WorldWideScience

Sample records for ubiquitous front door

  1. Through the EU's Back and Front Doors

    DEFF Research Database (Denmark)

    Adler-Nissen, Rebecca

    2015-01-01

    Through the EU's front- and backdoors: The selective Danish and Norwegian approaches in the Area of Freedom, Security and Justice Rebecca Adler-Nissen......Through the EU's front- and backdoors: The selective Danish and Norwegian approaches in the Area of Freedom, Security and Justice Rebecca Adler-Nissen...

  2. Confounding adjustment through front-door blocking in longitudinal studies

    Directory of Open Access Journals (Sweden)

    Arvid Sjölander

    2013-03-01

    Full Text Available A common aim of epidemiological research is to estimate the causal effect of a particular exposure on a particular outcome. Towards this end, observed associations are often ‘adjusted’ for potential confounding variables. When the potential confounders are unmeasured, explicit adjustment becomes unfeasible. It has been demonstrated that causal effects can be estimated even in the presence of umeasured confounding, utilizing a method called ‘front-door blocking’. In this paper we generalize this method to longitudinal studies. We demonstrate that the method of front-door blocking poses a number of challenging statistical problems, analogous to the famous problems associ- ated with the method of ‘back-door blocking’.

  3. Spam nation the inside story of organized cybercrime-from global epidemic to your front door

    CERN Document Server

    Krebs, Brian

    2014-01-01

    In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and countless viruses, phishing, and spyware attacks-he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere. Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma"-who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords-Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets. Not only are hundreds of thousands of Americans expos...

  4. Optimization of the blankholder force distribution with application to the stamping of a car front door panel (Numisheet'99)

    International Nuclear Information System (INIS)

    Ayed, L. Ben; Delameziere, A.; Batoz, J.L.; Knopf-Lenoir, C.

    2005-01-01

    New materials such as dual phase steel or aluminium and complex geometries of industrial parts increase the difficulties to obtain a defect free part by stamping. One way of solution is a better regulation of the blankholder pressures. Our work is based on an original idea of Siegert, Haeussermann and Haller. The goal is to control the movement of the blank under the blankholder. Thanks to a deformable flexible blankholder, it is possible to create some independent zones. In each zone, a blankholder force can be applied on the sheet, so that a strong force can hold the blank in a zone, and a smaller one can let it move in another zone. The methodology is presented as well as some results dealing with the optimization of the blankholder force considering the drawing of a front door panel (Numisheet'99 benchmark test). The numerical simulations are performed using ABAQUS Explicit. The parameters of the finite element model (mesh density, speed of punch) are set to achieve a good prediction with a minimum simulation time. The objective function is defined to minimize the work of the punch. Three inequality constraints functions were defined to avoid necking and wrinkling. To avoid necking, the major stress of the blank is limited to a value, which is determined by using the modified maximum force criterion (MMFC). To avoid wrinkling, under the blankholder, the angle between the blankholder surface and an element of the blank is limited to a value set by the user, as proposed by Gelin and Labergere. However, in the useful part of the workpiece, the major stress is limited to a value, which was proposed by Brunet, Batoz and Bouabdallah. For the localization of the optimum, we use a response surface method computed with a diffuse approximation and coupled with an adaptative strategy to update the research space

  5. Optimization of the blankholder force distribution with application to the stamping of a car front door panel (Numisheet'99)

    Science.gov (United States)

    Ayed, L. Ben; Delamézière, A.; Batoz, J. L.; Knopf-Lenoir, C.

    2005-08-01

    New materials such as dual phase steel or aluminium and complex geometries of industrial parts increase the difficulties to obtain a defect free part by stamping. One way of solution is a better regulation of the blankholder pressures. Our work is based on an original idea of Siegert, Häussermann and Haller. The goal is to control the movement of the blank under the blankholder. Thanks to a deformable flexible blankholder, it is possible to create some independent zones. In each zone, a blankholder force can be applied on the sheet, so that a strong force can hold the blank in a zone, and a smaller one can let it move in another zone. The methodology is presented as well as some results dealing with the optimization of the blankholder force considering the drawing of a front door panel (Numisheet'99 benchmark test). The numerical simulations are performed using ABAQUS Explicit. The parameters of the finite element model (mesh density, speed of punch) are set to achieve a good prediction with a minimum simulation time. The objective function is defined to minimize the work of the punch. Three inequality constraints functions were defined to avoid necking and wrinkling. To avoid necking, the major stress of the blank is limited to a value, which is determined by using the modified maximum force criterion (MMFC). To avoid wrinkling, under the blankholder, the angle between the blankholder surface and an element of the blank is limited to a value set by the user, as proposed by Gelin and Labergere. However, in the useful part of the workpiece, the major stress is limited to a value, which was proposed by Brunet, Batoz and Bouabdallah. For the localization of the optimum, we use a response surface method computed with a diffuse approximation and coupled with an adaptative strategy to update the research space.

  6. Ubiquitous positioning

    CERN Document Server

    Mannings, Robin

    2008-01-01

    This groundbreaking resource offers a practical, in-depth understanding of Ubiquitous Positioning - positioning systems that identify the location and position of people, vehicles and objects in time and space in the digitized networked economy. The future and growth of ubiquitous positioning will be fueled by the convergence of many other areas of technology, from mobile telematics, Internet technology, and location systems, to sensing systems, geographic information systems, and the semantic web. This first-of-its-kind volume explores ubiquitous positioning from a convergence perspective, of

  7. Ubiquitous human computing.

    Science.gov (United States)

    Zittrain, Jonathan

    2008-10-28

    Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a drawing pin and as large as a worldwide product distribution chain. What could happen when people are so readily networked? This paper explores issues arising from two possible emerging models of ubiquitous human computing: fungible networked brainpower and collective personal vital sign monitoring.

  8. Learning with Ubiquitous Computing

    Science.gov (United States)

    Rosenheck, Louisa

    2008-01-01

    If ubiquitous computing becomes a reality and is widely adopted, it will inevitably have an impact on education. This article reviews the background of ubiquitous computing and current research projects done involving educational "ubicomp." Finally it explores how ubicomp may and may not change education in both formal and informal settings and…

  9. Windows and doors

    Energy Technology Data Exchange (ETDEWEB)

    1988-01-01

    A complete manual is presented on windows and doors for the housing contractor. In order to understand the role of windows and doors in a house's energy performance, an introduction explains the house as a system of components that can have effects on each other. Further chapters explain in detail the parts of a window, window types and RSI values; window servicing and repair; window replacement; parts of a door, door types and RSI values; door service and repair, including weatherstripping; door replacement; and how to ensure quality, service, and customer satisfaction. A glossary of terms is included. 61 figs., 3 tabs.

  10. Ubiquitous Annotation Systems

    DEFF Research Database (Denmark)

    Hansen, Frank Allan

    2006-01-01

    Ubiquitous annotation systems allow users to annotate physical places, objects, and persons with digital information. Especially in the field of location based information systems much work has been done to implement adaptive and context-aware systems, but few efforts have focused on the general...... requirements for linking information to objects in both physical and digital space. This paper surveys annotation techniques from open hypermedia systems, Web based annotation systems, and mobile and augmented reality systems to illustrate different approaches to four central challenges ubiquitous annotation...... systems have to deal with: anchoring, structuring, presentation, and authoring. Through a number of examples each challenge is discussed and HyCon, a context-aware hypermedia framework developed at the University of Aarhus, Denmark, is used to illustrate an integrated approach to ubiquitous annotations...

  11. Science Opens Doors

    Science.gov (United States)

    Smyth, Steve; Smyth, Jen

    2016-01-01

    Science Opens Doors is the creation of Clive Thompson of the Horners' Livery Company. The Science Opens Doors project philosophy is strongly based upon the King's College London ASPIRES project, which established that children like doing science in junior school (ages 7-11), but that by the age of 12-14 they are firmly against becoming scientists.…

  12. A SURVEY ON UBIQUITOUS COMPUTING

    Directory of Open Access Journals (Sweden)

    Vishal Meshram

    2016-01-01

    Full Text Available This work presents a survey of ubiquitous computing research which is the emerging domain that implements communication technologies into day-to-day life activities. This research paper provides a classification of the research areas on the ubiquitous computing paradigm. In this paper, we present common architecture principles of ubiquitous systems and analyze important aspects in context-aware ubiquitous systems. In addition, this research work presents a novel architecture of ubiquitous computing system and a survey of sensors needed for applications in ubiquitous computing. The goals of this research work are three-fold: i serve as a guideline for researchers who are new to ubiquitous computing and want to contribute to this research area, ii provide a novel system architecture for ubiquitous computing system, and iii provides further research directions required into quality-of-service assurance of ubiquitous computing.

  13. Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Bardram, Jakob Eyvind; Friday, Adrian

    2009-01-01

    . While such growth is positive, the newest generation of ubicomp practitioners and researchers, isolated to specific tasks, are in danger of losing their sense of history and the broader perspective that has been so essential to the field’s creativity and brilliance. Under the guidance of John Krumm...... applications Privacy protection in systems that connect personal devices and personal information Moving from the graphical to the ubiquitous computing user interface Techniques that are revolutionizing the way we determine a person’s location and understand other sensor measurements While we needn’t become...

  14. Ubiquitous Network Society

    Directory of Open Access Journals (Sweden)

    Cristian USCATU

    2006-01-01

    Full Text Available Technology is evolving faster than ever in the ITC domain. Computing devices become smaller and more powerful by the day (and cheaper than ever. They have started to move away from the classical “computer” towards portable devices like personal digital assistants (PDAs and mobile phones. Even these devices are no longer what they used to be. A phone is no longer a simple voice communication device, but a minicomputer with lots of functions. The addition of wireless communication protocols, like WiFi and Bluetooth, leads to a web of interconnected devices with the final purpose of enabling us to access desired services anywhere, at any time. Adding less complicated devices, as sensors and detectors, located everywhere (clothes, cars, furniture, home appliances etc. but connected to the same global network, we have a technological world aware of itself and aware of us, ready to serve our needs without hindering our lives. “Ubiquitous computing names the third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives.” [Weiser, 1995

  15. Navigation studies based on the ubiquitous positioning technologies

    Science.gov (United States)

    Ye, Lei; Mi, Weijie; Wang, Defeng

    2007-11-01

    This paper summarized the nowadays positioning technologies, such as absolute positioning methods and relative positioning methods, indoor positioning and outdoor positioning, active positioning and passive positioning. Global Navigation Satellite System (GNSS) technologies were introduced as the omnipresent out-door positioning technologies, including GPS, GLONASS, Galileo and BD-1/2. After analysis of the shortcomings of GNSS, indoor positioning technologies were discussed and compared, including A-GPS, Cellular network, Infrared, Electromagnetism, Computer Vision Cognition, Embedded Pressure Sensor, Ultrasonic, RFID (Radio Frequency IDentification), Bluetooth, WLAN etc.. Then the concept and characteristics of Ubiquitous Positioning was proposed. After the ubiquitous positioning technologies contrast and selection followed by system engineering methodology, a navigation system model based on Incorporate Indoor-Outdoor Positioning Solution was proposed. And this model was simulated in the Galileo Demonstration for World Expo Shanghai project. In the conclusion, the prospects of ubiquitous positioning based navigation were shown, especially to satisfy the public location information acquiring requirement.

  16. Programmable ubiquitous telerobotic devices

    Science.gov (United States)

    Doherty, Michael; Greene, Matthew; Keaton, David; Och, Christian; Seidl, Matthew L.; Waite, William; Zorn, Benjamin G.

    1997-12-01

    We are investigating a field of research that we call ubiquitous telepresence, which involves the design and implementation of low-cost robotic devices that can be programmed and operated from anywhere on the Internet. These devices, which we call ubots, can be used for academic purposes (e.g., a biologist could remote conduct a population survey), commercial purposes (e.g., a house could be shown remotely by a real-estate agent), and for recreation and education (e.g., someone could tour a museum remotely). We anticipate that such devices will become increasingly common due to recent changes in hardware and software technology. In particular, current hardware technology enables such devices to be constructed very cheaply (less than $500), and current software and network technology allows highly portable code to be written and downloaded across the Internet. In this paper, we present our prototype system architecture, and the ubot implementation we have constructed based on it. The hardware technology we use is the handy board, a 6811-based controller board with digital and analog inputs and outputs. Our software includes a network layer based on TCP/IP and software layers written in Java. Our software enables users across the Internet to program the behavior of the vehicle and to receive image feedback from a camera mounted on it.

  17. Diplopie door monovisie

    NARCIS (Netherlands)

    Jorien Schouten; Louise Helmer

    2017-01-01

    Doelstelling: In kaart brengen van de risicofactoren voor het ontwikkelen van binoculaire diplopie na conventionele monovisie door middel van contactlenzen of refractiechirurgie bij presbyopen. Methode: Voor deze literatuurstudie is in maart 2017 gezocht in databanken Pubmed, ScienceDirect en Google

  18. The Future of Ubiquitous Elearning

    Science.gov (United States)

    Arndt, Timothy

    2014-01-01

    Post-secondary students are increasingly receiving instruction by eLearning. Many or these are part-time students or are working while taking classes. In such circumstances, students may find themselves short of time to study. One mechanism that can be exploited to make the best use of available time is ubiquitous eLearning. Ubiquitous eLearning…

  19. Door Locking Options in Schools

    Science.gov (United States)

    National Clearinghouse for Educational Facilities, 2009

    2009-01-01

    Doors serve a variety of needs and purposes in schools: (1) Exterior doors provide building security and protection from the elements; and (2) Interior doors control the movement of people among school spaces, help control noise and air flow, and act as flame and smoke barriers during a fire. In a lockdown, they serve as safety barriers. From a…

  20. Redox fronts

    International Nuclear Information System (INIS)

    Chapman, N.; McKinley, I.; Shea, M.; Smellie, J.

    1993-01-01

    This article describes the investigations of redox fronts performed at the Osamu Utsumi mine. Results obtained by modelling groups on the rate of movement of the redox fronts and on the chemical reactions involved are discussed. Some of the most important rockwater interactions which occur at redox fronts can be modelled reasonably well but the complex redox chemistry of elements like sulphur is poorly simulated. The observed enrichment of many trace elements close to the redox fronts could be of significance for high-level waste repositories, but cannot be quantified by existing models. (author) 6 figs., 1 tab

  1. Mobile and ubiquitous learning technologies

    NARCIS (Netherlands)

    Specht, Marcus

    2012-01-01

    Specht, M. (2012, 22 November). Mobile and ubiquitous learning technologies. Presentation given at the Workshop "Blended Learning an Hochschulen" at the Fakultätentag Informatik at the Universität Jena, Jena, Germany.

  2. Upgrading inflatable door seals

    International Nuclear Information System (INIS)

    Sykes, T.M.; Metcalfe, R.; Welch, L.A.; Josefowich, J.M.

    1997-01-01

    Inflatable door seals are used for airlocks in CANDU stations. They have been a significant source of unreliability and maintenance cost. A program is underway to improve their performance and reliability, backed by environmental qualification testing. Only commercial products and suppliers existed in 1993. For historical reasons, these 'existing products' did not use the most durable material then available. In hindsight, neither had they been adapted nor optimized to combat conditions often experienced in the plants-sagging doors, damaged sealing surfaces, and many thousands of openings and closings per year. Initial attempts to involve the two existing suppliers in efforts to upgrade these seals were unsuccessful. Another suitable supplier had therefore to be found, and a 'new,' COG-owned seal developed; this was completed in 1997. This paper summarizes its testing, along with that of the two existing products. Resistance to aging has been improved significantly. Testing has shown that an accident can be safely withstood after 10 years of service or 40,000 openings-closings, whichever comes first. AECL's Fluid Sealing Technology Unit (FSTU) has invested in the special moulds, test fixtures and other necessary tooling and documentation required to begin commercial manufacture of this new quality product. Accordingly, as with FSTU's other nuclear products such as pump seals, the long-term supply of door seals to CANDU plants is now protected from many external uncertainties-e.g., commercial products being discontinued, materials being changed, companies going out of business. Manufacturing to AECL's detailed specifications is being subcontracted to the new supplier. FSTU is performing the quality surveillance, inspection, testing, and customer service activities concomitant with direct responsibility for supply to the plants. (author)

  3. School Gardens: Teaching and Learning outside the Front Door

    Science.gov (United States)

    Passy, Rowena

    2014-01-01

    This article reports on two projects: one that investigated the impact of school gardens on primary children's learning and one that is currently exploring the pedagogies involved in teaching children in the garden. The evidence presented suggests that school gardens can be an interesting and effective way of engaging children with learning, but…

  4. Ubiquitous Computing, Complexity and Culture

    DEFF Research Database (Denmark)

    environments, experience time, and develop identities individually and socially. Interviews with working media artists lend further perspectives on these cultural transformations. Drawing on cultural theory, new media art studies, human-computer interaction theory, and software studies, this cutting-edge book......The ubiquitous nature of mobile and pervasive computing has begun to reshape and complicate our notions of space, time, and identity. In this collection, over thirty internationally recognized contributors reflect on ubiquitous computing’s implications for the ways in which we interact with our...... critically unpacks the complex ubiquity-effects confronting us every day....

  5. Trust Models in Ubiquitous Computing

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl; Sassone, Vladimiro

    2008-01-01

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.......We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models....

  6. Door Hardware and Installations; Carpentry: 901894.

    Science.gov (United States)

    Dade County Public Schools, Miami, FL.

    The curriculum guide outlines a course designed to provide instruction in the selection, preparation, and installation of hardware for door assemblies. The course is divided into five blocks of instruction (introduction to doors and hardware, door hardware, exterior doors and jambs, interior doors and jambs, and a quinmester post-test) totaling…

  7. Ubiquitous media for collocated interaction

    DEFF Research Database (Denmark)

    Morrison, Ann; Jacucci, Giulio; Peltonen, Peter

    2010-01-01

    Has ubiquitous computing entered our lives as anticipated in the early 90s or at the turn of the millennium? In this last decade, the processing of media combined with sensing and communication capabilities has been slowly entering our lives through powerful smartphones, multimodal game consoles,...

  8. International Symposium on Ubiquitous Networking

    CERN Document Server

    Medromi, Hicham; Sadik, Mohamed

    2016-01-01

    This volume publishes new trends and findings in hot topics related to ubiquitous computing/networking. It is the outcome of UNet - ainternational scientific event that took place on September 08-10, 2015, in the fascinating city of Casablanca, Morocco. UNet’15 is technically sponsored by IEEE Morocco Section and IEEE COMSOC Morocco Chapter.

  9. Trust models in ubiquitous computing.

    Science.gov (United States)

    Krukow, Karl; Nielsen, Mogens; Sassone, Vladimiro

    2008-10-28

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.

  10. The Status of Ubiquitous Computing.

    Science.gov (United States)

    Brown, David G.; Petitto, Karen R.

    2003-01-01

    Explains the prevalence and rationale of ubiquitous computing on college campuses--teaching with the assumption or expectation that all faculty and students have access to the Internet--and offers lessons learned by pioneering institutions. Lessons learned involve planning, technology, implementation and management, adoption of computer-enhanced…

  11. Ubiquitous emotion-aware computing

    NARCIS (Netherlands)

    van den Broek, Egon

    Emotions are a crucial element for personal and ubiquitous computing. What to sense and how to sense it, however, remain a challenge. This study explores the rare combination of speech, electrocardiogram, and a revised Self-Assessment Mannequin to assess people’s emotions. 40 people watched 30

  12. A Collaborative Model for Ubiquitous Learning Environments

    Science.gov (United States)

    Barbosa, Jorge; Barbosa, Debora; Rabello, Solon

    2016-01-01

    Use of mobile devices and widespread adoption of wireless networks have enabled the emergence of Ubiquitous Computing. Application of this technology to improving education strategies gave rise to Ubiquitous e-Learning, also known as Ubiquitous Learning. There are several approaches to organizing ubiquitous learning environments, but most of them…

  13. Retrofit curtain for overhead doors

    Energy Technology Data Exchange (ETDEWEB)

    Leckie, R E

    1987-12-29

    A heat insulating curtain has been developed for reducing heat losses through overhead doors of the type commonly found in industrial warehouses. The curtain consists of a reinforced polyester fabric attached to the outside top of the overhead door and moves with the door as it opens and closes. A T-shaped edge track seals the edges of the curtain to the door frame; the edge of the curtain is also T-shaped and runs up and down the track as the curtain is raised and lowered. The curtain fabric is ultraviolet resistant, durable, flexible, and transparent, and transforms the door into a solar collector which provides solar heated air to the building interior. Two curtains have been satisfactorily installed and tested at a warehouse in Calgary, Alberta. A market evaluation study was conducted to determine the possible buyers for such a door curtain. A target market consisting of those wishing to fix old, leaky doors was selected and a marketing strategy developed. The described strategy includes product development, pricing, distribution, promotion, and advertising. 2 figs., 1 tab.

  14. China opens the door

    Energy Technology Data Exchange (ETDEWEB)

    Starke, K.

    1997-01-01

    The door to China`s vast market for power generation was opened a bit further for foreign firms in November. That is when power ministry head Shi Dazhen said the country would rely on overseas investors for 20 percent of the funding needed to boost output--double the amount foreigners were previously allowed to contribute. Through 1995, foreigners invested $12.2 billion in China`s electricity industry, accounting for 10 percent of total investment. According to Shi, foreign investors will be asked to provide about $17 billion of the $84 billion China plans to invest in the sector over the next five years. Under China`s Ninth Five-Year Plan (1996-2000), the government aims to boost the country`s power generation capacity at the rate of 15,000 MW to 20,000 MW annually by the year 2000. Since China`s public external debt balance already exceeds $80 billion, however, the government would seem to have little choice but to allow foreigners a greater role. Shi also said that foreigners would be allowed 100 percent ownership of PRC power projects. This is discouraged under China`s current industry guidelines. It is, however, expected to be permitted under China`s first build-operate-transfer (BOT) law, which was anticipated by the end of 1996, says Susan Urkevich, director of project finance at HSBC Investment Bank Asia in Hong Kong. Indeed, China`s first BOT is already happening.

  15. Sweet Spots and Door Stops

    Science.gov (United States)

    Thompson, Michael; Tsui, Stella; Leung, Chi Fan

    2011-01-01

    A sweet spot is referred to in sport as the perfect place to strike a ball with a racquet or bat. It is the point of contact between bat and ball where maximum results can be produced with minimal effort from the hand of the player. Similar physics can be applied to the less inspiring examples of door stops; the perfect position of a door stop is…

  16. Ubiquitous Versus One-to-One

    Science.gov (United States)

    McAnear, Anita

    2006-01-01

    When we planned the editorial calendar with the topic ubiquitous computing, we were thinking of ubiquitous computing as the one-to-one ratio of computers to students and teachers and 24/7 access to electronic resources. At the time, we were aware that ubiquitous computing in the computer science field had more to do with wearable computers. Our…

  17. HCI in Mobile and Ubiquitous Computing

    OpenAIRE

    椎尾, 一郎; 安村, 通晃; 福本, 雅明; 伊賀, 聡一郎; 増井, 俊之

    2003-01-01

    This paper provides some perspectives to human computer interaction in mobile and ubiquitous computing. The review covers overview of ubiquitous computing, mobile computing and wearable computing. It also summarizes HCI topics on these field, including real-world oriented interface, multi-modal interface, context awareness and in-visible computers. Finally we discuss killer applications for coming ubiquitous computing era.

  18. Moving the campaign from the front door to the front pocket

    DEFF Research Database (Denmark)

    Bhatti, Yosef; Dahlgaard, Jens Olav; Hansen, Jonas Hedegaard

    2017-01-01

    Despite the widespread scholarly attention given to get-out-the-vote tactics the recent one and a half decade, few have studied the effect of short text messages (SMS) on voter turnout, and no previous such study has been conducted outside the US. We analyze four SMS experiments with more than 300......,000 voters conducted in relation to two elections in Denmark and find intention-to-treat (ITT) effects between 0.33 and 1.82 percentage points with a pooled effect of 0.74 percentage points. Furthermore, we vary the timing and the content of the messages to test existing theories of text messages...... as mobilization tools. In one experiment, we find messages delivered before Election Day to have a higher effect than those delivered on Election Day, while we find no additional effect of delivering multiple messages. We also vary message content and in general find no significant differences from sending...

  19. A Door-to-Door Combined Transport Planner

    DEFF Research Database (Denmark)

    Aastrup, Jesper; Jespersen, Per Homann; Pedersen, Michael B.

    2004-01-01

    Establishing a web-based portal functioning as a one-stop-shop for transport buyers is a radical idea of a consumer oriented intermodal freight system. This utopian vision will be materialized in a system description and a prototype of a Door-to-Door Combined Trans-port Planner (COTRAP), developed......- and inter-organizational barriers to the establishment of a competitive and effective combined transport system with rail freight operators as the intermodal integrator. In this paper we describes the ideas and methodology behind the project, as well as some preliminary results....

  20. Opening Doors, Hearts and Minds

    Science.gov (United States)

    Foster, Andrea

    2007-01-01

    A panel discussion, "Opening Doors, Hearts and Minds," was hosted at the 2006 annual COEO conference. Four dedicated Torontonians shared how they interpret outdoor environmental education and environmental education in what they do and offered suggestions as to how their work might be integrated in diverse urban communities. Tafari…

  1. Design proposal for door thresholds

    Directory of Open Access Journals (Sweden)

    Smolka Radim

    2017-01-01

    Full Text Available Panels for openings in structures have always been an essential and integral part of buildings. Their importance in terms of a building´s functionality was not recognised. However, the general view on this issue has changed from focusing on big planar segments and critical details to sub-elements of these structures. This does not only focus on the forms of connecting joints but also on the supporting systems that keep the panels in the right position and ensure they function properly. One of the most strained segments is the threshold structure, especially the entrance door threshold structure. It is the part where substantial defects in construction occur in terms of waterproofing, as well as in the static, thermal and technical functions thereof. In conventional buildings, this problem is solved by pulling the floor structure under the entrance door structure and subsequently covering it with waterproofing material. This system cannot work effectively over the long term so local defects occur. A proposal is put forward to solve this problem by installing a sub-threshold door coupler made of composite materials. The coupler is designed so that its variability complies with the required parameters for most door structures on the European market.

  2. Koperemissies door drinkwaterleidingen (herziene editie)

    NARCIS (Netherlands)

    Verweij W; Mons MN; Aalbers JEM; Cruchten RGH van; LWD

    1996-01-01

    Ge-inventariseerd werd wat er bekend is over de fluxen van koper door (corrosie van) waterleidingen naar rioolwaterzuiveringsinstallaties (rwzi's), rwzi-slib en het oppervlaktewater. Gebleken is dat in 1993 (landelijk gemiddeld) 57% van de koperbelasting van rwzi's afkomstig is van

  3. Ubiquitous Multicriteria Clinic Recommendation System.

    Science.gov (United States)

    Chen, Toly

    2016-05-01

    Advancements in information, communication, and sensor technologies have led to new opportunities in medical care and education. Patients in general prefer visiting the nearest clinic, attempt to avoid waiting for treatment, and have unequal preferences for different clinics and doctors. Therefore, to enable patients to compare multiple clinics, this study proposes a ubiquitous multicriteria clinic recommendation system. In this system, patients can send requests through their cell phones to the system server to obtain a clinic recommendation. Once the patient sends this information to the system, the system server first estimates the patient's speed according to the detection results of a global positioning system. It then applies a fuzzy integer nonlinear programming-ordered weighted average approach to assess four criteria and finally recommends a clinic with maximal utility to the patient. The proposed methodology was tested in a field experiment, and the experimental results showed that it is advantageous over two existing methods in elevating the utilities of recommendations. In addition, such an advantage was shown to be statistically significant.

  4. Dashboard for Analyzing Ubiquitous Learning Log

    Science.gov (United States)

    Lkhagvasuren, Erdenesaikhan; Matsuura, Kenji; Mouri, Kousuke; Ogata, Hiroaki

    2016-01-01

    Mobile and ubiquitous technologies have been applied to a wide range of learning fields such as science, social science, history and language learning. Many researchers have been investigating the development of ubiquitous learning environments; nevertheless, to date, there have not been enough research works related to the reflection, analysis…

  5. [When doors slam, fingers jam!].

    Science.gov (United States)

    Claudet, I; Toubal, K; Carnet, C; Rekhroukh, H; Zelmat, B; Debuisson, C; Cahuzac, J-P

    2007-08-01

    Epidemiological analysis in a universitary paediatric emergency unit of children admitted after accidental injuries resulting from fingers crushed in a door. Prospective, descriptive cohort study from September 6th, 2004 to July 1st, 2005 included all children admitted for finger injuries crushed in a non-automatic door. included accidents due to automatic doors, toy's or refrigerator doors, families who refused to participate to the study or families who had left the waiting area before medical examination. Collected data were patient and family characteristics, accident characteristics and its management. Three hundred and forty children affected by 427 digital lesions were included. The mean age was 5.5+/-3.8 years (range 4 months - 15.5 years). Male/female ratio was equal to 1.2: 1. Fifty-eight percent of patients belonged to families composed of 3 or more siblings. Ninety-three per cent of families came to hospital within the first 2 hours after the accident (mean delay 99+/-162 min, median range 54 minutes). Location of the accident was: domestic (62%, at home (64%)), at school (17%). Locations within the home were: the bedroom (33%), bathroom and toilets (21%). An adult was present in 75% of cases and responsible for the trauma in 25% of accidents, another child in 44%. The finger or fingers were trapped on the hinge side in 57% of patients. No specific safeguard devices were used by 94% of families. Among victims, 20% had several crushed digits; left and right hand were injured with an equal frequency. The commonest involved digits were: the middle finger (29%), the ring finger (23%). The nail plate was damaged in 60% of digital lesions, associated with a wound (50%), a distal phalanx fracture (P3) (12%). Six children had a partial or complete amputation of P3, 2 children a lesion of the extensor tendon, 1 child had a rupture of the external lateral ligament. Three percent of children required an admission to the paediatric orthopaedic surgery unit. Post

  6. Multimedia and ubiquitous engineering MUE 2013

    CERN Document Server

    Ng, Joseph; Jeong, Hwa; Waluyo, Borgy

    2013-01-01

    The new multimedia standards (for example, MPEG-21) facilitate the seamless integration of multiple modalities into interoperable multimedia frameworks, transforming the way people work and interact with multimedia data. These key technologies and multimedia solutions interact and collaborate with each other in increasingly effective ways, contributing to the multimedia revolution and having a significant impact across a wide spectrum of consumer, business, healthcare, education, and governmental domains. Multimedia and Ubiquitous Engineering provides an opportunity for academic and industry professionals to discuss recent progress in the area of multimedia and ubiquitous environment including models and systems, new directions, novel applications associated with the utilization and acceptance of ubiquitous computing devices and systems.

  7. Embedding Moodle into Ubiquitous Computing Environments

    NARCIS (Netherlands)

    Glahn, Christian; Specht, Marcus

    2010-01-01

    Glahn, C., & Specht, M. (2010). Embedding Moodle into Ubiquitous Computing Environments. In M. Montebello, et al. (Eds.), 9th World Conference on Mobile and Contextual Learning (MLearn2010) (pp. 100-107). October, 19-22, 2010, Valletta, Malta.

  8. Scott Brothers Windows and Doors Information Sheet

    Science.gov (United States)

    Scott Brothers Windows and Doors (the Company) is located in Bridgeville, Pennsylvania. The settlement involves renovation activities conducted at property constructed prior to 1978, located in Pittsburgh, Pennsylvania.

  9. Holiday Door Decorating Contest Brings Cheer | Poster

    Science.gov (United States)

    By Carolynne Keenan, Contributing Writer Other than the time of year, what do the following have in common: the leg lamp from the movie “A Christmas Story,” a compilation of silly holiday jokes, a gingerbread house, and Santa on a motorcycle? All four were among the individual door winners for the Holiday Door Decorating Contest, held at NCI at Frederick in December. Employees dressed up their office doors, hallways, and even stairwells to participate. Entries for the contest included individual office doors as well as groups. Some employees even “decked the halls” of whole office buildings to participate.

  10. 29 CFR 1917.114 - Cargo doors.

    Science.gov (United States)

    2010-07-01

    ... counterweights shall be guarded. (2) Lift trucks and cranes shall not be used to move mechanically operated doors.... (1) The door shall be connected to its lifting tackle with shackles or equally secure means. (2) Lifting bridles and tackles shall have a safety factor of five, based upon maximum anticipated static...

  11. The Ins and Outs of Modern Doors.

    Science.gov (United States)

    College Planning & Management, 1999

    1999-01-01

    Discusses the qualities and trends in modern metal doors for educational facilities that include fire protection and sound-control attributes. Important differences in door manufacturing methods and materials are addressed and sound-transmission class values, ratings, and rating descriptions are listed. (GR)

  12. EMPLACEMENT DRIFT ISOLATION DOOR CONTROL SYSTEM

    International Nuclear Information System (INIS)

    N.T. Raczka

    1998-01-01

    The purpose of this analysis is to review and refine key design concepts related to the control system presently under consideration for remotely operating the emplacement drift isolation doors at the potential subsurface nuclear waste repository at Yucca Mountain. This analysis will discuss the key design concepts of the control system that may be utilized for remotely monitoring, opening, and closing the emplacement drift isolation doors. The scope and primary objectives of this analysis are to: (1) Discuss the purpose and function of the isolation doors (Presented in Section 7.1). (2) Review the construction of the isolation door and other physical characteristics of the doors that the control system will interface with (Presented in Section 7.2). (3) Discuss monitoring and controlling the operation of the isolation doors with a digital control system (either a Programmable Logic Controller (PLC) system or a Distributed Control System (DCS)) (Presented in Section 7.3). (4) Discuss how all isolation doors can be monitored and controlled from a subsurface central control center (Presented in Section 7.4). This analysis will focus on the development of input/output (I/O) counts including the types of I/O, redundancy and fault tolerance considerations, and processor requirements for the isolation door control system. Attention will be placed on operability, maintainability, and reliability issues for the system operating in the subsurface environment with exposure to high temperatures and radiation

  13. A Foot Operated Timeout Room Door Latch.

    Science.gov (United States)

    Foxx, R. M.; And Others

    1982-01-01

    This report describes the design and implementation of a foot operated timeout room door latch that permits staff members to maintain a misbehaving retarded individual in timeout without locking the door. Use of the latch also frees the staff member involved to record behavioral observations or reinforce appropriate behavior. (Author)

  14. Taksterfte in Buxus, veroorzaakt door Cylindrocladium buxicola

    NARCIS (Netherlands)

    Kuik, van A.J.; Dalfsen, van P.

    2010-01-01

    De laatste jaren wordt de Buxusteelt geplaagd door een ziekte die veroorzaakt wordt door de schimmel Cylindrocladium buxicola. Gezien de snelle uitbreiding van de ziekte is het voor kwekers en afnemers van Buxus van groot belang dat deze problematiek wordt aangepakt. Daar om is begin 2006 in

  15. Ubiquitous Information Technologies and Applications CUTE 2012

    CERN Document Server

    Park, Doo-Soon; Jia, Weijia; Yeo, Sang-Soo

    2013-01-01

    This book is for The 7th International Conference on Ubiquitous Information Technologies and Applications (CUTE 2012). Ubiquitous computing will require a new approach to fitting technology to our lives. The advent of new computing devices, and the seamless connectivity between these devices, thanks to diverse wired and wireless networks, are enabling new opportunities for a user to perform his/her operation all the time and everywhere. These seamlessly connected devices are ranging from mobile handset to wearable computers. Also, it is expected that these devices will become so pervasive that they will be embedded in the surrounding physical environment, and transparent and invisible to a user. Such devices, whether carried on by people or embedded into other systems, will constitute a global internetworking infrastructure and likely to provide a new level of openness and dynamics. Ubiquitous computing has as its goal the enhancing computer use by pushing computational services out of conventional desktop in...

  16. Unit and ubiquitous Internet of Things

    CERN Document Server

    Ning, Huansheng

    2013-01-01

    Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts. Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous Internet of Things introduces essential IoT concepts from the perspectives of mapping and interaction between the physical world and the cyber world. It addresses key issues such as strategy and education, particularly around unit and ubiquitous IoT technologies. Supplying a new pers

  17. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  18. Learning potentials of the ubiquitous internet

    DEFF Research Database (Denmark)

    Dalsgaard, Christian; Pedersen, Nicholai Friis; Aaen, Janus Holst

    The aim of this paper is to identify the key learning potentials of the ubiquitous internet. Rather than focusing on mobile technology or the mobility of the learner, the paper emphasises the ubiquity of internet access as a paramount catalyst for new learning in the digital age. From...... a sociocultural perspective the paper discusses different ways in which the use of mobile devices can extend and augment the context of the learner. The learning potentials of the ubiquitous internet relate to the opportunities to extend the context of the learner on three levels: 1) personalisation...

  19. Creating ubiquitous intelligent sensing environments (CRUISE)

    DEFF Research Database (Denmark)

    Prasad, Neeli R.; Prasad, Ramjee

    2006-01-01

    The recent developments in the research and the technology have brought attention to the wireless sensor networks as one of the key enabling technologies in the next 10 years. Ubiquitous Intelligent Sensing Environments have promising future in supporting the everyday life of the European citizens...

  20. Ubiquitous Computing in Physico-Spatial Environments

    DEFF Research Database (Denmark)

    Dalsgård, Peter; Eriksson, Eva

    2007-01-01

    Interaction design of pervasive and ubiquitous computing (UC) systems must take into account physico-spatial issues as technology is implemented into our physical surroundings. In this paper we discuss how one conceptual framework for understanding interaction in context, Activity Theory (AT...

  1. Designing for Privacy in Ubiquitous Social Networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Figueiras, Joao

    2015-01-01

    Improving human communication during face–to–face meetings is nowadays possible by transferring online social networking benefits to the physical world. This is enabled by the ubiquitous social networking services that became available by means of wirelessly interconnected smart devices...

  2. Ubiquitous developments of the digital single market

    NARCIS (Netherlands)

    Maciejewski, M.; Porrino, F.; Veenstra, A.F.E. van; Marcus, J.S.; Cave, J.; Huijboom, N.M.; Elixmann, D.; Hillebrand, A.; Schindler, R.; Horvath, V.

    2013-01-01

    Ubiquitous solutions providing access from anywhere at any time are a next step for government and commercial services, and are expected to result in lower costs, increased flexibility, and an enhanced user experience. These solutions, based on modern cloud technologies, may facilitate re-use across

  3. An unexpected knock on Corrigan's secret door.

    Science.gov (United States)

    Woywodt, Alexander

    2010-10-01

    Corrigan's secret door describes a metaphorical escape route for busy physicians. The term was derived from the successful and exceptionally busy professional life of Irish physician Dominic John Corrigan (1802-80). It is claimed that Corrigan's outpatient clinic was so busy that he required a secret door in his consulting rooms to escape from the ever-growing queue of eager patients. The origins of this charming story are unknown, and the door may have never existed. However, at present, Corrigan's secret door is often quoted when busy physicians have their own little ways in surviving a stressful professional life. Generations of British-trained doctors have grown up with Corrigan's secret door, as it was featured in the introduction of the Oxford Handbook of Clinical Medicine. Accordingly, trainees as well as more senior doctors are often reminded that having a 'secret door' is vital in surviving in the medical profession. My own escape is through classical music and the violoncello, in particular. As the name implies, my own secret door is normally invisible to colleagues and patients. This little article is about a patient who found me out, and a reflection on the role of classical music and the cello in my professional life.

  4. Bulkhead Door – Critical Evacuation States

    Directory of Open Access Journals (Sweden)

    Flizikowski Józef

    2017-03-01

    Full Text Available The article is a preliminary to a modification concept of the sliding watertight bulkhead door used on ships and vessels. Hydraulic or electro-hydraulic drives used to move these doors require complicated and extended pressure installations with large amounts of hydraulic fluid. Well-known operational drawbacks of these installations include high level of noise and possibility of various leaks in the hydraulic system. Being the first in a series, the present article describes and analyses critical states which can take place during evacuation of people through openings in the watertight bulkhead doors on seagoing ships and vessels.

  5. Ubiquitous Retailing Innovative Scenario: From the Fixed Point of Sale to the Flexible Ubiquitous Store

    Directory of Open Access Journals (Sweden)

    Eleonora Pantano

    2013-05-01

    Full Text Available The current advances in information and communications technologies developed new tools for retailers to innovate. In fact, the increasing computing capacity and the advancements in networking systems provided a new ubiquitous scenario that can be adapted for retailing in order to develop innovative shopping environments. The aim of this paper is to deeply understand the emergence of the ubiquitous retailing phenomenon and the possible shift from the physical point of sale to a ubiquitous one, by analysing this radical innovation and the main consequences for frms and market.

  6. September 2013: the doors open

    CERN Document Server

    Antonella Del Rosso

    2013-01-01

    Three special days and one public open day: at the end of September our Laboratory will open its doors to visitors from CERN, the local region and all over the world. With over 150,000 visitors expected in total, the organisation of the OpenDays is a challenge that a core team of eleven people have taken up with enthusiasm.   They come from several departments but share one goal: making the last four days of September an unforgettable experience for all the visitors who will come to discover the Laboratory and its scientists. The core team in charge of the organisation of the events is co-ordinated by Hermann Schmickler. “The events are an opportunity for us to celebrate  the discoveries, the excellent performance of the technical installations and the vital contribution of all the CERN personnel, the thousands of users and those working under support contracts,” says Hermann Schmickler. The four-day programme will start on Friday 27 September with an “...

  7. The Globe reopens its doors

    CERN Multimedia

    CERN Bulletin

    2016-01-01

    After a year of work, the newly renovated Globe of Science and Innovation will open its doors again at 10 a.m. on Tuesday, 19 April. The “Universe of Particles” exhibition has been updated and will be open to the public, free of charge, from 10 a.m. to 5 p.m., Monday to Saturday (except during official CERN closures). The Globe’s programme of lectures and events for the general public will restart at the end of April. What’s on at the Globe in April and May: - 28 April at 6.30 p.m.: Theatre – “Curie_Meitner_Lamarr_indivisible”, a play that pays tribute to the lives of three exceptional women in the field of science and technology (in English). Reservations: http://indico.cern.ch/e/cmli - 10 May at 8.30 p.m.: Lecture – “Le modèle du CERN et les grands défis mondiaux” (“The CERN model and the key global challenges”) by Michel Spiro (in French with simultaneous ...

  8. Development of inverter for elevator door control

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J.K.; Choi, U.D.; Jung, M.K.; Choi, S.K. [HHI R and D Center (Korea, Republic of); Yun, J.H.; Han, S.B. [HELCO R and D Center (Korea, Republic of)

    1995-07-01

    Most of the elevator door controllers have been controlled by DC Motors as an actuator. Recently, The control system using AC induction motor and general purpose inverter has been applied to control of elevator door. But there are some difficulties in making use of this system, such as adjustment of door speed pattern, door open-close time, and security of passenger safety. In order to solve these problems, a special inverter has been developed with an encoder feedback. From the result of field-test, we proved that a special inverter with encoder feedback device has come to considerable effect. Until now about 1,200 sets of these inverters are operated in Korea and about 100 sets are operated in South-east Asia. (author). 3 refs., 10 figs., 3 tabs.

  9. Ubiquitous Robotic Technology for Smart Manufacturing System.

    Science.gov (United States)

    Wang, Wenshan; Zhu, Xiaoxiao; Wang, Liyu; Qiu, Qiang; Cao, Qixin

    2016-01-01

    As the manufacturing tasks become more individualized and more flexible, the machines in smart factory are required to do variable tasks collaboratively without reprogramming. This paper for the first time discusses the similarity between smart manufacturing systems and the ubiquitous robotic systems and makes an effort on deploying ubiquitous robotic technology to the smart factory. Specifically, a component based framework is proposed in order to enable the communication and cooperation of the heterogeneous robotic devices. Further, compared to the service robotic domain, the smart manufacturing systems are often in larger size. So a hierarchical planning method was implemented to improve the planning efficiency. A test bed of smart factory is developed. It demonstrates that the proposed framework is suitable for industrial domain, and the hierarchical planning method is able to solve large problems intractable with flat methods.

  10. An Instrumental Paradigm for Ubiquitous Interaction

    DEFF Research Database (Denmark)

    Klokmose, Clemens Nylandsted

    2008-01-01

    will require comprehensive experimental user centred development. Originality/Value -- This research offers a new way of thinking interaction, suited for the dynamism of modern computing. Take away message -- Through a strong foundation in activity theory and ecological psychology a new paradigm for ubiquitous...... shortcomings of some of the restrictive assumptions contemporary graphical user interfaces are built upon. Research approach -- Based on activity theory and ecological psychology a conceptual model for ubiquitous interaction is proposed and iteratively challenged and developed through actual implementation....... Findings/Design -- The project will ultimately shed light on how an understanding of interaction form activity theory and ecological psychology maps to an implementation of a new conceptual model for interaction with technology. Research limitations/Implications -- Implementation of an actual system...

  11. Student Assessment in the Ubiquitously Connected World

    OpenAIRE

    Adams, A. A.

    2017-01-01

    Student cheating on university assessments from entrance exams to finals and from contract cheating on coursework to requesting exam answers using a mobile phone during the exam, has received more and more attention of late. As connection to the Internet becomes ubiquitous and computing and communications technology more embedded in our environment, it is argued that a re-focussing on providing educational opportunities is needed in higher education, rather than chasing the ever-retreating p...

  12. Vraaggericht werken door narratief onderzoek

    Directory of Open Access Journals (Sweden)

    Joos Meesters

    2010-09-01

    Full Text Available Narrative research as a means for demand-driven policy and interventions This article reports on the advantages of performing narrative research discovering need patterns of families, children, local residents regarding quality of the pedagogical climate in their neighbourhood. A need pattern is a constructed set of related questions and needs that people express in response to life events, concrete experiences or within their current habitat. A method for narrative analysis was developed for two applications: use as a research tool and use as a change management tool. In this method professionals assume the role of narrative researchers and simultaneously learn to listen to the demands and needs of their potential clients from a more objective perspective. The method has been developed while performing transdisciplinary narrative research in the town-area of Hatert in Nijmegen, which will be presented as an example case throughout the text. Vraaggericht werken door narratief onderzoek Dit artikel gaat in op de mogelijkheden van narratief onderzoek in het opsporen van vraagpatronen van gezinnen, kinderen, wijkbewoners met betrekking tot de kwaliteit van het opgroeiklimaat in hun wijk. Een vraagpatroon is een set van samenhangende vragen en behoeften die burgers uiten naar aanleiding van een levensgebeurtenis, een concrete ervaring of binnen de actuele context waar zij in leven. Voor deze vorm van onderzoek is een vraaganalyse-instrument ontwikkeld om deze vraagpatronen te identificeren. Dit instrument heeft een dubbel perspectief. Het is een onderzoeksinstrument en een veranderkundig instrument. De professional kruipt in de rol van onderzoeker en leert hiermee te luisteren naar de vragen en behoeften van burgers. Het instrument is ontwikkeld in en voor een transdisciplinair, narratief onderzoek in de wijk Hatert in Nijmegen, dat we als casus zullen presenteren.

  13. Electric two wheelers, zero emission solution for urban door to door transportation

    DEFF Research Database (Denmark)

    Fasil, Muhammed; Jensen, Bogi Bech

    The noise and exhaust pollution coupled with increasing congestion faced by urban centres demands new personal mobility solution for faster door to door connectivity. The advancement in electric power train and lowering cost of Li-ion battery is made it possible to develop light weight fully...

  14. Comparing energy use and environmental emissions of reinforced wood doors and steel doors

    Science.gov (United States)

    Lynn Knight; Melissa Huff; Janet I. Stockhausen; Robert J. Ross

    2005-01-01

    The USDA Forest Service Forest Products Laboratory has patented a technology that incorporates fiberglass-reinforced wood into the structure of wood doors and other wood building products. The process of reinforcing wood doors with epoxy and fiberglass increases the strength and durability of the product. Also, it allows the use of low-value, small-diameter wood which...

  15. Negative Ion Density Fronts

    International Nuclear Information System (INIS)

    Igor Kaganovich

    2000-01-01

    Negative ions tend to stratify in electronegative plasmas with hot electrons (electron temperature Te much larger than ion temperature Ti, Te > Ti ). The boundary separating a plasma containing negative ions, and a plasma, without negative ions, is usually thin, so that the negative ion density falls rapidly to zero-forming a negative ion density front. We review theoretical, experimental and numerical results giving the spatio-temporal evolution of negative ion density fronts during plasma ignition, the steady state, and extinction (afterglow). During plasma ignition, negative ion fronts are the result of the break of smooth plasma density profiles during nonlinear convection. In a steady-state plasma, the fronts are boundary layers with steepening of ion density profiles due to nonlinear convection also. But during plasma extinction, the ion fronts are of a completely different nature. Negative ions diffuse freely in the plasma core (no convection), whereas the negative ion front propagates towards the chamber walls with a nearly constant velocity. The concept of fronts turns out to be very effective in analysis of plasma density profile evolution in strongly non-isothermal plasmas

  16. Gas dynamic laser having shutter doors

    International Nuclear Information System (INIS)

    Olinger, J.B. Jr.; Wahl, R.L.

    1975-01-01

    A gas dynamic laser is shown wherein gases containing constituents necessary to obtain a lasing action are passed through a nozzle array and directed into a lasing cavity and through a diffuser to an exit. An opening is located on each side of said lasing cavity with a shutter box outside of said cavity having a shutter door for opening or closing said opening. A mirror box is located behind each shutter box and contains a mirror. These mirrors are aligned with the openings in the lasing cavity with each door positioned between an opening and a mirror. Another outlet opening is positioned downstream of the first opening which provides an outlet opening for a laser beam. A shutter box is located around this opening and also houses a shutter door for opening and closing said opening. The mirror box which extends behind this shutter box includes opening means for permitting the output beam to pass through an aerodynamic window to atmosphere. Actuating means are provided for rapidly opening and closing said shutter doors. Bearing means including recirculating balls are located on the top and bottom of each shutter door to ride in tracks at an angle to the sealing surface on the laser device. Vacuum means are provided to reduce the pressure in the shutter box and mirror box independently of the pressure in the lasing cavity

  17. A proposal of ubiquitous fuzzy computing for ambient Intelligence

    NARCIS (Netherlands)

    Acampora, G.; Loia, V.

    2008-01-01

    Ambient Intelligence is considered as the composition of three emergent technologies: Ubiquitous Computing, Ubiquitous Communication and Intelligent User Interfaces. The aim of integration of aforesaid technologies is to make wider the interaction between human beings and information technology

  18. Ubiquitous fuzzy computing in open ambient intelligence environments

    NARCIS (Netherlands)

    Acampora, G.; Loia, V.

    2006-01-01

    Ambient intelligence (AmI) is considered as the composition of three emergent technologies: ubiquitous computing, ubiquitous communication and intelligent user interfaces. The aim of integration of aforesaid technologies is to make wider the interaction between human beings and information

  19. CILT2000: Ubiquitous Computing--Spanning the Digital Divide.

    Science.gov (United States)

    Tinker, Robert; Vahey, Philip

    2002-01-01

    Discusses the role of ubiquitous and handheld computers in education. Summarizes the contributions of the Center for Innovative Learning Technologies (CILT) and describes the ubiquitous computing sessions at the CILT2000 Conference. (Author/YDS)

  20. New Trends on Ubiquitous Mobile Multimedia Applications

    Directory of Open Access Journals (Sweden)

    Oliveira Marco

    2010-01-01

    Full Text Available Mobile devices present the opportunity to enhance our fast-growing and globally connected society, improving user-experience through novel approaches for information dissemination through mobile communication. The research community is developing new technologies, services, and applications to enable ubiquitous environments based on mobile technology. This paper tackles several important challenges such as communication cost and device limitations for development of ubiquitous multimedia applications. And we propose a system for news delivery using a set of wireless multimedia applications. For this purpose, we have performed a case study with Apple iPhone's platform, featuring two multimedia application contexts, namely, Web and native applications. The multimedia mobile applications draw on iPhone's assets, enabling context-awareness to distribute news, improving communication efficiency and setting-up viewing optimizations, thus enhancing user-experience. The proposed system is evaluated and validated through a series of real-life experiments on real devices, with online full availability. Moreover, due to the Web application availability, the system is not restrained to Apple's iPhone platform, but can also benefit users with other devices.

  1. Ubiquitous computing in shared-care environments.

    Science.gov (United States)

    Koch, S

    2006-07-01

    In light of future challenges, such as growing numbers of elderly, increase in chronic diseases, insufficient health care budgets and problems with staff recruitment for the health-care sector, information and communication technology (ICT) becomes a possible means to meet these challenges. Organizational changes such as the decentralization of the health-care system lead to a shift from in-hospital to both advanced and basic home health care. Advanced medical technologies provide solutions for distant home care in form of specialist consultations and home monitoring. Furthermore, the shift towards home health care will increase mobile work and the establishment of shared care teams which require ICT-based solutions that support ubiquitous information access and cooperative work. Clinical documentation and decision support systems are the main ICT-based solutions of interest in the context of ubiquitous computing for shared care environments. This paper therefore describes the prerequisites for clinical documentation and decision support at the point of care, the impact of mobility on the documentation process, and how the introduction of ICT-based solutions will influence organizations and people. Furthermore, the role of dentistry in shared-care environments is discussed and illustrated in the form of a future scenario.

  2. Design and Construction of Pool Door for Research Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Kwangsub; Lee, Sangjin; Choi, Jinbok; Oh, Jinho; Lee, Jongmin [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    The pool door is a structure to isolate the reactor pool from the service pool for maintenance. The pool door is installed before the reactor pool is drained. The pool door consists of structural component and sealing component. The main structures of the pool door are stainless steel plates and side frames. The plates and frames are assembled by welded joints. Lug is welded at the top of the plate. The pool door is submerged in the pool water when it is used. Materials of the pool door should be resistive to corrosion and radiation. Stainless steel is used in structural components and air nozzle assemblies. Features of design and construction of the pool door for the research reactor are introduced. The pool door is designed to isolate the reactor pool for maintenance. Structural analysis is performed to evaluate the structural integrity during earthquake. Tests and inspections are also carried out during construction to identify the safety and function of the pool door.

  3. Design and Construction of Pool Door for Research Reactor

    International Nuclear Information System (INIS)

    Jung, Kwangsub; Lee, Sangjin; Choi, Jinbok; Oh, Jinho; Lee, Jongmin

    2016-01-01

    The pool door is a structure to isolate the reactor pool from the service pool for maintenance. The pool door is installed before the reactor pool is drained. The pool door consists of structural component and sealing component. The main structures of the pool door are stainless steel plates and side frames. The plates and frames are assembled by welded joints. Lug is welded at the top of the plate. The pool door is submerged in the pool water when it is used. Materials of the pool door should be resistive to corrosion and radiation. Stainless steel is used in structural components and air nozzle assemblies. Features of design and construction of the pool door for the research reactor are introduced. The pool door is designed to isolate the reactor pool for maintenance. Structural analysis is performed to evaluate the structural integrity during earthquake. Tests and inspections are also carried out during construction to identify the safety and function of the pool door

  4. Ubiquitous Learning Environments in Higher Education: A Scoping Literature Review

    Science.gov (United States)

    Virtanen, Mari Aulikki; Haavisto, Elina; Liikanen, Eeva; Kääriäinen, Maria

    2018-01-01

    Ubiquitous learning and the use of ubiquitous learning environments heralds a new era in higher education. Ubiquitous learning environments enhance context-aware and seamless learning experiences available from any location at any time. They support smooth interaction between authentic and digital learning resources and provide personalized…

  5. Integrating Collaborative and Decentralized Models to Support Ubiquitous Learning

    Science.gov (United States)

    Barbosa, Jorge Luis Victória; Barbosa, Débora Nice Ferrari; Rigo, Sandro José; de Oliveira, Jezer Machado; Rabello, Solon Andrade, Jr.

    2014-01-01

    The application of ubiquitous technologies in the improvement of education strategies is called Ubiquitous Learning. This article proposes the integration between two models dedicated to support ubiquitous learning environments, called Global and CoolEdu. CoolEdu is a generic collaboration model for decentralized environments. Global is an…

  6. The Construction of an Ontology-Based Ubiquitous Learning Grid

    Science.gov (United States)

    Liao, Ching-Jung; Chou, Chien-Chih; Yang, Jin-Tan David

    2009-01-01

    The purpose of this study is to incorporate adaptive ontology into ubiquitous learning grid to achieve seamless learning environment. Ubiquitous learning grid uses ubiquitous computing environment to infer and determine the most adaptive learning contents and procedures in anytime, any place and with any device. To achieve the goal, an…

  7. Coherent structures amidst chaos: Solitons, fronts, and vortices

    International Nuclear Information System (INIS)

    Campbell, D.K.

    1996-01-01

    I introduce the concept of open-quote open-quote coherent structures close-quote close-quote emdash localized, persistent, propagating nonlinear waves emdash and argue that they are ubiquitous in spatially extended nonlinear systems. I discuss various specific forms of coherent structures emdash solitons, wave fronts, vortices emdash and illustrate how they arise in physics, chemistry, biology, and physiology. copyright 1996 American Institute of Physics

  8. Networked Biomedical System for Ubiquitous Health Monitoring

    Directory of Open Access Journals (Sweden)

    Arjan Durresi

    2008-01-01

    Full Text Available We propose a distributed system that enables global and ubiquitous health monitoring of patients. The biomedical data will be collected by wearable health diagnostic devices, which will include various types of sensors and will be transmitted towards the corresponding Health Monitoring Centers. The permanent medical data of patients will be kept in the corresponding Home Data Bases, while the measured biomedical data will be sent to the Visitor Health Monitor Center and Visitor Data Base that serves the area of present location of the patient. By combining the measured biomedical data and the permanent medical data, Health Medical Centers will be able to coordinate the needed actions and help the local medical teams to make quickly the best decisions that could be crucial for the patient health, and that can reduce the cost of health service.

  9. Ubiquitous health in practice: the interreality paradigm.

    Science.gov (United States)

    Gaggioli, Andrea; Raspelli, Simona; Grassi, Alessandra; Pallavicini, Federica; Cipresso, Pietro; Wiederhold, Brenda K; Riva, Giuseppe

    2011-01-01

    In this paper we introduce a new ubiquitous computing paradigm for behavioral health care: "Interreality". Interreality integrates assessment and treatment within a hybrid environment, that creates a bridge between the physical and virtual worlds. Our claim is that bridging virtual experiences (fully controlled by the therapist, used to learn coping skills and emotional regulation) with real experiences (allowing both the identification of any critical stressors and the assessment of what has been learned) using advanced technologies (virtual worlds, advanced sensors and PDA/mobile phones) may improve existing psychological treatment. To illustrate the proposed concept, a clinical scenario is also presented and discussed: Daniela, a 40 years old teacher, with a mother affected by Alzheimer's disease.

  10. De fietsstraat : Onderzoek naar fietsverbindingen door verblijfsgebieden

    NARCIS (Netherlands)

    Andriesse, H.C.; Hansen, J.A.

    1996-01-01

    De bestaande fietsverbindingen in de stad lopen meestal langs doorgaande wegen met druk autoverkeer. Door de toename van het autoverkeer zijn deze verbindingen niet altijd meer de meest geschikte fietsvoorzieningen. Ook de maatregelen die in het kader van duurzaam veilig wegverkeer worden

  11. Maillard-reactie door model beheersbaar

    NARCIS (Netherlands)

    Roost, van M.

    2006-01-01

    Gewenste en ongewenste bruinkleuring van levensmiddelen door een Maillard-reactie is vaak lastig te beheersen. Wageningse onderzoekers ontwikkelden een simulatiemodel, waarmee producentenmeer inzicht krijgen in de Maillard-reactie, en zo ook de kleur van het eindproduct beter kunnen beheersen

  12. Gaffkemia van kreeften door Aerococcus viridans

    NARCIS (Netherlands)

    Engelsma, M.Y.; Haenen, O.L.M.

    2011-01-01

    Artikel over een bacteriële ziekte van onder andere kreeften, de zogenaamde Gaffkemia, veroorzaakt door de bacterie Aerococcus viridans. Deze ziekte is in Nederland nog niet eerder gevonden bij kreeften, maar zou met importen van kreeftachtigen mee kunnen komen.

  13. Gezondheidsschade door calamiteiten met gevaarlijke stoffen

    NARCIS (Netherlands)

    Weger, D. de; Feron, V.J.; Zwart, A.; Vrijer, F. de

    1993-01-01

    Door de Afdeling Industriële Veiligheid van IMET-TNO (Instituut voor Milieu- en Energietechnologie, Hoofdgroep Milieu en Energie te Apeldoorn) en de Afdeling Biologische Toxicologie van ITV-TNO (Instituur voor Toxicologie en voeding, Hoofdgroep Voeding te Zeist) is het project 'Gezondheidsschade

  14. 14 CFR 25.783 - Fuselage doors.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Fuselage doors. 25.783 Section 25.783 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT AIRWORTHINESS... operated manually; (ii) The powered latch actuators, if installed; and (iii) The relative motion between...

  15. Doors for memory: A searchable database.

    Science.gov (United States)

    Baddeley, Alan D; Hitch, Graham J; Quinlan, Philip T; Bowes, Lindsey; Stone, Rob

    2016-11-01

    The study of human long-term memory has for over 50 years been dominated by research on words. This is partly due to lack of suitable nonverbal materials. Experience in developing a clinical test suggested that door scenes can provide an ecologically relevant and sensitive alternative to the faces and geometrical figures traditionally used to study visual memory. In pursuing this line of research, we have accumulated over 2000 door scenes providing a database that is categorized on a range of variables including building type, colour, age, condition, glazing, and a range of other physical characteristics. We describe an illustrative study of recognition memory for 100 doors tested by yes/no, two-alternative, or four-alternative forced-choice paradigms. These stimuli, together with the full categorized database, are available through a dedicated website. We suggest that door scenes provide an ecologically relevant and participant-friendly source of material for studying the comparatively neglected field of visual long-term memory.

  16. Door valve for fuel handling path

    International Nuclear Information System (INIS)

    Makishima, Katsuhiko.

    1969-01-01

    A door valve is provided which seals cover gas from a liquid metal cooled reactor without leakage therefrom. A threaded shaft is screwed into a heavy box press which is packed with lead. The shaft is adapted to be rotated by an electric motor or a manually operated wheel which is disposed outside of the door valve. From the box press a valve plate is suspended by four linkage bars, one for each corner. Each linkage bar is provided with two wheels which are respectively mounted at the connections with the box press and the valve plate. The wheels are carried on the horizontal grooves formed in a door valve casing. In operation the shaft rotates and travels to permit the box press and the valve plate to move into the door valve casing while the valve plate does not contact the casing. When the box press reaches the home position, the wheels drop into the recesses which are disposed at the ends of the grooves, the valve plate is carried on the valve opening, and the box press presses the valve plate to increase the tightness. The valve plate does not suffer wear as it does not over other parts. (Yamaguchi, T.)

  17. Development of a tornado safe room door from wood Products: door design and impact testing

    Science.gov (United States)

    Robert H. Falk; James J. Bridwell

    2016-01-01

    In this study, a tornado safe room door built from wood products and steel sheeting was developed and impact-tested according to tornado safe room standards. Results indicate that an door constructed from as few as two sheets of 23/32-in. (18.26-mm) construction-grade plywood and overlaid with 18-gauge (0.05-in.- (1.27- mm-) thick) steel can pass the required impact...

  18. Light-Front QCD

    Energy Technology Data Exchange (ETDEWEB)

    Brodsky, S.

    2004-11-30

    In these lectures, I survey a number of applications of light-front methods to hadron and nuclear physics phenomenology and dynamics, including light-front statistical physics. Light-front Fock-state wavefunctions provide a frame-independent representation of hadrons in terms of their fundamental quark and gluon degrees of freedom. Nonperturbative methods for computing LFWFs in QCD are discussed, including string/gauge duality which predicts the power-law fall-off at high momentum transfer of light-front Fock-state hadronic wavefunctions with an arbitrary number of constituents and orbital angular momentum. The AdS/CFT correspondence has important implications for hadron phenomenology in the conformal limit, including an all-orders derivation of counting rules for exclusive processes. One can also compute the hadronic spectrum of near-conformal QCD assuming a truncated AdS/CFT space. Given the LFWFs, one can compute form factors, heavy hadron decay amplitudes, hadron distribution amplitudes, and the generalized parton distributions underlying deeply virtual Compton scattering. The quantum fluctuations represented by the light-front Fock expansion leads to novel QCD phenomena such as color transparency, intrinsic heavy quark distributions, diffractive dissociation, and hidden-color components of nuclear wavefunctions. A new test of hidden color in deuteron photodisintegration is proposed. The origin of leading-twist phenomena such as the diffractive component of deep inelastic scattering, single-spin asymmetries, nuclear shadowing and antishadowing is also discussed; these phenomena cannot be described by light-front wavefunctions of the target computed in isolation. Part of the anomalous NuTeV results for the weak mixing angle {theta}{sub W} could be due to the non-universality of nuclear antishadowing for charged and neutral currents.

  19. Beam front accelerators

    International Nuclear Information System (INIS)

    Reiser, M.

    1982-01-01

    An intense relativistic electron beam cannot propagate in a metal drift tube when the current exceeds the space charge limit. Very high charge density and electric field gradients (10 2 to 10 3 MV/m) develop at the beam front and the electrons are reflected. When a neutral gas or a plasma is present, collective acceleration of positive ions occur, and the resulting charge neutralization enables the beam to propagate. Experimental results, theoretical understanding, and schemes to achieve high ion energies by external control of the beam front velocity will be reviewed

  20. Ubiquitous information for ubiquitous computing: expressing clinical data sets with openEHR archetypes.

    Science.gov (United States)

    Garde, Sebastian; Hovenga, Evelyn; Buck, Jasmin; Knaup, Petra

    2006-01-01

    Ubiquitous computing requires ubiquitous access to information and knowledge. With the release of openEHR Version 1.0 there is a common model available to solve some of the problems related to accessing information and knowledge by improving semantic interoperability between clinical systems. Considerable work has been undertaken by various bodies to standardise Clinical Data Sets. Notwithstanding their value, several problems remain unsolved with Clinical Data Sets without the use of a common model underpinning them. This paper outlines these problems like incompatible basic data types and overlapping and incompatible definitions of clinical content. A solution to this based on openEHR archetypes is motivated and an approach to transform existing Clinical Data Sets into archetypes is presented. To avoid significant overlaps and unnecessary effort during archetype development, archetype development needs to be coordinated nationwide and beyond and also across the various health professions in a formalized process.

  1. Ubiquitous Monitoring of Electrical Household Appliances

    Science.gov (United States)

    Lloret, Jaime; Macías, Elsa; Suárez, Alvaro; Lacuesta, Raquel

    2012-01-01

    The number of appliances at home is increasing continuously, mainly because they make our lives easier. Currently, technology is integrated in all objects of our daily life. TCP/IP let us monitor our home in real time and check ubiquitously if something is happening at home. Bearing in mind this idea, we have developed a low-cost system, which can be used in any type of electrical household appliance that takes information from the appliance and posts the information to the Twitter Social network. Several sensors placed in the household appliances gather the sensed data and send them wired or wirelessly, depending on the case, using small and cheap devices to a gateway located in the home. This gateway takes decisions, based on the received data, and sends notifications to Twitter. We have developed a software application that takes the values and decides when to issue an alarm to the registered users (Twitter friends of our smart home). The performance of our system has been measured taking into account the home network (using IEEE 802.3u and IEEE 802.11g) and the data publishing in Twitter. As a result, we have generated an original product and service for any electrical household appliance, regardless of the model and manufacturer, that helps home users improve their quality of life. The paper also shows that there is no system with the same innovative features like the ones presented in this paper. PMID:23202205

  2. Ubiquitous monitoring of electrical household appliances.

    Science.gov (United States)

    Lloret, Jaime; Macías, Elsa; Suárez, Alvaro; Lacuesta, Raquel

    2012-11-07

    The number of appliances at home is increasing continuously, mainly because they make our lives easier. Currently, technology is integrated in all objects of our daily life. TCP/IP let us monitor our home in real time and check ubiquitously if something is happening at home. Bearing in mind this idea, we have developed a low-cost system, which can be used in any type of electrical household appliance that takes information from the appliance and posts the information to the Twitter Social network. Several sensors placed in the household appliances gather the sensed data and send them wired or wirelessly, depending on the case, using small and cheap devices to a gateway located in the home. This gateway takes decisions, based on the received data, and sends notifications to Twitter. We have developed a software application that takes the values and decides when to issue an alarm to the registered users (Twitter friends of our smart home). The performance of our system has been measured taking into account the home network (using IEEE 802.3u and IEEE 802.11g) and the data publishing in Twitter. As a result, we have generated an original product and service for any electrical household appliance, regardless of the model and manufacturer, that helps home users improve their quality of life. The paper also shows that there is no system with the same innovative features like the ones presented in this paper.

  3. Ubiquitous Graphene Electronics on Scotch Tape

    Science.gov (United States)

    Chung, Yoonyoung; Ho Kim, Hyun; Lee, Sangryun; Lee, Eunho; Won Kim, Seong; Ryu, Seunghwa; Cho, Kilwon

    2015-07-01

    We report a novel concept of graphene transistors on Scotch tape for use in ubiquitous electronic systems. Unlike common plastic substrates such as polyimide and polyethylene terephthalate, the Scotch tape substrate is easily attached onto various objects such as banknotes, curved surfaces, and human skin, which implies potential applications wherein electronics can be placed in any desired position. Furthermore, the soft Scotch tape serves as an attractive substrate for flexible/foldable electronics that can be significantly bent, or even crumpled. We found that the adhesive layer of the tape with a relatively low shear modulus relaxes the strain when subjected to bending. The capacitance of the gate dielectric made of oxidized aluminum oxide was 1.5 μF cm-2, so that a supply voltage of only 2.5 V was sufficient to operate the devices. As-fabricated graphene transistors on Scotch tape exhibited high electron mobility of 1326 (±155) cm2 V-1 s-1 the transistors still showed high mobility of 1254 (±478) cm2 V-1 s-1 even after they were crumpled.

  4. UBIQUITOUS POLLUTION FROM HEALTH AND COSMETIC ...

    Science.gov (United States)

    Those chemical pollutants that are regulated under various international, federal, and state programs represent but a small fraction of the universe of chemicals that occur in the environment as a result of both natural processses and human influence. Although this galaxy of targeted chemicals might be miniuscule compared with the universe of both known and yet-to-be identified chemicals, an implicit assumption is that these selective lists of chemicals are responsible for the most significant share of risk with respect to environmental or economic impairment or to human health.Pharmaceuticals and person care products (PPCPs) comprise a particularly large and diverse array of unregulated pollutants that occur in the environment from the combined activities and actions of multitudes of individuals as well as from veterinary and agricultural use. Although the concentration of any individual PPCP are generally less than ppt-ppb), evidence is accumulateing that these trace-level pollutants are ubiquitous, they can have a continuous presence regardless of environment half-lives (especially where sanitary wastewaters enter the environment), and the numbers of distinct and varied chemical entities could be extremely large (given that thousands are in commerical use). The research focused on in the subtasks is the development and application of state-of the-art technologies to meet the needs of the public, Office of Water, and ORD in the area of Water Quality. Locat

  5. Security policies and trust in ubiquitous computing.

    Science.gov (United States)

    Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand

    2008-10-28

    Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

  6. World market in front of the door; Weltmarkt vor der Tuer

    Energy Technology Data Exchange (ETDEWEB)

    Schwarzburger, Heiko

    2013-07-01

    The company Kreuz Bad and Heizung GmbH (Schnaittach, Federal Republic of Germany) installed photovoltaic power plants and heating systems for years. Now the experience pays off: After all, customers want to be independent both in the boiler room as well as in te electricity error.

  7. Delivering Food to the Front Door: A New, Or Very Old, Convenience?

    Directory of Open Access Journals (Sweden)

    Christopher Muller

    2015-02-01

    Full Text Available A century of commercial competitive conflict between the grocery (food at home or “FAH” and restaurant (food away from home or “FAFH” distribution channels is now being fought on an unexpected but previously contested battlefield: who will own the “convenience” of delivery in the consumer’s mind.

  8. A Storied Past: The Best Tales are Often Found Right inside Your Own Front Door

    Science.gov (United States)

    Elliott, Zetta

    2011-01-01

    In this article, the author talks about her past experiences and how she immersed herself in African-American literature. While teaching a journalism class in an after-school program at the Decatur Clearpool Beacon School in Brooklyn's Bed-Stuy section, the author realized that most of her students had no sense of African-American history beyond a…

  9. Standing in front of a closed door. Piotr Dumała’s Franz Kafka

    Directory of Open Access Journals (Sweden)

    Kamil Kościelski

    2015-12-01

    Full Text Available Directed by Piotr Dumala, Franz Kafka is a very unusual example of a biographical movie. The film is composed of carefully thought-out poetic images which, according to the director himself, reflect the “psychic landscape” of the title character. Thus scenes inspired by Kafka's life and his Diaries intertwine with episodes that refer to his literary works. Dumala shows deep understand-ing of the writer’s characteristic way of depicting reality and the unusual perspective of narration indicates his thorough knowledge of Kafka’s works. Dumala draws on this heritage and creates an emotional portrait of the writer, while at the same time providing a universal reflection on the human condition.

  10. Intelligent Multi-Agent Middleware for Ubiquitous Home Networking Environments

    OpenAIRE

    Minwoo Son; Seung-Hun Lee; Dongkyoo Shin; Dongil Shin

    2008-01-01

    The next stage of the home networking environment is supposed to be ubiquitous, where each piece of material is equipped with an RFID (Radio Frequency Identification) tag. To fully support the ubiquitous environment, home networking middleware should be able to recommend home services based on a user-s interests and efficiently manage information on service usage profiles for the users. Therefore, USN (Ubiquitous Sensor Network) technology, which recognizes and manages a ...

  11. Ubiquitous and pervasive commerce new frontiers for electronic business

    CERN Document Server

    Roussos, George

    2006-01-01

    The new capabilities of ubiquitous and pervasive computing imply that products, locations, consumers and employees create rich streams of information about themselves, their immediate environment and their use. This book brings together technological and business aspects of conducting commerce using ubiquitous and pervasive computing techniques and also examines its implications for society at large. Individual chapters examine in detail the core technologies that make ubiquitous computing possible, the business standards that must be established to support the envisioned global infrastructure

  12. Nuclear Storage Overpack Door Actuator and Alignment Apparatus

    International Nuclear Information System (INIS)

    Andreyko, Gregory M.

    2005-01-01

    The invention is a door actuator and alignment apparatus for opening and closing the 15,000-pound horizontally sliding door of a storage overpack. The door actuator includes a ball screw mounted horizontally on a rigid frame including a pair of door panel support rails. An electrically powered ball nut moves along the ball screw. The ball nut rotating device is attached to a carriage. The carriage attachment to the sliding door is horizontally pivoting. Additional alignment features include precision cam followers attached to the rails and rail guides attached to the carriage

  13. A ubiquitous reflective e-portfolio architecture.

    Science.gov (United States)

    Forte, Marcos; de Souza, Wanderley L; da Silva, Roseli F; do Prado, Antonio F; Rodrigues, Jose F

    2013-11-01

    In nurse and in medicine courses, the use of reflective portfolios as a pedagogical tool is becoming a common practice; in the last years, this practice has gradually migrated from paper-based to electronic-based portfolios. Current approaches for reflective e-portfolios, however, do not widely operate at outdoor sites, where data networks are limited or nonexistent. Considering that many of the activities related to nurse and medicine courses relate to professional practices conducted in such conditions, these network shortcomings restrict the adoption of e-portfolios. The present study describes the requirements specification, design, implementation, and evaluation of the Ubiquitous Reflective E-Portfolio Architecture, a solution proposed to support the development of systems based on mobile and wired access for both online and offline operation. We have implemented a prototype named Professional Practice Module to evaluate the Ubiquitous Reflective E-Portfolio Architecture; the module was based on requirements observed during the professional practice, the paper-based portfolio in use, and related learning meetings in the Medicine Course of a Brazilian University. The evaluation of the system was carried out with a learning group of 2nd year students of the medicine course, who answered to extensive evaluation questionnaires. The prototype proved to be operational in the activities of the professional practice of the Medicine Course object of the study, including homework tasks, patient care, data sharing, and learning meetings. It also demonstrated to be versatile with respect to the availability of the computer network that, many times, was not accessible. Moreover, the students considered the module useful and easy to use, but pointed out difficulties about the keyboard and the display sizes of the netbook devices, and about their operational system. Lastly, most of the students declared preference for the electronic Professional Practice Module in internal

  14. Door valve for fuel handling path

    International Nuclear Information System (INIS)

    Makishima, Katsuhiko.

    1969-01-01

    A door valve is provided which seals cover gas from a liquid metal cooled reactor without leakage therefrom. A threaded shaft is screwed into a heavy box press which is packed with lead. The shaft is adapted to be rotated by an electric motor or a manually operated wheel which is disposed outside of the door valve. A valve plate is suspended from the box press by four guide wheels mounted thereon. The guide wheels are fitted into inclined guide grooves formed at the valve plate and into grooved formed in the inner wall of a valve casing. A locking ball is provided at each side of the valve plate. In operation the shaft rotates and travels to permit the box press and the valve plate to move into the door valve casing, thus releasing the locking balls. The valve plate does not contact the bottom of the casing. When the box press reaches the home position, the valve plate is carried on the valve opening, and the box press presses the valve plate to increase the tightness. The valve plate does not suffer wear as it does not slide over other parts. (Yamaguchi, T.)

  15. Dynamics of curved fronts

    CERN Document Server

    Pelce, Pierre

    1989-01-01

    In recent years, much progress has been made in the understanding of interface dynamics of various systems: hydrodynamics, crystal growth, chemical reactions, and combustion. Dynamics of Curved Fronts is an important contribution to this field and will be an indispensable reference work for researchers and graduate students in physics, applied mathematics, and chemical engineering. The book consist of a 100 page introduction by the editor and 33 seminal articles from various disciplines.

  16. Radiative thermal conduction fronts

    International Nuclear Information System (INIS)

    Borkowski, K.J.; Balbus, S.A.; Fristrom, C.C.

    1990-01-01

    The discovery of the O VI interstellar absorption lines in our Galaxy by the Copernicus observatory was a turning point in our understanding of the Interstellar Medium (ISM). It implied the presence of widespread hot (approx. 10 to the 6th power K) gas in disk galaxies. The detection of highly ionized species in quasi-stellar objects' absorption spectra may be the first indirect observation of this hot phase in external disk galaxies. Previous efforts to understand extensive O VI absorption line data from our Galaxy were not very successful in locating the regions where this absorption originates. The location at interfaces between evaporating ISM clouds and hot gas was favored, but recent studies of steady-state conduction fronts in spherical clouds by Ballet, Arnaud, and Rothenflug (1986) and Bohringer and Hartquist (1987) rejected evaporative fronts as the absorption sites. Researchers report here on time-dependent nonequilibrium calculations of planar conductive fronts whose properties match well with observations, and suggest reasons for the difference between the researchers' results and the above. They included magnetic fields in additional models, not reported here, and the conclusions are not affected by their presence

  17. Ubiquitous Learning Project Using Life-Logging Technology in Japan

    Science.gov (United States)

    Ogata, Hiroaki; Hou, Bin; Li, Mengmeng; Uosaki, Noriko; Mouri, Kosuke; Liu, Songran

    2014-01-01

    A Ubiquitous Learning Log (ULL) is defined as a digital record of what a learner has learned in daily life using ubiquitous computing technologies. In this paper, a project which developed a system called SCROLL (System for Capturing and Reusing Of Learning Log) is presented. The aim of developing SCROLL is to help learners record, organize,…

  18. Implications of Ubiquitous Computing for the Social Studies Curriculum

    Science.gov (United States)

    van Hover, Stephanie D.; Berson, Michael J.; Bolick, Cheryl Mason; Swan, Kathleen Owings

    2004-01-01

    In March 2002, members of the National Technology Leadership Initiative (NTLI) met in Charlottesville, Virginia to discuss the potential effects of ubiquitous computing on the field of education. Ubiquitous computing, or "on-demand availability of task-necessary computing power," involves providing every student with a handheld computer--a…

  19. Ubiquitous Computing: The Universal Use of Computers on College Campuses.

    Science.gov (United States)

    Brown, David G., Ed.

    This book is a collection of vignettes from 13 universities where everyone on campus has his or her own computer. These 13 institutions have instituted "ubiquitous computing" in very different ways at very different costs. The chapters are: (1) "Introduction: The Ubiquitous Computing Movement" (David G. Brown); (2) "Dartmouth College" (Malcolm…

  20. Towards context adaptive privacy decisions in ubiquitous computing

    NARCIS (Netherlands)

    Schaub, Florian; Könings, Bastian; Weber, M.; Kargl, Frank

    2012-01-01

    In ubiquitous systems control of privacy settings will be increasingly difficult due to the pervasive nature of sensing and communication capabilities. We identify challenges for privacy decisions in ubiquitous systems and propose a system for in situ privacy decision support. When context changes

  1. Architecture of personal healthcare information system in ubiquitous healthcare

    NARCIS (Netherlands)

    Bhardwaj, S.; Sain, M.; Lee, H.-J.; Chung, W.Y.; Slezak, D.; et al., xx

    2009-01-01

    Due to recent development in Ubiquitous Healthcare now it’s time to build such application which can work independently and with less interference of Physician. In this paper we are try to build the whole architecture of personal Healthcare information system for ubiquitous healthcare which also

  2. Real-time door detection for indoor autonomous vehicle

    Science.gov (United States)

    He, Zhihao; Zhu, Ming

    2017-07-01

    Indoor Autonomous Vehicle(IAV) is used in many indoor scenes. Such as hotels and hospitals. Door detection is a key issue to guide the IAV into rooms. In this paper, we consider door detection in the use of indoor navigation of IAV. Since real-time properties are important for real-world IAV, the detection algorithm must be fast enough. Most monocular-camera based door detection model need a perfect detection of the four line segments of the door or the four corners. But in many situations, line segments could be extended or cut off. And there could be many false detected corners. And few of them can distinguish doors from door-like objects with door-like shape effectively. We proposed a 2-D vision model of the door that is made up of line segments. The number of parts detected is used to determine the possibility of a door. Our algorithm is tested on a database of doors.1 The robustness and real-time are verified. The precision is 89.4%. Average time consumed for processing a 640x320 figure is 44.73ms.

  3. Traumatic asphyxia--fatal accident in an automatic revolving door.

    Science.gov (United States)

    Cortis, J; Falk, J; Rothschild, M A

    2015-09-01

    Due to continuing modernisation, the number of automatic doors in routine use, including powered revolving doors, has increased in recent years. Automatic revolving doors are found mostly in department stores, airports, railway stations and hospitals. Although safety arrangements and guidelines concerning the installation of automatic doors are in existence, their disregard in conjunction with obsolete or incorrect installation can lead to fatal accidents. In this report, a 19-month-old boy is described whose right arm was caught between the elements of an automatic revolving door. As a direct result of rescue attempts, the child's body was drawn further into the narrow gap between elements of the door. To get the boy's body out of the 4-cm-wide gap between the fixed outer wall of the revolving door and the revolving inner, back-up batteries had to be disconnected so as to stop the electrical motor powering the door. Cardiopulmonary resuscitation was begun immediately after the rescue but was unsuccessful; the child was declared dead at the hospital he was taken to. The cause of death was a combination of compression-related skull and brain injury together with thoracic compression. This case shows an outstanding example of the preventive aspect as a special task of forensic medicine. Additionally, it serves as a warning for the correct installation and use of automatic revolving doors. Even so, small children should not use these doors on their own, but only with an alert companion, so as to prevent further fatal accidents of this sort.

  4. Critical element development of double seal door for tritium containment

    International Nuclear Information System (INIS)

    Kanamori, Naokazu; Kakudate, Satoshi; Oka, Kiyoshi; Nakahira, Masataka; Taguchi, Kou; Obara, Kenjiro; Tada, Eisuke; Shibanuma, Kiyoshi; Seki, Masahiro

    1994-08-01

    In fusion experimental reactors, the in-vessel components such as blanket are activated due to D-T operation and they have to be assembled and replaced by remote operation through port penetration of plasma vacuum vessel. A double seal door is inevitably required at an interface between vacuum vessel port and maintenance cask in order to avoid the dispersion of tritium and activated dust during in-vessel component handling. The double seal door should have two open/close doors with four seal surfaces so as to keep leak tightness both of the vacuum vessel and the maintenance cask when doors closed, and to provide access space for handling in-vessel components when doors opened. A prototype compact double seal door with an attractive kinematics of parabolic trajectory has been proposed so as to minimize dead space for the door open/close operation, compared with ordinary slide or hinge type door. Based on this design concept, a sub-scaled model of double seal door with trapezoidal cross-section of around 0.2 m 2 has been fabricated. Through the preliminary experiments such as open/close performance, the double seal door mechanism with parabolic trajectory has been successfully demonstrated. As for leak tightness, seal characteristics of a polyimide ring irradiated up to 10 MGy have been measured. (author)

  5. Opening the doors: building brand awareness.

    Science.gov (United States)

    John, Judith; McCartney, Rob

    2006-01-01

    In search of a credible and cost-effective way to promote Mount Sinai Hospital (Mount Sinai) and educate a broad public, Mount Sinai opened its doors wide to The Globe and Mail (The Globe). The result was a three-part national feature series that told Mount Sinai's compelling story, provided third-party credibility and confirmed the value of proactive media relations. The series engaged our staff, energized our volunteers and reached both stakeholders and the general public on an emotional level. It also generated the more than dollars 6 million worth of equivalent advertising space it would have required for Mount Sinai to reach this national audience.

  6. Stationary flow near fronts

    Directory of Open Access Journals (Sweden)

    Reinhold Steinacker

    2016-12-01

    Full Text Available In 1906, the Austrian scientist Max Margules published a paper on temperature stratification in resting and non-accelerated moving air. The paper derives conditions for stationary slopes of air mass boundaries and was an important forerunner of frontal theories. Its formulation of relations between changes in density and geostrophic wind across the front is basically a discrete version of the thermal wind balance equation. The paper was highly influential and is still being cited to the present day. This paper accompanies an English translation of Margules’ seminal paper. We conclude here our “Classic Papers” series of the Meteorologische Zeitschrift.

  7. Design Report for ACP Hot Cell Rear Door

    Energy Technology Data Exchange (ETDEWEB)

    Ku, J. H.; Kwon, K. C.; Choung, W. M.; Cho, I. J.; Kook, D. H.; Lee, W. K.; You, G. S.; Lee, E. P.; Park, S. W

    2005-12-15

    A hot-cell facility was constructed at the IMEF building for the demonstrate ACP process. ACP hot-cell consists of process cell and maintenance cell, and each cell has rear door. Since this facility was constructed at basement floor, all process materials, equipment and radioactive materials are take in and out through the rear door. Also, this door can be an access route of workers for the maintenance works. Therefore ACP hot-cell rear doors must maintain the radiation shielding, sealing, mechanical and structural safety. This report presents design criteria, design contents of each part and driving part. It was confirmed that the rear doors sufficiently maintain the safety through the structural analysis and shielding analysis. Also, it was confirmed that the rear doors were constructed as designed by the gamma scanning test after the installation.

  8. Modal analysis of pool door in water tank

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kang Soo; Jeong, Kyeong Hoon; Park, Chan Gook; Koo, In Soo [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    A pool door is installed at the chase of the pool gate by means of an overhead crane in the building of a research reactor. The principal function of the pool door, which is located between the reactor pool and service pool, is to separate the reactor pool from the service pool for the maintenance and/or the removal of the equipment either in the reactor pool or service pool. The pool door consists of stainless steel plates supported by structural steel frames and sealing components. The pool door is equipped with double inflatable gaskets. The configuration of the pool door is shown in Figure 1. The FEM analysis and theoretical calculation by the formula were performed to evaluate the natural frequency for the pool door in the water. The results from the two methods were compared.

  9. Design Report for ACP Hot Cell Rear Door

    International Nuclear Information System (INIS)

    Ku, J. H.; Kwon, K. C.; Choung, W. M.; Cho, I. J.; Kook, D. H.; Lee, W. K.; You, G. S.; Lee, E. P.; Park, S. W.

    2005-12-01

    A hot-cell facility was constructed at the IMEF building for the demonstrate ACP process. ACP hot-cell consists of process cell and maintenance cell, and each cell has rear door. Since this facility was constructed at basement floor, all process materials, equipment and radioactive materials are take in and out through the rear door. Also, this door can be an access route of workers for the maintenance works. Therefore ACP hot-cell rear doors must maintain the radiation shielding, sealing, mechanical and structural safety. This report presents design criteria, design contents of each part and driving part. It was confirmed that the rear doors sufficiently maintain the safety through the structural analysis and shielding analysis. Also, it was confirmed that the rear doors were constructed as designed by the gamma scanning test after the installation

  10. COMPARISON OF RESULTS OF THERMAL TESTS OF BALCONY DOORS

    Directory of Open Access Journals (Sweden)

    Golubev Stanislav Sergeevich

    2012-10-01

    Full Text Available Results of thermal tests of balcony doors are presented in the article. In the course of the research project, two types of doors were tested. The first type represents a PVC frame door (width 82 mm; it has a triple glazing (4K-16Ar-4-16Ar-K4; its blank part represents a polystyrene sandwich panel (width 40 mm. The second type represents a PVC frame door (width 82 mm, that has a triple glazing (4K-16Ar-4-16Ar-K4 and composite PVC panels. The testing procedure and processing results are described in the article. The test has demonstrated that the thermal resistance value of the balcony door of the first type exceeds the thermal resistance value of the balcony door of the second type.

  11. Socio-technical Issues for Ubiquitous Information Society in 2010

    Science.gov (United States)

    Funabashi, Motohisa; Homma, Koichi; Sasaki, Toshiro; Sato, Yoshinori; Kido, Kunihiko; Fukumoto, Takashi; Yano, Koujin

    Impact of the ubiquitous information technology on our society is so significant that directing technological development and preparing institutional apparatus are quite important and urgent. The present paper elaborates, with the efforts by both humanity and engineering disciplines, to find out the socio-technical issues of ubiquitous information society in 2010 by inspecting social implications of emerging technology as well as social expectations. In order to deliberate the issues, scenarios are developed that describes possible life in ubiquitous information society. The derived issues cover integrating information technology and human body, producing smart sharable environment, protecting individual rights, fostering new service business, and forming community.

  12. USE OF UBIQUITOUS TECHNOLOGIES IN MILITARY LOGISTIC SYSTEM IN IRAN

    Directory of Open Access Journals (Sweden)

    P. Jafari

    2013-09-01

    Full Text Available This study is about integration and evaluation of RFID and ubiquitous technologies in military logistic system management. Firstly, supply chain management and the necessity of a revolution in logistic systems especially in military area, are explained. Secondly RFID and ubiquitous technologies and the advantages of their use in supply chain management are introduced. Lastly a system based on these technologies for controlling and increasing the speed and accuracy in military logistic system in Iran with its unique properties, is presented. The system is based on full control of military logistics (supplies from the time of deployment to replenishment using sensor network, ubiquitous and RFID technologies.

  13. Use of Ubiquitous Technologies in Military Logistic System in Iran

    Science.gov (United States)

    Jafari, P.; Sadeghi-Niaraki, A.

    2013-09-01

    This study is about integration and evaluation of RFID and ubiquitous technologies in military logistic system management. Firstly, supply chain management and the necessity of a revolution in logistic systems especially in military area, are explained. Secondly RFID and ubiquitous technologies and the advantages of their use in supply chain management are introduced. Lastly a system based on these technologies for controlling and increasing the speed and accuracy in military logistic system in Iran with its unique properties, is presented. The system is based on full control of military logistics (supplies) from the time of deployment to replenishment using sensor network, ubiquitous and RFID technologies.

  14. Golden Jubilee Photos: Doors wide open

    CERN Document Server

    2004-01-01

    http://www.cern.ch/cern50/ The reception area and visits desk (formerly PIO - Public Information Office) in 1972. Régine Chareyron (on the right), who has worked for the Visits Service for 35 years, is pictured here with Chantal Montuel and Cora Roth. CERN inaugurated its permanent visitor centre "Microcosm" in 1989. This brand new outreach facility added a crowning touch to CERN's tradition of openness in conducting its research activities. In keeping with Article II of the Convention, which stipulates that "the results of its (...) work shall be published or otherwise made available," CERN was already organising visits for the general public in the late 1950s, with members of the personnel doubling up as voluntary tour guides. By 1959, the Laboratory was opening its doors to almost 2 500 visitors a year. Ten years down the line, that number had risen to 12 700, and today CERN welcomes some 30 000 visitors through its doors every year. In addition, the Visits Service has developed teaching packs for sc...

  15. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  16. New functionalities in abundant element oxides: ubiquitous element strategy

    International Nuclear Information System (INIS)

    Hosono, Hideo; Hayashi, Katsuro; Kamiya, Toshio; Atou, Toshiyuki; Susaki, Tomofumi

    2011-01-01

    While most ceramics are composed of ubiquitous elements (the ten most abundant elements within the Earth's crust), many advanced materials are based on rare elements. A 'rare-element crisis' is approaching owing to the imbalance between the limited supply of rare elements and the increasing demand. Therefore, we propose a 'ubiquitous element strategy' for materials research, which aims to apply abundant elements in a variety of innovative applications. Creation of innovative oxide materials and devices based on conventional ceramics is one specific challenge. This review describes the concept of ubiquitous element strategy and gives some highlights of our recent research on the synthesis of electronic, thermionic and structural materials using ubiquitous elements. (topical review)

  17. Awareness for Contextualized Digital Contents in Ubiquitous Learning Environments

    NARCIS (Netherlands)

    Börner, Dirk

    2010-01-01

    Börner, D. (2009). Awareness for Contextualized Digital Contents in Ubiquitous Learning Environments. Presented at the Doctoral Consortium of the Fourth European Conference on Technology Enhanced Learning (EC-TEL 2009). September, 29-October, 2, 2009, Nice, France.

  18. Mining the preferences of patients for ubiquitous clinic recommendation.

    Science.gov (United States)

    Chen, Tin-Chih Toly; Chiu, Min-Chi

    2018-03-06

    A challenge facing all ubiquitous clinic recommendation systems is that patients often have difficulty articulating their requirements. To overcome this problem, a ubiquitous clinic recommendation mechanism was designed in this study by mining the clinic preferences of patients. Their preferences were defined using the weights in the ubiquitous clinic recommendation mechanism. An integer nonlinear programming problem was solved to tune the values of the weights on a rolling basis. In addition, since it may take a long time to adjust the values of weights to their asymptotic values, the back propagation network (BPN)-response surface method (RSM) method is applied to estimate the asymptotic values of weights. The proposed methodology was tested in a regional study. Experimental results indicated that the ubiquitous clinic recommendation system outperformed several existing methods in improving the successful recommendation rate.

  19. Disclosure of Personal Data in Ubiquitous Social Networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio

    users' privacy. Firstly, it updates the current privacy guidelines of ubiquitous computing by proposing four drawbacks to be avoided when designing for privacy in ubiquitous social networking environments. Secondly, this dissertation identifies and investigates the determinants that might influence......Ubiquitous social networking focuses on developing possible advantageous relationships such as friendships, partnerships and business relations in the physical world, by uncovering hidden connections that people share with others nearby. The foundation of these services is based on disclosure...... of personal information, which can provoke numerous accidental invasions of privacy. This dissertation contributes by addressing two problems, related to support of privacy-aware social networking in ubiquitous computing environments that focus on maximizing potential networking benefits while preserving...

  20. Life on the front lines.

    Science.gov (United States)

    Hern, W M

    1993-01-01

    A physician who owns and operates an abortion clinic in Boulder, Colorado, in the US relates how he came to offer this procedure to women and how this choice has affected his life. The physician had worked as a medical student at a Schweitzer-inspired hospital in the Peruvian Amazon in 1964 and later as a Peace Corps physician in Brazil. He performed his first abortion in 1970, in Washington, D. C., for a 17-year-old high school student whose future plans would have been derailed by her pregnancy. At that time, the physician was working to change the federal government's restrictions on abortion funding and he began to correspond with abortion rights groups and heard the Supreme Court arguments in the landmark abortion cases. As part-time medical director of a family planning training program in the Rocky Mountain region, part of his job was to provide information about new abortion techniques. In 1973, he was asked to help start an abortion clinic in Boulder, and he accepted the position of medical director reporting to an executive director. He had to struggle to acquire privileges at Boulder Community Hospital in order to admit patients with complications. In addition, a "Fight the Abortion Clinic Committee" tried to have the clinic closed by the Colorado Board of Health. Further obstacles were placed by members of the Boulder County Medical Society who formed another committee with the intent of closing the clinic. After a tour of the clinic, the committee chairman declared that the clinic met the highest standards of medical care, so that effort was ended. In November 1973, antiabortion groups began to picket the clinic and the physician began to receive threatening phone calls at home. He purchased a rifle and kept it by his bed. In the summer of 1974, he participated in a debate on Denver television. He had to be secreted out a back door after a subsequent debate. The same summer, the Denver chapter of the National Organization for Women held a rally to

  1. USE OF UBIQUITOUS TECHNOLOGIES IN MILITARY LOGISTIC SYSTEM IN IRAN

    OpenAIRE

    P. Jafari; A. Sadeghi-Niaraki

    2013-01-01

    This study is about integration and evaluation of RFID and ubiquitous technologies in military logistic system management. Firstly, supply chain management and the necessity of a revolution in logistic systems especially in military area, are explained. Secondly RFID and ubiquitous technologies and the advantages of their use in supply chain management are introduced. Lastly a system based on these technologies for controlling and increasing the speed and accuracy in military logistic system ...

  2. Cluster-based localization and tracking in ubiquitous computing systems

    CERN Document Server

    Martínez-de Dios, José Ramiro; Torres-González, Arturo; Ollero, Anibal

    2017-01-01

    Localization and tracking are key functionalities in ubiquitous computing systems and techniques. In recent years a very high variety of approaches, sensors and techniques for indoor and GPS-denied environments have been developed. This book briefly summarizes the current state of the art in localization and tracking in ubiquitous computing systems focusing on cluster-based schemes. Additionally, existing techniques for measurement integration, node inclusion/exclusion and cluster head selection are also described in this book.

  3. Front propagation in flipping processes

    International Nuclear Information System (INIS)

    Antal, T; Ben-Avraham, D; Ben-Naim, E; Krapivsky, P L

    2008-01-01

    We study a directed flipping process that underlies the performance of the random edge simplex algorithm. In this stochastic process, which takes place on a one-dimensional lattice whose sites may be either occupied or vacant, occupied sites become vacant at a constant rate and simultaneously cause all sites to the right to change their state. This random process exhibits rich phenomenology. First, there is a front, defined by the position of the leftmost occupied site, that propagates at a nontrivial velocity. Second, the front involves a depletion zone with an excess of vacant sites. The total excess Δ k increases logarithmically, Δ k ≅ ln k, with the distance k from the front. Third, the front exhibits ageing-young fronts are vigorous but old fronts are sluggish. We investigate these phenomena using a quasi-static approximation, direct solutions of small systems and numerical simulations

  4. Photoionization effects in ionization fronts

    International Nuclear Information System (INIS)

    Arrayas, Manuel; Fontelos, Marco A; Trueba, Jose L

    2006-01-01

    In this paper we study the effects of photoionization processes on the propagation of both negative and positive ionization fronts in streamer discharge. We show that negative fronts accelerate in the presence of photoionization events. The appearance and propagation of positive ionization fronts travelling with constant velocity is explained as the result of the combined effects of photoionization and electron diffusion. The photoionization range plays an important role in the selection of the velocity of the ionization front as we show in this work

  5. Photoionization effects in ionization fronts

    Energy Technology Data Exchange (ETDEWEB)

    Arrayas, Manuel [Departamento de Electromagnetismo, Universidad Rey Juan Carlos, Tulipan s/n, 28933 Mostoles, Madrid (Spain); Fontelos, Marco A [Departamento de Matematicas, Instituto de Matematicas y Fisica Fundamental, Consejo Superior de Investigaciones CientIficas, C/Serrano 123, 28006 Madrid (Spain); Trueba, Jose L [Departamento de Electromagnetismo, Universidad Rey Juan Carlos, Tulipan s/n, 28933 Mostoles, Madrid (Spain)

    2006-12-21

    In this paper we study the effects of photoionization processes on the propagation of both negative and positive ionization fronts in streamer discharge. We show that negative fronts accelerate in the presence of photoionization events. The appearance and propagation of positive ionization fronts travelling with constant velocity is explained as the result of the combined effects of photoionization and electron diffusion. The photoionization range plays an important role in the selection of the velocity of the ionization front as we show in this work.

  6. The chatter door, designing for in-between spaces

    NARCIS (Netherlands)

    Duel, T.; Levy, P.

    2015-01-01

    The project presented in this paper is part of a broader research addressing in-between spaces and the designing of experiences taking place there. The project focuses on door frames, and inquires the way to improve social interactions taking place 'at the door'. To do so, the approach is structured

  7. Beoordeling RWA-installatie Atrium Vertigo: Rookverspreiding door het gebouw

    NARCIS (Netherlands)

    Neuhaus, E.

    2004-01-01

    Het atrium van het Vertigo-gebouw is bouwkundig bedoeld als één groot brandcompartiment. De schuifdeuren en ramen naar aanliggende vertrekken staan echter vaak open. Hierdoor kan de rook zich in het geval van een brand in het atrium gemakkelijk door het gebouw verspreiden door een overdruk in het

  8. Close-fitting shield doors with sculptured edges

    International Nuclear Information System (INIS)

    Goodman, L.

    1986-01-01

    The US Department of Energy has contracted with Fluor Technology, Inc. for design and engineering of a facility to begin reprocessing fuel from the reactors at Hanford, Washington. Within the facility, a 15-cm (6-in.)-thick, steel shield door is needed to close an opening 4.3 m (14 ft) high x 8.2 m (27 ft) wide. Two cranes and a centrally located monorail hoist must pass through the opening. The door weighs about 41,000 kg (45 ton), and passage of the hoist will be the most frequent cause for opening the door. These two factors essentially mandated a three-piece door, which allows for using commercially available chain hoists to raise and lower the individual door sections. Normally, there is a 187-Pa (0.75-in. water gauge) pressure differential across the door, and minimal air leakage is essential. Stepped, mating edges between sections and along the adjacent concrete structures are typical with such doors, but so are significant gaps (and air leaks) around the edges. Gaps are needed to preclude frictional jamming between edges as a section is lowered. The challenge was to conceive a method to produce near-zero gaps and preclude jamming without involving impractically tight tolerances. The chosen method was to place trapezoidally shaped, steel gaskets on the door-section edges and on the mating concrete surfaces. The concept is described

  9. Revolving Classroom Door: Management Strategies To Eliminate the Quick Spin.

    Science.gov (United States)

    Rancifer, Jesse L.

    This paper presents classroom management practices that can be used to avoid the "revolving classroom door." In the revolving classroom door, misbehaving students are sent to the principal, and eventually returned to the classroom with no gains in student behavior or opportunity for learning. The paper begins by discussing the meaning of classroom…

  10. Development, Control, and Evaluation of an Actuated Car Door.

    Science.gov (United States)

    Strolz, M; Mortl, A; Graf, M; Buss, M

    2009-01-01

    Actuated car doors are a promising way to increase the convenience of access to cars. We propose an advanced actuation and control concept which can easily be integrated into conventional car doors. By utilizing a linear, nonbackdrivable actuator and various sensors, both automatic and manual door operations are enabled. A discrete state controller ensures a safe operation of the door, including automatic opening and closing. The realization of a supportive, high-quality haptic interaction with the car door for the manual operation is the principal part of our work. Due to the impracticality of a direct measurement of the user interaction force at a car door, we chose impedance control to render the desired dynamics. The impedance was designed to provide a convenient, intuitive, and safe manual handling of the door. We implemented and tested four different impedance control schemes, of which impedance control with actuator force feedback performed best. Two experimental evaluations with 16 and 27 participants revealed a predominant approval of the actuated car door.

  11. Looking for the WIMP next door

    Science.gov (United States)

    Evans, Jared A.; Gori, Stefania; Shelton, Jessie

    2018-02-01

    We comprehensively study experimental constraints and prospects for a class of minimal hidden sector dark matter (DM) models, highlighting how the cosmological history of these models informs the experimental signals. We study simple `secluded' models, where the DM freezes out into unstable dark mediator states, and consider the minimal cosmic history of this dark sector, where coupling of the dark mediator to the SM was sufficient to keep the two sectors in thermal equilibrium at early times. In the well-motivated case where the dark mediators couple to the Standard Model (SM) via renormalizable interactions, the requirement of thermal equilibrium provides a minimal, UV-insensitive, and predictive cosmology for hidden sector dark matter. We call DM that freezes out of a dark radiation bath in thermal equilibrium with the SM a WIMP next door, and demonstrate that the parameter space for such WIMPs next door is sharply defined, bounded, and in large part potentially accessible. This parameter space, and the corresponding signals, depend on the leading interaction between the SM and the dark mediator; we establish it for both Higgs and vector portal interactions. In particular, there is a cosmological lower bound on the portal coupling strength necessary to thermalize the two sectors in the early universe. We determine this thermalization floor as a function of equilibration temperature for the first time. We demonstrate that direct detection experiments are currently probing this cosmological lower bound in some regions of parameter space, while indirect detection signals and terrestrial searches for the mediator cut further into the viable parameter space. We present regions of interest for both direct detection and dark mediator searches, including motivated parameter space for the direct detection of sub-GeV DM.

  12. Detecting Signage and Doors for Blind Navigation and Wayfinding.

    Science.gov (United States)

    Wang, Shuihua; Yang, Xiaodong; Tian, Yingli

    2013-07-01

    Signage plays a very important role to find destinations in applications of navigation and wayfinding. In this paper, we propose a novel framework to detect doors and signage to help blind people accessing unfamiliar indoor environments. In order to eliminate the interference information and improve the accuracy of signage detection, we first extract the attended areas by using a saliency map. Then the signage is detected in the attended areas by using a bipartite graph matching. The proposed method can handle multiple signage detection. Furthermore, in order to provide more information for blind users to access the area associated with the detected signage, we develop a robust method to detect doors based on a geometric door frame model which is independent to door appearances. Experimental results on our collected datasets of indoor signage and doors demonstrate the effectiveness and efficiency of our proposed method.

  13. Radiation hydrodynamical instabilities in cosmological and galactic ionization fronts

    Science.gov (United States)

    Whalen, Daniel J.; Norman, Michael L.

    2011-11-01

    Ionization fronts, the sharp radiation fronts behind which H/He ionizing photons from massive stars and galaxies propagate through space, were ubiquitous in the universe from its earliest times. The cosmic dark ages ended with the formation of the first primeval stars and galaxies a few hundred Myr after the Big Bang. Numerical simulations suggest that stars in this era were very massive, 25-500 solar masses, with H(II) regions of up to 30,000 light-years in diameter. We present three-dimensional radiation hydrodynamical calculations that reveal that the I-fronts of the first stars and galaxies were prone to violent instabilities, enhancing the escape of UV photons into the early intergalactic medium (IGM) and forming clumpy media in which supernovae later exploded. The enrichment of such clumps with metals by the first supernovae may have led to the prompt formation of a second generation of low-mass stars, profoundly transforming the nature of the first protogalaxies. Cosmological radiation hydrodynamics is unique because ionizing photons coupled strongly to both gas flows and primordial chemistry at early epochs, introducing a hierarchy of disparate characteristic timescales whose relative magnitudes can vary greatly throughout a given calculation. We describe the adaptive multistep integration scheme we have developed for the self-consistent transport of both cosmological and galactic ionization fronts.

  14. Trust information-based privacy architecture for ubiquitous health.

    Science.gov (United States)

    Ruotsalainen, Pekka Sakari; Blobel, Bernd; Seppälä, Antto; Nykänen, Pirkko

    2013-10-08

    Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). The network takes place in open and unsecure information space. It is created and managed by the DS who sets rules that regulate the way personal health information is collected and used. Compared to health care, it is impossible in ubiquitous health to assume the existence of a priori trust between the DS and service providers and to produce privacy using static security services. In ubiquitous health features, business goals and regulations systems followed often remain unknown. Furthermore, health care-specific regulations do not rule the ways health data is processed and shared. To be successful, ubiquitous health requires novel privacy architecture. The goal of this study was to develop a privacy management architecture that helps the DS to create and dynamically manage the network and to maintain information privacy. The architecture should enable the DS to dynamically define service and system-specific rules that regulate the way subject data is processed. The architecture should provide to the DS reliable trust information about systems and assist in the formulation of privacy policies. Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. A sequential method that combines methodologies used in system theory, systems engineering, requirement analysis, and system design was used in the study. In the first phase, principles, trust and privacy models, and viewpoints were selected. Thereafter, functional requirements and services were developed on the basis of a careful analysis of existing research published in journals and conference proceedings. Based on principles, models, and requirements, architectural components and their interconnections were developed using system

  15. Active learning of Pareto fronts.

    Science.gov (United States)

    Campigotto, Paolo; Passerini, Andrea; Battiti, Roberto

    2014-03-01

    This paper introduces the active learning of Pareto fronts (ALP) algorithm, a novel approach to recover the Pareto front of a multiobjective optimization problem. ALP casts the identification of the Pareto front into a supervised machine learning task. This approach enables an analytical model of the Pareto front to be built. The computational effort in generating the supervised information is reduced by an active learning strategy. In particular, the model is learned from a set of informative training objective vectors. The training objective vectors are approximated Pareto-optimal vectors obtained by solving different scalarized problem instances. The experimental results show that ALP achieves an accurate Pareto front approximation with a lower computational effort than state-of-the-art estimation of distribution algorithms and widely known genetic techniques.

  16. Geochemistry of Natural Redox Fronts

    International Nuclear Information System (INIS)

    Hofmann, B.A.

    1999-05-01

    Redox fronts are important geochemical boundaries which need to be considered in safety assessment of deep repositories for radioactive waste. In most cases, selected host-rock formations will be reducing due to the presence of ferrous minerals, sulphides, etc. During construction and operation of the repository, air will be introduced into the formation. After repository closure, oxidising conditions may persist locally until all oxygen is consumed. In the case of high-level waste, radiolysis of water may provide an additional source of oxidants. Oxidising conditions within a repository are thus possible and potentially have a strong influence on the mobility of many elements. The rate of movement of redox fronts, the boundary between oxidising and reducing environments, and their influence on migrating radionuclides are thus important factors influencing repository performance. The present report is a review of elemental behaviour at natural redox fronts, based on published information and work of the author. Redox fronts are geochemically and geometrically variable manifestations of a global interface between generally oxidising geochemical milieux in contact with the atmosphere and generally reducing milieux in contact with rocks containing ferrous iron, sulphide and/or organic carbon. A classification of redox fronts based on a subdivision into continental near-surface, marine near-surface, and deep environments is proposed. The global redox interface is often located close to the surface of rocks and sediments and, sometimes, within bodies of water. Temperature conditions are close to ambient. A deeper penetration of the global redox front to depths of several kilometres is found in basins containing oxidised sediments (red beds) and in some hydrothermal circulation systems. Temperatures at such deep redox fronts may reach 200 o C. Both near-surface and deep redox fronts are sites of formation of economic deposits of redox-sensitive elements, particularly of

  17. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  18. Internet messenger based smart virtual class learning using ubiquitous computing

    Science.gov (United States)

    Umam, K.; Mardi, S. N. S.; Hariadi, M.

    2017-06-01

    Internet messenger (IM) has become an important educational technology component in college education, IM makes it possible for students to engage in learning and collaborating at smart virtual class learning (SVCL) using ubiquitous computing. However, the model of IM-based smart virtual class learning using ubiquitous computing and empirical evidence that would favor a broad application to improve engagement and behavior are still limited. In addition, the expectation that IM based SVCL using ubiquitous computing could improve engagement and behavior on smart class cannot be confirmed because the majority of the reviewed studies followed instructions paradigms. This article aims to present the model of IM-based SVCL using ubiquitous computing and showing learners’ experiences in improved engagement and behavior for learner-learner and learner-lecturer interactions. The method applied in this paper includes design process and quantitative analysis techniques, with the purpose of identifying scenarios of ubiquitous computing and realize the impressions of learners and lecturers about engagement and behavior aspect and its contribution to learning

  19. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Directory of Open Access Journals (Sweden)

    Hakjun Lee

    Full Text Available With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  20. Blower door method in radon diagnostics

    International Nuclear Information System (INIS)

    Fronka, A.; Moucka, L.

    2004-01-01

    The idea of the radon transfer factor is commonly presented as the ratio of the building indoor radon concentration to the subsoil radon concentration. Ventilation and the pressure field over the whole building envelope, which varies in a time over a very wide range even in the same building, poses a major problem. Therefore a new approach based on the controlled conditions determining the soil air infiltration was developed. Radon in soil gas infiltrates into the building indoor environment particularly through cracks and other leakages in the structure providing the building contact with its subsoil. The infiltration is driven by the air pressure difference on the two sides of the structure. The pressure difference is caused by the stack effect and its value ranges from 1-2 Pa in family houses to some tens of Pa in higher buildings. Unfortunately, the pressure difference is very unstable under normal conditions, being affected by a host of parameters such as the height of the building, distribution and geometry of leakages, outdoor-indoor temperature difference, etc. Wind direction and velocity of the wind plays a major role. In our research the blower door method was applied in combination with a monitoring of the indoor radon concentration. The indoor-outdoor pressure difference and the pressure difference at the two sides of the screen shutter of the blower door fan are also measured. The blower door ensures a constant, evaluable air exchange rate. The fan power is regulated to provide a stable pressure difference within the range of roughly 5-100 Pa. This approach provides very well defined conditions allowing us to apply a constant ventilation-constant radon supply model. In such circumstances the dynamical changes of radon concentrations are very fast, and therefore a unique continual radon monitor was applied. The radon supply rate is evaluated from the radon steady state of the time course of radon concentration. The dependence of the radon supply rate on

  1. Motor actuated vacuum door. [for photography from sounding rockets

    Science.gov (United States)

    Hanagud, A. V.

    1986-01-01

    Doors that allow scientific instruments to record and retrieve the observed data are often required to be designed and installed as a part of sounding rocket hardware. The motor-actuated vacuum door was designed to maintain a medium vacuum of the order of 0.0001 torr or better while closed, and to provide an opening 15 inches long x 8.5 inches wide while open for cameras to image Halley's comet. When the electric motor receives the instruction to open the door through the payload battery, timer, and relay circuit, the first operation is to unlock the door. After unlatching, the torque transmitted by the motor to the main shaft through the links opens the door. A microswitch actuator, which rides on the linear motion conversion mechanism, is adjusted to trip the limit switch at the end of the travel. The process is repeated in the reverse order to close the door. 'O' rings are designed to maintain the seal. Door mechanisms similar to the one described have flown on Aerobee 17.018 and Black Brant 27.047 payloads.

  2. Mobile, ubiquitous, and pervasive learning fundaments, applications, and trends

    CERN Document Server

    2016-01-01

    This book is concerned with the mobile, ubiquitous, and pervasive learning arena. It present a collection of works corresponding to four categories: reviews, studies, conceptual proposals, and approaches. As a result of the submission and revision processes eight manuscripts were accepted and organized into the aforementioned four parts as follows: ·Review: a couple of chapters offer a survey of related works. One concerns with the diversity of mobile, ubiquitous, and pervasive labor, where interested findings are unveiled based on correlations. Other focuses on adaptive and adaptable architectures that are suitable to implement ubiquitous learning sceneries, whose contribution represents a model of a domain specific architecture. ·Studies: two chapters explore issues related to the effect of question styles made through smartphones and tablets, and the disposition of teachers to exploit mobile devices at classroom. ·Conceptual: a pair of chapters offer a given proposal, the first to develop adaptive mobil...

  3. A model for ubiquitous care of noncommunicable diseases.

    Science.gov (United States)

    Vianna, Henrique Damasceno; Barbosa, Jorge Luis Victória

    2014-09-01

    The ubiquitous computing, or ubicomp, is a promising technology to help chronic diseases patients managing activities, offering support to them anytime, anywhere. Hence, ubicomp can aid community and health organizations to continuously communicate with patients and to offer useful resources for their self-management activities. Communication is prioritized in works of ubiquitous health for noncommunicable diseases care, but the management of resources is not commonly employed. We propose the UDuctor, a model for ubiquitous care of noncommunicable diseases. UDuctor focuses the resources offering, without losing self-management and communication supports. We implemented a system and applied it in two practical experiments. First, ten chronic patients tried the system and filled out a questionnaire based on the technology acceptance model. After this initial evaluation, an alpha test was done. The system was used daily for one month and a half by a chronic patient. The results were encouraging and show potential for implementing UDuctor in real-life situations.

  4. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  5. Privacy-related context information for ubiquitous health.

    Science.gov (United States)

    Seppälä, Antto; Nykänen, Pirkko; Ruotsalainen, Pekka

    2014-03-11

    Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how data can be processed or how components

  6. A Survey of Service Composition Mechanisms in Ubiquitous Computing

    DEFF Research Database (Denmark)

    Brønsted, Jeppe; Hansen, Klaus Marius; Ingstrup, Mads

    2007-01-01

    Composition of services, i.e., providing new services by combining existing ones, is a pervasive idea in ubiquitous computing. We surveyed the field by looking at what features are actually present in technologies that support service composition in some form. Condensing this into a list...... of features allowed us to discuss the qualitative merits and drawbacks of various approaches to service composition, focusing in particular on usability, adaptability and efficiency. Moreover, we found that further research is needed into quality-of-service assurance of composites and into contingency...... management for composites—one of the concerns differentiating service composition in ubiquitous computing from its counterpart in less dynamic settings....

  7. Privacy-Related Context Information for Ubiquitous Health

    Science.gov (United States)

    Nykänen, Pirkko; Ruotsalainen, Pekka

    2014-01-01

    Background Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Objective Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Methods Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Results Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how

  8. "Front" hotshet izvinitsja / Aleksandr Ikonnikov

    Index Scriptorium Estoniae

    Ikonnikov, Aleksandr

    2003-01-01

    Põhiliselt vene rahvusest noori ühendava liikumise "Front" esindajad kavatsevad kohtuda USA suursaadikuga Eestis ja vabandada kevadel suursaatkonna ees vägivallatsemisega lõppenud meeleavalduse pärast

  9. Energy conversion at dipolarization fronts

    Science.gov (United States)

    Khotyaintsev, Yu. V.; Divin, A.; Vaivads, A.; André, M.; Markidis, S.

    2017-02-01

    We use multispacecraft observations by Cluster in the Earth's magnetotail and 3-D particle-in-cell simulations to investigate conversion of electromagnetic energy at the front of a fast plasma jet. We find that the major energy conversion is happening in the Earth (laboratory) frame, where the electromagnetic energy is being transferred from the electromagnetic field to particles. This process operates in a region with size of the order several ion inertial lengths across the jet front, and the primary contribution to E·j is coming from the motional electric field and the ion current. In the frame of the front we find fluctuating energy conversion with localized loads and generators at sub-ion scales which are primarily related to the lower hybrid drift instability excited at the front; however, these provide relatively small net energy conversion.

  10. Ubiquitous Learning Ecologies for a Critical Cyber-Citizenship

    Science.gov (United States)

    Díez-Gutiérrez, Enrique; Díaz-Nafría, José-María

    2018-01-01

    The aim of this research is to identify and analyse the ubiquitous learning acquired through blending education settings devoted to the "lifelong training of trainers" and how these contribute to the development of a conscious, critic and engaged citizenship. Through active exploration of the learning process, the study analyses the…

  11. Multimedia Adaptation in Ubiquitous Environments: Benefits of Structured Multimedia Documents

    NARCIS (Netherlands)

    P.S. Cesar Garcia (Pablo Santiago); I. Vaishnavi (Ishan); R. Kernchen; S. Meissner; M. Boussard; A. Spedalieri; B. Gao (Bo); D.C.A. Bulterman (Dick)

    2008-01-01

    htmlabstractThis paper demonstrates the advantages of using structured multimedia documents for session management and media distribution in ubiquitous environments. We show how document manipulations can be used to perform powerful operations such as content to context adaptation and presentation

  12. Noise and Vibration Risk Prevention Virtual Web for Ubiquitous Training

    Science.gov (United States)

    Redel-Macías, María Dolores; Cubero-Atienza, Antonio J.; Martínez-Valle, José Miguel; Pedrós-Pérez, Gerardo; del Pilar Martínez-Jiménez, María

    2015-01-01

    This paper describes a new Web portal offering experimental labs for ubiquitous training of university engineering students in work-related risk prevention. The Web-accessible computer program simulates the noise and machine vibrations met in the work environment, in a series of virtual laboratories that mimic an actual laboratory and provide the…

  13. Dynamic Service Discovery and Composition for Ubiquitous Networks Applications

    NARCIS (Netherlands)

    Bonino da Silva Santos, L.O.; van Sinderen, Marten J.; Ferreira Pires, Luis

    2006-01-01

    The realization of ubiquitous networks brings new challenges to application development. In this kind of network, services and, more specifically web services, have been used to provide the functionality required by its users and applications. In such environments features like automatic service

  14. A survey on web modeling approaches for ubiquitous web applications

    NARCIS (Netherlands)

    Schwinger, W.; Retschitzegger, W.; Schauerhuber, A.; Kappel, G.; Wimmer, M.; Pröll, B.; Cachero Castro, C.; Casteleyn, S.; De Troyer, O.; Fraternali, P.; Garrigos, I.; Garzotto, F.; Ginige, A.; Houben, G.J.P.M.; Koch, N.; Moreno, N.; Pastor, O.; Paolini, P.; Pelechano Ferragud, V.; Rossi, G.; Schwabe, D.; Tisi, M.; Vallecillo, A.; Sluijs, van der K.A.M.; Zhang, G.

    2008-01-01

    Purpose – Ubiquitous web applications (UWA) are a new type of web applications which are accessed in various contexts, i.e. through different devices, by users with various interests, at anytime from anyplace around the globe. For such full-fledged, complex software systems, a methodologically sound

  15. PERKAM: Personalized Knowledge Awareness Map for Computer Supported Ubiquitous Learning

    Science.gov (United States)

    El-Bishouty, Moushir M.; Ogata, Hiroaki; Yano, Yoneo

    2007-01-01

    This paper introduces a ubiquitous computing environment in order to support the learners while doing tasks; this environment is called PERKAM (PERsonalized Knowledge Awareness Map). PERKAM allows the learners to share knowledge, interact, collaborate, and exchange individual experiences. It utilizes the RFID ubiquities technology to detect the…

  16. Twenty-First Century Learning: Communities, Interaction and Ubiquitous Computing

    Science.gov (United States)

    Leh, Amy S.C.; Kouba, Barbara; Davis, Dirk

    2005-01-01

    Advanced technology makes 21st century learning, communities and interactions unique and leads people to an era of ubiquitous computing. The purpose of this article is to contribute to the discussion of learning in the 21st century. The paper will review literature on learning community, community learning, interaction, 21st century learning and…

  17. Ubiquitous Computing--Are We Crazy? Point/Counterpoint

    Science.gov (United States)

    DeWitt, Scott W.; Horn, Patricia S.

    2005-01-01

    The push for ubiquitous computing (UC) relies on an understandable and well-intentioned belief that teaching and schooling need to be transformed. This view appears credible based on large-scale criteria, such as test scores relative to other countries, drop-out rates, and economic changes. And the use of technology to achieve this goal is…

  18. Commentary: Ubiquitous Computing Revisited--A New Perspective

    Science.gov (United States)

    Bull, Glen; Garofalo, Joe

    2006-01-01

    In 2002, representatives from the teacher educator associations representing the core content areas (science, mathematics, language arts, and social studies) and educational technology met at the National Technology Leadership Retreat (NTLR) to discuss potential implications of ubiquitous computing for K-12 schools. This paper re-examines some of…

  19. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    Science.gov (United States)

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  20. Awareness for Contextualized Digital Contents in Ubiquitous Learning Environments

    NARCIS (Netherlands)

    Börner, Dirk; Specht, Marcus

    2010-01-01

    Börner, D., & Specht, M. (2009). Awareness for Contextualized Digital Contents in Ubiquitous Learning Environments. Proceedings of the Doctoral Consortium of the Fourth European Conference on Technology Enhanced Learning (EC-TEL 2009). September, 29-October, 2, 2009, Nice, France. [unpublished

  1. Privacy context model for dynamic privacy adaptation in ubiquitous computing

    NARCIS (Netherlands)

    Schaub, Florian; Koenings, Bastian; Dietzel, Stefan; Weber, M.; Kargl, Frank

    Ubiquitous computing is characterized by the merger of physical and virtual worlds as physical artifacts gain digital sensing, processing, and communication capabilities. Maintaining an appropriate level of privacy in the face of such complex and often highly dynamic systems is challenging. We argue

  2. Ontwateren van zeugenmest door middel van omgekeerde osmose

    NARCIS (Netherlands)

    Thelosen, J.; Gastel, van J.; Cuyck, van J.

    1992-01-01

    In periodiek nummer 1 (februari 1991) is het proces van omgekeerde osmose reeds beschreven. In het kort komt omgekeerde osmose op het volgende neer: de te ontwateren vloeistof wordt onder hoge druk (55 bar) door filterbuizen gepompt.

  3. Deeltjesemissie door wegverkeer: emissiefactoren, deeltjesgrootteverdeling en chemische samenstelling

    NARCIS (Netherlands)

    Brink RMM van den; LAE

    1996-01-01

    In deze literatuurstudie werden zowel gegevens over uitlaatgas-deeltjesemissie alsook over deeltjesemissie als gevolg van slijtage van banden, remvoering en wegdek ge-inventariseerd. Daarnaast werd aandacht besteed aan deeltjesemissie als gevolg van, door rijdend verkeer, opgewerveld stof. Naast

  4. Rotational and frictional dynamics of the slamming of a door

    Science.gov (United States)

    Klein, Pascal; Müller, Andreas; Gröber, Sebastian; Molz, Alexander; Kuhn, Jochen

    2017-01-01

    A theoretical and experimental investigation of the rotational dynamics, including friction, of a slamming door is presented. Based on existing work regarding different damping models for rotational and oscillatory motions, we examine different forms for the (angular) velocity dependence (ωn, n = 0, 1, 2) of the frictional force. An analytic solution is given when all three friction terms are present and several solutions for specific cases known from the literature are reproduced. The motion of a door is investigated experimentally using a smartphone, and the data are compared with the theoretical results. A laboratory experiment under more controlled conditions is conducted to gain a deeper understanding of the movement of a slammed door. Our findings provide quantitative evidence that damping models involving quadratic air drag are most appropriate for the slamming of a door. Examining this everyday example of a physical phenomenon increases student motivation, because they can relate it to their own personal experience.

  5. Plattelandimpuls : leren door gewoon te dóen

    NARCIS (Netherlands)

    Noorduyn, L.

    2008-01-01

    Plattelandsondernemers die hun activiteiten verbreden, vergeten nogal eens serieuze aandacht te besteden aan de vermarkting van hun product. Met het project PlattelandImpuls hebben ondernemers hun vaardigheden op dat vlak kunnen verbeteren door te werken met product-marktcombinaties.

  6. Landing Gear Door Liners for Airframe Noise Reduction

    Science.gov (United States)

    Jones, Michael G. (Inventor); Howerton, Brian M. (Inventor); Van De Ven, Thomas (Inventor)

    2014-01-01

    A landing gear door for retractable landing gear of aircraft includes an acoustic liner. The acoustic liner includes one or more internal cavities or chambers having one or more openings that inhibit the generation of sound at the surface and/or absorb sound generated during operation of the aircraft. The landing gear door may include a plurality of internal chambers having different geometries to thereby absorb broadband noise.

  7. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  8. An unexpected knock on Corrigan’s secret door

    Science.gov (United States)

    Woywodt, Alexander

    2010-01-01

    Corrigan’s secret door describes a metaphorical escape route for busy physicians. The term was derived from the successful and exceptionally busy professional life of Irish physician Dominic John Corrigan (1802–80). It is claimed that Corrigan’s outpatient clinic was so busy that he required a secret door in his consulting rooms to escape from the ever-growing queue of eager patients. The origins of this charming story are unknown, and the door may have never existed. However, at present, Corrigan’s secret door is often quoted when busy physicians have their own little ways in surviving a stressful professional life. Generations of British-trained doctors have grown up with Corrigan’s secret door, as it was featured in the introduction of the Oxford Handbook of Clinical Medicine. Accordingly, trainees as well as more senior doctors are often reminded that having a ‘secret door’ is vital in surviving in the medical profession. My own escape is through classical music and the violoncello, in particular. As the name implies, my own secret door is normally invisible to colleagues and patients. This little article is about a patient who found me out, and a reflection on the role of classical music and the cello in my professional life. PMID:25984078

  9. From acoustic descriptors to evoked quality of car door sounds.

    Science.gov (United States)

    Bezat, Marie-Céline; Kronland-Martinet, Richard; Roussarie, Vincent; Ystad, Sølvi

    2014-07-01

    This article describes the first part of a study aiming at adapting the mechanical car door construction to the drivers' expectancies in terms of perceived quality of cars deduced from car door sounds. A perceptual cartography of car door sounds is obtained from various listening tests aiming at revealing both ecological and analytical properties linked to evoked car quality. In the first test naive listeners performed absolute evaluations of five ecological properties (i.e., solidity, quality, weight, closure energy, and success of closure). Then experts in the area of automobile doors categorized the sounds according to organic constituents (lock, joints, door panel), in particular whether or not the lock mechanism could be perceived. Further, a sensory panel of naive listeners identified sensory descriptors such as classical descriptors or onomatopoeia that characterize the sounds, hereby providing an analytic description of the sounds. Finally, acoustic descriptors were calculated after decomposition of the signal into a lock and a closure component by the Empirical Mode Decomposition (EMD) method. A statistical relationship between the acoustic descriptors and the perceptual evaluations of the car door sounds could then be obtained through linear regression analysis.

  10. Blower-door techniques for measuring interzonal leakage

    Energy Technology Data Exchange (ETDEWEB)

    Hult, Erin L.; Sherman, Max H.; Walker, Iain

    2013-01-01

    Abstract The standard blower door test methods, such as ASTM E779, describe how to use a single blower door to determine the total leakage of a single-zone structure such as a detached single-family home. There are no standard test methods for measuring interzonal leakage in a two-zone or multi-zone building envelope such as might be encountered in with an attached garage or in a multifamily building. Some practitioners have been using techniques that involve making multiple measurements with a single blower door as well as combined measurements using multiple blower doors. Even for just two zones there are dozens of combinations of one-door and two-door test protocols that could conceivably be used to determine the interzonal air tightness. We examined many of these two-zone configurations using both simulation and measured data to estimate the accuracy and precision of each technique for realistic measurement scenarios. We also considered the impact of taking measurements at a single pressure versus over multiple pressures. We compared the various techniques and evaluated them for specific uses. Some techniques work better in one leakage regime; some are more sensitive to wind and other noise; some are more suited to determining only a subset of the leakage values. This paper makes recommendations on which techniques to use or not use for various cases and provides data that could be used to develop future test methods.

  11. Failure case of a garage door opener

    Directory of Open Access Journals (Sweden)

    Habib, K.

    2005-12-01

    Full Text Available A failure analysis of a garage door opener was conducted for determination of the cause of the failure. The analysis included visual inspections of broken parts as well as electron microscopy examinations of the fracture surface. The visual inspections showed that a bolt connected to the inner trolley of the garage opener assembly was initially fractured. Also, the results of electron microscopy examinations revealed that the broken bolt failed by fatigue damage phenomenon, due to alternating torsional stresses throughout 25 years of an operational life of the garage opener. In addition, a mathematical model corresponding to the failure mechanism was derived along the failure analysis. The model comprises of both design philosophy and fracture mechanics approaches.

    Se analizó el fallo del mecanismo de apertura de una puerta de garaje con el fin de determinar sus causas. El análisis incluyó una inspección visual de las piezas rotas así como un examen mediante microscopía de la superficie de fractura. La inspección visual reveló que primero se fracturó un perno conectado al carro interior del mecanismo de apertura. Los resultados del análisis por microscopía electrónica también mostraron que el perno roto falló debido a fenómenos de daño por fatiga, debido a los esfuerzos torsionales alternos a la largo de 25 años de vida en servicio del mecanismo de apertura. Por otra parte, se construyó un modelo matemático correspondiente al mecanismo de rotura durante el análisis del mismo. Este modelo comprende enfoques, tanto de la filosofía de diseño como de la mecánica de fractura.

  12. [Psychiatry with open doors. Part 1: Rational for an open door for acute psychiatry].

    Science.gov (United States)

    Sollberger, D; Lang, U E

    2014-03-01

    Despite the reform efforts of the last decades modern acute psychiatry still stands between conflicting priorities in everyday practice. The protection of patient autonomy might conflict with a regulatory mandate of psychiatry in societal contexts and the necessity of coercive measures and involuntary treatment might become problematic with respect to presumed but contentious interests of the patient. The conflicts particularly concern questions of involuntary commitment, door closing, coercive and isolation measures. Research on the topic of therapeutic effectiveness of these practices is rare. Accordingly, the practice depends on the federal state, hospital and ward and is very heterogeneous. Epidemiological prognosis predicts an increase of psychiatric disorders; however, simultaneously in terms of medical ethics the warranty of patient autonomy, shared decision-making and informed consent in psychiatry become increasingly more important. This challenges structural and practical changes in psychiatry, particularly in situations of self and third party endangerment which are outlined and a rationale for an opening of the doors in acute psychiatric wards is provided.

  13. Analysis of the quality of the whole journey (door-to-door) passenger expierence

    Energy Technology Data Exchange (ETDEWEB)

    Herrero Tomas, M.D.; Gonzalez Viosca, E.

    2016-07-01

    European cities increasingly face problems caused by transport and traffic. A key factor for all transport operators is the quality of the passenger experience as this particularly, affects the uptake of the service. A comprehensive study (METPEX FP7 EU project - www.metpex.eu) developed by a consortium of 16 European partners has analysed the quality of the whole journey (door-to-door) passenger experience, including private or individual forms transport and attending to specific need of users’ groups. For this purpose, a tool with a technological basis was used to collect data from 8 trial cities: Bucharest (Romania), Coventry (United Kingdom), Dublin (Ireland), Grevena (Greece), Rome (Italy), Stockholm (Sweden), Valencia (Spain) and Vilnius (Lithuania); and five FIA motorist networks countries. For a correct evaluation of quality experience, it was deployed a subset of key variables derived from the comprehensive set of potential satisfaction factors that were studied for each pilot city. In this paper, results of the travel experience are showed, including analysis of variables affecting behavior and feelings of passengers. (Author)

  14. 46 CFR 170.270 - Door design, operation, installation, and testing.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Door design, operation, installation, and testing. 170..., operation, installation, and testing. (a) Each Class 1 door must have a quick action closing device... the welding process so that the door frame is not distorted. (e) For each watertight door which is in...

  15. Components for containment enclosures - Part 3: Transfer systems such as plain doors, airlock chambers, double door transfer systems, leaktight connections for waste drums. 1. ed.

    International Nuclear Information System (INIS)

    1998-01-01

    This part of ISO 11933 specifies requirements for the selection, construction and use of the following leak tight components: doors, airlock chambers, double door transfer systems, leaktight connections for waste drums. Some of the elements, double doors or airlock chambers are described in ISO 11933-1 and ISO 11933-2 as well. Doors having bigger dimensions used for personnel od larger objects are not covered by this document

  16. Towards ubiquitous access of computer-assisted surgery systems.

    Science.gov (United States)

    Liu, Hui; Lufei, Hanping; Shi, Weishong; Chaudhary, Vipin

    2006-01-01

    Traditional stand-alone computer-assisted surgery (CAS) systems impede the ubiquitous and simultaneous access by multiple users. With advances in computing and networking technologies, ubiquitous access to CAS systems becomes possible and promising. Based on our preliminary work, CASMIL, a stand-alone CAS server developed at Wayne State University, we propose a novel mobile CAS system, UbiCAS, which allows surgeons to retrieve, review and interpret multimodal medical images, and to perform some critical neurosurgical procedures on heterogeneous devices from anywhere at anytime. Furthermore, various optimization techniques, including caching, prefetching, pseudo-streaming-model, and compression, are used to guarantee the QoS of the UbiCAS system. UbiCAS enables doctors at remote locations to actively participate remote surgeries, share patient information in real time before, during, and after the surgery.

  17. Design requirements for ubiquitous computing environments for healthcare professionals.

    Science.gov (United States)

    Bång, Magnus; Larsson, Anders; Eriksson, Henrik

    2004-01-01

    Ubiquitous computing environments can support clinical administrative routines in new ways. The aim of such computing approaches is to enhance routine physical work, thus it is important to identify specific design requirements. We studied healthcare professionals in an emergency room and developed the computer-augmented environment NOSTOS to support teamwork in that setting. NOSTOS uses digital pens and paper-based media as the primary input interface for data capture and as a means of controlling the system. NOSTOS also includes a digital desk, walk-up displays, and sensor technology that allow the system to track documents and activities in the workplace. We propose a set of requirements and discuss the value of tangible user interfaces for healthcare personnel. Our results suggest that the key requirements are flexibility in terms of system usage and seamless integration between digital and physical components. We also discuss how ubiquitous computing approaches like NOSTOS can be beneficial in the medical workplace.

  18. Network architecture test-beds as platforms for ubiquitous computing.

    Science.gov (United States)

    Roscoe, Timothy

    2008-10-28

    Distributed systems research, and in particular ubiquitous computing, has traditionally assumed the Internet as a basic underlying communications substrate. Recently, however, the networking research community has come to question the fundamental design or 'architecture' of the Internet. This has been led by two observations: first, that the Internet as it stands is now almost impossible to evolve to support new functionality; and second, that modern applications of all kinds now use the Internet rather differently, and frequently implement their own 'overlay' networks above it to work around its perceived deficiencies. In this paper, I discuss recent academic projects to allow disruptive change to the Internet architecture, and also outline a radically different view of networking for ubiquitous computing that such proposals might facilitate.

  19. A Client-Server System for Ubiquitous Video Service

    Directory of Open Access Journals (Sweden)

    Ronit Nossenson

    2012-12-01

    Full Text Available In this work we introduce a simple client-server system architecture and algorithms for ubiquitous live video and VOD service support. The main features of the system are: efficient usage of network resources, emphasis on user personalization, and ease of implementation. The system supports many continuous service requirements such as QoS provision, user mobility between networks and between different communication devices, and simultaneous usage of a device by a number of users.

  20. I WHATSAPP AN IGUANA: AN ATTEMPT TO APPLY UBIQUITOUS LEARNING

    OpenAIRE

    Dwi Haryanti

    2017-01-01

    This paper aims at presenting how Whatsapp provides alternative method to enhance writing skills on personal letter for senior high school student. This method Whatsapps inspired by the concept called ubiquitous learning (U-Learning), which means ―learning supported by ICT resources held anytime, anywhere and fits the context of the learner‖ (de Sousa Monteiro et al., 2014). Participants were 40 11-th grade students in one class in Cirebon High School. A short story in the form of personal le...

  1. Application of ubiquitous computing in personal health monitoring systems.

    Science.gov (United States)

    Kunze, C; Grossmann, U; Stork, W; Müller-Glaser, K D

    2002-01-01

    A possibility to significantly reduce the costs of public health systems is to increasingly use information technology. The Laboratory for Information Processing Technology (ITIV) at the University of Karlsruhe is developing a personal health monitoring system, which should improve health care and at the same time reduce costs by combining micro-technological smart sensors with personalized, mobile computing systems. In this paper we present how ubiquitous computing theory can be applied in the health-care domain.

  2. Development of Wearable Systems for Ubiquitous Healthcare Service Provisioning

    OpenAIRE

    Ogunduyile, O.O.; Olugbara, O.O.; Lall, M.

    2013-01-01

    This paper reports on the development of a wearable system using wireless biomedical sensors for ubiquitous healthcare service provisioning. The prototype system is developed to address current healthcare challenges such as increasing cost of services, inability to access diverse services, low quality services and increasing population of elderly as experienced globally. The biomedical sensors proactively collect physiological data of remote patients to recommend diagnostic services. The prot...

  3. Alexithymia in anorexia and bulimia: Ubiquitous and primary trait?

    Directory of Open Access Journals (Sweden)

    F. Amianto

    2016-05-01

    Full Text Available Background: Alexithymia is associated to Eating Disorders (ED and relevant for their prognosis but it is uncertain if it is ubiquitous, primary and necessary for ED outburst. Methods: 124 ED outpatients and 80 healthy controls were compared with the Toronto Alexithymia Scale, personality and psychopathology measures. Alexithymia and the other features are compared between anorexia nervosa (AN, bulimia nervosa (BN and control groups. Alexithymia-based clusters were explored and compared with controls. Alexithymia traits are correlated with the other features. Results: Difficulty in identifying feelings was ubiquitous in ED subjects. A Non-Alexithymic Cluster (NAC and an Alexithymic Cluster (ALC were found with no difference in AN/BN distribution. ALC displays disordered personality and high psychopathology. Self-directiveness and interoceptive awareness were independently related to alexithymia and to depressive feelings. These two features along with depressive features completely accounted for alexithymia variance. Conclusion: even though the difficulty in identifying feelings is ubiquitous in ED subjects, Alexithymia may not represent a primary trait but a complex dysfunction consequent to co-occurring character immaturity, altered interoceptive awareness, and depressive traits.

  4. Ubiquitous mobile knowledge construction in collaborative learning environments.

    Science.gov (United States)

    Baloian, Nelson; Zurita, Gustavo

    2012-01-01

    Knowledge management is a critical activity for any organization. It has been said to be a differentiating factor and an important source of competitiveness if this knowledge is constructed and shared among its members, thus creating a learning organization. Knowledge construction is critical for any collaborative organizational learning environment. Nowadays workers must perform knowledge creation tasks while in motion, not just in static physical locations; therefore it is also required that knowledge construction activities be performed in ubiquitous scenarios, and supported by mobile and pervasive computational systems. These knowledge creation systems should help people in or outside organizations convert their tacit knowledge into explicit knowledge, thus supporting the knowledge construction process. Therefore in our understanding, we consider highly relevant that undergraduate university students learn about the knowledge construction process supported by mobile and ubiquitous computing. This has been a little explored issue in this field. This paper presents the design, implementation, and an evaluation of a system called MCKC for Mobile Collaborative Knowledge Construction, supporting collaborative face-to-face tacit knowledge construction and sharing in ubiquitous scenarios. The MCKC system can be used by undergraduate students to learn how to construct knowledge, allowing them anytime and anywhere to create, make explicit and share their knowledge with their co-learners, using visual metaphors, gestures and sketches to implement the human-computer interface of mobile devices (PDAs).

  5. Characteristic wave fronts in magnetohydrodynamics

    International Nuclear Information System (INIS)

    Menon, V.V.; Sharma, V.D.

    1981-01-01

    The influence of magnetic field on the process of steepening or flattening of the characteristic wave fronts in a plane and cylindrically symmetric motion of an ideal plasma is investigated. This aspect of the problem has not been considered until now. Remarkable differences between plane, cylindrical diverging, and cylindrical converging waves are discovered. The discontinuity in the velocity gradient at the wave front is shown to satisfy a Bernoulli-type equation. The discussion of the solutions of such equations reported in the literature is shown to be incomplete, and three general theorems are established. 18 refs

  6. SAFETY BULLETIN TIS 2002-03 GLASS DOORS

    CERN Multimedia

    2002-01-01

    Be careful! What happened?   Unsignaled reinforced glass.   Signaled safety glass.   A visitor recently hurt his leg when he walked into a glass door which shattered from the impact. This door was made of reinforced glass, a material which is inappropriate for this kind of use as it is too fragile. Indeed, it shatters into sharp splinters which can cause serious injury. Furthermore, the door was not easily visible (badly lit, no warning signs, ...). Corrective measures Just after the accident: glass doors were signed to make them more visible; replacement of dangerous glass panes planned for 2003. What preventive measures can be taken against this kind of accident? If you are in charge of projects and works: In the call for tender, specify the acceptable shock resistance level of the glass pane; Before the door is mounted, insist on receiving technical documentation and/or certificate of conformity from the supplier; If in doubt, ask advice from the TIS/GS sa...

  7. Understanding "revolving door" patients in general practice: a qualitative study.

    Science.gov (United States)

    Williamson, Andrea E; Mullen, Kenneth; Wilson, Philip

    2014-02-13

    'Revolving door' patients in general practice are repeatedly removed from general practitioners' (GP) lists. This paper reports a qualitative portion of the first mixed methods study of these marginalised patients. We conducted qualitative semi-structured interviews with six practitioner services staff and six GPs in Scotland, utilizing Charmazian grounded theory to characterise 'revolving door' patients and their impact from professionals' perspectives. 'Revolving door' patients were reported as having three necessary characteristics; they had unreasonable expectations, exhibited inappropriate behaviours and had unmet health needs. A range of boundary breaches were reported too when 'revolving door' patients interacted with NHS staff. We utilise the 'sensitising concepts' of legitimacy by drawing on literature about 'good and bad' patients and 'dirty work designations.' We relate these to the core work of general practice and explore the role that medical and moral schemas have in how health service professionals understand and work with 'revolving door' patients. We suggest this may have wider relevance for the problem doctor patient relationship literature.

  8. Modeling and Simulation of Two Wheelchair Accessories for Pushing Doors.

    Science.gov (United States)

    Abdullah, Soran Jalal; Shaikh Mohammed, Javeed

    2017-03-27

    Independent mobility is vital to individuals of all ages, and wheelchairs have proven to be great personal mobility devices. The tasks of opening and navigating through a door are trivial for healthy people, while the same tasks could be difficult for some wheelchair users. A wide range of intelligent wheelchair controllers and systems, robotic arms, or manipulator attachments integrated with wheelchairs have been developed for various applications, including manipulating door knobs. Unfortunately, the intelligent wheelchairs and robotic attachments are not widely available as commercial products. Therefore, the current manuscript presents the modeling and simulation of a novel but simple technology in the form of a passive wheelchair accessory (straight, arm-like with a single wheel, and arc-shaped with multiple wheels) for pushing doors open from a wheelchair. From the simulations using different wheel shapes and sizes, it was found that the arc-shaped accessory could push open the doors faster and with almost half the required force as compared to the arm-like accessory. Also, smaller spherical wheels were found to be best in terms of reaction forces on the wheels. Prototypes based on the arc-shaped accessory design will be manufactured and evaluated for pushing doors open and dodging or gliding other obstacles.

  9. Improving Door-to-balloon Time by Decreasing Door-to-ECG time for Walk-in STEMI Patients

    Directory of Open Access Journals (Sweden)

    Coyne, Christopher J.

    2014-12-01

    Full Text Available Introduction: The American Heart Association/American College of Cardiology guidelines recommend rapid door-to-electrocardiography (ECG times for patients with ST-segment elevation myocardial infarction (STEMI. Previous quality improvement research at our institution revealed that we were not meeting this benchmark for walk-in STEMI patients. The objective is to investigate whether simple, directed changes in the emergency department (ED triage process for potential cardiac patients could decrease door-to-ECG times and secondarily door-to-balloon times. Methods: We conducted an interventional study at a large, urban, public teaching hospital from April 2010 to June 2012. All patients who walked into the ED with a confirmed STEMI were enrolled in the study. The primary intervention involved creating a chief complaint-based “cardiac triage” designation that streamlined the evaluation of potential cardiac patients. A secondary intervention involved moving our ECG technician and ECG station to our initial triage area. The primary outcome measure was door-to-ECG time and the secondary outcome measure was door-to-balloon time. Results: We enrolled 91 walk-in STEMI patients prior to the intervention period and 141 patients after the invention. We observed statistically significant reductions in door-to-ECG time (43±93 to 30±72 minutes, median 23 to 14 minutes p<0.01, ECG-to-activation time (87±134 to 52±82 minutes, median 43 to 31 minutes p<0.01, and door-to-balloon time (134±146 to 84±40 minutes, median 85 -75 minutes p=0.03. Conclusion: By creating a chief complaint-based cardiac triage protocol and by streamlining ECG completion, walk-in STEMI patients are systematically processed through the ED. This is not only associated with a decrease in door-to-balloon time, but also a decrease in the variability of the time sensitive intervals of door-to-ECG and ECG-to-balloon time. [West J Emerg Med. 2015;16(1:184–189.

  10. Align the Front End First.

    Science.gov (United States)

    Perry, Jim

    1995-01-01

    Discussion of management styles and front-end analysis focuses on a review of Douglas McGregor's theories. Topics include Theories X, Y, and Z; leadership skills; motivational needs of employees; intrinsic and extrinsic rewards; and faulty implementation of instructional systems design processes. (LRW)

  11. F-door spaces and F-submaximal spaces

    Directory of Open Access Journals (Sweden)

    Lobna Dridi

    2013-04-01

    Full Text Available Submaximal spaces and door spaces play an enigmatic role in topology. In this paper, reinforcing this role, we are concerned with reaching two main goals: The first one is to characterize topological spaces X such that F(X is a submaximal space (resp., door space for some covariant functor Ff rom the category Top to itself. T0, and FH functors are completely studied. Secondly, our interest is directed towards the characterization of maps f given by a flow (X, f in the category Set, such that (X,P(f is submaximal (resp., door where P(f is a topology on X whose closed sets are exactly the f-invariant sets.

  12. Dynamic Object Oriented Requirements System (DOORS) System Test Plan

    International Nuclear Information System (INIS)

    JOHNSON, A.L.

    2000-01-01

    The U. S. Department of Energy, Office of River Protection (ORP) will use the Dynamic Object Oriented Requirements System (DOORS) as a tool to assist in identifying, capturing, and maintaining the necessary and sufficient set of requirements for accomplishing the ORP mission. By managing requirements as one integrated set, the ORP will be able to carry out its mission more efficiently and effectively. DOORS is a Commercial-Off-The-Shelf (COTS) requirements management tool. The tool has not been customized for the use of the PIO, at this time

  13. Moving the campaign from the front door to the front pocket: field experimental evidence on the effect of phrasing and timing of text messages on voter turnout

    DEFF Research Database (Denmark)

    Bhatti, Yosef; Dahlgaard, Jens Olav; Hansen, Jonas Hedegaard

    2017-01-01

    Despite the widespread scholarly attention given to get-out-the-vote tactics the recent one and a half decade, few have studied the effect of short text messages (SMS) on voter turnout, and no previous such study has been conducted outside the US. We analyze four SMS experiments with more than 300......,000 voters conducted in relation to two elections in Denmark and find intention-to-treat (ITT) effects between 0.33 and 1.82 percentage points with a pooled effect of 0.74 percentage points. Furthermore, we vary the timing and the content of the messages to test existing theories of text messages...... as mobilization tools. In one experiment, we find messages delivered before Election Day to have a higher effect than those delivered on Election Day, while we find no additional effect of delivering multiple messages. We also vary message content and in general find no significant differences from sending...

  14. Some guidelines for the ethical development of ubiquitous computing.

    Science.gov (United States)

    Greenfield, Adam

    2008-10-28

    At a time when both the landscape of everyday life and the choices available to us there are increasingly conditioned by ubiquitous information processing systems, it seems wise to articulate some general principles guiding their ethical design and deployment. I here enunciate five broad guidelines for the designers of such systems, including recommendations that they be devised in such a way as to default to harmlessness, be conservative of time, be conservative of face, be self-disclosing and be deniable. I conclude with some observations about the likelihood of any such principles winning usefully widespread voluntary adherence.

  15. Observations on sustainable and ubiquitous healthcare informatics from Florence Nightingale.

    Science.gov (United States)

    Betts, Helen J; Wright, Graham

    2009-01-01

    As nurses around the world prepare to celebrate the centenary of the death of Florence Nightingale in 2010 this paper reviews her work on using information, especially statistics, to analyze and manage patient care and links that to current developments in informatics. It then examines assistive technologies and how they may impact on nursing practice in the future and links these developments to the writings of Florence Nightingale. The paper concludes by suggesting that in progressing towards sustainable and ubiquitous healthcare informatics we need to study history in order to learn from the lessons of Florence Nightingale and other healthcare pioneers.

  16. A proposal of an open ubiquitous fuzzy computing system for Ambient Intelligence

    NARCIS (Netherlands)

    Acampora, G.; Loia, V.; Lee, R.S.T.; Lioa, V.

    2007-01-01

    Ambient Intelligence (AmI) is considered as the composition of three emergent technologies: Ubiquitous Computing, Ubiquitous Communication and Intelligent User Interfaces. The aim of integration of aforesaid technologies is to make wider the interaction between human beings and information

  17. Datenschutz- und Medizinprodukterecht bei Ubiquitous Computing-Anwendungen im Gesundheitssektor / Data protection and medical product law with respect to medical ubiquitous computing applications

    Directory of Open Access Journals (Sweden)

    Skistims, Hendrik

    2011-01-01

    Full Text Available With respect to ubiquitous computing there is a great potential of application, particularly in medicine and health care. This work deals with the legal problems which ubiquitous computing is facing in these areas. At the beginning, issues with respect to data protection and professional secrecy are treated. Afterwards the problem of applicability of medical product law for medical ubiquitous computing applications as well as the resulting requirements for manufactures, operators and users will be discussed.

  18. CyberPsychological Computation on Social Community of Ubiquitous Learning

    Science.gov (United States)

    Zhou, Xuan; Dai, Genghui; Huang, Shuang; Sun, Xuemin; Hu, Feng; Hu, Hongzhi; Ivanović, Mirjana

    2015-01-01

    Under the modern network environment, ubiquitous learning has been a popular way for people to study knowledge, exchange ideas, and share skills in the cyberspace. Existing research findings indicate that the learners' initiative and community cohesion play vital roles in the social communities of ubiquitous learning, and therefore how to stimulate the learners' interest and participation willingness so as to improve their enjoyable experiences in the learning process should be the primary consideration on this issue. This paper aims to explore an effective method to monitor the learners' psychological reactions based on their behavioral features in cyberspace and therefore provide useful references for adjusting the strategies in the learning process. In doing so, this paper firstly analyzes the psychological assessment of the learners' situations as well as their typical behavioral patterns and then discusses the relationship between the learners' psychological reactions and their observable features in cyberspace. Finally, this paper puts forward a CyberPsychological computation method to estimate the learners' psychological states online. Considering the diversity of learners' habitual behaviors in the reactions to their psychological changes, a BP-GA neural network is proposed for the computation based on their personalized behavioral patterns. PMID:26557846

  19. Distributed user interfaces for clinical ubiquitous computing applications.

    Science.gov (United States)

    Bång, Magnus; Larsson, Anders; Berglund, Erik; Eriksson, Henrik

    2005-08-01

    Ubiquitous computing with multiple interaction devices requires new interface models that support user-specific modifications to applications and facilitate the fast development of active workspaces. We have developed NOSTOS, a computer-augmented work environment for clinical personnel to explore new user interface paradigms for ubiquitous computing. NOSTOS uses several devices such as digital pens, an active desk, and walk-up displays that allow the system to track documents and activities in the workplace. We present the distributed user interface (DUI) model that allows standalone applications to distribute their user interface components to several devices dynamically at run-time. This mechanism permit clinicians to develop their own user interfaces and forms to clinical information systems to match their specific needs. We discuss the underlying technical concepts of DUIs and show how service discovery, component distribution, events and layout management are dealt with in the NOSTOS system. Our results suggest that DUIs--and similar network-based user interfaces--will be a prerequisite of future mobile user interfaces and essential to develop clinical multi-device environments.

  20. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    Science.gov (United States)

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  1. Toward ubiquitous healthcare services with a novel efficient cloud platform.

    Science.gov (United States)

    He, Chenguang; Fan, Xiaomao; Li, Ye

    2013-01-01

    Ubiquitous healthcare services are becoming more and more popular, especially under the urgent demand of the global aging issue. Cloud computing owns the pervasive and on-demand service-oriented natures, which can fit the characteristics of healthcare services very well. However, the abilities in dealing with multimodal, heterogeneous, and nonstationary physiological signals to provide persistent personalized services, meanwhile keeping high concurrent online analysis for public, are challenges to the general cloud. In this paper, we proposed a private cloud platform architecture which includes six layers according to the specific requirements. This platform utilizes message queue as a cloud engine, and each layer thereby achieves relative independence by this loosely coupled means of communications with publish/subscribe mechanism. Furthermore, a plug-in algorithm framework is also presented, and massive semistructure or unstructured medical data are accessed adaptively by this cloud architecture. As the testing results showing, this proposed cloud platform, with robust, stable, and efficient features, can satisfy high concurrent requests from ubiquitous healthcare services.

  2. Ubiquitous Supervisory System Based on Social Contexts Using Ontology

    Directory of Open Access Journals (Sweden)

    Satoru Izumi

    2009-01-01

    Full Text Available As described in this paper, we propose a supervisory system that considers actual situations and social aspects of users in a ubiquitous computing environment. To realize gentle and safe supervision while providing efficient supervisory services, the system must recognize the situations of a watched person, such as the person's physical condition. To achieve this, we have proposed a ubiquitous supervisory system "uEyes", which introduces Social Context Awareness: a distinguishing feature for supervision. Using this feature, the system can combine environmental information acquired from sensors in the real world and common-sense knowledge related to human activities in daily life. As described in this paper, we specifically examine design of Social Context Awareness using ontology technologies. Based on this advanced feature, a live video streaming system is configured autonomously depending on the users' circumstances in runtime. We implemented a uEyes prototype for supervising elderly people and performed some experiments based on several scenarios. Based on those experimental results, we confirmed that the social contexts are handled effectively to support the supervision.

  3. Bear at the back door | Prinsloo | Scientia Militaria: South African ...

    African Journals Online (AJOL)

    Scientia Militaria: South African Journal of Military Studies. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 9, No 3 (1979) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Bear at the back door. C Prinsloo ...

  4. Polychaete Anneliden verzameld door Het Rijksinstituut voor Biologisch Visscherijonderzoek

    NARCIS (Netherlands)

    Horst, R.

    1920-01-01

    Lepidonotus squamatus L. juv. Waarn. 134. Enkhuizerzand. 7 Febr. 1909. Zooals vroeger door mij aangetoond, is deze soort vrij gemeen in de Zuiderzee. Eunoa nodosa M. Sars. Waarn. 16. 55° 40' N.Br., 0° 50' W.L. 8 Maart 1914. Harmothoë (Evarne) impar (Johnst.). Waarn. 69. Molengat. 16 Oct. 1913. De

  5. Barcode van DNA. Democratisering van de taxonomie door digitaal identificatiesysteem

    NARCIS (Netherlands)

    Bakker, F.T.

    2011-01-01

    Het herkennen van biologische soorten aan de hand van een gestandaardiseerde DNA-barcode heeft de laatste tijd een enorme vlucht genomen. Gedreven door aan de ene kant de biodiversiteitscrises en de mogelijke global change, en aan de andere kant zowel razendsnelle technologische vooruitgang als ook

  6. Plantenkaartjes uitgegeven door het I.V.O.N

    NARCIS (Netherlands)

    NN,

    1959-01-01

    De serie door het I.V.O.N. gepubliceerde verspreidingskaartjes van Nederlandse plantensoorten is wederom verkrijgbaar. De prijzen zijn als volgt: afl. 1, 1935, 21 kaartjes van diverse soorten f. 1.35 afl. 2, 1936, 32 kaartjes van diverse soorten „ 2.00 afl. 3, 1936, 18 kaartjes van Potamogeton „

  7. Inclusie door interprofessionele samenwerking. : Resultaten van de proeftuinen van PACT.

    NARCIS (Netherlands)

    Doornenbal, Jeannette; Fukkink, Ruben; van Yperen, Tom; Balledux, Mariëlle; Spoelstra, Jolanda; Verseveld, Marloes

    2017-01-01

    Deze rapportage gaat over de resultaten van de PACT-proeftuinen waaraan in opdracht van Het Kinderopvangfonds van 2015 tot 2017 is gewerkt. PACT-proeftuinen zijn innovatieve praktijken waarin door middel van interprofessionele samenwerking tussen de kinderopvang, het basisonderwijs en de zorg wordt

  8. Door de ogen van de ander kijken: kunst als veranderkracht

    NARCIS (Netherlands)

    Smilde, Rineke

    2015-01-01

    Presentie gehouden bij een besloten expert meeting van de KNAW en de Boekmanstichting in Amsterdam. Door de ogen van de ander kijken: kunst als veranderkracht. Ik maak graag van de gelegenheid gebruik om iets te vertellen vanuit mijn werk als lector aan het PCC van de Hanzehogeschool Groningen.

  9. DE VERWOESTINGEN VAN BABYLON DOOR DARIUS I EN ...

    African Journals Online (AJOL)

    Test

    Het is alles behalve gemakkelijk deze bedreigingen in hun historisch verband te rangschikken. Bij een profetie als Jes. 21: „Gevallen, gevallen is Babel en al haar afgodsbeelden heeft. Hij ter aarde verbrijzeld”—zou men nog aan de eerste berichten kunnen denken, die Jeruzalem omtrent de verwoesting van Babylon door ...

  10. Identity verification using computer vision for automatic garage door opening

    NARCIS (Netherlands)

    Wijnhoven, R.G.J.; With, de P.H.N.

    2011-01-01

    We present a novel system for automatic identification of vehicles as part of an intelligent access control system for a garage entrance. Using a camera in the door, cars are detected and matched to the database of authenticated cars. Once a car is detected, License Plate Recognition (LPR) is

  11. Portal: Your Door to World Languages and Cultures

    Science.gov (United States)

    Elliott, Don; Lawton, Rachele

    2009-01-01

    Portal: Your Door to World Languages and Cultures was a series of public cultural events, in a variety of formats, created through a new partnership between the credit and continuing education (noncredit) foreign language programs at the Community College of Baltimore County (CCBC). Portal was designed to cultivate interest in foreign languages…

  12. Locked doors in acute inpatient psychiatry: a literature review.

    Science.gov (United States)

    van der Merwe, M; Bowers, L; Jones, J; Simpson, A; Haglund, K

    2009-04-01

    Many acute inpatient psychiatric wards in the UK are permanently locked, although this is contrary to the current Mental Health Act Code of Practice. To conduct a literature review of empirical articles concerning locked doors in acute psychiatric inpatient wards, an extensive literature search was performed in SAGE Journals Online, EBM Reviews, British Nursing Index, CINAHL, EMBASE Psychiatry, International Bibliography of the Social Sciences, Ovid MEDLINE, PsycINFO and Google, using the search terms 'open$', 'close$', '$lock$', 'door', 'ward', 'hospital', 'psychiatr', 'mental health', 'inpatient' and 'asylum'. A total of 11 empirical papers were included in the review. Both staff and patients reported advantages (e.g. preventing illegal substances from entering the ward and preventing patients from absconding and harming themselves or others) and disadvantages (e.g. making patients feel depressed, confined and creating extra work for staff) regarding locked doors. Locked wards were associated with increased patient aggression, poorer satisfaction with treatment and more severe symptoms. The limited literature available showed the urgent need for research to determine the real effects of locked doors in inpatient psychiatry.

  13. A Knock at the Door. The Oryx Multicultural Folktale Series.

    Science.gov (United States)

    Shannon, George, Comp.

    This folktales collection includes 35 versions, representing countries and cultures from around the world, of the traditional tale in which a dangerous character knocks at the door and tries to trick the children into letting him inside. The stories are intended for use in homes, schools, and libraries by both children and adults who enjoy sharing…

  14. DOORS English--The Cognitive Basis of Rhetorical Models.

    Science.gov (United States)

    Taylor, Karl K.

    1979-01-01

    The Development of Operational Reasoning Skills (DOORS) program at Illinois Central College is an interdisciplinary experiment that guides students from concrete to formal operational levels of thought to ensure that they understand the concepts and cognitive skills undergirding the rhetorical modes. (RL)

  15. After Installation: Ubiquitous Computing and High School Science in Three Experienced, High-Technology Schools

    Science.gov (United States)

    Drayton, Brian; Falk, Joni K.; Stroud, Rena; Hobbs, Kathryn; Hammerman, James

    2010-01-01

    There are few studies of the impact of ubiquitous computing on high school science, and the majority of studies of ubiquitous computing report only on the early stages of implementation. The present study presents data on 3 high schools with carefully elaborated ubiquitous computing systems that have gone through at least one "obsolescence cycle"…

  16. Light front quantum chromodynamics: Towards phenomenology

    Indian Academy of Sciences (India)

    Light front dynamics; quantum chromodynamics; deep inelastic scattering. PACS Nos 11.10. ... What makes light front dynamics appealing from high energy phenomenology point of view? .... given in terms of Poincarй generators by. MВ = W P ...

  17. Front Propagation in Stochastic Neural Fields

    KAUST Repository

    Bressloff, Paul C.; Webber, Matthew A.

    2012-01-01

    We analyze the effects of extrinsic multiplicative noise on front propagation in a scalar neural field with excitatory connections. Using a separation of time scales, we represent the fluctuating front in terms of a diffusive-like displacement

  18. Seabirds and fronts: a brief overview

    OpenAIRE

    Schneider, David C.

    1990-01-01

    Oceanographic fronts are the sites of enhanced physical and biological activity, including locally concentrated feeding by marine birds. Two general hypotheses relating marine birds to fronts have been developed. The first is that enhanced primary production at fronts increases prey supply through increased animal growth, reproduction, or immigration. The second is that prey patches develop at fronts either through behavioural responses of prey to thermal or salinity gradients, or through int...

  19. Fluctuation charge effects in ionization fronts

    International Nuclear Information System (INIS)

    Arrayas, Manuel; Trueba, Jose L; Baltanas, J P

    2008-01-01

    In this paper, we study the effects of charge fluctuations on the propagation of both negative and positive ionization fronts in streamer discharges. We show that fronts accelerate when random charge creation events are present. This effect might play a similar role to photoionization in order to make the front move faster

  20. Fluctuation charge effects in ionization fronts

    Energy Technology Data Exchange (ETDEWEB)

    Arrayas, Manuel; Trueba, Jose L [Area de Electromagnetismo, Universidad Rey Juan Carlos, Camino del Molino s/n, 28943 Fuenlabrada, Madrid (Spain); Baltanas, J P [Departamento de Fisica Aplicada II, Universidad de Sevilla, Av. Reina Mercedes 2, 41012 Sevilla (Spain)

    2008-05-21

    In this paper, we study the effects of charge fluctuations on the propagation of both negative and positive ionization fronts in streamer discharges. We show that fronts accelerate when random charge creation events are present. This effect might play a similar role to photoionization in order to make the front move faster.

  1. A Study on the Modeling of the Oil Damper in an Auto-Door Hinge

    Energy Technology Data Exchange (ETDEWEB)

    Ha, Kwang Soon; Kim, Jong Tae; Kim, Hwan Yeol

    2009-11-15

    An auto-door hinge, which is one of the automatic door-closing apparatuses, has been widely used to prevent fire propagations in living or commercial buildings. The auto-door hinge consists of a spring to accumulate power for closing a door and an oil damper to control door-closing velocity. To predict and optimize the temporal door behavior during the door-closing period, the auto-door closing system was modeled as a second order-damping system. And a damping coefficient of the oil damper was also theoretically modeled by analyzing Newtonian, incompressible, viscous flow through an oil passage between a oil control rod and a oil piston body. The temporal door behaviors during the door-closing period were predicted with respect to the gap distance of the oil passage, oil viscosity, and pre-compressing of the spring. Temporal door behavior measurement method using an encoder system was also developed to validate the modelling on the oil damping system. As using the developed test apparatus, the temporal door position, velocity, and rotational torque were measured, and the modelling method was evaluated.

  2. A Study on the Modeling of the Oil Damper in an Auto-Door Hinge

    International Nuclear Information System (INIS)

    Ha, Kwang Soon; Kim, Jong Tae; Kim, Hwan Yeol

    2009-11-01

    An auto-door hinge, which is one of the automatic door-closing apparatuses, has been widely used to prevent fire propagations in living or commercial buildings. The auto-door hinge consists of a spring to accumulate power for closing a door and an oil damper to control door-closing velocity. To predict and optimize the temporal door behavior during the door-closing period, the auto-door closing system was modeled as a second order-damping system. And a damping coefficient of the oil damper was also theoretically modeled by analyzing Newtonian, incompressible, viscous flow through an oil passage between a oil control rod and a oil piston body. The temporal door behaviors during the door-closing period were predicted with respect to the gap distance of the oil passage, oil viscosity, and pre-compressing of the spring. Temporal door behavior measurement method using an encoder system was also developed to validate the modelling on the oil damping system. As using the developed test apparatus, the temporal door position, velocity, and rotational torque were measured, and the modelling method was evaluated

  3. Using Face Recognition in the Automatic Door Access Control in a Secured Room

    Directory of Open Access Journals (Sweden)

    Gheorghe Gilca

    2017-06-01

    Full Text Available The aim of this paper is to help users improve the door security of sensitive locations by using face detection and recognition. This paper is comprised mainly of three subsystems: face detection, face recognition and automatic door access control. The door will open automatically for the known person due to the command of the microcontroller.

  4. 16 CFR 1211.13 - Inherent force activated secondary door sensors.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Inherent force activated secondary door sensors. 1211.13 Section 1211.13 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION CONSUMER PRODUCT... across the door so that the axis is perpendicular to the plane of the door. See Figure 6 of this part...

  5. Door locking and exit security measures on acute psychiatric admission wards

    NARCIS (Netherlands)

    Nijman, H.L.I.; Bowers, L.; Haglund, K.; Muir-Cochrane, E.; Simpson, A.; Merwe, M. van der

    2011-01-01

    Locking the exit doors of psychiatric wards is believed to reduce the risk of patients absconding. The aims of the study were to investigate both the prevalence of door locking and other exit security measures on UK admission wards, as well as whether door locking appears to be effective in keeping

  6. Decentralized Sensor Fusion for Ubiquitous Networking Robotics in Urban Areas

    Science.gov (United States)

    Sanfeliu, Alberto; Andrade-Cetto, Juan; Barbosa, Marco; Bowden, Richard; Capitán, Jesús; Corominas, Andreu; Gilbert, Andrew; Illingworth, John; Merino, Luis; Mirats, Josep M.; Moreno, Plínio; Ollero, Aníbal; Sequeira, João; Spaan, Matthijs T.J.

    2010-01-01

    In this article we explain the architecture for the environment and sensors that has been built for the European project URUS (Ubiquitous Networking Robotics in Urban Sites), a project whose objective is to develop an adaptable network robot architecture for cooperation between network robots and human beings and/or the environment in urban areas. The project goal is to deploy a team of robots in an urban area to give a set of services to a user community. This paper addresses the sensor architecture devised for URUS and the type of robots and sensors used, including environment sensors and sensors onboard the robots. Furthermore, we also explain how sensor fusion takes place to achieve urban outdoor execution of robotic services. Finally some results of the project related to the sensor network are highlighted. PMID:22294927

  7. Empowering Pre-Service Teachers to Produce Ubiquitous Flipped Classes

    Directory of Open Access Journals (Sweden)

    Soraya García-Sánchez

    2017-01-01

    Full Text Available This work focuses on technological and educational outcomes that resulted from the production of foreign language educational videos by 90 pre-service instructors enrolled in an official Master’s Degree in Secondary Education programme. This teaching practice, conducted during two consecutive years, was set in a ubiquitous learning environment with the intention of effectively linking digital technology with pedagogy by means of producing flipped classroom units. The findings reveal that these pre-service teachers successfully combined instructional dynamics with digital skills to produce flipped classes adapted to the young generation’s needs. The classroom becomes, therefore, a more participatory learner-centred scenario with a variety of interactive and collaborative activities performed by foreign language students.

  8. Unfolding and Refolding Embodiment into the Landscape of Ubiquitous Computing

    DEFF Research Database (Denmark)

    Schick, Lea; Malmborg, Lone

    2009-01-01

    This paper advocates the future of the body as a distributed and shared embodiment; an unfolded body that doesn’t end at one's skin, but emerges as intercorporeality between bodies and the technological environment. Looking at new tendencies within interaction design and ubiquitous computing to see...... how these are to an increasing extent focusing on sociality, context-awareness, relations, affects, connectedness, and collectivity we will examine how these new technological movements can change our perception of embodiment towards a distributed and shared one. By examining interactive textiles...... as part of a future rising landscape of multi-sensory networks we will exemplify how the new technologies can shutter dichotomies and challenge traditional notions of embodiment and the subject. Finally, we show how this ‘new embodiment’ manifests Deleuze’s philosophy of the body as something unstable...

  9. Quasistatic Cavity Resonance for Ubiquitous Wireless Power Transfer.

    Science.gov (United States)

    Chabalko, Matthew J; Shahmohammadi, Mohsen; Sample, Alanson P

    2017-01-01

    Wireless power delivery has the potential to seamlessly power our electrical devices as easily as data is transmitted through the air. However, existing solutions are limited to near contact distances and do not provide the geometric freedom to enable automatic and un-aided charging. We introduce quasistatic cavity resonance (QSCR), which can enable purpose-built structures, such as cabinets, rooms, and warehouses, to generate quasistatic magnetic fields that safely deliver kilowatts of power to mobile receivers contained nearly anywhere within. A theoretical model of a quasistatic cavity resonator is derived, and field distributions along with power transfer efficiency are validated against measured results. An experimental demonstration shows that a 54 m3 QSCR room can deliver power to small coil receivers in nearly any position with 40% to 95% efficiency. Finally, a detailed safety analysis shows that up to 1900 watts can be transmitted to a coil receiver enabling safe and ubiquitous wireless power.

  10. Quasistatic Cavity Resonance for Ubiquitous Wireless Power Transfer.

    Directory of Open Access Journals (Sweden)

    Matthew J Chabalko

    Full Text Available Wireless power delivery has the potential to seamlessly power our electrical devices as easily as data is transmitted through the air. However, existing solutions are limited to near contact distances and do not provide the geometric freedom to enable automatic and un-aided charging. We introduce quasistatic cavity resonance (QSCR, which can enable purpose-built structures, such as cabinets, rooms, and warehouses, to generate quasistatic magnetic fields that safely deliver kilowatts of power to mobile receivers contained nearly anywhere within. A theoretical model of a quasistatic cavity resonator is derived, and field distributions along with power transfer efficiency are validated against measured results. An experimental demonstration shows that a 54 m3 QSCR room can deliver power to small coil receivers in nearly any position with 40% to 95% efficiency. Finally, a detailed safety analysis shows that up to 1900 watts can be transmitted to a coil receiver enabling safe and ubiquitous wireless power.

  11. Quasistatic Cavity Resonance for Ubiquitous Wireless Power Transfer

    Science.gov (United States)

    Shahmohammadi, Mohsen; Sample, Alanson P.

    2017-01-01

    Wireless power delivery has the potential to seamlessly power our electrical devices as easily as data is transmitted through the air. However, existing solutions are limited to near contact distances and do not provide the geometric freedom to enable automatic and un-aided charging. We introduce quasistatic cavity resonance (QSCR), which can enable purpose-built structures, such as cabinets, rooms, and warehouses, to generate quasistatic magnetic fields that safely deliver kilowatts of power to mobile receivers contained nearly anywhere within. A theoretical model of a quasistatic cavity resonator is derived, and field distributions along with power transfer efficiency are validated against measured results. An experimental demonstration shows that a 54 m3 QSCR room can deliver power to small coil receivers in nearly any position with 40% to 95% efficiency. Finally, a detailed safety analysis shows that up to 1900 watts can be transmitted to a coil receiver enabling safe and ubiquitous wireless power. PMID:28199321

  12. Decentralized Sensor Fusion for Ubiquitous Networking Robotics in Urban Areas

    Directory of Open Access Journals (Sweden)

    Aníbal Ollero

    2010-03-01

    Full Text Available In this article we explain the architecture for the environment and sensors that has been built for the European project URUS (Ubiquitous Networking Robotics in Urban Sites, a project whose objective is to develop an adaptable network robot architecture for cooperation between network robots and human beings and/or the environment in urban areas. The project goal is to deploy a team of robots in an urban area to give a set of services to a user community. This paper addresses the sensor architecture devised for URUS and the type of robots and sensors used, including environment sensors and sensors onboard the robots. Furthermore, we also explain how sensor fusion takes place to achieve urban outdoor execution of robotic services. Finally some results of the project related to the sensor network are highlighted.

  13. A Survey of Software Infrastructures and Frameworks for Ubiquitous Computing

    Directory of Open Access Journals (Sweden)

    Christoph Endres

    2005-01-01

    Full Text Available In this survey, we discuss 29 software infrastructures and frameworks which support the construction of distributed interactive systems. They range from small projects with one implemented prototype to large scale research efforts, and they come from the fields of Augmented Reality (AR, Intelligent Environments, and Distributed Mobile Systems. In their own way, they can all be used to implement various aspects of the ubiquitous computing vision as described by Mark Weiser [60]. This survey is meant as a starting point for new projects, in order to choose an existing infrastructure for reuse, or to get an overview before designing a new one. It tries to provide a systematic, relatively broad (and necessarily not very deep overview, while pointing to relevant literature for in-depth study of the systems discussed.

  14. Mobile-PKI Service Model for Ubiquitous Environment

    Science.gov (United States)

    Jeun, Inkyung; Chun, Kilsoo

    One of the most important things in PKI(Public Key Infrastructure) is the private key management issue. The private key must be deal with safely for secure PKI service. Even though PKI service is usually used for identification and authentication of user in e-commerce, PKI service has many inconvenient factors. Especially, the fact that storage media of private key for PKI service is limited to PC hard disk drive or smart card users must always carry, gives an inconvenience to user and is not suitable in ubiquitous network. This paper suggests the digital signature service using a mobile phone(m-PKI service) which is suitable in future network. A mobile phone is the most widely used for personal communication means and has a characteristic of high movability. We can use the PKI service anytime and anywhere using m-PKI.

  15. Transparency of intentions decreases privacy concerns in ubiquitous surveillance.

    Science.gov (United States)

    Oulasvirta, Antti; Suomalainen, Tiia; Hamari, Juho; Lampinen, Airi; Karvonen, Kristiina

    2014-10-01

    An online experiment (n=1,897) was carried out to understand how data disclosure practices in ubiquitous surveillance affect users' privacy concerns. Information about the identity and intentions of a data collector was manipulated in hypothetical surveillance scenarios. Privacy concerns were found to differ across the scenarios and moderated by knowledge about the collector's identity and intentions. Knowledge about intentions exhibited a stronger effect. When no information about intentions was disclosed, the respondents postulated negative intentions. A positive effect was found for disclosing neutral intentions of an organization or unknown data collector, but not for a private data collector. The findings underline the importance of disclosing intentions of data use to users in an easily understandable manner.

  16. A Comprehensive Ubiquitous Healthcare Solution on an Android™ Mobile Device

    Directory of Open Access Journals (Sweden)

    Pei-Cheng Hii

    2011-06-01

    Full Text Available Provision of ubiquitous healthcare solutions which provide healthcare services at anytime anywhere has become more favorable nowadays due to the emphasis on healthcare awareness and also the growth of mobile wireless technologies. Following this approach, an Android™ smart phone device is proposed as a mobile monitoring terminal to observe and analyze ECG (electrocardiography waveforms from wearable ECG devices in real time under the coverage of a wireless sensor network (WSN. The exploitation of WSN in healthcare is able to substitute the complicated wired technology, moving healthcare away from a fixed location setting. As an extension to the monitoring scheme, medicine care is taken into consideration by utilizing the mobile phone as a barcode decoder, to verify and assist out-patients in the medication administration process, providing a better and more comprehensive healthcare service.

  17. Successful enrichment of the ubiquitous freshwater acI Actinobacteria.

    Science.gov (United States)

    Garcia, Sarahi L; McMahon, Katherine D; Grossart, Hans-Peter; Warnecke, Falk

    2014-02-01

    Actinobacteria of the acI lineage are often the numerically dominant bacterial phylum in surface freshwaters, where they can account for > 50% of total bacteria. Despite their abundance, there are no described isolates. In an effort to obtain enrichment of these ubiquitous freshwater Actinobacteria, diluted freshwater samples from Lake Grosse Fuchskuhle, Germany, were incubated in 96-well culture plates. With this method, a successful enrichment containing high abundances of a member of the lineage acI was established. Phylogenetic classification showed that the acI Actinobacteria of the enrichment belonged to the acI-B2 tribe, which seems to prefer acidic lakes. This enrichment grows to low cell densities and thus the oligotrophic nature of acI-B2 was confirmed. © 2013 Society for Applied Microbiology and John Wiley & Sons Ltd.

  18. Hydrodynamic instabilities in an ablation front

    International Nuclear Information System (INIS)

    Piriz, A R; Portugues, R F

    2004-01-01

    The hydrodynamic stability of an ablation front is studied for situations in which the wavelength of the perturbations is larger than the distance to the critical surface where the driving radiation is absorbed. An analytical model is presented, and it shows that under conditions in which the thermal flux is limited within the supercritical region of the ablative corona, the front may behave like a flame or like an ablation front, depending on the perturbation wavelength. For relatively long wavelengths the critical and ablation surfaces practically lump together into a unique surface and the front behaves like a flame, whereas for the shortest wavelengths the ablation front substructure is resolved

  19. Hydrodynamic instabilities in an ablation front

    Energy Technology Data Exchange (ETDEWEB)

    Piriz, A R; Portugues, R F [E.T.S.I. Industriales, Universidad de Castilla-La Mancha, 13071 Ciudad Real (Spain)

    2004-06-01

    The hydrodynamic stability of an ablation front is studied for situations in which the wavelength of the perturbations is larger than the distance to the critical surface where the driving radiation is absorbed. An analytical model is presented, and it shows that under conditions in which the thermal flux is limited within the supercritical region of the ablative corona, the front may behave like a flame or like an ablation front, depending on the perturbation wavelength. For relatively long wavelengths the critical and ablation surfaces practically lump together into a unique surface and the front behaves like a flame, whereas for the shortest wavelengths the ablation front substructure is resolved.

  20. Fuel poverty, affordability, and energy justice in England: Policy insights from the Warm Front Program

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.

    2015-01-01

    Millions of homes around the world suffer from “fuel poverty,” commonly defined as the necessity to spend more than 10 percent of their income paying energy bills. This article first discusses how home energy efficiency schemes, such as those that pay to weatherize doors and windows, install insulation, and give free energy audits, can significantly reduce the prevalence of fuel poverty. It then examines the “Warm Front” program in England, which over the course of 2000–2013 saw 2.3 million “fuel poor” British homes receive energy efficiency upgrades to save them money and improve their overall health. Warm Front not only lessened the prevalence of fuel poverty; it cut greenhouse gas emissions, produced an average extra annual income of £1894.79 per participating household, and reported exceptional customer satisfaction with more than 90 percent of its customers praising the scheme. This study details the history, benefits, and challenges of the program, and it teases out six noteworthy lessons for energy analysts, planners, and policymakers. - Highlights: • Millions of homes around the world suffer from “fuel poverty”. • The “Warm Front” program in England saw 2.3 million “fuel poor” British homes receive energy efficiency upgrades. • Warm Front ran from over the course of 2000–2013. • Warm Front lessened the prevalence of fuel poverty, cut greenhouse gas emissions, and saved households money. • Warm Front offers important lessons for energy analysts, planners, and policymakers.

  1. Dipolarization Fronts from Reconnection Onset

    Science.gov (United States)

    Sitnov, M. I.; Swisdak, M. M.; Merkin, V. G.; Buzulukova, N.; Moore, T. E.

    2012-12-01

    Dipolarization fronts observed in the magnetotail are often viewed as signatures of bursty magnetic reconnection. However, until recently spontaneous reconnection was considered to be fully prohibited in the magnetotail geometry because of the linear stability of the ion tearing mode. Recent theoretical studies showed that spontaneous reconnection could be possible in the magnetotail geometries with the accumulation of magnetic flux at the tailward end of the thin current sheet, a distinctive feature of the magnetotail prior to substorm onset. That result was confirmed by open-boundary full-particle simulations of 2D current sheet equilibria, where two magnetotails were separated by an equilibrium X-line and weak external electric field was imposed to nudge the system toward the instability threshold. To investigate the roles of the equilibrium X-line, driving electric field and other parameters in the reconnection onset process we performed a set of 2D PIC runs with different initial settings. The investigated parameter space includes the critical current sheet thickness, flux tube volume per unit magnetic flux and the north-south component of the magnetic field. Such an investigation is critically important for the implementation of kinetic reconnection onset criteria into global MHD codes. The results are compared with Geotail visualization of the magnetotail during substorms, as well as Cluster and THEMIS observations of dipolarization fronts.

  2. Intelligent Vision System for Door Sensing Mobile Robot

    Directory of Open Access Journals (Sweden)

    Jharna Majumdar

    2012-08-01

    Full Text Available Wheeled Mobile Robots find numerous applications in the Indoor man made structured environments. In order to operate effectively, the robots must be capable of sensing its surroundings. Computer Vision is one of the prime research areas directed towards achieving these sensing capabilities. In this paper, we present a Door Sensing Mobile Robot capable of navigating in the indoor environment. A robust and inexpensive approach for recognition and classification of the door, based on monocular vision system helps the mobile robot in decision making. To prove the efficacy of the algorithm we have designed and developed a ‘Differentially’ Driven Mobile Robot. A wall following behavior using Ultra Sonic range sensors is employed by the mobile robot for navigation in the corridors.  Field Programmable Gate Arrays (FPGA have been used for the implementation of PD Controller for wall following and PID Controller to control the speed of the Geared DC Motor.

  3. Bunker door interlock limit issues of K-130 cyclotron, VECC

    International Nuclear Information System (INIS)

    Srihari, K.; Ravishankar, R.; Mitra, M.S.; Mishra, S.K.; Bandyopadhyay, T.; Sarkar, P.K.

    2011-01-01

    The K-130 cyclotron is in operation at VECC, Kolkata. Recently modernization of the cyclotron has taken place. Central region modification has increased reasonable internal beam current. During the tuning of the projectiles, loss of beam is unavoidable and projectiles hitting different parts of the machine inside the vacuum chamber . These interactions produce prompt radiation comprising neutron and gamma. However machine bunker is not accessible during the operation of the machine. The induced activity produced because of interactions of the primary and secondary radiation a radiation hazardous environment during the shut down for the related maintenance work. Area radiation monitors placed at machine bunker room have the interlock with massive shield door of the bunker. Area radiation monitors are set to specified limiting value, lower than that will allow to open the shield door in normal condition. As, the internal beam current being increased and the probability of beam spread being more. Consequently generation of induced activity is also high leading to delay in machine bunker door opening because of the interlock settings. Radiation dose mapping after a long operation of the machine was done for the different strategic points (The locations mainly people access immediate after shut down). Different consequences and remedial measures being presented in paper to raise the dose rate limit level for the interlocks between the area radiation monitors with machine bunker door, keeping in mind of the regulatory requirements. Raising the limit of dose rate limiting value will minimize the waiting time to access the machine bunker which will increase the duty factor of the machine. (author)

  4. Flow of pedestrians through narrow doors with different competitiveness

    International Nuclear Information System (INIS)

    Garcimartín, A; Pastor, J M; Zuriguel, I; Parisi, D R; Martín-Gómez, C

    2016-01-01

    We report a thorough analysis of the intermittent flow of pedestrians through a narrow door. The observations include five different sets of evacuation drills with which we have investigated the effect of door size and competitiveness on the flow dynamics. Although the outcomes are in general compatible with the existence of the faster-is-slower effect, the temporal evolution of the instantaneous flow rate provides evidence of new features. These stress the crucial role of the number of people performing the tests, which has an influence on the obtained results. Once the transients at the beginning and end of the evacuation are removed, we have found that the time lapses between the passage of two consecutive pedestrians display heavy-tailed distributions in all the scenarios studied. Meanwhile, the distribution of burst sizes decays exponentially; this can be linked to a constant probability of finding a long-lasting clog during the evacuation process. Based on these results, a discussion is presented on the caution that should be exercised when measuring or describing the intermittent flow of pedestrians through narrow doors. (paper: interdisciplinary statistical mechanics)

  5. A CloudSat-CALIPSO View of Cloud and Precipitation Properties Across Cold Fronts over the Global Oceans

    Science.gov (United States)

    Naud, Catherine M.; Posselt, Derek J.; van den Heever, Susan C.

    2015-01-01

    The distribution of cloud and precipitation properties across oceanic extratropical cyclone cold fronts is examined using four years of combined CloudSat radar and CALIPSO lidar retrievals. The global annual mean cloud and precipitation distributions show that low-level clouds are ubiquitous in the post frontal zone while higher-level cloud frequency and precipitation peak in the warm sector along the surface front. Increases in temperature and moisture within the cold front region are associated with larger high-level but lower mid-/low level cloud frequencies and precipitation decreases in the cold sector. This behavior seems to be related to a shift from stratiform to convective clouds and precipitation. Stronger ascent in the warm conveyor belt tends to enhance cloudiness and precipitation across the cold front. A strong temperature contrast between the warm and cold sectors also encourages greater post-cold-frontal cloud occurrence. While the seasonal contrasts in environmental temperature, moisture, and ascent strength are enough to explain most of the variations in cloud and precipitation across cold fronts in both hemispheres, they do not fully explain the differences between Northern and Southern Hemisphere cold fronts. These differences are better explained when the impact of the contrast in temperature across the cold front is also considered. In addition, these large-scale parameters do not explain the relatively large frequency in springtime post frontal precipitation.

  6. Front Propagation in Stochastic Neural Fields

    KAUST Repository

    Bressloff, Paul C.

    2012-01-01

    We analyze the effects of extrinsic multiplicative noise on front propagation in a scalar neural field with excitatory connections. Using a separation of time scales, we represent the fluctuating front in terms of a diffusive-like displacement (wandering) of the front from its uniformly translating position at long time scales, and fluctuations in the front profile around its instantaneous position at short time scales. One major result of our analysis is a comparison between freely propagating fronts and fronts locked to an externally moving stimulus. We show that the latter are much more robust to noise, since the stochastic wandering of the mean front profile is described by an Ornstein-Uhlenbeck process rather than a Wiener process, so that the variance in front position saturates in the long time limit rather than increasing linearly with time. Finally, we consider a stochastic neural field that supports a pulled front in the deterministic limit, and show that the wandering of such a front is now subdiffusive. © 2012 Society for Industrial and Applied Mathematics.

  7. A seamless ubiquitous emergency medical service for crisis situations.

    Science.gov (United States)

    Lin, Bor-Shing

    2016-04-01

    In crisis situations, a seamless ubiquitous communication is necessary to provide emergency medical service to save people's lives. An excellent prehospital emergency medicine provides immediate medical care to increase the survival rate of patients. On their way to the hospital, ambulance personnel must transmit real-time and uninterrupted patient information to the hospital to apprise the physician of the situation and provide options to the ambulance personnel. In emergency and crisis situations, many communication channels can be unserviceable because of damage to equipment or loss of power. Thus, data transmission over wireless communication to achieve uninterrupted network services is a major obstacle. This study proposes a mobile middleware for cognitive radio (CR) for improving the wireless communication link. CRs can sense their operating environment and optimize the spectrum usage so that the mobile middleware can integrate the existing wireless communication systems with a seamless communication service in heterogeneous network environments. Eventually, the proposed seamless mobile communication middleware was ported into an embedded system, which is compatible with the actual network environment without the need for changing the original system architecture. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  8. Distributing Workflows over a Ubiquitous P2P Network

    Directory of Open Access Journals (Sweden)

    Eddie Al-Shakarchi

    2007-01-01

    Full Text Available This paper discusses issues in the distribution of bundled workflows across ubiquitous peer-to-peer networks for the application of music information retrieval. The underlying motivation for this work is provided by the DART project, which aims to develop a novel music recommendation system by gathering statistical data using collaborative filtering techniques and the analysis of the audio itsel, in order to create a reliable and comprehensive database of the music that people own and which they listen to. To achieve this, the DART scientists creating the algorithms need the ability to distribute the Triana workflows they create, representing the analysis to be performed, across the network on a regular basis (perhaps even daily in order to update the network as a whole with new workflows to be executed for the analysis. DART uses a similar approach to BOINC but differs in that the workers receive input data in the form of a bundled Triana workflow, which is executed in order to process any MP3 files that they own on their machine. Once analysed, the results are returned to DART's distributed database that collects and aggregates the resulting information. DART employs the use of package repositories to decentralise the distribution of such workflow bundles and this approach is validated in this paper through simulations that show that suitable scalability is maintained through the system as the number of participants increases. The results clearly illustrate the effectiveness of the approach.

  9. FCJ-135 Feral Computing: From Ubiquitous Calculation to Wild Interactions

    Directory of Open Access Journals (Sweden)

    Matthew Fuller

    2011-12-01

    Full Text Available In ‘The Coming Age of Calm Technology’, Mark Weiser and John Seely Brown are clear in their assertions, what really ‘matters’ about technology is not technology in itself, rather, its capacity to continuously recreate our relationship with the world at large (Brown and Weiser 1996. Even though they promote such an idea under the banner of ‘calm technology’, what is central to their thesis is the mutational capacities brought into the world by the spillage of computation out from its customary boxes. What their work tends to occlude is that in setting the sinking of technology almost imperceptibly, but deeply into the ‘everyday’ as a target for ubiquitous computing, other possibilities are masked, for instance, those of greater hackability or interrogability of such technologies. Our contention is that making ubicomp seamless (MacColl et al, 2002 tends to obfuscate the potential of computation in reworking computational subjects, including societies, modes of life, and inter-relations with the dynamics of thought and the composition of experience and understanding.

  10. Ubiquitous Monitoring of Electrical Household Appliances 

    Directory of Open Access Journals (Sweden)

    Raquel Lacuesta

    2012-11-01

    Full Text Available The number of appliances at home is increasing continuously, mainly because they make our lives easier. Currently, technology is integrated in all objects of our daily life. TCP/IP let us monitor our home in real time and check ubiquitously if something is happening at home. Bearing in mind this idea, we have developed a low-cost system, which can be used in any type of electrical household appliance that takes information from the appliance and posts the information to the Twitter Social network. Several sensors placed in the household appliances gather the sensed data and send them wired or wirelessly, depending on the case, using small and cheap devices to a gateway located in the home. This gateway takes decisions, based on the received data, and sends notifications to Twitter. We have developed a software application that takes the values and decides when to issue an alarm to the registered users (Twitter friends of our smart home. The performance of our system has been measured taking into account the home network (using IEEE 802.3u and IEEE 802.11g and the data publishing in Twitter. As a result, we have generated an original product and service for any electrical household appliance, regardless of the model and manufacturer, that helps home users improve their quality of life. The paper also shows that there is no system with the same innovative features like the ones presented in this paper.

  11. I WHATSAPP AN IGUANA: AN ATTEMPT TO APPLY UBIQUITOUS LEARNING

    Directory of Open Access Journals (Sweden)

    Dwi Haryanti

    2017-12-01

    Full Text Available This paper aims at presenting how Whatsapp provides alternative method to enhance writing skills on personal letter for senior high school student. This method Whatsapps inspired by the concept called ubiquitous learning (U-Learning, which means ―learning supported by ICT resources held anytime, anywhere and fits the context of the learner‖ (de Sousa Monteiro et al., 2014. Participants were 40 11-th grade students in one class in Cirebon High School. A short story in the form of personal letter entitled I Wanna Iguana by Karen Kaufman Orloff was used as main learning source and the mobile version of the story was sent to the class Whatsapp group along with the reading comprehension questions and the personal letter template. The study was conducted for three weeks in the middle of the second semester year 2017. Contrary to the basic face-to-face teaching and learning, the using of Whatsapp group demonstrates how mobile technology can be fully integrated in an educational context to support students‘ learning beyond the classroom. Another advantages of using Whatsapp group is the fact that learning become the responsibility of learners and may take place through observation, trial and error, asking for help, conversing with others, reading to stories, reflecting on a one‘s personal event, or stimulated by general interests

  12. From computers to ubiquitous computing by 2010: health care.

    Science.gov (United States)

    Aziz, Omer; Lo, Benny; Pansiot, Julien; Atallah, Louis; Yang, Guang-Zhong; Darzi, Ara

    2008-10-28

    Over the past decade, miniaturization and cost reduction in semiconductors have led to computers smaller in size than a pinhead with powerful processing abilities that are affordable enough to be disposable. Similar advances in wireless communication, sensor design and energy storage have meant that the concept of a truly pervasive 'wireless sensor network', used to monitor environments and objects within them, has become a reality. The need for a wireless sensor network designed specifically for human body monitoring has led to the development of wireless 'body sensor network' (BSN) platforms composed of tiny integrated microsensors with on-board processing and wireless data transfer capability. The ubiquitous computing abilities of BSNs offer the prospect of continuous monitoring of human health in any environment, be it home, hospital, outdoors or the workplace. This pervasive technology comes at a time when Western world health care costs have sharply risen, reflected by increasing expenditure on health care as a proportion of gross domestic product over the last 20 years. Drivers of this rise include an ageing post 'baby boom' population, higher incidence of chronic disease and the need for earlier diagnosis. This paper outlines the role of pervasive health care technologies in providing more efficient health care.

  13. Ubiquitous computing in sports: A review and analysis.

    Science.gov (United States)

    Baca, Arnold; Dabnichki, Peter; Heller, Mario; Kornfeind, Philipp

    2009-10-01

    Ubiquitous (pervasive) computing is a term for a synergetic use of sensing, communication and computing. Pervasive use of computing has seen a rapid increase in the current decade. This development has propagated in applied sport science and everyday life. The work presents a survey of recent developments in sport and leisure with emphasis on technology and computational techniques. A detailed analysis on new technological developments is performed. Sensors for position and motion detection, and such for equipment and physiological monitoring are discussed. Aspects of novel trends in communication technologies and data processing are outlined. Computational advancements have started a new trend - development of smart and intelligent systems for a wide range of applications - from model-based posture recognition to context awareness algorithms for nutrition monitoring. Examples particular to coaching and training are discussed. Selected tools for monitoring rules' compliance and automatic decision-making are outlined. Finally, applications in leisure and entertainment are presented, from systems supporting physical activity to systems providing motivation. It is concluded that the emphasis in future will shift from technologies to intelligent systems that allow for enhanced social interaction as efforts need to be made to improve user-friendliness and standardisation of measurement and transmission protocols.

  14. Structure of the vault, a ubiquitous celular component.

    Science.gov (United States)

    Kong, L B; Siva, A C; Rome, L H; Stewart, P L

    1999-04-15

    The vault is a ubiquitous and highly conserved ribonucleoprotein particle of approximately 13 MDa. This particle has been shown to be upregulated in certain multidrug-resistant cancer cell lines and to share a protein component with the telomerase complex. Determination of the structure of the vault was undertaken to provide a first step towards understanding the role of this cellular component in normal metabolism and perhaps to shed some light on its role in mediating drug resistance. Over 1300 particle images were combined to calculate an approximately 31 A resolution structure of the vault. Rotational power spectra did not yield a clear symmetry peak, either because of the thin, smooth walls or inherent flexibility of the vault. Although cyclic eightfold (C8) symmetry was imposed, the resulting reconstruction may be partially cylindrically averaged about the eightfold axis. Our results reveal the vault to be a hollow, barrel-like structure with two protruding caps and an invaginated waist. Although the normal cellular function of the vault is as yet undetermined, the structure of the vault is consistent with either a role in subcellular transport, as previously suggested, or in sequestering macromolecular assemblies.

  15. A concept for ubiquitous robotics in industrial environment

    Science.gov (United States)

    Sallinen, Mikko; Heilala, Juhani; Kivikunnas, Sauli

    2007-09-01

    In this paper a concept for industrial ubiquitous robotics is presented. The concept combines two different approaches to manage agile, adaptable production: firstly the human operator is strongly in the production loop and secondly, the robot workcell will be more autonomous and smarter to manage production. This kind of autonomous robot cell can be called production island. Communication to the human operator working in this kind of smart industrial environment can be divided into two levels: body area communication and operator-infrastructure communication including devices, machines and infra. Body area communication can be supportive in two directions: data is recorded by means of measuring physical actions, such as hand movements, body gestures or supportive when it will provide information to user such as guides or manuals for operation. Body area communication can be carried out using short range communication technologies such as NFC (Near Field communication) which is RFID type of communication. In the operator-infrastructure communication, WLAN or Bluetooth -communication can be used. Beyond the current Human Machine interaction HMI systems, the presented system concept is designed to fulfill the requirements for hybrid, knowledge intensive manufacturing in the future, where humans and robots operate in close co-operation.

  16. Ubiquitous Health in Korea: Progress, Barriers, and Prospects

    Science.gov (United States)

    Lee, Yountae

    2012-01-01

    Objectives Korea has one of the most advanced information technology (IT) infrastructures in the world, and the application of IT in health systems is rapidly progressing from computerization to information systems, ubiquitous systems, and smart systems. This study aims to analyze Korean environments in regards to the development of their u-Health industry and propose directions for u-Healthcare services based on this analysis. Methods This paper reviews the background, progress history, and current status of u-Health in Korea, and suggests strategies for the u-Health industry based on an analysis of its barriers and obstacles. Results When u-Health was introduced to Koreans, their policies and approaches focused mainly on environmental factors, yet these efforts have not progressed further to impact the u-Healthcare service industry itself. To develop the u-Healthcare industry, four points need to be considered: the development and support of the practical service model, institutional support, support of core technology and industry, and the institutionalization of health management service. Conclusions Korea is at a strategic point to start building u-Healthcare service delivery models. u-Healthcare is a healthcare service that provides added value through u-Health environments. By identifying critical success factors in u-Healthcare, we can strengthen the u-Health industry and implement policies to coordinate our efforts in the process of value chains to which we belong. PMID:23346474

  17. The upgraded Tevatron front end

    International Nuclear Information System (INIS)

    Glass, M.; Zagel, J.; Smith, P.; Marsh, W.; Smolucha, J.

    1990-01-01

    We are replacing the computers which support the CAMAC crates in the Fermilab accelerator control system. We want a significant performance increase, but we still want to be able to service scores of different varieties of CAMAC cards in a manner essentially transparent to console applications software. Our new architecture is based on symmetric multiprocessing. Several processors on the same bus, each running identical software, work simultaneously at satisfying different pieces of a console's request for data. We dynamically adjust the load between the processors. We can obtain more processing power by simply plugging in more processor cards and rebooting. We describe in this paper what we believe to be the interesting architectural features of the new front-end computers. We also note how we use some of the advanced features of the Multibus TM II bus and the Intel 80386 processor design to achieve reliability and expandability of both hardware and software. (orig.)

  18. Le front oriental de Lille

    Directory of Open Access Journals (Sweden)

    Étienne Poncelet

    2011-06-01

    Full Text Available De la porte d’eau de la Basse Deûle jusqu’au fort Saint-Sauveur, le front oriental de Lille, fortifié à l’époque espagnole, glisse ses courtines dans les entrelacs du périphérique et des gares. L’enjeu urbain actuel consiste à s’appuyer sur ces murs historiques pour « passer malgré tout » à travers cet écheveau urbain et retisser les fils de la continuité des promenades au cœur de la ville. Moins connus que le front occidental de la reine des citadelles, ces anciens espaces militaires sont une chance pour l’urbanisme de demain dont les opérations en cours de la Porte de Gand et de la Basse Deûle témoignent déjà.The east wall, at Lille, fortified during the period of Spanish occupation, extends from the Porte d'Eau de la Basse-Deûle to the Saint-Sauveur fort. Its curtain walls emerge today in a landscape of ring roads and railway territories. The issue today is to profit from these historic walls in order to make some sense of the urban chaos and to reinstate some urban continuity in the city-centre walkways. Although they are not as well known as the western wall of this major fortified city, these former military properties are an exciting opportunity for tomorrow's town-planners, as the operations already underway at the Porte de Gand et de la Basse Deûle suggest.

  19. Muon front end for the neutrino factory

    Directory of Open Access Journals (Sweden)

    C. T. Rogers

    2013-04-01

    Full Text Available In the neutrino factory, muons are produced by firing high-energy protons onto a target to produce pions. The pions decay to muons and pass through a capture channel known as the muon front end, before acceleration to 12.6 GeV. The muon front end comprises a variable frequency rf system for longitudinal capture and an ionization cooling channel. In this paper we detail recent improvements in the design of the muon front end.

  20. Muon front end for the neutrino factory

    CERN Document Server

    Rogers, C T; Prior, G; Gilardoni, S; Neuffer, D; Snopok, P; Alekou, A; Pasternak, J

    2013-01-01

    In the neutrino factory, muons are produced by firing high-energy protons onto a target to produce pions. The pions decay to muons and pass through a capture channel known as the muon front end, before acceleration to 12.6 GeV. The muon front end comprises a variable frequency rf system for longitudinal capture and an ionization cooling channel. In this paper we detail recent improvements in the design of the muon front end.

  1. A system for ubiquitous health monitoring in the bedroom via a Bluetooth network and wireless LAN.

    Science.gov (United States)

    Choi, J M; Choi, B H; Seo, J W; Sohn, R H; Ryu, M S; Yi, W; Park, K S

    2004-01-01

    Advances in information technology have enabled ubiquitous health monitoring at home, which is particularly useful for patients, who have to live alone. We have focused on the automatic and unobtrusive measurement of biomedical signals and activities of patients. We have constructed wireless communication networks in order to transfer data. The networks consist of Bluetooth and Wireless Local Area Network (WLAN). In this paper, we present the concept of a ubiquitous-Bedroom (u-Bedroom) which is a part of a ubiquitous-House (u-House) and we present our systems for ubiquitous health monitoring.

  2. Comparative Genomics of the Ubiquitous, Hydrocarbon-degrading Genus Marinobacter

    Science.gov (United States)

    Singer, E.; Webb, E.; Edwards, K. J.

    2012-12-01

    The genus Marinobacter is amongst the most ubiquitous in the global oceans and strains have been isolated from a wide variety of marine environments, including offshore oil-well heads, coastal thermal springs, Antarctic sea water, saline soils and associations with diatoms and dinoflagellates. Many strains have been recognized to be important hydrocarbon degraders in various marine habitats presenting sometimes extreme pH or salinity conditions. Analysis of the genome of M. aquaeolei revealed enormous adaptation versatility with an assortment of strategies for carbon and energy acquisition, sensation, and defense. In an effort to elucidate the ecological and biogeochemical significance of the Marinobacters, seven Marinobacter strains from diverse environments were included in a comparative genomics study. Genomes were screened for metabolic and adaptation potential to elucidate the strategies responsible for the omnipresence of the Marinobacter genus and their remedial action potential in hydrocarbon-polluted waters. The core genome predominantly encodes for key genes involved in hydrocarbon degradation, biofilm-relevant processes, including utilization of external DNA, halotolerance, as well as defense mechanisms against heavy metals, antibiotics, and toxins. All Marinobacter strains were observed to degrade a wide spectrum of hydrocarbon species, including aliphatic, polycyclic aromatic as well as acyclic isoprenoid compounds. Various genes predicted to facilitate hydrocarbon degradation, e.g. alkane 1-monooxygenase, appear to have originated from lateral gene transfer as they are located on gene clusters of 10-20% lower GC-content compared to genome averages and are flanked by transposases. Top ortholog hits are found in other hydrocarbon degrading organisms, e.g. Alcanivorax borkumensis. Strategies for hydrocarbon uptake encoded by various Marinobacter strains include cell surface hydrophobicity adaptation via capsular polysaccharide biosynthesis and attachment

  3. Twelve previously unknown phage genera are ubiquitous in global oceans.

    Science.gov (United States)

    Holmfeldt, Karin; Solonenko, Natalie; Shah, Manesh; Corrier, Kristen; Riemann, Lasse; Verberkmoes, Nathan C; Sullivan, Matthew B

    2013-07-30

    Viruses are fundamental to ecosystems ranging from oceans to humans, yet our ability to study them is bottlenecked by the lack of ecologically relevant isolates, resulting in "unknowns" dominating culture-independent surveys. Here we present genomes from 31 phages infecting multiple strains of the aquatic bacterium Cellulophaga baltica (Bacteroidetes) to provide data for an underrepresented and environmentally abundant bacterial lineage. Comparative genomics delineated 12 phage groups that (i) each represent a new genus, and (ii) represent one novel and four well-known viral families. This diversity contrasts the few well-studied marine phage systems, but parallels the diversity of phages infecting human-associated bacteria. Although all 12 Cellulophaga phages represent new genera, the podoviruses and icosahedral, nontailed ssDNA phages were exceptional, with genomes up to twice as large as those previously observed for each phage type. Structural novelty was also substantial, requiring experimental phage proteomics to identify 83% of the structural proteins. The presence of uncommon nucleotide metabolism genes in four genera likely underscores the importance of scavenging nutrient-rich molecules as previously seen for phages in marine environments. Metagenomic recruitment analyses suggest that these particular Cellulophaga phages are rare and may represent a first glimpse into the phage side of the rare biosphere. However, these analyses also revealed that these phage genera are widespread, occurring in 94% of 137 investigated metagenomes. Together, this diverse and novel collection of phages identifies a small but ubiquitous fraction of unknown marine viral diversity and provides numerous environmentally relevant phage-host systems for experimental hypothesis testing.

  4. mORCA: ubiquitous access to life science web services.

    Science.gov (United States)

    Diaz-Del-Pino, Sergio; Trelles, Oswaldo; Falgueras, Juan

    2018-01-16

    Technical advances in mobile devices such as smartphones and tablets have produced an extraordinary increase in their use around the world and have become part of our daily lives. The possibility of carrying these devices in a pocket, particularly mobile phones, has enabled ubiquitous access to Internet resources. Furthermore, in the life sciences world there has been a vast proliferation of data types and services that finish as Web Services. This suggests the need for research into mobile clients to deal with life sciences applications for effective usage and exploitation. Analysing the current features in existing bioinformatics applications managing Web Services, we have devised, implemented, and deployed an easy-to-use web-based lightweight mobile client. This client is able to browse, select, compose parameters, invoke, and monitor the execution of Web Services stored in catalogues or central repositories. The client is also able to deal with huge amounts of data between external storage mounts. In addition, we also present a validation use case, which illustrates the usage of the application while executing, monitoring, and exploring the results of a registered workflow. The software its available in the Apple Store and Android Market and the source code is publicly available in Github. Mobile devices are becoming increasingly important in the scientific world due to their strong potential impact on scientific applications. Bioinformatics should not fall behind this trend. We present an original software client that deals with the intrinsic limitations of such devices and propose different guidelines to provide location-independent access to computational resources in bioinformatics and biomedicine. Its modular design makes it easily expandable with the inclusion of new repositories, tools, types of visualization, etc.

  5. Lipid droplets as ubiquitous fat storage organelles in C. elegans

    Directory of Open Access Journals (Sweden)

    Guo Fengli

    2010-12-01

    Full Text Available Abstract Background Lipid droplets are a class of eukaryotic cell organelles for storage of neutral fat such as triacylglycerol (TAG and cholesterol ester (CE. We and others have recently reported that lysosome-related organelles (LROs are not fat storage structures in the nematode C. elegans. We also reported the formation of enlarged lipid droplets in a class of peroxisomal fatty acid β-oxidation mutants. In the present study, we seek to provide further evidence on the organelle nature and biophysical properties of fat storage structures in wild-type and mutant C. elegans. Results In this study, we provide biochemical, histological and ultrastructural evidence of lipid droplets in wild-type and mutant C. elegans that lack lysosome related organelles (LROs. The formation of lipid droplets and the targeting of BODIPY fatty acid analogs to lipid droplets in live animals are not dependent on lysosomal trafficking or peroxisome dysfunction. However, the targeting of Nile Red to lipid droplets in live animals occurs only in mutants with defective peroxisomes. Nile Red labelled-lipid droplets are characterized by a fluorescence emission spectrum distinct from that of Nile Red labelled-LROs. Moreover, we show that the recently developed post-fix Nile Red staining method labels lipid droplets exclusively. Conclusions Our results demonstrate lipid droplets as ubiquitous fat storage organelles and provide a unified explanation for previous studies on fat labelling methods in C. elegans. These results have important applications to the studies of fat storage and lipid droplet regulation in the powerful genetic system, C. elegans.

  6. Double seal door design and analysis for ITER transfer cask

    International Nuclear Information System (INIS)

    Liu, C.L.; Yao, D.M.; Cheng, T.

    2007-01-01

    DSD (Double seal door) design concept was introduced. 3-D model work was performed for DSD in the three typical regions, such as upper port, equatorial port, divertor port. The numerical analysis for some typical components was done based on Finite Element (FE) method by using ANSYS code, especially for the optimization activities. The rescue procedures of the DSD was discussed which could benefit a little for future engineering implementation. The design and analysis work can support and be the important reference for future procurement. (authors)

  7. Container lid gasket protective strip for double door transfer system

    Science.gov (United States)

    Allen, Jr., Burgess M

    2013-02-19

    An apparatus and a process for forming a protective barrier seal along a "ring of concern" of a transfer container used with double door systems is provided. A protective substrate is supplied between a "ring of concern" and a safety cover in which an adhesive layer of the substrate engages the "ring of concern". A compressive foam strip along an opposite side of the substrate engages a safety cover such that a compressive force is maintained between the "ring of concern" and the adhesive layer of the substrate.

  8. Stability of cosmological deflagration fronts

    Science.gov (United States)

    Mégevand, Ariel; Membiela, Federico Agustín

    2014-05-01

    In a cosmological first-order phase transition, bubbles of the stable phase nucleate and expand in the supercooled metastable phase. In many cases, the growth of bubbles reaches a stationary state, with bubble walls propagating as detonations or deflagrations. However, these hydrodynamical solutions may be unstable under corrugation of the interface. Such instability may drastically alter some of the cosmological consequences of the phase transition. Here, we study the hydrodynamical stability of deflagration fronts. We improve upon previous studies by making a more careful and detailed analysis. In particular, we take into account the fact that the equation of motion for the phase interface depends separately on the temperature and fluid velocity on each side of the wall. Fluid variables on each side of the wall are similar for weakly first-order phase transitions, but differ significantly for stronger phase transitions. As a consequence, we find that, for large enough supercooling, any subsonic wall velocity becomes unstable. Moreover, as the velocity approaches the speed of sound, perturbations become unstable on all wavelengths. For smaller supercooling and small wall velocities, our results agree with those of previous works. Essentially, perturbations on large wavelengths are unstable, unless the wall velocity is higher than a critical value. We also find a previously unobserved range of marginally unstable wavelengths. We analyze the dynamical relevance of the instabilities, and we estimate the characteristic time and length scales associated with their growth. We discuss the implications for the electroweak phase transition and its cosmological consequences.

  9. Stability of cosmological detonation fronts

    Science.gov (United States)

    Mégevand, Ariel; Membiela, Federico Agustín

    2014-05-01

    The steady-state propagation of a phase-transition front is classified, according to hydrodynamics, as a deflagration or a detonation, depending on its velocity with respect to the fluid. These propagation modes are further divided into three types, namely, weak, Jouguet, and strong solutions, according to their disturbance of the fluid. However, some of these hydrodynamic modes will not be realized in a phase transition. One particular cause is the presence of instabilities. In this work we study the linear stability of weak detonations, which are generally believed to be stable. After discussing in detail the weak detonation solution, we consider small perturbations of the interface and the fluid configuration. When the balance between the driving and friction forces is taken into account, it turns out that there are actually two different kinds of weak detonations, which behave very differently as functions of the parameters. We show that the branch of stronger weak detonations are unstable, except very close to the Jouguet point, where our approach breaks down.

  10. Up front in the CIS

    International Nuclear Information System (INIS)

    Grey, C.A.

    1994-01-01

    A picture is drawn of the current supply side of the front-end fuel cycle production capacities in the CIS. Uranium production has been steadily declining, as in the West. Market realities have been reflected in local costs of production since the break-up of the former Soviet Union and some uneconomic mines have been closed. In terms of actual production, Kazakhstan, Russia and Uzbekistan, remain among the top five uranium producers in the world. Western government action has been taken to restrict the market access for natural uranium from the CIS. Reactors in the CIS continue to be supplied with fabricated fuel solely by Russian, though Western fuel fabricators have reduced Russian supplies to Eastern Europe. Russia's current dominance in conversion and enrichment services in both the CIS and Eastern Europe is likely to continue as long as the present surplus low enriched uranium stocks last and surplus production capacity exists. Market penetration in the West has been limited by government action but Russia in 1993 still held about 20% of the world's conversion market and nearly 19% of the enrichment market. (6 figures, 2 tables, 4 references) (UK)

  11. Application of up-front licensing

    International Nuclear Information System (INIS)

    Grant, S.D.; Snell, V.G.

    1995-01-01

    AECL has been pioneering 'up-front' licensing of new reactor designs. The CANDU 3 design has been formally reviewed by AECB staff for a number of years. The CANDU 9 design has just started the up-front licensing process. The process gives designers, regulators and potential customers early confidence in the licensability of future plants. (author). 4 refs., 2 tabs

  12. Application of up-front licensing

    Energy Technology Data Exchange (ETDEWEB)

    Grant, S D [Atomic Energy of Canada Ltd., Saskatoon, SK (Canada); Snell, V G [Atomic Energy of Canada Ltd., Mississauga, ON (Canada)

    1996-12-31

    AECL has been pioneering `up-front` licensing of new reactor designs. The CANDU 3 design has been formally reviewed by AECB staff for a number of years. The CANDU 9 design has just started the up-front licensing process. The process gives designers, regulators and potential customers early confidence in the licensability of future plants. (author). 4 refs., 2 tabs.

  13. RPC performance vs. front-end electronics

    International Nuclear Information System (INIS)

    Cardarelli, R.; Aielli, G.; Camarri, P.; Di Ciaccio, A.; Di Stante, L.; Liberti, B.; Pastori, E.; Santonico, R.; Zerbini, A.

    2012-01-01

    Moving the amplification from the gas to the front-end electronics was a milestone in the development of Resistive Plate Chambers. Here we discuss the historical evolution of RPCs and we show the results obtained with newly developed front-end electronics with threshold in the fC range.

  14. Control of a laser front wave

    International Nuclear Information System (INIS)

    Akaoka, K.; Wakaida, I.

    1996-01-01

    We controlled the laser wave front through a laser beam simulation experiment propagating through medium. Thus, we confirmed that the RMS, defined as the quadratic mean of the laser beam wave front, dropped to the 1/3 - 1/6 of the pre-control value

  15. Nuclear Physics on the Light Front

    OpenAIRE

    Miller, Gerald A.

    1999-01-01

    High energy scattering experiments involving nuclei are typically analyzed in terms of light front variables. The desire to provide realistic, relativistic wave functions expressed in terms of these variables led me to try to use light front dynamics to compute nuclear wave functions. The progress is summarized here.

  16. Wave fronts of electromagnetic cyclotron harmonic waves

    International Nuclear Information System (INIS)

    Ohnuma, T.; Watanabe, T.

    1982-01-01

    In an inhomogeneous high-density magnetized plasma, the spatial properties of the wave fronts and ray trajectories of electromagnetic ordinary and extraordinary cyclotron harmonic waves are investigated. Those waves which are radiated from a local source are found to have wave fronts which are almost parallel to the magnetic field. Also, the reflective properties of the electromagnetic cyclotron harmonic waves are confirmed

  17. End-Users, Front Ends and Librarians.

    Science.gov (United States)

    Bourne, Donna E.

    1989-01-01

    The increase in end-user searching, the advantages and limitations of front ends, and the role of the librarian in end-user searching are discussed. It is argued that librarians need to recognize that front ends can be of benefit to themselves and patrons, and to assume the role of advisors and educators for end-users. (37 references) (CLB)

  18. Identification of persons entering through the door from the accelerometers data

    OpenAIRE

    Vodopivec, Tadej

    2013-01-01

    This thesis presents a system for automatic identification of a person who walks through a door based on the information gathered with acceleration sensors, which are mounted on the door. The proccedure for automatic identification consists of four steps. In the first step, data acquisition and coordinate system rotation is performed. Coordinate system rotation is needed in order to match the direction of measured accelerations with the direction of components of the forces acting on the door...

  19. An Expert System-based Context-Aware Ubiquitous Learning Approach for Conducting Science Learning Activities

    Science.gov (United States)

    Wu, Po-Han; Hwang, Gwo-Jen; Tsai, Wen-Hung

    2013-01-01

    Context-aware ubiquitous learning has been recognized as being a promising approach that enables students to interact with real-world learning targets with supports from the digital world. Several researchers have indicated the importance of providing learning guidance or hints to individual students during the context-aware ubiquitous learning…

  20. Evaluation of a ubiquitous learning system in a design engineering environment

    NARCIS (Netherlands)

    Vroom, R.W.; Horvath, I.; Rusak, Z.; De Smit, A.; Opiyo, E.Z.

    2012-01-01

    Ubiquitous computing is computing power that is integrated in devices and environments in such a way that they offer optimal support to human daily life activities. For industrial design engineering students, applying ubiquitous technologies offer a great opportunity and challenge for innovating

  1. Conjoint Analysis for Mobile Devices for Ubiquitous Learning in Higher Education: The Korean Case

    Science.gov (United States)

    Lee, Hyeongjik

    2013-01-01

    Despite the increasing importance of mobile devices in education, the essential features of these devices for ubiquitous learning have not been empirically addressed. This study empirically investigated the necessary conditions for using mobile devices as an educational tool for ubiquitous learning in higher education by a conjoint method. The…

  2. The Influential Factors for the Variation of Data Sensitivity in Ubiquitous Social Networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio

    2013-01-01

    Ubiquitous social networking services offer new opportunities for developing advantageous relationships by uncovering hidden connections that people share with others nearby. As sharing of personal information is an intrinsic part of ubiquitous social networking, these services are subject......, mood, location familiarity, number of previous encounters and mutual friends, were also discovered to influence participants' data disclosure, but as factors of secondary importance....

  3. Ambient Learning Displays - Distributed Mixed Reality Information Mash-ups to support Ubiquitous Learning

    NARCIS (Netherlands)

    Börner, Dirk

    2012-01-01

    Börner, D. (2012). Ambient Learning Displays - Distributed Mixed Reality Information Mash-ups to support Ubiquitous Learning. 2012 IEEE Seventh International Conference on Wireless, Mobile and Ubiquitous Technology in Education (pp. 337-338). March, 27-30, 2012, Takamatsu, Japan: IEEE Computer

  4. Usage of radiography techniques for restoration of Cizre Mardin Ulucami door

    International Nuclear Information System (INIS)

    Tugrul, B.; Sungur, F.; Gorkem, A.; Olcer, N.

    1986-01-01

    In this study, one of the two sections of Cizre-Mardin Ulucami door is investigated by x-ray radiography technique whether it has some patterns similar to those which were discovered during the restoration of the first section of the door. Some painted and traced parts have been fixed and torn down, cleared and investigated. In the study, many pieces of the first part of the door including the second door have been investigated by x-ray radiography technique and have been evaluated. Furthermore, neutrography has been applied on some painted parts for the investigation of traces of painting. (author)

  5. Inflatable door seals - reduced maintenance and longer service-life

    International Nuclear Information System (INIS)

    Kuran, S.; Wensel, R.; Lazic, M.

    1995-01-01

    Inflatable door seals, designed more than a quarter of a century ago, have given good service in Canadian and overseas CANDU reactors. These thin-walled elastomeric seals have been exposed to many thousands of cycles of inflation and deflation, various types of aging (temperature, radiation and time), ozone degradation, abrasion, pinching, stiction, cracking and installation damage. The fact that they have operated successfully as part of the reactor building containment structure - subjected to the same pressures and temperatures as those for the thick reinforced concrete walls and steel doors highlights the achievement of these thin rubber seals. However, in the last decade, the rubber industry has developed new compounds that are more resistant to radiation, temperature, and time-dependent aging. Components manufactured from such compounds are less prone to hardening, stress cracking and permanent set; thereby saving on replacement costs, inventory and overall maintenance. This paper discusses development and testing of recent material and design changes to inflatable seals, and addresses various practical issues faced by the operations engineers and maintainers using these seals. (author)

  6. Blocking-resistant communication through domain fronting

    Directory of Open Access Journals (Sweden)

    Fifield David

    2015-06-01

    Full Text Available We describe “domain fronting,” a versatile censorship circumvention technique that hides the remote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to communicate with a forbidden host while appearing to communicate with some other host, permitted by the censor. The key idea is the use of different domain names at different layers of communication. One domain appears on the “outside” of an HTTPS request—in the DNS request and TLS Server Name Indication—while another domain appears on the “inside”—in the HTTP Host header, invisible to the censor under HTTPS encryption. A censor, unable to distinguish fronted and nonfronted traffic to a domain, must choose between allowing circumvention traffic and blocking the domain entirely, which results in expensive collateral damage. Domain fronting is easy to deploy and use and does not require special cooperation by network intermediaries. We identify a number of hard-to-block web services, such as content delivery networks, that support domain-fronted connections and are useful for censorship circumvention. Domain fronting, in various forms, is now a circumvention workhorse. We describe several months of deployment experience in the Tor, Lantern, and Psiphon circumvention systems, whose domain-fronting transports now connect thousands of users daily and transfer many terabytes per month.

  7. Solid-State Photomultiplier with Integrated Front End Electronics

    Science.gov (United States)

    Christian, James; Stapels, Christopher; Johnson, Erik; Mukhopadhyay, Sharmistha; Jie Chen, Xiao; Miskimen, Rory

    2009-10-01

    The instrumentation cost of physics experiments has been reduced per channel, by the use of solid-state detectors, but these cost-effective techniques have not been translated to scintillation-based detectors. When considering photodetectors, the cost per channel is determined by the use of high-voltage, analog-to-digital converters, BNC cables, and any other ancillary devices. The overhead associated with device operation limits the number of channels for the detector system, while potentially limiting the scope of physics that can be explored. The PRIMEX experiment at JLab, which is being designed to measure the radiative widths of the η and η' pseudo-scalar mesons for a more comprehensive understanding of QCD at low energies, is an example where CMOS solid-state photomultipliers (SSPMs) can be implemented. The ubiquitous nature of CMOS allows for on-chip signal processing to provide front-end electronics within the detector package. We present the results of the device development for the PRIMEX calorimeter, discussing the characteristics of SSPMs, the potential cost savings, and experimental results of on-chip signal processing.

  8. Characterizing Ion Flows Across a Dipolarization Front

    Science.gov (United States)

    Arnold, H.; Drake, J. F.; Swisdak, M.

    2017-12-01

    In light of the Magnetospheric Multiscale Mission (MMS) moving to study predominately symmetric magnetic reconnection in the Earth's magnetotail, it is of interest to investigate various methods for determining the relative location of the satellites with respect to the x line or a dipolarization front. We use a 2.5 dimensional PIC simulation to explore the dependence of various characteristics of a front, or flux bundle, on the width of the front in the dawn-dusk direction. In particular, we characterize the ion flow in the x-GSM direction across the front. We find a linear relationship between the width of a front, w, and the maximum velocity of the ion flow in the x-GSM direction, Vxi, for small widths: Vxi/VA=w/di*1/2*(mVA2)/Ti*Bz/Bxwhere m, VA, di, Ti, Bz, and Bx are the ion mass, upstream Alfven speed, ion inertial length, ion temperature, and magnetic fields in the z-GSM and x-GSM directions respectively. However, once the width reaches around 5 di, the relationship gradually approaches the well-known theoretical limit for ion flows, the upstream Alfven speed. Furthermore, we note that there is a reversal in the Hall magnetic field near the current sheet on the positive y-GSM side of the front. This reversal is most likely due to conservation of momentum in the y-GSM direction as the ions accelerate towards the x-GSM direction. This indicates that while the ions are primarily energized in the x-GSM direction by the front, they transfer energy to the electromagnetic fields in the y-GSM direction. The former energy transfer is greater than the latter, but the reversal of the Hall magnetic field drags the frozen-in electrons along with it outside of the front. These simulations should better able researchers to determine the relative location of a satellite crossing a dipolarization front.

  9. Managing Controversies in the Fuzzy Front End

    DEFF Research Database (Denmark)

    Christiansen, John K.; Gasparin, Marta

    2016-01-01

    This research investigates the controversies that emerge in the fuzzy front end (FFE) and how they are closed so the innovation process can move on. The fuzzy front has been characterized in the literature as a very critical phase, but controversies in the FFE have not been studied before....... The analysis investigates the microprocesses around the controversies that emerge during the fuzzy front end of four products. Five different types of controversies are identified: profit, production, design, brand and customers/market. Each controversy represents a threat, but also an opportunity to search...

  10. SPD very front end electronics

    International Nuclear Information System (INIS)

    Luengo, S.; Gascon, D.; Comerma, A.; Garrido, L.; Riera, J.; Tortella, S.; Vilasis, X.

    2006-01-01

    The Scintillator Pad Detector (SPD) is part of the LHCb calorimetry system [D. Breton, The front-end electronics for LHCb calorimeters, Tenth International Conference on Calorimetry in Particle Physics, CALOR, Pasadena, 2002] that provides high-energy hadron, electron and photon candidates for the first level trigger. The SPD is designed to distinguish electrons from photons. It consists of a plastic scintillator layer, divided into about 6000 cells of different size to obtain better granularity near the beam [S. Amato, et al., LHCb technical design report, CERN/LHCC/2000-0036, 2000]. Charged particles will produce, and photons will not, ionization in the scintillator. This ionization generates a light pulse that is collected by a WaveLength Shifting (WLS) fiber that is coiled inside the scintillator cell. The light is transmitted through a clear fiber to the readout system that is placed at the periphery of the detector. Due to space constraints, and in order to reduce costs, these 6000 cells are divided in groups using a MAPMT [Z. Ajaltouni, et al., Nucl. Instr. and Meth. A 504 (2003) 9] of 64 channels that provides information to the VFE readout electronics. The SPD signal has rather large statistical fluctuations because of the low number (20-30) of photoelectrons per MIP. Therefore the signal is integrated over the whole bunch crossing length of 25 ns in order to have the maximum value. Since in average about 85% of the SPD signal is within 25 ns, 15% of a sample is subtracted from the following one using an operational amplifier. The SPD VFE readout system that will be presented consists of the following components. A specific ASIC [D. Gascon, et al., Discriminator ASIC for the VFE SPD of the LHCb Calorimeter, LHCB Technical Note, LHCB 2004-xx] integrates the signal, makes the signal-tail subtraction, and compares the level obtained to a programmable threshold (to distinguish electrons from photons). A FPGA programmes the ASIC threshold and the value for

  11. Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices

    Directory of Open Access Journals (Sweden)

    Jae Dong Lee

    2014-01-01

    Full Text Available As intelligent ubiquitous devices become more popular, security threats targeting them are increasing; security is seen as one of the major challenges of the ubiquitous computing. Now a days, applying ubiquitous computing in number of fields for human safety and convenience was immensely increased in recent years. The popularity of the technology is rising day by day, and hence the security is becoming the main focused point with the advent and rising popularity of the applications. In particular, the number of wireless networks based on ubiquitous devices has increased rapidly; these devices support transmission for many types of data traffic. The convenient portability of ubiquitous devices makes them vulnerable to security threats, such as loss, theft, data modification, and wiretapping. Developers and users should seriously consider employing data encryption to protect data from such vulnerabilities. In this paper, we propose a Rhythm Key based Encryption scheme for ubiquitous devices (Ubi-RKE. The concept of Rhythm Key based Encryption has been applied to numerous real world applications in different domains. It provides key memorability and secure encryption through user touching rhythm on ubiquitous devices. Our proposed scheme is more efficient for users than existing schemes, by providing a strong cipher.

  12. Multimodal and ubiquitous computing systems: supporting independent-living older users.

    Science.gov (United States)

    Perry, Mark; Dowdall, Alan; Lines, Lorna; Hone, Kate

    2004-09-01

    We document the rationale and design of a multimodal interface to a pervasive/ubiquitous computing system that supports independent living by older people in their own homes. The Millennium Home system involves fitting a resident's home with sensors--these sensors can be used to trigger sequences of interaction with the resident to warn them about dangerous events, or to check if they need external help. We draw lessons from the design process and conclude the paper with implications for the design of multimodal interfaces to ubiquitous systems developed for the elderly and in healthcare, as well as for more general ubiquitous computing applications.

  13. FTRA 4th International Conference on Mobile, Ubiquitous, and Intelligent Computing

    CERN Document Server

    Adeli, Hojjat; Park, Namje; Woungang, Isaac

    2014-01-01

    MUSIC 2013 will be the most comprehensive text focused on the various aspects of Mobile, Ubiquitous and Intelligent computing. MUSIC 2013 provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of intelligent technologies in mobile and ubiquitous computing environment. MUSIC 2013 is the next edition of the 3rd International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC-12, Vancouver, Canada, 2012) which was the next event in a series of highly successful International Workshop on Multimedia, Communication and Convergence technologies MCC-11 (Crete, Greece, June 2011), MCC-10 (Cebu, Philippines, August 2010).

  14. On Front Slope Stability of Berm Breakwaters

    DEFF Research Database (Denmark)

    Burcharth, Hans F.

    2013-01-01

    The short communication presents application of the conventional Van der Meer stability formula for low-crested breakwaters for the prediction of front slope erosion of statically stable berm breakwaters with relatively high berms. The method is verified (Burcharth, 2008) by comparison...... with the reshaping of a large Norwegian breakwater exposed to the North Sea waves. As a motivation for applying the Van der Meer formula a discussion of design parameters related to berm breakwater stability formulae is given. Comparisons of front erosion predicted by the use of the Van der Meer formula with model...... test results including tests presented in Sigurdarson and Van der Meer (2011) are discussed. A proposal is presented for performance of new model tests with the purpose of developing more accurate formulae for the prediction of front slope erosion as a function of front slope, relative berm height...

  15. Onderzoek naar voorkomen van zachte vruchten bij courgette in de afzetketen door optimale watergift

    NARCIS (Netherlands)

    Wijk, van C.A.P.; Wilms, J.A.M.

    2008-01-01

    Vochttekort tijdens de teelt werd door de telers als mogelijke oorzaak gezien. Het ‘weer’ is geen groeifactor waarop de tuinder kan sturen. Vochttekort is wel bij te sturen door water geven. Ter toetsing van de invloed van vochttekort is in 2006 in een late zomer/herfstteelt een proef aangelegd in

  16. Novel Door-opening Method for Six-legged Robots Based on Only Force Sensing

    Science.gov (United States)

    Chen, Zhi-Jun; Gao, Feng; Pan, Yang

    2017-09-01

    Current door-opening methods are mainly developed on tracked, wheeled and biped robots by applying multi-DOF manipulators and vision systems. However, door-opening methods for six-legged robots are seldom studied, especially using 0-DOF tools to operate and only force sensing to detect. A novel door-opening method for six-legged robots is developed and implemented to the six-parallel-legged robot. The kinematic model of the six-parallel-legged robot is established and the model of measuring the positional relationship between the robot and the door is proposed. The measurement model is completely based on only force sensing. The real-time trajectory planning method and the control strategy are designed. The trajectory planning method allows the maximum angle between the sagittal axis of the robot body and the normal line of the door plane to be 45º. A 0-DOF tool mounted to the robot body is applied to operate. By integrating with the body, the tool has 6 DOFs and enough workspace to operate. The loose grasp achieved by the tool helps release the inner force in the tool. Experiments are carried out to validate the method. The results show that the method is effective and robust in opening doors wider than 1 m. This paper proposes a novel door-opening method for six-legged robots, which notably uses a 0-DOF tool and only force sensing to detect and open the door.

  17. Evaluatie van het nieuwe RVV door weggebruikers : een samenvattend verslag van de nameting.

    NARCIS (Netherlands)

    Wittink, R.D.

    1993-01-01

    The new Dutch traffic regulations (RVV of 1990) have been effective since 1 November 1991. This paper presents the results of a door-to-door questionnaire survey among 655 sixteen year olds and older persons in order to investigate their knowledge and opinions about the new RVV. This survey carried

  18. 24 CFR 3280.403 - Standard for windows and sliding glass doors used in manufactured homes.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Standard for windows and sliding... AND SAFETY STANDARDS Testing § 3280.403 Standard for windows and sliding glass doors used in manufactured homes. (a) Scope. This section sets the requirements for prime windows and sliding glass doors...

  19. The doors have been removed… for YOUR safety

    DEFF Research Database (Denmark)

    Abildgaard, Mette Simonsen

    on the classic box-shaped telephone booths, which had been a part of Danish communication infrastructure since 1932. But the doors were never reinstalled after the capture of the user, who became known as The Telephone Bomber, and a competition for a new open design was commissioned in 1980. The winning design......'s shape in fact made it inoperable for wheelchair-users. In contrast, the mayor of Copenhagen was fond of The Question Mark and vetoed alternative designs. Following several years of dispute, The Question Mark was installed in central Copenhagen, and Utzon Arkitekter, firm of Jørn Utzon, were commissioned...... to design a second open telephone booth. The Utzon-booth was ready in 1987, and received favourable reactions from the public on its design, which drew on the classic box-shape. I will present how, between human and nonhuman actors, in such different domains as politics, design, infrastructure and terror...

  20. Bluetooth enables in-door mobile location services

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    Several technologies can be applied to enable mobile location services, but most of them suffer from limited accuracy and availability. GPS can solve the problem of determining the location of users in most outdoor situations, but an end-user position inside a building cannot be pinpointed. Other...... mobile location techniques can also provide the user's position, but the accuracy is rather low. In order to improve the accuracy and make location-based services really attractive, existing approaches must be supplemented by new technologies. Wireless short-range technologies like Bluetooth could...... be candidates for solving these problems. This paper shows that Bluetooth can act as a key enabler of mobile location services in an in-door environment. The advantage of Bluetooth technology is, that it can provide rather precise location data inside a building or hotspot area, while the Bluetooth terminal...

  1. Simulation of the noise transmission through automotive door seals

    CERN Document Server

    Hazir, Andreas

    2016-01-01

    Andreas Hazir is investigating the door seal contribution to the interior noise level of production vehicles. These investigations contain experimental contribution analyses of real production vehicles and of academic test cases as well as the development of a simulation methodology for noise transmission through sealing systems and side windows. The simulations are realized by coupling transient computational aeroacoustics of the exterior flow to nonlinear finite element simulations of the structural transmission. By introducing a linear transmission model, the setup and computational costs of the seal noise transmission are significantly reduced, resulting in the feasibility of numerical contribution analyses of real production vehicles. Contents Contribution Analyses of Production Vehicles Acoustic Excitation versus Aeroacoustic Excitation Development of a Simulation Methodology Sensitivity Analysis of Noise Transmission Simulations Target Groups Researchers and students in the field of automotive engineer...

  2. Door Security using Face Detection and Raspberry Pi

    Science.gov (United States)

    Bhutra, Venkatesh; Kumar, Harshav; Jangid, Santosh; Solanki, L.

    2018-03-01

    With the world moving towards advanced technologies, security forms a crucial part in daily life. Among the many techniques used for this purpose, Face Recognition stands as effective means of authentication and security. This paper deals with the user of principal component and security. PCA is a statistical approach used to simplify a data set. The minimum Euclidean distance found from the PCA technique is used to recognize the face. Raspberry Pi a low cost ARM based computer on a small circuit board, controls the servo motor and other sensors. The servo-motor is in turn attached to the doors of home and opens up when the face is recognized. The proposed work has been done using a self-made training database of students from B.K. Birla Institute of Engineering and Technology, Pilani, Rajasthan, India.

  3. Globalization: an open door for the knowledge economy

    Directory of Open Access Journals (Sweden)

    Andreea MARIN-PANTELESCU

    2009-12-01

    Full Text Available Globalization refers to an emphasized process of global integration and spreading a set of ideas related to the economical activity and goods’ production, the premises being the liberalization of international commerce and the capital flows, the speeding up of the technological progress and informational society. The cognitive society is more and more obvious and unanimously accepted, which actually proves its efficiency. If traditional, conservative communities, which are not open to change and reject from the start anything new on the horizon, still exist today, they are isolated cases that will eventually be "converted" by this wave of information that has become indispensable to any development because in its absence resources could not be used efficiently. Taking into consideration these elements, this paper wishes to give arguments to the fact that globalization can be seen as being an open door for the cognitive society.

  4. A low-power bio-potential acquisition system with flexible PDMS dry electrodes for portable ubiquitous healthcare applications.

    Science.gov (United States)

    Chen, Chih-Yuan; Chang, Chia-Lin; Chang, Chih-Wei; Lai, Shin-Chi; Chien, Tsung-Fu; Huang, Hong-Yi; Chiou, Jin-Chern; Luo, Ching-Hsing

    2013-03-04

    This work describes a bio-potential acquisition system for portable ubiquitous healthcare applications using flexible polydimethylsiloxane dry electrodes (FPDEs) and a low-power recording circuit. This novel FPDE used Au as the skin contact layer, which was made using a CO2 laser and replica method technology. The FPDE was revised from a commercial bio-potential electrode with a conductive snap using dry electrodes rather than wet electrodes that proposed reliable and robust attachment for the purpose of measurement, and attaching velcro made it wearable on the forearm for bio-potential applications. Furthermore, this study proposes a recording device to store bio-potential signal data and provides portability and low-power consumption for the proposed acquisition system. To acquire differential bio-potentials, such as electrocardiogram (ECG) signals, the proposed recording device includes a low-power front-end acquisition chip fabricated using a complementary metal-oxide-semiconductor (CMOS) process, a commercial microcontroller (MSP430F149), and a secure digital (SD) card for portable healthcare applications. The proposed system can obtain ECG signals efficiently and are comfortable to the skin. The power consumption of the system is about 85 mW for continuous working over a 3 day period with two AA batteries. It can also be used as a compact Holter ECG system.

  5. Doors and thresholds: Jeddi's approach to psychiatric disorders.

    Science.gov (United States)

    Devisch, R; Vervaeck, B

    1986-01-01

    Professor Essedik Jeddi and his team have introduced a most significant institutional and therapeutic innovation at the Ibn Rochd and Pinel section of the Razi university long-term mental hospital in Tunis (Tunisia). The innovation focuses upon the ambiguity of doors and boundaries in the mental asylum. Doors and walls influence the rhythm of activity and the nature of contact between patients, therapists and the wider society and culture. If they are very rigid, they may disjoin the patient from him- or herself, from his/her body, social network and culture. On the other hand, if such boundaries are completely neglected they may merge these related dimensions as undifferentiated entities. Jeddi's innovation is primarily concerned with placing the spatio-temporal experience of the body and the intimate interpersonal interaction at the centre of treatment. It aims at establishing creative modes of expression, interaction and exchange such as tea-sessions, dancing, singing, verbal communication, clay-modelling, figurative or plastic expression, agricultural works. These relationships mediate and differentiate at the same time between the patient, his/her body-self, and his/her social and cultural world, thus avoiding both the disjunction and the merging. It would seem that the activities concerned with the distinction between 'inside' and 'outside', peasant and urban, self and other (e.g. dancing and singing) are of paramount importance in bringing about such mediating and differentiating relationships. In the present study we limit ourselves to one particularly revealing therapeutic activity, namely dancing to live music. Jeddi's innovation is a unique blend of current developments in psychiatry and psychotherapy with Arabo-Islamic science and philosophy.

  6. Telling About Southern Fluctuations: Elizabeth Spencer at the Back Door

    Directory of Open Access Journals (Sweden)

    Gérald PRÉHER

    2011-06-01

    Full Text Available Le troisième roman d’Elizabeth Spencer, The Voice at the Back Door (1956, appartient à son cycle du Mississippi. Il traite des relations raciales et de la violence sudiste, deux thèmes qui n’avaient pas bonne presse à cette époque puisque le mouvement pour les droits civiques débutait. Le roman rappelle L’intrus (1948 de Faulkner en ce qu’il met en scène la recherche du coupable du meurtre d’un homme blanc. Cet article analyse la façon dont Spencer dépeint les manières du Sud en s’interrogeant sur les relations raciales. Le roman est également lu dans le contexte de sa publication puisque Spencer fut perçue comme une traîtresse par les Sudistes. Spencer utilise des sujets impopulaires pour révéler le paradoxe au cœur de la manière de vivre sudiste et montre combien le passé se rejoue constamment dans le présent.Elizabeth Spencer’s third novel, The Voice at the Back Door (1956, is part of her Mississippi cycle. It deals with race relations and southern violence, two highly controversial issues at the time since the Civil Rights Movements were beginning. The novel, reminiscent of William Faulkner’s Intruder in the Dust (1948, stages the search for a culprit after the murder of a white man. This paper focuses on Spencer’s portrait of southern manners and interracial relationships and analyzes the novel in the context of its publication. It will show that Spencer uses unpopular topics to expose the paradox at the core of the southern way of life and show that the past is constantly reenacted in the present.

  7. Characterisation of open-door electrical cabinet fires in compartments

    Energy Technology Data Exchange (ETDEWEB)

    Coutin, M., E-mail: mickael.coutin@irsn.fr; Plumecocq, W.; Zavaleta, P.; Audouin, L.

    2015-05-15

    Highlights: • Heat release rate of electrical cabinet fire source in a vitiated atmosphere. • Experimental database for proper validation the combustible modelling, taking into account the oxygen depletion in an enclosure. • New model for complex fire source. - Abstract: The study of electrical fires is a major concern for fire safety in the industry and more particularly for fire safety in nuclear facilities. To investigate this topic, IRSN conducted a large number of real-scale experiments involving open-door electrical cabinets burning firstly under a calorimetric hood and then inside a mechanically-ventilated compartment. The main challenges are to determine accurately the heat release rate of such a complex fire source in a vitiated atmosphere and to provide an experimental database for validating properly the combustible modelling, taking into account the oxygen depletion in an enclosure. After providing a detailed description of the fire scenarios and of the experimental apparatus, this paper focuses on the characteristic stages of the cabinet fire development, essentially based on the heat release rate time evolution of the fire. The effects of the confinement, of the outlet branch location, of the ventilation management and of the fire barrier on the fire source were then investigated. The reproducibility of electrical cabinet fires is also studied. A new model for complex fire source (applied in this study for open-door electrical cabinet fires) was then developed. This model was introduced in the zone code SYLVIA and the major features of the compartment fire experiments, such as characteristic heat release rate with effect of oxygen depletion and over-pressure peak were then calculated with a rather good agreement for this complex fire source (i.e. electrical cabinet)

  8. Effect of door opening and defrost cycle on a freezer with phase change panels

    International Nuclear Information System (INIS)

    Gin, B.; Farid, M.M.; Bansal, P.K.

    2010-01-01

    An investigation into the effectiveness of phase change material (PCM) panels placed against the internal walls of a freezer to maintain stable temperatures in the presence of heat loads such as door openings, defrosting, and loss of electrical power was carried out. Temperature response was studied during loss of power, a defrost cycle lasting 30 min, and a door opening scheme of 13 door openings over an 11 h period. This PCM system has significantly decreased the rate of temperature increase inside the freezer during defrosting and power loss. Energy consumption was measured during steady operation, a defrost cycle of 30 min, and a scheme of eight door openings at 40 min intervals. It was found that heat loads caused greater energy consumption, and that the presence of PCM during defrosting and door openings resulted in slightly lower energy consumption compared to without PCM.

  9. Influence of Ubiquitous Electron Acceptors on In Situ Anaerobic Biotransformation of RDX in Groundwater

    National Research Council Canada - National Science Library

    Wani, Altaf

    2003-01-01

    A series of column studies, with aquifer material from the former Nebraska Ordnance Plant, were performed to explore the phenomenon of electron competition from ubiquitous inorganic electron acceptors (nitrate and sulfate...

  10. Ambient Learning Displays - Distributed Mixed Reality Information Mash-ups to support Ubiquitous Learning

    NARCIS (Netherlands)

    Börner, Dirk

    2010-01-01

    Börner, D. (2010, 19-21 March). Ambient Learning Displays Distributed Mixed Reality Information Mash-ups to support Ubiquitous Learning. Presented at the IADIS International Conference Mobile Learning 2010, Porto, Portugal.

  11. The Synergy of Paper-Based and Digital Material for Ubiquitous Foreign Language Learners

    Directory of Open Access Journals (Sweden)

    Sabrina Leone

    2011-09-01

    Full Text Available In recent years, the development of digital information transfer, storage and communication methods has allowed for access to ubiquitous global connections and to a large number of resources available to foreign language students at all age and levels of schooling. Further, the combination of traditional paper-based learning material with digital one in a ubiquitous learning environment may offer great innovation in the delivery of education, to foster a student-centred approach, and to accommodate the needs of ubiquitous learners’ personal lifestyles. In this direction, research has increasingly emphasised the importance of a technology-enhanced rather than technology-driven learning approach. This paper aims to evaluate the effectiveness of the integration of paper-based and digital material through Quick Response (QR code for ubiquitous English language learners in three different scenarios. Results show that, despite some difficulties, flexibility and personalisation of learning have been perceived as an asset.

  12. System architecture for ubiquitous live video streaming in university network environment

    CSIR Research Space (South Africa)

    Dludla, AG

    2013-09-01

    Full Text Available an architecture which supports ubiquitous live streaming for university or campus networks using a modified bluetooth inquiry mechanism with extended ID, integrated end-user device usage and adaptation to heterogeneous networks. Riding on that architecture...

  13. Ruimte in regels: 10 succesvolle voorbeelden op wet en regelgeving binnen ruimtelijke ordening voor multifunctionele landbouw voor en door gemeenten

    NARCIS (Netherlands)

    Schoorlemmer, H.B.; Waal, van der B.H.C.; Oppedijk van Veen, J.; Migchels, G.; Mul, M.F.

    2007-01-01

    Deze VNG brochure geeft een overzicht van 10 succesvolle voorbeelden op wet en regelgeving binnen ruimtelijke ordening voor multifunctionele landbouw voor en door gemeenten. Van traditionele bestemmingsplannen naar een nieuw, ontwikkelingsgericht beleid. De brochure is samengesteld door PPO

  14. Smart Geographic object: Toward a new understanding of GIS Technology in Ubiquitous Computing

    OpenAIRE

    Zakaria, Sakyoud; Rey, Gaëtan; Mohamed, Eladnani; Lavirotte, Stéphane; Abdelaziz, El Fazziki; Tigli, Jean-Yves

    2015-01-01

    International audience; One of the fundamental aspects of ubiquitous computing is the instrumentation of the real world by smart devices. This instrumentation constitutes an opportunity to rethink the interactions between human beings and their environment on the one hand, and between the components of this environment on the other. In this paper we discuss what this understanding of ubiquitous computing can bring to geographic science and particularly to GIS technology. Our main idea is the ...

  15. Interactive Spaces: Towards Collaborative structuring and Ubiquitous Presentation in Domestic Environment

    DEFF Research Database (Denmark)

    Petersen, Marianne Graves; Grønbæk, Kaj

    2004-01-01

    collaborative structuring and ubiquitous presentation of materials in private homes. With DoHM we propose establishing new relationship between digital and physical hyperspaces, folding hyperspaces into the physical space of the household. Thus we strive to combine the qualities of physical domestic materials...... and spaces with the flexibility and dynamics of digital hyperspaces. We propose a variety of new ubiquitous home appliances called MediaWall, MediaTable, MediaTray and MediaPort, which address these issues....

  16. Interactive Spaces: Towards Collaborative Structuring and Ubiquitous Presentation in Domestic Environments

    DEFF Research Database (Denmark)

    Petersen, Marianne Graves; Grønbæk, Kaj

    2004-01-01

    collaborative structuring and ubiquitous presentation of materials in private homes. With DoHM we propose establishing new relationship between digital and physical hyperspaces, folding hyperspaces into the physical space of the household. Thus we strive to combine the qualities of physical domestic materials...... and spaces with the flexibility and dynamics of digital hyperspaces. We propose a variety of new ubiquitous home appliances called MediaWall, MediaTable, MediaTray and MediaPort, which address these issues....

  17. Door-to-door survey of major neurological disorders (project in Al Quseir City, Red Sea Governorate, Egypt

    Directory of Open Access Journals (Sweden)

    El Tallawy HN

    2013-05-01

    Full Text Available Hamdy NA El Tallawy,1 Wafaa MA Farghaly,1 Tarek A Rageh,1 Ghaydaa A Shehata,1 Reda Badry,1 Nabil A Metwally,2 Esam A El Moselhy,2 Mahmoud Hassan,2 Mohamed A Sayed,3 Ahmed A Waris,1 Yaser Hamed,2 Islam Shaaban,2 Mohamed A Hamed,1 Mahmoud Raafat Kandil11Department of Neurology, Faculty of Medicine, Assiut University, Assiut, Egypt; 2Department of Neurology and Public Health, Faculty of Medicine, Al-Azhar University (Assiut branch, Assiut, Egypt; 3Department of Neurology, Faculty of Medicine, Sohag University, Sohag, EgyptAbstract: A door-to-door survey, including every household, was conducted for all inhabitants of Al Quseir City (33,283, Red Sea Governorate, Egypt by three specialists of neurology as well as nine senior staff members of neurology and 15 female social workers to assess the epidemiology of major neurological disorders. Over six phases, from July 1, 2009 to January 31, 2012, screening of all eligible people in the population was carried out, by which case ascertainment of all major neurological disorders included in the study was done according to the accepted definitions and diagnostic criteria of the World Health Organization. The order of frequency of prevalence of the studied neurological disorders was dementia (3.83% for those aged > 60 years, migraine (2.8% for those aged > 8 years, stroke (6.2/1000 for those aged > 20 years, epilepsy (5.5/1000, Parkinson’s disease (452.1/100,000 for those aged > 40 years, cerebral palsy (3.6/1000 among children 37 years, chorea (21.03/100,000, athetosis (15/100,000, and multiple sclerosis (13.74/100,000. The incidence rates of stroke, epilepsy, and Bell’s palsy were 181/100,000, 48/100,000, and 98.9/100,000 per year, respectively.Keywords: prevalence, incidence, neurological disorders

  18. QCD and Light-Front Dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Brodsky, Stanley J.; de Teramond, Guy F.; /SLAC /Southern Denmark U., CP3-Origins /Costa Rica U.

    2011-01-10

    AdS/QCD, the correspondence between theories in a dilaton-modified five-dimensional anti-de Sitter space and confining field theories in physical space-time, provides a remarkable semiclassical model for hadron physics. Light-front holography allows hadronic amplitudes in the AdS fifth dimension to be mapped to frame-independent light-front wavefunctions of hadrons in physical space-time. The result is a single-variable light-front Schroedinger equation which determines the eigenspectrum and the light-front wavefunctions of hadrons for general spin and orbital angular momentum. The coordinate z in AdS space is uniquely identified with a Lorentz-invariant coordinate {zeta} which measures the separation of the constituents within a hadron at equal light-front time and determines the off-shell dynamics of the bound state wavefunctions as a function of the invariant mass of the constituents. The hadron eigenstates generally have components with different orbital angular momentum; e.g., the proton eigenstate in AdS/QCD with massless quarks has L = 0 and L = 1 light-front Fock components with equal probability. Higher Fock states with extra quark-anti quark pairs also arise. The soft-wall model also predicts the form of the nonperturbative effective coupling and its {beta}-function. The AdS/QCD model can be systematically improved by using its complete orthonormal solutions to diagonalize the full QCD light-front Hamiltonian or by applying the Lippmann-Schwinger method to systematically include QCD interaction terms. Some novel features of QCD are discussed, including the consequences of confinement for quark and gluon condensates. A method for computing the hadronization of quark and gluon jets at the amplitude level is outlined.

  19. QCD and Light-Front Dynamics

    International Nuclear Information System (INIS)

    Brodsky, Stanley J.; de Teramond, Guy F.

    2011-01-01

    AdS/QCD, the correspondence between theories in a dilaton-modified five-dimensional anti-de Sitter space and confining field theories in physical space-time, provides a remarkable semiclassical model for hadron physics. Light-front holography allows hadronic amplitudes in the AdS fifth dimension to be mapped to frame-independent light-front wavefunctions of hadrons in physical space-time. The result is a single-variable light-front Schroedinger equation which determines the eigenspectrum and the light-front wavefunctions of hadrons for general spin and orbital angular momentum. The coordinate z in AdS space is uniquely identified with a Lorentz-invariant coordinate ζ which measures the separation of the constituents within a hadron at equal light-front time and determines the off-shell dynamics of the bound state wavefunctions as a function of the invariant mass of the constituents. The hadron eigenstates generally have components with different orbital angular momentum; e.g., the proton eigenstate in AdS/QCD with massless quarks has L = 0 and L = 1 light-front Fock components with equal probability. Higher Fock states with extra quark-anti quark pairs also arise. The soft-wall model also predicts the form of the nonperturbative effective coupling and its β-function. The AdS/QCD model can be systematically improved by using its complete orthonormal solutions to diagonalize the full QCD light-front Hamiltonian or by applying the Lippmann-Schwinger method to systematically include QCD interaction terms. Some novel features of QCD are discussed, including the consequences of confinement for quark and gluon condensates. A method for computing the hadronization of quark and gluon jets at the amplitude level is outlined.

  20. Pareto fronts in clinical practice for pinnacle.

    Science.gov (United States)

    Janssen, Tomas; van Kesteren, Zdenko; Franssen, Gijs; Damen, Eugène; van Vliet, Corine

    2013-03-01

    Our aim was to develop a framework to objectively perform treatment planning studies using Pareto fronts. The Pareto front represents all optimal possible tradeoffs among several conflicting criteria and is an ideal tool with which to study the possibilities of a given treatment technique. The framework should require minimal user interaction and should resemble and be applicable to daily clinical practice. To generate the Pareto fronts, we used the native scripting language of Pinnacle(3) (Philips Healthcare, Andover, MA). The framework generates thousands of plans automatically from which the Pareto front is generated. As an example, the framework is applied to compare intensity modulated radiation therapy (IMRT) with volumetric modulated arc therapy (VMAT) for prostate cancer patients. For each patient and each technique, 3000 plans are generated, resulting in a total of 60,000 plans. The comparison is based on 5-dimensional Pareto fronts. Generating 3000 plans for 10 patients in parallel requires on average 96 h for IMRT and 483 hours for VMAT. Using VMAT, compared to IMRT, the maximum dose of the boost PTV was reduced by 0.4 Gy (P=.074), the mean dose in the anal sphincter by 1.6 Gy (P=.055), the conformity index of the 95% isodose (CI(95%)) by 0.02 (P=.005), and the rectal wall V(65 Gy) by 1.1% (P=.008). We showed the feasibility of automatically generating Pareto fronts with Pinnacle(3). Pareto fronts provide a valuable tool for performing objective comparative treatment planning studies. We compared VMAT with IMRT in prostate patients and found VMAT had a dosimetric advantage over IMRT. Copyright © 2013 Elsevier Inc. All rights reserved.

  1. Pareto Fronts in Clinical Practice for Pinnacle

    International Nuclear Information System (INIS)

    Janssen, Tomas; Kesteren, Zdenko van; Franssen, Gijs; Damen, Eugène; Vliet, Corine van

    2013-01-01

    Purpose: Our aim was to develop a framework to objectively perform treatment planning studies using Pareto fronts. The Pareto front represents all optimal possible tradeoffs among several conflicting criteria and is an ideal tool with which to study the possibilities of a given treatment technique. The framework should require minimal user interaction and should resemble and be applicable to daily clinical practice. Methods and Materials: To generate the Pareto fronts, we used the native scripting language of Pinnacle 3 (Philips Healthcare, Andover, MA). The framework generates thousands of plans automatically from which the Pareto front is generated. As an example, the framework is applied to compare intensity modulated radiation therapy (IMRT) with volumetric modulated arc therapy (VMAT) for prostate cancer patients. For each patient and each technique, 3000 plans are generated, resulting in a total of 60,000 plans. The comparison is based on 5-dimensional Pareto fronts. Results: Generating 3000 plans for 10 patients in parallel requires on average 96 h for IMRT and 483 hours for VMAT. Using VMAT, compared to IMRT, the maximum dose of the boost PTV was reduced by 0.4 Gy (P=.074), the mean dose in the anal sphincter by 1.6 Gy (P=.055), the conformity index of the 95% isodose (CI 95% ) by 0.02 (P=.005), and the rectal wall V 65 Gy by 1.1% (P=.008). Conclusions: We showed the feasibility of automatically generating Pareto fronts with Pinnacle 3 . Pareto fronts provide a valuable tool for performing objective comparative treatment planning studies. We compared VMAT with IMRT in prostate patients and found VMAT had a dosimetric advantage over IMRT

  2. From Many-to-One to One-to-Many: The Evolution of Ubiquitous Computing in Education

    Science.gov (United States)

    Chen, Wenli; Lim, Carolyn; Tan, Ashley

    2011-01-01

    Personal, Internet-connected technologies are becoming ubiquitous in the lives of students, and ubiquitous computing initiatives are already expanding in educational contexts. Historically in the field of education, the terms one-to-one (1:1) computing and ubiquitous computing have been interpreted in a number of ways and have at times been used…

  3. Light-Front Holography and the Light-Front Schrodinger Equation

    Energy Technology Data Exchange (ETDEWEB)

    Brodsky, Stanley J.; de Teramond, Guy

    2012-08-15

    One of the most important nonperturbative methods for solving QCD is quantization at fixed light-front time {tau} = t+z=c - Dirac's 'Front Form'. The eigenvalues of the light-front QCD Hamiltonian predict the hadron spectrum and the eigensolutions provide the light-front wavefunctions which describe hadron structure. More generally, we show that the valence Fock-state wavefunctions of the light-front QCD Hamiltonian satisfy a single-variable relativistic equation of motion, analogous to the nonrelativistic radial Schrodinger equation, with an effective confining potential U which systematically incorporates the effects of higher quark and gluon Fock states. We outline a method for computing the required potential from first principles in QCD. The holographic mapping of gravity in AdS space to QCD, quantized at fixed light-front time, yields the same light front Schrodinger equation; in fact, the soft-wall AdS/QCD approach provides a model for the light-front potential which is color-confining and reproduces well the light-hadron spectrum. One also derives via light-front holography a precise relation between the bound-state amplitudes in the fifth dimension of AdS space and the boost-invariant light-front wavefunctions describing the internal structure of hadrons in physical space-time. The elastic and transition form factors of the pion and the nucleons are found to be well described in this framework. The light-front AdS/QCD holographic approach thus gives a frame-independent first approximation of the color-confining dynamics, spectroscopy, and excitation spectra of relativistic light-quark bound states in QCD.

  4. Light-Front Quantization of Gauge Theories

    Energy Technology Data Exchange (ETDEWEB)

    Brodsky, Stanley J.

    2003-03-25

    Light-front wavefunctions provide a frame-independent representation of hadrons in terms of their physical quark and gluon degrees of freedom. The light-front Hamiltonian formalism provides new nonperturbative methods for obtaining the QCD spectrum and eigensolutions, including resolvant methods, variational techniques, and discretized light-front quantization. A new method for quantizing gauge theories in light-cone gauge using Dirac brackets to implement constraints is presented. In the case of the electroweak theory, this method of light-front quantization leads to a unitary and renormalizable theory of massive gauge particles, automatically incorporating the Lorentz and 't Hooft conditions as well as the Goldstone boson equivalence theorem. Spontaneous symmetry breaking is represented by the appearance of zero modes of the Higgs field leaving the light-front vacuum equal to the perturbative vacuum. I also discuss an ''event amplitude generator'' for automatically computing renormalized amplitudes in perturbation theory. The importance of final-state interactions for the interpretation of diffraction, shadowing, and single-spin asymmetries in inclusive reactions such as deep inelastic lepton-hadron scattering is emphasized.

  5. Light-Front Quantization of Gauge Theories

    Energy Technology Data Exchange (ETDEWEB)

    Brodskey, Stanley

    2002-12-01

    Light-front wavefunctions provide a frame-independent representation of hadrons in terms of their physical quark and gluon degrees of freedom. The light-front Hamiltonian formalism provides new nonperturbative methods for obtaining the QCD spectrum and eigensolutions, including resolvant methods, variational techniques, and discretized light-front quantization. A new method for quantizing gauge theories in light-cone gauge using Dirac brackets to implement constraints is presented. In the case of the electroweak theory, this method of light-front quantization leads to a unitary and renormalizable theory of massive gauge particles, automatically incorporating the Lorentz and 't Hooft conditions as well as the Goldstone boson equivalence theorem. Spontaneous symmetry breaking is represented by the appearance of zero modes of the Higgs field leaving the light-front vacuum equal to the perturbative vacuum. I also discuss an ''event amplitude generator'' for automatically computing renormalized amplitudes in perturbation theory. The importance of final-state interactions for the interpretation of diffraction, shadowing, and single-spin asymmetries in inclusive reactions such as deep inelastic lepton-hadron scattering is emphasized.

  6. Statistical Physics and Light-Front Quantization

    Energy Technology Data Exchange (ETDEWEB)

    Raufeisen, J

    2004-08-12

    Light-front quantization has important advantages for describing relativistic statistical systems, particularly systems for which boost invariance is essential, such as the fireball created in a heavy ion collisions. In this paper the authors develop light-front field theory at finite temperature and density with special attention to quantum chromodynamics. They construct the most general form of the statistical operator allowed by the Poincare algebra and show that there are no zero-mode related problems when describing phase transitions. They then demonstrate a direct connection between densities in light-front thermal field theory and the parton distributions measured in hard scattering experiments. The approach thus generalizes the concept of a parton distribution to finite temperature. In light-front quantization, the gauge-invariant Green's functions of a quark in a medium can be defined in terms of just 2-component spinors and have a much simpler spinor structure than the equal-time fermion propagator. From the Green's function, the authors introduce the new concept of a light-front density matrix, whose matrix elements are related to forward and to off-diagonal parton distributions. Furthermore, they explain how thermodynamic quantities can be calculated in discretized light-cone quantization, which is applicable at high chemical potential and is not plagued by the fermion-doubling problems.

  7. Sharp fronts within geochemical transport problems

    International Nuclear Information System (INIS)

    Grindrod, P.

    1995-01-01

    The authors consider some reactive geochemical transport problems in groundwater systems. When incoming fluid is in disequilibrium with the mineralogy sharp transition fronts may develop. They show that this is a generic property for a class of systems where the timescales associated with reaction and diffusion phenomena are much shorter than those associated with advective transport. Such multiple timescale problems are relevant to a variety of processes in natural systems: mathematically methods of singular perturbation theory reduce the dimension of the problems to be solved locally. Furthermore, they consider how spatial heterogeneous mineralogy can impact upon the propagation of sharp geochemical fronts. The authors developed an asymptotic approach in which they solve equations for the evolving geometry of the front and indicate how the non-smooth perturbations due to natural heterogeneity of the mineralogy on underlying ground water flow field are balanced against the smoothing effect of diffusion/dispersive processes. Fronts are curvature damped, and the results here indicate the generic nature of separate front propagation within both model (idealized) and natural (heterogeneous) geochemical systems

  8. Investigation into the acceptability of door locking to staff, patients, and visitors on acute psychiatric wards.

    Science.gov (United States)

    Muir-Cochrane, Eimear; van der Merwe, Marie; Nijman, Henk; Haglund, Kristina; Simpson, Alan; Bowers, Len

    2012-02-01

    There is disagreement among psychiatric professionals about whether the doors of acute psychiatric wards should be kept locked to prevent patients from leaving and harming themselves or others. This study explored patient, staff, and visitor perceptions about the acceptability of locking the ward door on acute psychiatric inpatient wards. Interviews were conducted with 14 registered nurses, 15 patients, and six visitors from three different acute wards. Findings revealed commonalities across all groups, with general agreement that locking the door reduced absconding. Staff expressed feelings of guilt, embarrassment, and fear of being blamed when a patient absconded. Staff also reported that open wards created anxious vigilance to prevent an abscond and increased workload in allocating staff to watch the door, whereas staff on partially-locked doors also perceived an increased workload in letting people in and out of the ward. Patients had mixed feelings about the status of the door, expressing depression, a sense of stigma, and low self-esteem when the door was locked. The issue of balancing safety and security on acute psychiatric wards against the autonomy of patients is not easily resolved, and requires focused research to develop innovative nursing practices. © 2011 The Authors. International Journal of Mental Health Nursing © 2011 Australian College of Mental Health Nurses Inc.

  9. Design, development and testing of a high speed door for a blast containment fixture

    International Nuclear Information System (INIS)

    Shapiro, C.

    1991-01-01

    This paper reports that the concept of a large door able to close over a three foot diameter hole in less than 50 milliseconds evolved during the design of a test containment fixture at the Idaho National Engineering laboratory (INEL). This facility was designed for use at the Aberdeen Proving Ground (APG) in Aberdeen, Maryland. EPA regulations required new technologies for blast containment at APG, which culminated in the design of the blast chamber with a high speed door at its entrance. The main requirement of the fixture is to contain large explosion pressure pulses and explosive by-products during a variety of test scenarios. The door was designed to allow entrance of test projectiles and then to close over the entrance hole to contain explosive by-products inside the fixture. The speed of the projectile and the resultant blast pressure pulse required door closure within 56 msec. Analytical modelling of the door closure indicated velocities of up to 150 ft/sec before impact, for closure within the required time. Lightweight materials were used for the moving parts to minimize this impact force, including aluminum honeycomb composite panels and energy absorbers. Actuation was accomplished with a standard explosive bolt. High pressure nitrogen accelerated the door during closure. Time measurement for the door closer were obtained using high speed video equipment

  10. Systematic front distortion and presence of consecutive fronts in a precipitation system

    NARCIS (Netherlands)

    Volford, A.; Izsak, F.; Ripszam, M.; Lagzi, I.

    2006-01-01

    A new simple reaction-diffusion system is presented focusing on pattern formation phenomena as consecutive precipitation fronts and distortion of the precipitation front.The chemical system investigated here is based on the amphoteric property of aluminum hydroxide and exhibits two unique phenomena.

  11. Optimal back-to-front airplane boarding

    Science.gov (United States)

    Bachmat, Eitan; Khachaturov, Vassilii; Kuperman, Ran

    2013-06-01

    The problem of finding an optimal back-to-front airplane boarding policy is explored, using a mathematical model that is related to the 1+1 polynuclear growth model with concave boundary conditions and to causal sets in gravity. We study all airplane configurations and boarding group sizes. Optimal boarding policies for various airplane configurations are presented. Detailed calculations are provided along with simulations that support the main conclusions of the theory. We show that the effectiveness of back-to-front policies undergoes a phase transition when passing from lightly congested airplanes to heavily congested airplanes. The phase transition also affects the nature of the optimal or near-optimal policies. Under what we consider to be realistic conditions, optimal back-to-front policies lead to a modest 8-12% improvement in boarding time over random (no policy) boarding, using two boarding groups. Having more than two groups is not effective.

  12. Friction forces on phase transition fronts

    International Nuclear Information System (INIS)

    Mégevand, Ariel

    2013-01-01

    In cosmological first-order phase transitions, the microscopic interaction of the phase transition fronts with non-equilibrium plasma particles manifests itself macroscopically as friction forces. In general, it is a nontrivial problem to compute these forces, and only two limits have been studied, namely, that of very slow walls and, more recently, ultra-relativistic walls which run away. In this paper we consider ultra-relativistic velocities and show that stationary solutions still exist when the parameters allow the existence of runaway walls. Hence, we discuss the necessary and sufficient conditions for the fronts to actually run away. We also propose a phenomenological model for the friction, which interpolates between the non-relativistic and ultra-relativistic values. Thus, the friction depends on two friction coefficients which can be calculated for specific models. We then study the velocity of phase transition fronts as a function of the friction parameters, the thermodynamic parameters, and the amount of supercooling

  13. Optimal back-to-front airplane boarding.

    Science.gov (United States)

    Bachmat, Eitan; Khachaturov, Vassilii; Kuperman, Ran

    2013-06-01

    The problem of finding an optimal back-to-front airplane boarding policy is explored, using a mathematical model that is related to the 1+1 polynuclear growth model with concave boundary conditions and to causal sets in gravity. We study all airplane configurations and boarding group sizes. Optimal boarding policies for various airplane configurations are presented. Detailed calculations are provided along with simulations that support the main conclusions of the theory. We show that the effectiveness of back-to-front policies undergoes a phase transition when passing from lightly congested airplanes to heavily congested airplanes. The phase transition also affects the nature of the optimal or near-optimal policies. Under what we consider to be realistic conditions, optimal back-to-front policies lead to a modest 8-12% improvement in boarding time over random (no policy) boarding, using two boarding groups. Having more than two groups is not effective.

  14. Experimental Studies of Wheelchair and Walker Users Passing Through Doors with Different Opening Force.

    Science.gov (United States)

    Nersveen, Jonny

    2016-01-01

    Users of walkers and users of different categories of wheelchairs tested doors with different opening force, aiming to reveal the limit that these groups of people could manage on an everyday basis. 94.7% of the wheelchair users reported that a door opening force of 30 N was acceptable, while as 92.1% of this group described 40 N as acceptable. Similarly, 100% of the walker users reported that a door opening force of 30 N was acceptable, while as 87,5% of this group described 40 N as acceptable.

  15. Hand sanitizer-dispensing door handles increase hand hygiene compliance: a pilot study.

    Science.gov (United States)

    Babiarz, Lukasz S; Savoie, Brent; McGuire, Mark; McConnell, Lauren; Nagy, Paul

    2014-04-01

    Improving rates of hand hygiene compliance (HHC) has been shown to reduce nosocomial disease. We compared the HHC for a traditional wall-mounted unit and a novel sanitizer-dispensing door handle device in a hospital inpatient ultrasound area. HHC increased 24.5%-77.1% (P sanitizer-dispensing door handle, whereas it remained unchanged for the other rooms. Technical improvements like a sanitizer-dispensing door handle can improve hospital HHC. Copyright © 2014 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.

  16. PIV tracer behavior on propagating shock fronts

    International Nuclear Information System (INIS)

    Glazyrin, Fyodor N; Mursenkova, Irina V; Znamenskaya, Irina A

    2016-01-01

    The present work was aimed at the quantitative particle image velocimetry (PIV) measurement of a velocity field near the front of a propagating shock wave and the study of the dynamics of liquid tracers crossing the shock front. For this goal, a shock tube with a rectangular cross-section (48  ×  24 mm) was used. The flat shock wave with Mach numbers M  =  1.4–2.0 propagating inside the tube channel was studied as well as an expanding shock wave propagating outside the channel with M  =  1.2–1.8 at its main axis. The PIV imaging of the shock fronts was carried out with an aerosol of dioctyl sebacate (DEHS) as tracer particles. The pressures of the gas in front of the shock waves studied ranged from 0.013 Mpa to 0.1 MPa in the series of experiments. The processed PIV data, compared to the 1D normal shock theory, yielded consistent values of wake velocity immediately behind the plain shock wave. Special attention was paid to the blurring of the velocity jump on the shock front due to the inertial particle lag and peculiarities of the PIV technique. A numerical algorithm was developed for analysis and correction of the PIV data on the shock fronts, based on equations of particle-flow interaction. By application of this algorithm, the effective particle diameter of the DEHS aerosol tracers was estimated as 1.03  ±  0.12 μm. A number of different formulations for particle drag were tested with this algorithm, with varying success. The results show consistency with previously reported experimental data obtained for cases of stationary shock waves. (paper)

  17. Analytical study of the main door of Santiago church, Guadix, Granada

    Directory of Open Access Journals (Sweden)

    Espinosa Gaitán, Jesús

    1995-06-01

    Full Text Available The analytical study described on this paper has been made due to the request formulated by the priest of Santiago church, D. José Mª Ballesteros, through the Provincial Delegation of Culture of Granada. In view of the degradation of the main door front, the Instituto Andaluz del Patrimonio Histórico has been asked for technical advice on the possible treatment to be carried out to resolve the problems of this front. As a part of the technical study we have carried out the analysis required to determine the characteristics of the stone used, the possible causes of weathering and to evaluate the most adequate treatment products, in case that it is convenient to apply any one as a part of the conservation restoration works. As a first step we have carried out a visual inspection of the door front and the inside of the church, and then samples have been taken. These samples have been analyzed by means of: chemical analysis of main components, X Ray diffraction, mineralogic petrographic study and SEM observation. From all these determinations it has been deduced the possible causes and mechanisms of alteration. As previous phase to the evaluation of treatments, due to the high quantity of stone needed to make all the tests, we have proceeded to identify and find the quarry of origin of this stone; it is located in Bácor, a little village on the municipal term of Guadix, at 40 Km from it. Once the identification has been made with certainty, enough material has been extracted to prepare the samples used. It is very interesting to study this stone because it has been employed also on the Cathedral of Guadix and it will be able to extend the results obtained on the tests to this building.

    El estudio analítico recogido en el presente artículo se realiza como respuesta a la petición formulada por el párroco de la iglesia de Santiago, D. José Mª Ballesteros, a través de la Delegación Provincial de Cultura de Granada. Ante el estado de

  18. RF front-end world class designs

    CERN Document Server

    Love, Janine

    2009-01-01

    All the design and development inspiration and direction a harware engineer needs in one blockbuster book! Janine Love site editor for RF Design Line,columnist, and author has selected the very best RF design material from the Newnes portfolio and has compiled it into this volume. The result is a book covering the gamut of RF front end design from antenna and filter design fundamentals to optimized layout techniques with a strong pragmatic emphasis. In addition to specific design techniques and practices, this book also discusses various approaches to solving RF front end design problems and h

  19. THREE PERSPECTIVES ON MANAGING FRONT END INNOVATION

    DEFF Research Database (Denmark)

    Jensen, Anna Rose Vagn; Clausen, Christian; Gish, Liv

    2018-01-01

    as a complementary perspective. The paper combines a literature review with an empirical examination of the application of these multiple perspectives across three cases of front end of innovation (FEI) management in mature product developing companies. While the process models represent the dominant, albeit rather...... to represent an emergent approach in managing FEI where process models, knowledge strategies and objects become integrated elements in more advanced navigational strategies for key players.......This paper presents three complementary perspectives on the management of front end innovation: A process model perspective, a knowledge perspective and a translational perspective. While the first two perspectives are well established in literature, we offer the translation perspective...

  20. TopN-Pareto Front Search

    Energy Technology Data Exchange (ETDEWEB)

    2016-12-21

    The JMP Add-In TopN-PFS provides an automated tool for finding layered Pareto front to identify the top N solutions from an enumerated list of candidates subject to optimizing multiple criteria. The approach constructs the N layers of Pareto fronts, and then provides a suite of graphical tools to explore the alternatives based on different prioritizations of the criteria. The tool is designed to provide a set of alternatives from which the decision-maker can select the best option for their study goals.

  1. Discretionary Power on the Front-line

    DEFF Research Database (Denmark)

    Sanden, Guro Refsum; Lønsmann, Dorte

    This article investigates the communication practices used by front-line employees to cross language boundaries in the context of English language policies implemented by the management of three multinational corporations (MNCs) headquartered in Scandinavia. Based on an analysis of interview...... and document data, our findings show that employees face a number of different language boundaries in their everyday work, and that ad hoc and informal solutions in many cases are vital for successful cross-language communication. We introduce the concept of ‘discretionary power’ to explain how and why front...

  2. Coping on the Front-line

    DEFF Research Database (Denmark)

    Sanden, Guro Refsum; Lønsmann, Dorte

    language boundaries in their everyday work. Despite official English language policies in the three companies, our findings show that employees face a number of different language boundaries, and that ad hoc and informal solutions in many cases are vital for successful cross-language communication. Drawing......This article investigates how front-line employees respond to English language policies implemented by the management of three multinational corporations (MNCs) headquartered in Scandinavia. Based on interview and document data the article examines the ways in which front-line employees cross...

  3. Discretionary power on the front-line

    DEFF Research Database (Denmark)

    Sanden, Guro Refsum; Lønsmann, Dorte

    2018-01-01

    This article investigates the communication practices used by front-line employees to cross language boundaries in the context of English language policies implemented by the management of three multinational corporations headquartered in Scandinavia. Based on an analysis of interview and document...... data, our findings show that employees face a number of different language boundaries in their everyday work, and that ad hoc and informal solutions in many cases are vital for successful cross-language communication. We introduce the concept of discretionary power to explain how and why front...

  4. Discretionary Power on the Front Line

    DEFF Research Database (Denmark)

    Sanden, Guro Refsum; Lønsmann, Dorte

    2018-01-01

    This paper investigates the communication practices used by front-line employees to cross language boundaries in the context of English language policies implemented by the management of three multinational corporations (MNCs) headquartered in Scandinavia. Based on an analysis of interview...... and document data, our findings show that employees face a number of different language boundaries in their everyday work, and that ad hoc and informal solutions in many cases are vital for successful cross-language communication. We introduce the concept of 'discretionary power' to explain how and why front...

  5. Pole solutions for flame front propagation

    CERN Document Server

    Kupervasser, Oleg

    2015-01-01

    This book deals with solving mathematically the unsteady flame propagation equations. New original mathematical methods for solving complex non-linear equations and investigating their properties are presented. Pole solutions for flame front propagation are developed. Premixed flames and filtration combustion have remarkable properties: the complex nonlinear integro-differential equations for these problems have exact analytical solutions described by the motion of poles in a complex plane. Instead of complex equations, a finite set of ordinary differential equations is applied. These solutions help to investigate analytically and numerically properties of the flame front propagation equations.

  6. Light-front nuclear shell-model

    International Nuclear Information System (INIS)

    Johnson, M.B.

    1990-01-01

    I examine the effects of nuclear structure on high-energy, high-momentum transfer processes, specifically the EMC effect. For pedagogical reasons, a fictitious but simple two-body system consisting of two equal-mass particles interacting in a harmonic oscillator potential has been chosen. For this toy nucleus, I utilize a widely-used link between instant-form and light-front dynamics, formulating nuclear structure and deep-inelastic scattering consistently in the laboratory system. Binding effects are compared within conventional instant-form and light-front dynamical frameworks, with appreciable differences being found in the two cases. 20 refs

  7. LS1 Report: As one door closes, another opens

    CERN Multimedia

    Katarina Anthony & Anaïs Schaeffer

    2014-01-01

    Across the PS complex - from Linac 2 to TT2 to the accelerator itself - teams have seen the closing of their retro-1980s entryways, and the opening of state-of-the-art access points in compliance with the highest nuclear safety standards.   One of the new PS access points. The new PS access system provides more than just doors. Designed to protect against the radiation hazards and other risks caused by machine operation, the access system will monitor who goes into each zone, check whether or not the individual has the appropriate permissions to be entering, and even stop the beam if access is attempted during beam mode. "These new points provide automatic means to check that the right people are going in and in safe circumstances," says Pierre Ninin, project leader of the PS complex safety system. "All of these checks were previously done manually, so the burden on operators has been significantly reduced." The 19 new access points were successfully insta...

  8. The CERN Global Network opens its doors to companies

    CERN Multimedia

    Francesco Poppi

    2010-01-01

    Six months after its launch, the CERN Global Network already has almost one thousand members. Today, it is opening its doors to companies from CERN's Member States. This will open up a variety of new professional and career opportunities to all the members and will enhance the networking capabilities of all parties involved.   Screenshot of the CERN Global Network website. A new item has recently appeared on the top menu of the Network's website: “Organisations”. This is the entry point for companies and, later, research institutes, wishing to join. “The CERN Global Network brings together hundreds of people who have worked at or with CERN and who have a wealth of skills and expertise. Thanks to the Network, the job opportunities made available by the companies will become visible to the wider community,” says Linda Orr-Easo, a member of the Knowledge and Technology Transfer Group and the CERN Global Network Manager. In addition to creating new career opp...

  9. Ubiquitous testing using tablets: its impact on medical student perceptions of and engagement in learning.

    Science.gov (United States)

    Kim, Kyong-Jee; Hwang, Jee-Young

    2016-03-01

    Ubiquitous testing has the potential to affect medical education by enhancing the authenticity of the assessment using multimedia items. This study explored medical students' experience with ubiquitous testing and its impact on student learning. A cohort (n=48) of third-year students at a medical school in South Korea participated in this study. The students were divided into two groups and were given different versions of 10 content-matched items: one in text version (the text group) and the other in multimedia version (the multimedia group). Multimedia items were delivered using tablets. Item response analyses were performed to compare item characteristics between the two versions. Additionally, focus group interviews were held to investigate the students' experiences of ubiquitous testing. The mean test score was significantly higher in the text group. Item difficulty and discrimination did not differ between text and multimedia items. The participants generally showed positive responses on ubiquitous testing. Still, they felt that the lectures that they had taken in preclinical years did not prepare them enough for this type of assessment and clinical encounters during clerkships were more helpful. To be better prepared, the participants felt that they needed to engage more actively in learning in clinical clerkships and have more access to multimedia learning resources. Ubiquitous testing can positively affect student learning by reinforcing the importance of being able to understand and apply knowledge in clinical contexts, which drives students to engage more actively in learning in clinical settings.

  10. A single gene (Eu4) encodes the tissue-ubiquitous urease of soybean.

    Science.gov (United States)

    Torisky, R S; Griffin, J D; Yenofsky, R L; Polacco, J C

    1994-02-01

    We sought to determine the genetic basis of expression of the ubiquitous (metabolic) urease of soybean. This isozyme is termed the metabolic urease because its loss, in eu4/eu4 mutants, leads to accumulation of urea, whereas loss of the embryo-specific urease isozyme does not. The eu4 lesion eliminated the expression of the ubiquitous urease in vegetative and embryonic tissues. RFLP analysis placed urease clone LC4 near, or within, the Eu4 locus. Sequence comparison of urease proteins (ubiquitous and embryo-specific) and clones (LC4 and LS1) indicated that LC4 and LS1 encode ubiquitous and embryo-specific ureases, respectively. That LC4 is transcribed into poly(A)+ RNA in all tissues was indicated by the amplification of its transcript by an LC4-specific PCR primer. (The LS1-specific primer, on the other hand, amplified poly(A)+ RNA only from developing embryos expressing the embryo-specific urease.) These observations are consistent with Eu4 being the ubiquitous urease structural gene contained in the LC4 clone. In agreement with this notion, the mutant phenotype of eu4/eu4 callus was partially corrected by the LC4 urease gene introduced by particle bombardment.

  11. The Vaccination of 35,000 Dogs in 20 Working Days Using Combined Static Point and Door-to-Door Methods in Blantyre, Malawi.

    Directory of Open Access Journals (Sweden)

    Andrew D Gibson

    2016-07-01

    Full Text Available An estimated 60,000 people die of rabies annually. The vast majority of cases of human rabies develop following a bite from an infected dog. Rabies can be controlled in both human and canine populations through widespread vaccination of dogs. Rabies is particularly problematic in Malawi, costing the country an estimated 13 million USD and 484 human deaths annually, with an increasing paediatric incidence in Blantyre City. Consequently, the aim of this study was to vaccinate a minimum of 75% of all the dogs within Blantyre city during a one month period. Blantyre's 25 administrative wards were divided into 204 working zones. For initial planning, a mean human:dog ratio from the literature enabled estimation of dog population size and dog surveys were then performed in 29 working zones in order to assess dog distribution by land type. Vaccination was conducted at static point stations at weekends, at a total of 44 sites, with each operating for an average of 1.3 days. On Monday to Wednesday, door-to-door vaccination sessions were undertaken in the areas surrounding the preceding static point stations. 23,442 dogs were vaccinated at static point stations and 11,774 dogs were vaccinated during door-to-door vaccinations. At the end of the 20 day vaccination programme, an assessment of vaccination coverage through door-to-door surveys found that of 10,919 dogs observed, 8,661 were vaccinated resulting in a vaccination coverage of 79.3% (95%CI 78.6-80.1%. The estimated human:dog ratio for Blantyre city was 18.1:1. Mobile technology facilitated the collection of data as well as efficient direction and coordination of vaccination teams in near real time. This study demonstrates the feasibility of vaccinating large numbers of dogs at a high vaccination coverage, over a short time period in a large African city.

  12. The Vaccination of 35,000 Dogs in 20 Working Days Using Combined Static Point and Door-to-Door Methods in Blantyre, Malawi.

    Science.gov (United States)

    Gibson, Andrew D; Handel, Ian G; Shervell, Kate; Roux, Tarryn; Mayer, Dagmar; Muyila, Stanford; Maruwo, Golden B; Nkhulungo, Edwin M S; Foster, Rachel A; Chikungwa, Patrick; Chimera, Bernard; Bronsvoort, Barend M deC; Mellanby, Richard J; Gamble, Luke

    2016-07-01

    An estimated 60,000 people die of rabies annually. The vast majority of cases of human rabies develop following a bite from an infected dog. Rabies can be controlled in both human and canine populations through widespread vaccination of dogs. Rabies is particularly problematic in Malawi, costing the country an estimated 13 million USD and 484 human deaths annually, with an increasing paediatric incidence in Blantyre City. Consequently, the aim of this study was to vaccinate a minimum of 75% of all the dogs within Blantyre city during a one month period. Blantyre's 25 administrative wards were divided into 204 working zones. For initial planning, a mean human:dog ratio from the literature enabled estimation of dog population size and dog surveys were then performed in 29 working zones in order to assess dog distribution by land type. Vaccination was conducted at static point stations at weekends, at a total of 44 sites, with each operating for an average of 1.3 days. On Monday to Wednesday, door-to-door vaccination sessions were undertaken in the areas surrounding the preceding static point stations. 23,442 dogs were vaccinated at static point stations and 11,774 dogs were vaccinated during door-to-door vaccinations. At the end of the 20 day vaccination programme, an assessment of vaccination coverage through door-to-door surveys found that of 10,919 dogs observed, 8,661 were vaccinated resulting in a vaccination coverage of 79.3% (95%CI 78.6-80.1%). The estimated human:dog ratio for Blantyre city was 18.1:1. Mobile technology facilitated the collection of data as well as efficient direction and coordination of vaccination teams in near real time. This study demonstrates the feasibility of vaccinating large numbers of dogs at a high vaccination coverage, over a short time period in a large African city.

  13. DOORS Syndrome: Phenotype, Genotype and Comparison With Coffin-Siris Syndrome

    NARCIS (Netherlands)

    Campeau, Philippe M.; Hennekam, Raoul C.; Aftimos, Salim; Banka, Siddharth; Begleiter, Michael L.; Bilo, Leonilda; Blair, Edward; Burrage, Lindsay C.; Liu, David S.; de Bie, Isabelle; Félix, Têmis Maria; Giltay, Jacques C.; Gibbs, Richard A.; Giuliano, Fabienne; Hadzsiev, Kinga; Hori, Mutsuki; Kariminejad, Ariana; Kayserili, Hülya; Kerr, Bronwyn; Lee, Brendan H.; Lu, James T.; Male, Alison; Meenakshi, Girish; Mey, Antje; Murray, Mitzi L.; Nair, Lal D. V.; Nampoothiri, Sheela; Newman, William G.; Peluso, Silvio; Peters, Heidi; Powell, R.; Repetto, Gabriela M.; Rump, Patrick; Santos-Simarro, Fernando; Stewart, Fiona; van Bever, Yolande; van den Ende, Jenneke; Wieczorek, Dagmar; Wisniewska, Marzena; Sisodiya, Sanjay M.

    2014-01-01

    DOORS syndrome (Deafness, Onychodystrophy, Osteodystrophy, mental Retardation, Seizures) is characterized mainly by sensorineural deafness, shortened terminal phalanges with small nails of hands and feet, intellectual deficiency, and seizures. Half of the patients with all clinical features have

  14. Resultaten van de proeftuinen van PACT : inclusie door interprofessionele samenwerking in kindvoorzieningen 0-6 jaar

    NARCIS (Netherlands)

    Doornenbal, Jeannette; Balledux, Marielle; Fukkink, Ruben; Spoelstra, Jolanda; van Verseveld, Marloes; van Yperen, Tom

    2018-01-01

    In deze bijdrage worden de onderzoeksresultaten gepresenteerd van de ontwikkelingen in de PACT-proeftuinen om door middel van interprofessionele samenwerking tussen onderwijs, kinderopvang en zorg inclusie van elk kind te realiseren.

  15. Design And Implementation Of A Door Locking System Using Android App

    Directory of Open Access Journals (Sweden)

    Agbo David O.

    2017-08-01

    Full Text Available The Android Operating System finds wide use in smart phones and tablets and is thus suitable for home controllers. This project presents a smart home controller that uses the Bluetooth in an Android device to control the operation of an automated security door system. The software was designed using an Android app that generates a password that is recognized by the Bluetooth to control the opening and closing of the door located at some distance from the user. The Bluetooth module that is installed on the door receives the commands from the android phone and passes these commands to the microcontroller that controls the opening and closing of the door. The design was simulated in Proteus integrated development environment after which the hardware was built on experimental boards. The performance of the system agrees excellently with its conception. The system can be used in various situations where access to an enclosure need to be secured

  16. Light-Front Dynamics in Hadron Physics

    NARCIS (Netherlands)

    Ji, C.R.; Bakker, B.L.G.; Choi, H.M.

    2013-01-01

    Light-front dynamics(LFD) plays an important role in the analyses of relativistic few-body systems. As evidenced from the recent studies of generalized parton distributions (GPDs) in hadron physics, a natural framework for a detailed study of hadron structures is LFD due to its direct application in

  17. Positional Velar Fronting: An Updated Articulatory Account

    Science.gov (United States)

    Byun, Tara McAllister

    2012-01-01

    This study develops the hypothesis that the child-specific phenomenon of positional velar fronting can be modeled as the product of phonologically encoded articulatory limitations unique to immature speakers. Children have difficulty executing discrete tongue movements, preferring to move the tongue and jaw as a single unit. This predisposes the…

  18. QCD and Light-Front Holography

    Energy Technology Data Exchange (ETDEWEB)

    Brodsky, Stanley J.; /SLAC /Southern Denmark U., CP3-Origins; de Teramond, Guy F.; /Costa Rica U.

    2010-10-27

    The soft-wall AdS/QCD model, modified by a positive-sign dilaton metric, leads to a remarkable one-parameter description of nonperturbative hadron dynamics. The model predicts a zero-mass pion for zero-mass quarks and a Regge spectrum of linear trajectories with the same slope in the leading orbital angular momentum L of hadrons and the radial quantum number N. Light-Front Holography maps the amplitudes which are functions of the fifth dimension variable z of anti-de Sitter space to a corresponding hadron theory quantized on the light front. The resulting Lorentz-invariant relativistic light-front wave equations are functions of an invariant impact variable {zeta} which measures the separation of the quark and gluonic constituents within the hadron at equal light-front time. The result is to a semi-classical frame-independent first approximation to the spectra and light-front wavefunctions of meson and baryon light-quark bound states, which in turn predict the behavior of the pion and nucleon form factors. The theory implements chiral symmetry in a novel way: the effects of chiral symmetry breaking increase as one goes toward large interquark separation, consistent with spectroscopic data, and the the hadron eigenstates generally have components with different orbital angular momentum; e.g., the proton eigenstate in AdS/QCD with massless quarks has L = 0 and L = 1 light-front Fock components with equal probability. The soft-wall model also predicts the form of the non-perturbative effective coupling {alpha}{sub s}{sup AdS} (Q) and its {beta}-function which agrees with the effective coupling {alpha}{sub g1} extracted from the Bjorken sum rule. The AdS/QCD model can be systematically improved by using its complete orthonormal solutions to diagonalize the full QCD light-front Hamiltonian or by applying the Lippmann-Schwinger method in order to systematically include the QCD interaction terms. A new perspective on quark and gluon condensates is also reviewed.

  19. New results in light-front phenomenology

    International Nuclear Information System (INIS)

    Brodsky, S.J.

    2005-01-01

    The light-front quantization of gauge theories in light-cone gauge provides a frame-independent wavefunction representation of relativistic bound states, simple forms for current matrix elements, explicit unitarity, and a trivial vacuum. In this talk I review the theoretical methods and constraints which can be used to determine these central elements of QCD phenomenology. The freedom to choose the light-like quantization four-vector provides an explicitly covariant formulation of light-front quantization and can be used to determine the analytic structure of light-front wave functions and define a kinematical definition of angular momentum. The AdS/CFT correspondence of large N c supergravity theory in higher-dimensional anti-de Sitter space with supersymmetric QCD in four-dimensional space-time has interesting implications for hadron phenomenology in the conformal limit, including an all-orders demonstration of counting rules for exclusive processes. String/gauge duality also predicts the QCD power-law behavior of light-front Fock-state hadronic wavefunctions with arbitrary orbital angular momentum at high momentum transfer. The form of these near-conformal wavefunctions can be used as an initial ansatz for a variational treatment of the light-front QCD Hamiltonian. The light-front Fock-state wavefunctions encode the bound state properties of hadrons in terms of their quark and gluon degrees of freedom at the amplitude level. The nonperturbative Fock-state wavefunctions contain intrinsic gluons, and sea quarks at any scale Q with asymmetries such as s(x) ≠ s-bar(x), u-bar(x) ≠ d-bar(x). Intrinsic charm and bottom quarks appear at large x in the light-front wavefunctions since this minimizes the invariant mass and off-shellness of the higher Fock state. In the case of nuclei, the Fock state expansion contains 'hidden color' states which cannot be classified in terms of of nucleonic degrees of freedom. I also briefly review recent analyses which show that some

  20. Ubiquitous Computing Services Discovery and Execution Using a Novel Intelligent Web Services Algorithm

    Science.gov (United States)

    Choi, Okkyung; Han, SangYong

    2007-01-01

    Ubiquitous Computing makes it possible to determine in real time the location and situations of service requesters in a web service environment as it enables access to computers at any time and in any place. Though research on various aspects of ubiquitous commerce is progressing at enterprises and research centers, both domestically and overseas, analysis of a customer's personal preferences based on semantic web and rule based services using semantics is not currently being conducted. This paper proposes a Ubiquitous Computing Services System that enables a rule based search as well as semantics based search to support the fact that the electronic space and the physical space can be combined into one and the real time search for web services and the construction of efficient web services thus become possible.

  1. Design of the shield door and transporter for the Culham Conceptual Tokamak Reactor Mark II

    International Nuclear Information System (INIS)

    Guthrie, J.A.S.

    1980-04-01

    In the Culham Conceptual Tokamak Reactor MK II access to the interior for blanket maintenance is through large openings in the fixed shield structure closed by removable shield doors when the reactor is operational. This report describes the design of the 200 tonne doors and the associated special-purpose remote operating transporter manipulator. The design, which has not been optimised, generally uses available commercial equipment and state-of-the-art techniques. (U.K.)

  2. QCD Phenomenology and Light-Front Wavefunctions

    International Nuclear Information System (INIS)

    Brodsky, Stanley J.

    2001-01-01

    A natural calculus for describing the bound-state structure of relativistic composite systems in quantum field theory is the light-front Fock expansion which encodes the properties of a hadrons in terms of a set of frame-independent n-particle wavefunctions. Light-front quantization in the doubly-transverse light-cone gauge has a number of remarkable advantages, including explicit unitarity, a physical Fock expansion, the absence of ghost degrees of freedom, and the decoupling properties needed to prove factorization theorems in high momentum transfer inclusive and exclusive reactions. A number of applications are discussed in these lectures, including semileptonic B decays, two-photon exclusive reactions, diffractive dissociation into jets, and deeply virtual Compton scattering. The relation of the intrinsic sea to the light-front wavefunctions is discussed. Light-front quantization can also be used in the Hamiltonian form to construct an event generator for high energy physics reactions at the amplitude level. The light-cone partition function, summed over exponentially weighted light-cone energies, has simple boost properties which may be useful for studies in heavy ion collisions. I also review recent work which shows that the structure functions measured in deep inelastic lepton scattering are affected by final-state rescattering, thus modifying their connection to light-front probability distributions. In particular, the shadowing of nuclear structure functions is due to destructive interference effects from leading-twist diffraction of the virtual photon, physics not included in the nuclear light-cone wavefunctions

  3. Effects of Door Width and Human Body Size on Walking Speed

    Directory of Open Access Journals (Sweden)

    Jetthumrong Siwalee

    2016-01-01

    Full Text Available Door width is one of the important factors to concern in layout or facilities design because it affects directly to traffic speed and overall traffic time simultaneously. Nowadays, common assessment method is computer simulation which is still not realistic due to the unchanged speed of model while walking through a door. This research aims to study an effect of door width to individual walking speed. Sixty subjects participated in the experiment and performed task by walking through the door that is set the width as 40, 50, 60, 70, 80, 90 and 100 centimetres. The optical motion capture system was used to determine walking speed. The results showed that Fitts’ law was applied to the participants with high weight. Door width below 70 centimetres significantly affected to changing speed at 0-0.5 m. before the door. Additionally, human size also affected changing speed. The factors include shoulder breadth, weight and interaction between shoulder breadth and weight were found to be significant. These factors explained 54.2% of changing speed.

  4. Study of structural capacity and serviceability affecting the obstruction of residential door

    Directory of Open Access Journals (Sweden)

    Eric Forcael

    Full Text Available The last Chilean earthquake, occurred on February 27, 2010, allowed establishing important patterns of structural failures in reinforced concrete residential buildings; however, limited progress has been made in the study of basic standards of serviceability, such as obstruction of doors. Thus, this study focused on measuring the influence of design specifications and construction criteria of lintels and columns, in terms of obstruction of doors, considering capacity thresholds for certain levels of displacement. The study consisted of the design and construction of a full-scale prototype of a reinforced concrete frame, designed in accordance with all the ACI-318-08 requirements, taking into account typical aspects of geometry and materiality widely used by the real estate industry, for location and size of doors. In order to quantify the structural capacity of the prototype and to study the serviceability of the door, a quasi-static cyclic test was conducted, according to load and displacement protocols specified in FEMA 356 and FEMA 461, which was adjusted by using virtual models based on a static nonlinear analysis called "Pushover". This research verified that, for displacement levels even five times higher than those established by codes considered, the cracking degree was minimal and fully recoverable. It was also found the door evidenced malfunction when the displacements were greater than those specified by design only, validating a high degree of accomplishment of current codes, in terms of capacity and serviceability, when dealing with obstruction of residential doors.

  5. Assessment of operating room airflow using air particle counts and direct observation of door openings.

    Science.gov (United States)

    Teter, Jonathan; Guajardo, Isabella; Al-Rammah, Tamrah; Rosson, Gedge; Perl, Trish M; Manahan, Michele

    2017-05-01

    The role of the operating room (OR) environment has been thought to contribute to surgical site infection rates. The quality of OR air, disruption of airflow, and other factors may increase contamination risks. We measured air particulate counts (APCs) to determine if they increased in relation to traffic, door opening, and other common activities. During 1 week, we recorded APCs in 5-minute intervals and movement of health care workers. Trained observers recorded information about traffic, door openings, job title of the opener, and the reason for opening. At least 1 OR door was open during 47% of all readings. There were 13.4 door openings per hour during cases. Door opening rates ranged from 0.19-0.28 per minute. During this time, a total of 660 air measurements were obtained. The mean APCs were 9,238 particles (95% confidence interval [CI], 5,494- 12,982) at baseline and 14,292 particles (95% CI, 12,382-16,201) during surgery. Overall APCs increased 13% when either door was opened (P opening. We observed numerous instances of verbal communication and equipment movement. Improving efficiency of communication and equipment can aid in reduction of traffic. Further study is needed to examine links between microbiologic sampling, outcome data, and particulate matter to enable study of risk factors and effects of personnel movement. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  6. Saving millions by thermal insulation; Miljoenen besparen door goede isolatie

    Energy Technology Data Exchange (ETDEWEB)

    Van der Velden, U. [Nederlands Centrum voor Technische Isolatie NCTI, spijkenisse (Netherlands)

    2009-07-15

    Corrosion under insulation (CUI) can be reduced by the application of a correctly designed, installed and maintained insulation system. In refrigeration plants a heat flow will occur from the warm outside towards the cold inside. Hot air, containing more moisture, will be distributed to the cold components of the installation, such as separators, intermediate coolers, piping and valves, thus not only facilitating CUI, but also seriously compromising the thermal performance of the system. Furthermore, this moisture could condensate or freeze and compromise the integrity of the installation. Insulation in cold systems is built up with closed cell materials, such as elastomeric foam, PIR (polyisocyanurate) or cellular glass. On the outside a vapor barrier (e.g. reinforced aluminium foil) is essential to prevent hot moist air from penetrating the system. For protection against weather influences and/or mechanical damage, the system should be finished with a (non)metal cladding. [Dutch] Corrosie onder isolatie (CUI) kan worden beperkt door toepassing van een correct ontworpen, geinstalleerd en onderhouden isolatiesysteem. Bij koude-isolatiesystemen treedt een warmtestroom van buiten naar binnen op. Warme lucht - die meer vocht bevat - dringt naar installatiecomponenten, zoals afscheiders, tussenkoelers, leidingen en afstuiters, waarbij niet alleen het risico op CUI aanzienlijk toeneemt, maar ook de isolatiewaarde van het systeem gereduceerd wordt. Vocht kan hierbij ook nog condenseren of bevriezen en de integriteit van de hele installatie in gevaar brengen. Koude-isolatiesystemen dienen te worden opgebouwd met gesloten cel-materiaal, zoals elastomeer schuim, PIR (polyisocyanurate) of cellulair glas. Het systeem dient aan de buitenzijde te worden voorzien van een dampremmende laag (van bijvoorbeeld versterkt aluminiumfolie) om binnendringend vocht te blokkeren. In buitencondities moet het systeem worden voorzien van een (metalen of niet-metalen) eindafwerking, die

  7. RECON: Capturing Mobile and Ubiquitous Interaction in Real Contexts

    DEFF Research Database (Denmark)

    Jensen, Kasper Løvborg

    2009-01-01

    for studying the user experience of such applications in the field tend to be cumbersome and expensive with regard to time and manpower, and they generally do not scale well with number of users and duration of studies. RECON addresses these challenges and provides an addition to the methodological...... to conduct large scale remote studies of mobile and ubiquitous applications in real contexts.......Evaluating the user experience of mobile and ubiquitous applications is a challenging task. They are becoming increasingly complex and tightly interwoven into the fabric of everyday life and thus cannot easily be taken out of context and evaluated in controlled experimental environments. Methods...

  8. [Facing the challenges of ubiquitous computing in the health care sector].

    Science.gov (United States)

    Georgieff, Peter; Friedewald, Michael

    2010-01-01

    The steady progress of microelectronics, communications and information technology will enable the realisation of the vision for "ubiquitous computing" where the Internet extends into the real world embracing everyday objects. The necessary technical basis is already in place. Due to their diminishing size, constantly falling price and declining energy consumption, processors, communications modules and sensors are being increasingly integrated into everyday objects today. This development is opening up huge opportunities for both the economy and individuals. In the present paper we discuss possible applications, but also technical, social and economic barriers to a wide-spread use of ubiquitous computing in the health care sector. .

  9. Ubiquitous atom

    International Nuclear Information System (INIS)

    Spruch, G.M.; Spruch, L.

    1974-01-01

    The fundamentals of modern physics, including the basic physics and chemistry of the atom, elementary particles, cosmology, periodicity, and recent advances, are surveyed. The biology and chemistry of the life process is discussed to provide a background for considering the effects of atomic particles on living things. The uses of atomic power in space travel, merchant shipping, food preservation, desalination, and nuclear clocks are explored. (Pollut. Abstr.)

  10. Managing Controversies in the Fuzzy Front End

    DEFF Research Database (Denmark)

    Christiansen, John K.; Gasparin, Marta

    2016-01-01

    . The analysis investigates the microprocesses around the controversies that emerge during the fuzzy front end of four products. Five different types of controversies are identified: profit, production, design, brand and customers/market. Each controversy represents a threat, but also an opportunity to search...... for new solutions in the unpredictable non-linear processes. The study uses an ethnographic approach using qualitative data from interviews, company documents, external communication and marketing material, minutes of meetings, informal conversations and observations. The analysis of four FFE processes...... demonstrates how the fuzzy front requires managers to deal with controversies that emerge from many different places and involve both human and non-human actors. Closing the controversies requires managers to take account of the situation, identify the problem that needs to be addressed, and initiate a search...

  11. Multiclass gene selection using Pareto-fronts.

    Science.gov (United States)

    Rajapakse, Jagath C; Mundra, Piyushkumar A

    2013-01-01

    Filter methods are often used for selection of genes in multiclass sample classification by using microarray data. Such techniques usually tend to bias toward a few classes that are easily distinguishable from other classes due to imbalances of strong features and sample sizes of different classes. It could therefore lead to selection of redundant genes while missing the relevant genes, leading to poor classification of tissue samples. In this manuscript, we propose to decompose multiclass ranking statistics into class-specific statistics and then use Pareto-front analysis for selection of genes. This alleviates the bias induced by class intrinsic characteristics of dominating classes. The use of Pareto-front analysis is demonstrated on two filter criteria commonly used for gene selection: F-score and KW-score. A significant improvement in classification performance and reduction in redundancy among top-ranked genes were achieved in experiments with both synthetic and real-benchmark data sets.

  12. Trace metal fronts in European shelf waters

    International Nuclear Information System (INIS)

    Kremling, K.

    1983-01-01

    The Hebrides shelf edge area is characterized by strong horizontal salinity gradients (fronts) which mark the boundary between Scottish coastal and oceanic waters. The results presented here, obtained in summer 1981 on a transect between the open north Atlantic and the German Bight, confirm that the hydrographical front is accompanied by dramatic increases in inorganic nutrients (phosphate, silicate) and dissolved trace elements such as Cd, Cu, Mn, and 226 Ra. These data (together with measurements from North Sea regions) suggest that the trace metals are mobilized from partly reduced (organic-rich) sediments and vertically mixed into the surface waters. The regional variations evident from the transect are interpreted as being the result of the hydrography prevailing in waters around the British Isles. (author)

  13. Study on the Context-Aware Middleware for Ubiquitous Greenhouses Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jeonghwang Hwang

    2011-04-01

    Full Text Available Wireless Sensor Network (WSN technology is one of the important technologies to implement the ubiquitous society, and it could increase productivity of agricultural and livestock products, and secure transparency of distribution channels if such a WSN technology were successfully applied to the agricultural sector. Middleware, which can connect WSN hardware, applications, and enterprise systems, is required to construct ubiquitous agriculture environment combining WSN technology with agricultural sector applications, but there have been insufficient studies in the field of WSN middleware in the agricultural environment, compared to other industries. This paper proposes a context-aware middleware to efficiently process data collected from ubiquitous greenhouses by applying WSN technology and used to implement combined services through organic connectivity of data. The proposed middleware abstracts heterogeneous sensor nodes to integrate different forms of data, and provides intelligent context-aware, event service, and filtering functions to maximize operability and scalability of the middleware. To evaluate the performance of the middleware, an integrated management system for ubiquitous greenhouses was implemented by applying the proposed middleware to an existing greenhouse, and it was tested by measuring the level of load through CPU usage and the response time for users’ requests when the system is working.

  14. Undergraduate Students' Opinions with Regard to Ubiquitous MOOC for Enhancing Cross-Cultural Competence

    Science.gov (United States)

    Plangsorn, Boonrat; Na-Songkhla, Jaitip; Luetkehans, Lara M.

    2016-01-01

    The purpose of this study was to study undergraduate students' opinions with regard to the ubiquitous massive open online course (MOOC) for enhancing cross-cultural competence. This descriptive research applied a survey method. The survey data were collected by using survey questionnaires and online questionnaires from 410 undergraduate students…

  15. Pervasion of what? : techno–human ecologies and their ubiquitous spirits.

    NARCIS (Netherlands)

    Coeckelbergh, Mark

    2012-01-01

    Are the robots coming? Is the singularity near? Will we be dominated by technology? The usual response to ethical issues raised by pervasive and ubiquitous technologies assumes a philosophical anthropology centered on existential autonomy and agency, a dualistic ontology separating humans from

  16. A Socio-technical study of an Ubiquitous CPOE-system in Local Use

    DEFF Research Database (Denmark)

    Wentzer, Helle; Böttger, Ulrich; Boye, Niels

    2006-01-01

    , transformation in competencies, and less time spent at the bedside for nurses and doctors, as a system - constructed for ubiquitous drug-order entries and handling - was implemented for local use. This study throws light on problems of patient continuity, patient-related and IT-system-related error...

  17. 2nd FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network

    CERN Document Server

    Pan, Yi; Chao, Han-Chieh; Yi, Gangman

    2015-01-01

    IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its special tracks.

  18. Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?

    Science.gov (United States)

    Billah, Syed Masum; Ashok, Vikas; Porter, Donald E; Ramakrishnan, I V

    2017-05-01

    Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access-an early forerunner of true ubiquitous access-screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments.

  19. Radar sensor technology developments as CSIR DPSS in support of persistent, ubiquitous surveillance systems

    CSIR Research Space (South Africa)

    Anderson, F

    2008-11-01

    Full Text Available of an S&T capability based on international technology trends in persistent, ubiquitous surveillance. The ultimate aim of this programme is to develop and produce a series of South African innovations that can be used by departments and agencies...

  20. Bringing Mohamed to the Mountain: Situated Professional Development in a Ubiquitous Computing Classroom

    Science.gov (United States)

    Swan, Karen; Kratcoski, Annette; Mazzer, Pat; Schenker, Jason

    2005-01-01

    This article describes an ongoing situated professional development program in which teachers bring their intact classes for an extended stay in a ubiquitous computing environment equipped with a variety of state-of-the-art computing devices. The experience is unique in that it not only situates teacher learning about technology integration in…

  1. Ubiquitous Computing and Changing Pedagogical Possibilities: Representations, Conceptualizations and Uses of Knowledge

    Science.gov (United States)

    Swan, Karen; Van 'T Hooft, Mark; Kratcoski, Annette; Schenker, Jason

    2007-01-01

    This article reports on preliminary findings from an ongoing study of teaching and learning in a ubiquitous computing classroom. The research employed mixed methods and multiple measures to document changes in teaching and learning that result when teachers and students have access to a variety of digital devices wherever and whenever they need…

  2. Conditions for Ubiquitous Computing: What Can Be Learned from a Longitudinal Study

    Science.gov (United States)

    Lei, Jing

    2010-01-01

    Based on survey data and interview data collected over four academic years, this longitudinal study examined how a ubiquitous computing project evolved along with the changes in teachers, students, the human infrastructure, and technology infrastructure in the school. This study also investigated what conditions were necessary for successful…

  3. Evaluating Ubiquitous Media Usability Challenges: Content Transfer and Channel Switching Delays

    DEFF Research Database (Denmark)

    Fleury, Alexandre; Pedersen, Jakob Schou; Larsen, Lars Bo

    2011-01-01

    As ubiquitous media is developing rapidly, new HCI challenges emerge. In this paper, we address usability issues related to the transfer of content between fixed and mobile devices, as well as channel switching delays on mobile devices. We first provide an extensive review of the field. We...

  4. Introducing Laptops to Children: An Examination of Ubiquitous Computing in Grade 3 Reading, Language, and Mathematics

    Science.gov (United States)

    Bernard, Robert M.; Bethel, Edward Clement; Abrami, Philip C.; Wade, C. Anne

    2007-01-01

    This study examines the achievement outcomes accompanying the implementation of a Grade 3 laptop or so-­called "ubiquitous computing" program in a Quebec school district. CAT­3 reading, language, and mathematics batteries were administered at the end of Grade 2 and again at the end of Grade 3, after the first year of computer…

  5. Ubiquitous Knowledge Construction: Mobile Learning Re-Defined and a Conceptual Framework

    Science.gov (United States)

    Peng, Hsinyi; Su, Yi-Ju; Chou, Chien; Tsai, Chin-Chung

    2009-01-01

    Emerging from recent mobile technologies, mobile learning, or m-learning, is beginning to offer "stunning new technical capabilities" in education (DiGiano et al., 2003). This new genre of learning is viewed as a revolutionary stage in educational technology. However, ubiquitous computing technologies have given rise to several issues. This…

  6. Four Stages of Research on the Educational Use of Ubiquitous Computing

    Science.gov (United States)

    Laru, Jari; Naykki, Piia; Järvelä, Sanna

    2015-01-01

    In this paper, the Gartner Group's hype cycle is used as the basis for categorizing and analyzing research on the educational use of ubiquitous computing. There are five phases of the hype cycle: the technology trigger, the peak of inflated expectations, the trough of disillusionment, the slope of enlightenment, and the plateau of productivity.…

  7. Ubiquitous and Ambient Intelligence Assisted Learning Environment Infrastructures Development--A Review

    Science.gov (United States)

    Kanagarajan, Sujith; Ramakrishnan, Sivakumar

    2018-01-01

    Ubiquitous Learning Environment (ULE) has been becoming a mobile and sensor based technology equipped environment that suits the modern world education discipline requirements for the past few years. Ambient Intelligence (AmI) makes much smarter the ULE by the support of optimization and intelligent techniques. Various efforts have been so far…

  8. Refining the ethics of computer-made decisions : A classification of moral mediation by ubiquitous machines

    NARCIS (Netherlands)

    Van der Voort, M.; Pieters, W.; Consoli, L.

    2015-01-01

    In the past decades, computers have become more and more involved in society by the rise of ubiquitous systems, increasing the number of interactions between humans and IT systems. At the same time, the technology itself is getting more complex, enabling devices to act in a way that previously only

  9. Using TinyOS Components for the Design of an Adaptive Ubiquitous System

    NARCIS (Netherlands)

    Kaya, O.S.; Durmaz, O.; Dulman, S.O.; Gemesi, R.; Jansen, P.G.; Havinga, Paul J.M.

    2005-01-01

    This work is an initiative attempt toward component-based software engineering in ubiquitous computing systems. Software components cooperate in a distributed manner to meet a demand, and adapt their software bindings during run-time depending on the context information. There are two main research

  10. Using TinyOS Components for the Design of an Adaptive Ubiquitous System

    NARCIS (Netherlands)

    Kaya, O.S.; Durmaz, O.; Dulman, S.O.; Gemesi, R.; Jansen, P.G.; Havinga, Paul J.M.

    This work is an initiative attempt toward component-based software engineering in ubiquitous computing systems. Software components cooperate in a distributed manner to meet a demand, and adapt their software bindings during run-time depending on the context information. There are two main research

  11. Prototype ALICE front-end card

    CERN Multimedia

    Maximilien Brice

    2004-01-01

    This circuit board is a prototype 48-channel front end digitizer card for the ALICE time projection chamber (TPC), which takes electrical signals from the wire sensors in the TPC and shapes the data before converting the analogue signal to digital data. A total of 4356 cards will be required to process the data from the ALICE TPC, the largest of this type of detector in the world.

  12. Front Cover Photograph & Interview for FREEYE Magazine

    OpenAIRE

    Murray, Matthew

    2003-01-01

    Matthew Murray Front Cover Photograph & Interview for FREEYE Magazine - Dutch Quarterly For Exceptional International Photography, Holland.\\ud The article focuses on Murray's practice, his personal work, commissioned work, advertising, gallery and exhibition work along with his methodology. Looking at Murray's inspirations and how they feed into his personal projects and how this personal work feeds into shooting above the line advertising campaigns. Murray's work blurs the lines between pers...

  13. Wave Front Sensor for Solar Concentrator Control

    Science.gov (United States)

    2009-10-01

    terrestrial-based and space-based. Both types of concentrator can be either imaging or nonimaging and they can be rigid or inflatable. Other...and T is the temperature of the absorber and propellant. In (5), Iin is input intensity with effects of the optical path through the concentrator acting...Hartmann in 1900 and was used for checking optical telescopes for aberrations. It was an array of holes in a plate placed in front of the mirror of

  14. Fronting and exhaustive exclusion in Biblical Hebrew

    African Journals Online (AJOL)

    Kate H

    48, 2017, 219-222 doi: 10.5774/48-0-292. Fronting and exhaustive exclusion in Biblical Hebrew. Christo H. J. van der Merwe. Department of Ancient Studies, University of Stellenbosch, South ... Merwe, Naudé and Kroeze 2017: 491-493). .... “And I will give him to the Lord all the days of his life, and no razor shall touch his.

  15. Kinetics of a plasma streamer ionization front

    Science.gov (United States)

    Taccogna, Francesco; Pellegrini, Fabrizio

    2018-02-01

    A streamer is a non-linear and non-local gas breakdown mode. Its large-scale coherent structures, such as the ionization front, are the final results of a hierarchical cascade starting from the single particle dynamics. Therefore, this phenomenon covers, by definition, different space and time scales. In this study, we have reproduced the ionization front formation and development by means of a particle-based numerical methodology. The physical system investigated concerns of a high-voltage ns-pulsed surface dielectric barrier discharge. Different reduced electric field regimes ranging from 50 to 500 Td have been considered for two gases: pure atomic Ar and molecular N2. Results have shown the detailed structure of the negative streamer: the leading edge, the head, the interior and the tail. Its dynamical evolution and the front propagation velocity have been calculated for the different cases. Finally, the deviation of the electron energy distribution function from equilibrium behavior has been pointed out as a result of a fast and very localized phenomenon.

  16. A Comparative Study of Two Different Uncinectomy Techniques: Swing-Door and Classical

    Directory of Open Access Journals (Sweden)

    Ankit A Singhania

    2011-01-01

    Full Text Available Introduction: The aim of this study was to determine which technique of uncinectomy, classical or swing door technique.  Materials and Methods: Four hundred eighty Cases of sinusitis were selected and operated for Functional Endoscopic Sinus Surgery (FESS. Out of these, in 240 uncinectomies classical uncinectomy was done whereas in another 240 uncinectomies swing door technique was used. Initially patients were medically managed treated according to their symptoms and prior management. Patients who had received previous adequate medical management were evaluated with CT scan of the sinuses. If disease still persists than they were operated for FESS. Results: The authors' experience indicates that Functional endoscopic sinus surgery can be performed under local or general anesthesia, as permitted or tolerated. In this review classical technique was used in 240 uncinectomies. Out of this, ethmoidal complex injury was noted in 4 cases, missed maxillary ostium syndrome (incomplete removal was reported in 12 patients and orbital fat exposure was encountered in 5 patients. As compared to 240 uncinectomies done with swing door technique, incomplete removal was evident in 2 cases and lacrimal duct injury was reported in 3 cases. 'Evidence that underscores how this 'swing door technique' successfully combines 'the conservation goals of the anterior-to-posterior approach and anatomic virtues of the posterior-to-anterior approach to ethmoidectomy of the total 480 uncinectomies operated. Out of which 240 uncinectomies have been performed using the 'swing-door' technique. The 240 uncinectomies performed using classical technique were used as controls. The incidence of orbital penetration, incomplete removal, ethmoidal complex injury and ostium non-identification was significantly less with the new technique. Three lacrimal injuries occurred with the 'swing-door' technique compared to no injuries with classical technique. Conclusion: The authors recommend

  17. A comparative study of two different uncinectomy techniques: swing-door and classical.

    Science.gov (United States)

    Singhania, Ankit A; Bansal, Chetan; Chauhan, Nirali; Soni, Saurav

    2012-01-01

    The aim of this study was to determine which technique of uncinectomy, classical or swing door technique. Four hundred eighty Cases of sinusitis were selected and operated for Functional Endoscopic Sinus Surgery (FESS). Out of these, in 240 uncinectomies classical uncinectomy was done whereas in another 240 uncinectomies swing door technique was used. Initially patients were medically managed treated according to their symptoms and prior management. Patients who had received previous adequate medical management were evaluated with CT scan of the sinuses. If disease still persists than they were operated for FESS. The authors' experience indicates that Functional endoscopic sinus surgery can be performed under local or general anesthesia, as permitted or tolerated. In this review classical technique was used in 240 uncinectomies. Out of this, ethmoidal complex injury was noted in 4 cases, missed maxillary ostium syndrome (incomplete removal) was reported in 12 patients and orbital fat exposure was encountered in 5 patients. As compared to 240 uncinectomies done with swing door technique, incomplete removal was evident in 2 cases and lacrimal duct injury was reported in 3 cases. 'Evidence that underscores how this 'swing door technique' successfully combines 'the conservation goals of the anterior-to-posterior approach and anatomic virtues of the posterior-to-anterior approach to ethmoidectomy of the total 480 uncinectomies operated. Out of which 240 uncinectomies have been performed using the 'swing-door' technique. The 240 uncinectomies performed using classical technique were used as controls. The incidence of orbital penetration, incomplete removal, ethmoidal complex injury and ostium non-identification was significantly less with the new technique. Three lacrimal injuries occurred with the 'swing-door' technique compared to no injuries with classical technique. The authors recommend swing door technique as it is easy to learn, allows complete removal of the

  18. Ubiquitous Total Station Development using Smartphone, RSSI and Laser Sensor providing service to Ubi-GIS

    Directory of Open Access Journals (Sweden)

    M. A. Shoushtari

    2014-10-01

    Full Text Available The growing trend in technological advances and Micro Electro Mechanical Systems (MEMS has targeted for intelligent human lives. Accordingly, Ubiquitous Computing Approach was proposed by Mark Weiser. This paper proposes an ubiquitous surveying solution in Geometrics and surveying field. Ubiquitous Surveying provides cost-effective, smart and available surveying techniques while traditional surveying equipment are so expensive and have small availability specially in indoor and daily surveying jobs. In order to have a smart surveying instrument, different information technology methods and tools like Triangle method, Received Signal Strength Indicator (RSSI method and laser sensor are used. These new ways in combine with surveying equations introduces a modern surveying equipment called Ubi-Total Station that also employed different sensors embedded in smartphone and mobile stand. RSSI-based localization and Triangle method technique are easy and well known methods to predict the position of an unknown node in indoor environments whereas additional measures are required for a sufficient accuracy. In this paper the main goal is to introduce the Ubiquitous Total Station as a development in smart and ubiquitous GIS. In order to public use of the surveying equipment, design and implementation of this instrument has been done. Conceptual model of Smartphone-based system is designed for this study and based on this model, an Android application as a first sample is developed. Finally the evaluations shows that absolute errors in X and Y calculation are 0.028 and 0.057 meter respectively. Also RMSE of 0.26 was calculated in RSSI method for distance measurement. The high price of traditional equipment and their requirement for professional surveyors has given way to intelligent surveying. In the suggested system, smartphones can be used as tools for positioning and coordinating geometric information of objects.

  19. Wintertime sea surface temperature fronts in the Taiwan Strait

    Science.gov (United States)

    Chang, Yi; Shimada, Teruhisa; Lee, Ming-An; Lu, Hsueh-Jung; Sakaida, Futoki; Kawamura, Hiroshi

    2006-12-01

    We present wintertime variations and distributions of sea surface temperature (SST) fronts in the Taiwan Strait by applying an entropy-based edge detection method to 10-year (1996-2005) satellite SST images with grid size of 0.01°. From climatological monthly mean maps of SST gradient magnitude in winter, we identify four significant SST fronts in the Taiwan Strait. The Mainland China Coastal Front is a long frontal band along the 50-m isobath near the Chinese coast. The sharp Peng-Chang Front appears along the Peng-Hu Channel and extends northward around the Chang-Yuen Ridge. The Taiwan Bank Front evolves in early winter. As the winter progresses, the front becomes broad and moves toward the Chinese coast, connecting to the Mainland China Coastal Front. The Kuroshio Front extends northeastward from the northeastern tip of Taiwan with a semicircle-shape curving along the 100-m isobath.

  20. Bibliometric analysis of acupuncture research fronts and their ...

    African Journals Online (AJOL)

    Bibliometric analysis of acupuncture research fronts and their worldwide ... This study chronologically examined the changing features and research fronts of ... from the Science Citation Index Expanded and Social Science Citation Index.

  1. Ervaringen van schaamte en psychologisch lijden door voedselbankklanten

    Directory of Open Access Journals (Sweden)

    Hille Hoogland

    2016-03-01

    qualify for a food parcel. Shame is also felt when going to the foodbank and as result of the lack of choice of food. Thirdly, we found a category of shame that was related to the restrictions of consumption. The foodbank clients feel that they are unable to buy the food or clothing that they want or to take part in activities.In conclusion, we found, in line with other studies, that foodbank clients experience psychological suffering and feelings of shame. These feelings of shame relate to the stigma attached to being a foodbank client and are reinforced by the way the foodbanks operate. Foodbank clients feel that they have a lack of choice, not only at the foodbank, but also in the wider context of the consumer society. SAMENVATTINGErvaringen van schaamte en psychologisch lijden door voedselbankklanten Voedselbanken bestaan al meer dan tien jaar in Nederland en groeien in aantal en omvang. Er is beperkt wetenschappelijk onderzoek gedaan naar voedselbankklanten in Nederland en ook in internationale studies ontbreekt het klantperspectief. In dit artikel presenteren wij bevindingen uit 45 diepte-interviews met voedselbankklanten in Amsterdam, waarbij wij hun ervaring centraal stelden. De centrale vraag die wij in dit artikel beantwoorden is: welke rol spelen financiële problemen, schaamte en andere emoties bij voedselbankklanten in Amsterdam? Voedselbankklanten zeggen dat zij besparen op consumptiemiddelen en activiteiten vanwege hun gelimiteerde budget. Het gebrek aan geld beperkt een aantal respondenten in hun sociale leven. In reactie op geldzorgen laten sommigen hun post ongeopend of zij verdoven zich. De respondenten uiten dat zij stress, slapeloosheid, angst, paniek, depressie en/of somberheid door geldgebrek ervaren. Dit vatten wij samen als psychologisch lijden. Hiernaast is schaamte een veel genoemde emotie. Ook uit andere studies bleek dat schaamte veel voorkomt bij voedselbankklanten. Wij zagen hiervoor drie verschillende oorzaken: het stempel voedselbankklant

  2. Topology optimization of front metallization patterns for solar cells

    NARCIS (Netherlands)

    Gupta, D.K.; Langelaar, M.; Barink, M.; Keulen, F. van

    2015-01-01

    This paper presents the application of topology optimization (TO) for designing the front electrode patterns for solar cells. Improving the front electrode design is one of the approaches to improve the performance of the solar cells. It serves to produce the voltage distribution for the front

  3. FDS5 Simulation for OECD PRISME Fire Test of DOOR PRSD5

    International Nuclear Information System (INIS)

    Lee, Kyu Bok; Park, Jong Seuk

    2009-01-01

    OECD/NEA PRISME Fire Project is an international co-operation project to investigate fire propagation by means of experiments and analyses for nuclear power plant applications. This project focuses on the generation of experimental data for fire and smoke propagation from the fire room to adjacent rooms under various conditions and room configurations. In addition, analyses using computer codes are performed to understand the phenomena of interest and to produce a consistent interpretation of the experimental results. The PRISME Project is composed of series of tests named as SOURCE, DOOR, LEAK and Global Tests. The SOURCE is composed of tests to characterize the fire source, and the DOOR is to study fire and smoke propagation through an open door, while the LEAK is to investigate hot gas leakages through other modes of openings such as holes, a slot, a duct, and a partially opened door. The Global test will be conducted as integral tests on the basis of the results of the previous separate effects tests. In this paper, simulations are performed with FDS5 computer code for the DOOR Test No.5 (PRS D 5) and the calculation results are compared with the corresponding experimental data to study the code capability to predict the phenomena of the hot gas propagation between two rooms

  4. Influence of the Pressure Difference and Door Swing on Heavy Contaminants Migration between Rooms.

    Science.gov (United States)

    Hendiger, Jacek; Chludzińska, Marta; Ziętek, Piotr

    2016-01-01

    This paper presents the results of investigations whose aim was to describe the influence of the pressure difference level on the ability of contaminants migration between neighbouring rooms in dynamic conditions associated with door swing. The analysis was based on airflow visualization made with cold smoke, which simulated the heavy contaminants. The test room was pressurized to a specific level and then the door was opened to observe the trail of the smoke plume in the plane of the door. The door was opened in both directions: to the positively and negatively pressurized room. This study focuses on the visualization of smoke plume discharge and an uncertainty analysis is not applicable. Unlike other studies which focus on the analysis of pressure difference, the present study looks at the contaminants which are heavier than air and on "pumping out" the contaminants by means of door swing. Setting the proper level of pressure difference between the contaminated room and the neighbouring rooms can prove instrumental in ensuring protection against toxic contaminants migration. This study helped to establish the threshold of pressure difference necessary to reduce migration of heavy contaminants to neighbouring rooms.

  5. Desirability of Outcome Ranking (DOOR) and Response Adjusted for Duration of Antibiotic Risk (RADAR).

    Science.gov (United States)

    Evans, Scott R; Rubin, Daniel; Follmann, Dean; Pennello, Gene; Huskins, W Charles; Powers, John H; Schoenfeld, David; Chuang-Stein, Christy; Cosgrove, Sara E; Fowler, Vance G; Lautenbach, Ebbing; Chambers, Henry F

    2015-09-01

    Clinical trials that compare strategies to optimize antibiotic use are of critical importance but are limited by competing risks that distort outcome interpretation, complexities of noninferiority trials, large sample sizes, and inadequate evaluation of benefits and harms at the patient level. The Antibacterial Resistance Leadership Group strives to overcome these challenges through innovative trial design. Response adjusted for duration of antibiotic risk (RADAR) is a novel methodology utilizing a superiority design and a 2-step process: (1) categorizing patients into an overall clinical outcome (based on benefits and harms), and (2) ranking patients with respect to a desirability of outcome ranking (DOOR). DOORs are constructed by assigning higher ranks to patients with (1) better overall clinical outcomes and (2) shorter durations of antibiotic use for similar overall clinical outcomes. DOOR distributions are compared between antibiotic use strategies. The probability that a randomly selected patient will have a better DOOR if assigned to the new strategy is estimated. DOOR/RADAR represents a new paradigm in assessing the risks and benefits of new strategies to optimize antibiotic use. © The Author 2015. Published by Oxford University Press on behalf of the Infectious Diseases Society of America. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  6. DYNAMIC TIME HISTORY ANALYSIS OF BLAST RESISTANT DOOR USING BLAST LOAD MODELED AS IMPACT LOAD

    Directory of Open Access Journals (Sweden)

    Y. A. Pranata

    2012-06-01

    Full Text Available A blast resistant single door was designed to withstand a 0.91 bar blast pressure and 44 ms blast duration. The analysis was done using Dynamic Time History Analysis using Blast Load modeled as Impact Load for given duration. The material properties used have been modified to accommodate dynamic effects. The analysis was done using dynamic finite element method (fem for time of the blast duration, and the maximum/minimum internal forces and displacement were taken from the time history output, in order to know the behavior under blast load and estimate the safety margin of the door. Results obtained from this research indicated that the maximum z-displacement is 1.709 mm, while in the term of serviceability, the permitted is 25 mm. The maximum reaction force is 73,960 N, while the maximum anchor capacity is 82,069 N. On blast condition, the maximum frame stress is 71.71 MPa, the maximum hinge shear stress is 45.28 MPa. While on rebound condition, the maximum frame stress is 172.11 MPa, the maximum hinge shear stress is 29.46 MPa. The maximum door edge rotation is 0.44 degree, which is not exceed the permitted boundary (1.2 degree. Keywords: Dynamic time history, blast resistant door, single door, finite element method.

  7. Barriers to and enablers for European rail freight transport for integrated door-to-door logistics service. Part 2: Enablers for multimodal rail freight transport

    Directory of Open Access Journals (Sweden)

    Dewan Md Zahurul ISLAM

    2014-12-01

    Full Text Available The objective of this paper is to examine and identify barriers to and enablers for the European rail freight transport services as a transport chain partner along the supply chains in the changing market scenario. The changing market scenario includes, among others, requiring 'door-to-door' rather than 'terminal to terminal' and integrated service, competitive ability to attract non-rail cargo type, changes in the customer requirements (e.g. reliable service and changes in the operational requirements and practices. Using a literature review method, the paper is presented in two parts. The part 1 focuses on the identification of barriers to the European rail freight service by reviewing freight logistics services for global supply chains followed by the current performance of European rail freight transport followed by a discussion on the rail freight market liberalisation in Europe. Then rail freight transport in the Unites States (U.S. is discussed. The research notes that although the background, scope and necessity for reform measures in Europe differ from those of the U.S., some lessons can be learned and the main lesson is that an appropriate reform measure can enhance rail sector competitive ability in Europe. The part 2 of the paper is dedicated to recommend some concrete steps and actions as enablers to remove the barriers identified in the part 1 to develop multimodal rail freight transport. The enablers for multimodal rail freight transport include: •\tEuropean rail freight transport market needs full liberalisation so that incumbent and new entrants can compete freely. •\tThe rail operators need to acquire service (e.g. customer tailored services, door to door service quality offered by road freight operators. •\tThey need to conduct a combination of ‘terminal-to-terminal’ and door-to-door operations, as and when needed; •\tThey must build partnership with freight forwarder or 3PLs to include all types of customers

  8. Ubiquitous geospatial concept in evolution of the macro and micro spatial planning

    International Nuclear Information System (INIS)

    Sabri, S; Ludin, A N M; Majid, M R

    2014-01-01

    There are many examples of GIS application in planning such as urban land-use planning, cultural heritage conservation, coastal zone management, and the design of structure plans for sustainable economic development. All these applications are dealing with systems in which natural and human factors are interconnected. But an issue that should be addressed is to what extent the current information technology is able to connect all these parts together? Contemporary improvement in information technology made the computer so imbedded in our everyday practices that we use it without having to think about it. Thus, computing is becoming truly ubiquitous and is available anywhere anytime. Advances in the internet facilities and devices, such as high speed wireless networks, mobile middleware, and smart technologies, has pushed the concept of ubiquitous computing to the forefront of GIS research and development. There are developments in this regards, these are such as GeoWeb 2.0, voluntarily geographic Information (VGI), and Mashups, whereby the application of cloud computing was possible in visualizing urban air pollution and emergency responses to ensure the safety and security. These advancements therefore, have changed the conventional facet of macro and micro spatial planning. Every possible information system such as residential, medical, business, environmental, governmental, and the like can be linked through ubiquitous computing technologies and acts as a virtually one system which works for society. However, the journey to achieve a true ubiquitous GIS is not without challenges. Despite the current potentials there are many issues and obstacles need to be addressed before GIS can to be truly ubiquitous in planning context. Perhaps four criteria as explained by Goodchild et al (1997) can be applied to ubiquitous GIS in planning very well: the system must be distributed (data storage, processing and user interaction can occur at locations that are potentially

  9. Ubiquitous geospatial concept in evolution of the macro and micro spatial planning

    Science.gov (United States)

    Sabri, S.; Ludin, A. N. M.; Majid, M. R.

    2014-02-01

    There are many examples of GIS application in planning such as urban land-use planning, cultural heritage conservation, coastal zone management, and the design of structure plans for sustainable economic development. All these applications are dealing with systems in which natural and human factors are interconnected. But an issue that should be addressed is to what extent the current information technology is able to connect all these parts together? Contemporary improvement in information technology made the computer so imbedded in our everyday practices that we use it without having to think about it. Thus, computing is becoming truly ubiquitous and is available anywhere anytime. Advances in the internet facilities and devices, such as high speed wireless networks, mobile middleware, and smart technologies, has pushed the concept of ubiquitous computing to the forefront of GIS research and development. There are developments in this regards, these are such as GeoWeb 2.0, voluntarily geographic Information (VGI), and Mashups, whereby the application of cloud computing was possible in visualizing urban air pollution and emergency responses to ensure the safety and security. These advancements therefore, have changed the conventional facet of macro and micro spatial planning. Every possible information system such as residential, medical, business, environmental, governmental, and the like can be linked through ubiquitous computing technologies and acts as a virtually one system which works for society. However, the journey to achieve a true ubiquitous GIS is not without challenges. Despite the current potentials there are many issues and obstacles need to be addressed before GIS can to be truly ubiquitous in planning context. Perhaps four criteria as explained by Goodchild et al (1997) can be applied to ubiquitous GIS in planning very well: the system must be distributed (data storage, processing and user interaction can occur at locations that are potentially

  10. Novel Perspectives from Light-Front QCD, Super-Conformal Algebra, and Light-Front Holography

    Energy Technology Data Exchange (ETDEWEB)

    Brodsky, Stanley J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    Light-Front Quantization – Dirac’s “Front Form” – provides a physical, frame-independent formalism for hadron dynamics and structure. Observables such as structure functions, transverse momentum distributions, and distribution amplitudes are defined from the hadronic LFWFs. One obtains new insights into the hadronic mass scale, the hadronic spectrum, and the functional form of the QCD running coupling in the nonperturbative domain using light-front holography. In addition, superconformal algebra leads to remarkable supersymmetric relations between mesons and baryons. I also discuss evidence that the antishadowing of nuclear structure functions is nonuniversal; i.e., flavor dependent, and why shadowing and antishadowing phenomena may be incompatible with the momentum and other sum rules for the nuclear parton distribution functions.

  11. Observational Analysis of Cloud and Precipitation in Midlatitude Cyclones: Northern Versus Southern Hemisphere Warm Fronts

    Science.gov (United States)

    Naud, Catherine M.; Posselt, Derek J.; van den Heever, Susan C.

    2012-01-01

    Extratropical cyclones are responsible for most of the precipitation and wind damage in the midlatitudes during the cold season, but there are still uncertainties on how they will change in a warming climate. An ubiquitous problem amongst General Circulation Models (GCMs) is a lack of cloudiness over the southern oceans that may be in part caused by a lack of clouds in cyclones. We analyze CloudSat, CALIPSO and AMSR-E observations for 3 austral and boreal cold seasons and composite cloud frequency of occurrence and precipitation at the warm fronts for northern and southern hemisphere oceanic cyclones. We find that cloud frequency of occurrence and precipitation rate are similar in the early stage of the cyclone life cycle in both northern and southern hemispheres. As cyclones evolve and reach their mature stage, cloudiness and precipitation at the warm front increase in the northern hemisphere but decrease in the southern hemisphere. This is partly caused by lower amounts of precipitable water being available to southern hemisphere cyclones, and smaller increases in wind speed as the cyclones evolve. Southern hemisphere cloud occurrence at the warm front is found to be more sensitive to the amount of moisture in the warm sector than to wind speeds. This suggests that cloudiness in southern hemisphere storms may be more susceptible to changes in atmospheric water vapor content, and thus to changes in surface temperature than their northern hemisphere counterparts. These differences between northern and southern hemisphere cyclones are statistically robust, indicating A-Train-based analyses as useful tools for evaluation of GCMs in the next IPCC report.

  12. Light front field theory: an advanced primer

    International Nuclear Information System (INIS)

    Martinovic, L.

    2007-01-01

    We present an elementary introduction to quantum field theory formulated in terms of Dirac's light front variables. In addition to general principles and methods, a few more specific topics and approaches based on the author's work will be discussed. Most of the discussion deals with massive two-dimensional models formulated in a finite spatial volume starting with a detailed comparison between quantization of massive free fields in the usual field theory and the light front (LF) quantization. We discuss basic properties such as relativistic invariance and causality. After the LF treatment of the soluble Federbush model, a LF approach to spontaneous symmetry breaking is explained and a simple gauge theory - the massive Schwinger model in various gauges is studied. A LF version of bosonization and the massive Thirring model are also discussed. A special chapter is devoted to the method of discretized light cone quantization and its application to calculations of the properties of quantum solitons. The problem of LF zero modes is illustrated with the example of the two/dimensional Yukawa model. Hamiltonian perturbation theory in the LF formulation is derived and applied to a few simple processes to demonstrate its advantages. As a byproduct, it is shown that the LF theory cannot be obtained as a 'light-like' limit of the usual field theory quantized on a initial space-like surface. A simple LF formulation of the Higgs mechanism is then given Since our intention was to provide a treatment of the light front quantization accessible to postgradual students, an effort was made to discuss most of the topics pedagogically and number of technical details and derivations are contained in the appendices (Author)

  13. Functional description of APS beamline front ends

    International Nuclear Information System (INIS)

    Kuzay, T.

    1993-02-01

    Traditional synchrotron sources were designed to produce bending magnet radiation and have proven to be an essential scientific tool. Currently, a new generation of synchrotron sources is being built that will be able to accommodate a large number of insertion device (ID) and high quality bending magnet (BM) sources. One example is the 7-GeV Advanced Photon Source (APS) now under construction at Argonne National Laboratory. The research and development effort at the APS is designed to fully develop the potential of this new generation of synchrotron sources. Of the 40 straight sections in the APS storage ring, 34 will be available for IDs. The remaining six sections are reserved for the storage ring hardware and diagnostics. Although the ring incorporates 80 BMs, only 40 of them can be used to extract radiation. The accelerator hardware shadows five of these 40 bending magnets, so the maximum number of BM sources on the lattice is 35. Generally, a photon beamline consists of four functional sections. The first section is the ID or the BM, which provides the radiation source. The second section, which is immediately outside the storage ring but inside a concrete shielding tunnel, is the front end, which is designed to control, define, and/or confine the x-ray beam. In the case of the APS, the front ends are designed to confine the photon beam. The third section, just outside the concrete shielding tunnel and on the experimental floor, is the first optics enclosure, which contains optics to filter and monochromatize the photon beam. The fourth section of a beamline consists of beam transports, additional optics, and experiment stations to do the scientific investigations. This document describes only the front ends of the APS beamlines

  14. Self-testing security sensor for monitoring closure of vault doors and the like

    International Nuclear Information System (INIS)

    Cawthorne, D.C.

    1997-01-01

    A self-testing device is provided for a monitoring system for monitoring whether a closure member such as a door or window is closed. The monitoring system includes a switch unit mounted on the frame of the closure member being monitored and including magnetically biased switches connected in one or more electrical monitoring circuits, and a door magnet unit mounted on the closure member being monitored. The door magnet includes one or more permanent magnets that produce a magnetic field which, when the closure member is closed, cause said switches to assume a first state. When the closure member is opened, the switches switch to a second, alarm state. The self-testing device is electrically controllable from a remote location and produces a canceling or diverting magnetic field which simulates the effect of movement of the closure member from the closed position thereof without any actual movement of the member. 5 figs

  15. O triste quadro da saúde: análise de um out-door

    Directory of Open Access Journals (Sweden)

    Fernando Lefèvre

    1995-09-01

    Full Text Available Procura-se, neste trabalho, analisar um out­door presente na cidade de São Paulo, no mês de maio de 1993, e que intitula-se : "O triste quadro da saúde". Em função de vários elementos encontrados no texto e em função do contexto externo, o referido out-door permite e possibilita, pelo menos, duas leituras de sentidos absolutamente opostos, o que, certamente, implica, no caso de um out-door "assinado", uma escolha inadequada da mensagem por parte dos signatários. Em função disso, sugere-se cuidado e atenção para a ambigüidade presente, com muita freqüência, nas mensagens e nos discursos.

  16. DOORS syndrome: phenotype, genotype and comparison with Coffin-Siris syndrome.

    Science.gov (United States)

    Campeau, Philippe M; Hennekam, Raoul C

    2014-09-01

    DOORS syndrome (Deafness, Onychodystrophy, Osteodystrophy, mental Retardation, Seizures) is characterized mainly by sensorineural deafness, shortened terminal phalanges with small nails of hands and feet, intellectual deficiency, and seizures. Half of the patients with all clinical features have mutations in TBC1D24. We review here the manifestations of patients clinically diagnosed with DOORS syndrome. In this cohort of 32 families (36 patients) we detected 13 individuals from 10 families with TBC1D24 mutations. Subsequent whole exome sequencing in the cohort showed the same de novoSMARCB1 mutation (c.1130G>A), known to cause Coffin-Siris syndrome, in two patients. Distinguishing features include retinal anomalies, Dandy-Walker malformation, scoliosis, rocker bottom feet, respiratory difficulties and absence of seizures, and 2-oxoglutaric aciduria in the patients with the SMARCB1 mutation. We briefly discuss the heterogeneity of the DOORS syndrome phenotype and the differential diagnosis of this condition. © 2014 Wiley Periodicals, Inc.

  17. Ubiquitous Performance-Support System as Mindtool: A Case Study of Instructional Decision Making and Learning Assistant

    Science.gov (United States)

    Peng, Hsinyi; Chuang, Po-Ya; Hwang, Gwo-Jen; Chu, Hui-Chun; Wu, Ting-Ting; Huang, Shu-Xian

    2009-01-01

    Researchers have conducted various studies on applying wireless communication and ubiquitous computing technologies to education, so that the technologies can provide learners and educators with more active and adaptive support. This study proposes a Ubiquitous Performance-support System (UPSS) that can facilitate the seamless use of powerful new…

  18. Researching the Ethical Dimensions of Mobile, Ubiquitous and Immersive Technology Enhanced Learning (MUITEL): A Thematic Review and Dialogue

    Science.gov (United States)

    Lally, Vic; Sharples, Mike; Tracy, Frances; Bertram, Neil; Masters, Sherriden

    2012-01-01

    In this article, we examine the ethical dimensions of researching the mobile, ubiquitous and immersive technology enhanced learning (MUITEL), with a particular focus on learning in informal settings. We begin with an analysis of the interactions between mobile, ubiquitous and immersive technologies and the wider context of the digital economy. In…

  19. Front panel human interface for FASTBUS

    International Nuclear Information System (INIS)

    Gustavson, D.B.; Holmes, T.L.; Paffrath, L.; Steffani, J.P.

    1980-01-01

    A human interface based on the Snoop diagnostic module has been designed to facilitate checkout of FASTBUS devices, diagnosis of system faults, and monitoring of system performance. This system, which is a generalization of the usual computer front panel or control console, includes logic analyzer functions, display and manual-control access to other modules, a microprocessor which allows the user to create and execute diagnostic programs and store them on a minifloppy disk, and a diagnostic network which allows remote console operation and coordination of information from multiple segments' Snoops

  20. Light-Front Holography, Light-Front Wavefunctions, and Novel QCD Phenomena

    DEFF Research Database (Denmark)

    Brodsky, S. J.; de Teramond, G. F.

    2012-01-01

    Light-front holography is one of the most remarkable features of the AdS/CFT correspondence. In spite of its present limitations, it provides important physical insights into the non-perturbative regime of QCD and its transition to the perturbative domain. This novel framework allows hadronic...... projected on the free Fock basis provides the complete set of valence and non-valence light-front Fock state wavefunctions Psi(n)/H(x(i), k(perpendicular to i), lambda(i)) which describe the hadron's momentum and spin distributions needed to compute the direct measures of hadron structure at the quark...

  1. Syntactic and FSP Aspects of Fronting as a Style Marker

    Directory of Open Access Journals (Sweden)

    Libuše Dušková

    2017-07-01

    Full Text Available The paper examines contextual and emphatic fronting in academic prose, fiction narrative and fiction dialogue in order to ascertain whether the types of fronting can serve as a style marker. The differences in the distribution and their effect on style are assumed to be connected with the respective FSP structures: in emphatic fronting the fronted element is the rheme, whereas in contextual fronting it is the diatheme. Hence emphatic fronting displays a prominent deviation from the basic distribution of communicative dynamism, whereas contextual fronting achieves agreement with it. As compared with the unmarked postverbal ordering, emphatic fronting intensifies the emphatic/emotional character of the content being expressed, which is a feature of speech, while contextual fronting serves as a direct link with what precedes, hence contributes to textual cohesion, which is a characteristic of academic prose, with fiction narrative presumably occupying an intermediate position. The results of the study show more types of fronting with diversified structures and less clear-cut relations between the types of frontings and the examined text sorts.

  2. Indoor Modelling from Slam-Based Laser Scanner: Door Detection to Envelope Reconstruction

    Science.gov (United States)

    Díaz-Vilariño, L.; Verbree, E.; Zlatanova, S.; Diakité, A.

    2017-09-01

    Updated and detailed indoor models are being increasingly demanded for various applications such as emergency management or navigational assistance. The consolidation of new portable and mobile acquisition systems has led to a higher availability of 3D point cloud data from indoors. In this work, we explore the combined use of point clouds and trajectories from SLAM-based laser scanner to automate the reconstruction of building indoors. The methodology starts by door detection, since doors represent transitions from one indoor space to other, which constitutes an initial approach about the global configuration of the point cloud into building rooms. For this purpose, the trajectory is used to create a vertical point cloud profile in which doors are detected as local minimum of vertical distances. As point cloud and trajectory are related by time stamp, this feature is used to subdivide the point cloud into subspaces according to the location of the doors. The correspondence between subspaces and building rooms is not unambiguous. One subspace always corresponds to one room, but one room is not necessarily depicted by just one subspace, for example, in case of a room containing several doors and in which the acquisition is performed in a discontinue way. The labelling problem is formulated as combinatorial approach solved as a minimum energy optimization. Once the point cloud is subdivided into building rooms, envelop (conformed by walls, ceilings and floors) is reconstructed for each space. The connectivity between spaces is included by adding the previously detected doors to the reconstructed model. The methodology is tested in a real case study.

  3. INDOOR MODELLING FROM SLAM-BASED LASER SCANNER: DOOR DETECTION TO ENVELOPE RECONSTRUCTION

    Directory of Open Access Journals (Sweden)

    L. Díaz-Vilariño

    2017-09-01

    Full Text Available Updated and detailed indoor models are being increasingly demanded for various applications such as emergency management or navigational assistance. The consolidation of new portable and mobile acquisition systems has led to a higher availability of 3D point cloud data from indoors. In this work, we explore the combined use of point clouds and trajectories from SLAM-based laser scanner to automate the reconstruction of building indoors. The methodology starts by door detection, since doors represent transitions from one indoor space to other, which constitutes an initial approach about the global configuration of the point cloud into building rooms. For this purpose, the trajectory is used to create a vertical point cloud profile in which doors are detected as local minimum of vertical distances. As point cloud and trajectory are related by time stamp, this feature is used to subdivide the point cloud into subspaces according to the location of the doors. The correspondence between subspaces and building rooms is not unambiguous. One subspace always corresponds to one room, but one room is not necessarily depicted by just one subspace, for example, in case of a room containing several doors and in which the acquisition is performed in a discontinue way. The labelling problem is formulated as combinatorial approach solved as a minimum energy optimization. Once the point cloud is subdivided into building rooms, envelop (conformed by walls, ceilings and floors is reconstructed for each space. The connectivity between spaces is included by adding the previously detected doors to the reconstructed model. The methodology is tested in a real case study.

  4. Human Pacman: A Mobile Augmented Reality Entertainment System Based on Physical, Social, and Ubiquitous Computing

    Science.gov (United States)

    Cheok, Adrian David

    This chapter details the Human Pacman system to illuminate entertainment computing which ventures to embed the natural physical world seamlessly with a fantasy virtual playground by capitalizing on infrastructure provided by mobile computing, wireless LAN, and ubiquitous computing. With Human Pacman, we have a physical role-playing computer fantasy together with real human-social and mobile-gaming that emphasizes on collaboration and competition between players in a wide outdoor physical area that allows natural wide-area human-physical movements. Pacmen and Ghosts are now real human players in the real world experiencing mixed computer graphics fantasy-reality provided by using the wearable computers on them. Virtual cookies and actual tangible physical objects are incorporated into the game play to provide novel experiences of seamless transitions between the real and virtual worlds. This is an example of a new form of gaming that anchors on physicality, mobility, social interaction, and ubiquitous computing.

  5. NOVEL APPLICATIONS FOR EMERGING MARKETS USING TELEVISION AS A UBIQUITOUS DEVICE

    DEFF Research Database (Denmark)

    Pal, Arpan

    2013-01-01

    – personal computer (including laptop and tablet), television and mobile (including smart phone). For emerging market countries like India, personal computers are not yet affordable to masses and most of the people are not savvy or skilled enough to operate a personal computer. Mobile phones, though being...... connected to the internet-world in a low-cost manner, it has the potential of becoming the ―Ubiquitous Computing Screen‖ for the home. The emerging markets are characterized by some unique issues like low bandwidth / low Quality-of-Service (QoS) of the available wireless networks, extreme cost...... solutions for seamlessly blending Internet with broadcasting content. To this end, in this thesis a novel application development framework is proposed first on top of a low-cost over-the-top box that uses television as a ubiquitous device with a focus on emerging markets. Then an end-to-end solution...

  6. Ubiquitous health monitoring and real-time cardiac arrhythmias detection: a case study.

    Science.gov (United States)

    Li, Jian; Zhou, Haiying; Zuo, Decheng; Hou, Kun-Mean; De Vaulx, Christophe

    2014-01-01

    As the symptoms and signs of heart diseases that cause sudden cardiac death, cardiac arrhythmia has attracted great attention. Due to limitations in time and space, traditional approaches to cardiac arrhythmias detection fail to provide a real-time continuous monitoring and testing service applicable in different environmental conditions. Integrated with the latest technologies in ECG (electrocardiograph) analysis and medical care, the pervasive computing technology makes possible the ubiquitous cardiac care services, and thus brings about new technical challenges, especially in the formation of cardiac care architecture and realization of the real-time automatic ECG detection algorithm dedicated to care devices. In this paper, a ubiquitous cardiac care prototype system is presented with its architecture framework well elaborated. This prototype system has been tested and evaluated in all the clinical-/home-/outdoor-care modes with a satisfactory performance in providing real-time continuous cardiac arrhythmias monitoring service unlimitedly adaptable in time and space.

  7. Real-time long term measurement using integrated framework for ubiquitous smart monitoring

    Science.gov (United States)

    Heo, Gwanghee; Lee, Giu; Lee, Woosang; Jeon, Joonryong; Kim, Pil-Joong

    2007-04-01

    Ubiquitous monitoring combining internet technologies and wireless communication is one of the most promising technologies of infrastructure health monitoring against the natural of man-made hazards. In this paper, an integrated framework of the ubiquitous monitoring is developed for real-time long term measurement in internet environment. This framework develops a wireless sensor system based on Bluetooth technology and sends measured acceleration data to the host computer through TCP/IP protocol. And it is also designed to respond to the request of web user on real time basis. In order to verify this system, real time monitoring tests are carried out on a prototype self-anchored suspension bridge. Also, wireless measurement system is analyzed to estimate its sensing capacity and evaluate its performance for monitoring purpose. Based on the evaluation, this paper proposes the effective strategies for integrated framework in order to detect structural deficiencies and to design an early warning system.

  8. Ubiquitous Wireless Sensor Networks and future “Internet of Things""

    OpenAIRE

    Vermesan, Ovidiu

    2009-01-01

    Overview of heterogeneous networks of embedded devices that can range from RFID, to smart identifiable systems with sensing and actuating capabilitie. Presentation of wireless sensor networks protocols and Internet of Things future technology. Bridging the real, virtual and digital worlds by using wireless connectivity. Application examples in automotive, aeronautics, healthcare, building, oil and gas industries. Ubiquitous Wireless Sensor Networks and future “Internet ...

  9. Expressing clinical data sets with openEHR archetypes: a solid basis for ubiquitous computing.

    Science.gov (United States)

    Garde, Sebastian; Hovenga, Evelyn; Buck, Jasmin; Knaup, Petra

    2007-12-01

    The purpose of this paper is to analyse the feasibility and usefulness of expressing clinical data sets (CDSs) as openEHR archetypes. For this, we present an approach to transform CDS into archetypes, and outline typical problems with CDS and analyse whether some of these problems can be overcome by the use of archetypes. Literature review and analysis of a selection of existing Australian, German, other European and international CDSs; transfer of a CDS for Paediatric Oncology into openEHR archetypes; implementation of CDSs in application systems. To explore the feasibility of expressing CDS as archetypes an approach to transform existing CDSs into archetypes is presented in this paper. In case of the Paediatric Oncology CDS (which consists of 260 data items) this lead to the definition of 48 openEHR archetypes. To analyse the usefulness of expressing CDS as archetypes, we identified nine problems with CDS that currently remain unsolved without a common model underpinning the CDS. Typical problems include incompatible basic data types and overlapping and incompatible definitions of clinical content. A solution to most of these problems based on openEHR archetypes is motivated. With regard to integrity constraints, further research is required. While openEHR cannot overcome all barriers to Ubiquitous Computing, it can provide the common basis for ubiquitous presence of meaningful and computer-processable knowledge and information, which we believe is a basic requirement for Ubiquitous Computing. Expressing CDSs as openEHR archetypes is feasible and advantageous as it fosters semantic interoperability, supports ubiquitous computing, and helps to develop archetypes that are arguably of better quality than the original CDS.

  10. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    OpenAIRE

    Pinzón, Cristian; de Paz Santana, Yanira; Bajo Pérez, Javier; Abraham, Ajith P.; Corchado Rodríguez, Juan M.

    2009-01-01

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a k...

  11. The new transparency: police violence in the context of ubiquitous surveillance

    OpenAIRE

    Brucato, Ben

    2015-01-01

    Media and surveillance scholars often comment on the purported empowering quality of transparency, which they expect participatory media to promote. From its Enlightenment origins, transparency is related to accountability and legitimacy: its increase is believed to promote these. It has earned a position as an unassailed, prime normative value in contemporary liberal and social democracies. Though still valued, transparency is undergoing change in an era of ubiquitous surveillance. Publics s...

  12. Air curtain technology improves working conditions with open hall doors; Luftschleiertechnik verbessert Arbeitsbedingungen bei geoeffneten Hallentoren

    Energy Technology Data Exchange (ETDEWEB)

    Multhauf, R. [Biddle GmbH, Koeln (Germany)

    1998-11-01

    Hall doors are indispensable for short logistic distances of product or raw materials management. Air curtain systems make it possible to keep doors open independent of the weather and season. The heating energy requiremens of modern air curtain systems has been reduced significantly. (orig.) [Deutsch] Hallentore sind fuer moeglichst kurze Logistikwege der Waren oder Rohstoffe im industriellen Betrieb unvermeidlich. Luftschleieranlagen ermoeglichen offene Tore unabhaengig von der Witterung und der Jahreszeit. Die zur Betreibung der Luftschleieranlagen notwendige Heizenergie wurde durch neue Entwicklungen stark reduziert. (orig.)

  13. Development of the automated bunker door by using a microcontroller-system

    Science.gov (United States)

    Ahmad, M. A.; Leo, K. W.; Mohamad, G. H. P.; Ahmad, A.; Hashim, S. A.; Chulan, R. M.; Baijan, A. H.

    2018-01-01

    The new low energy electron beam accelerator bunker was designed and built locally to allocate a 500 keV electron beam accelerator at Block 43T in Malaysian Nuclear Agency. This bunker is equipped with a locally made radiation shielding door of 10 tons. Originally, this door is moving manually by a wheel and fitted with a gear system. However, it is still heavy and need longer time to operate it manually. To overcome those issues, a new automated control system has been designed and developed. In this paper, the complete steps and design of automated control system based on the microcontroller (PIC16F84A) is described.

  14. Special sliding door with storable handrail to support senior and handicapped persons to walk by themselves

    Science.gov (United States)

    Saitou, K.; Noda, N.-A.; Sano, Y.; Takase, Y.; Murai, K.; Wang, Z. F.; Li, S. Q.; Liu, X.; Tanaka, H.; Kubo, Y.

    2018-06-01

    In this paper, special sliding door is designed in order to support senior and handicapped persons to walk by themselves in hospitals and nursing facilities. This semiautomatic lifting equipment is utilized for the storable handrail to make sure the bad health persons are able to open the door by using a weak force. In this study, to design the equipment of the handrail, the theoretical formula of opening force is derived. Then the simulation is performed by varying geometrical conditions. The simulation results are compared with the experiment results.

  15. An Intelligent Automated Door Control System Based on a Smart Camera

    Directory of Open Access Journals (Sweden)

    Jiann-Jone Chen

    2013-05-01

    Full Text Available This paper presents an innovative access control system, based on human detection and path analysis, to reduce false automatic door system actions while increasing the added values for security applications. The proposed system can first identify a person from the scene, and track his trajectory to predict his intention for accessing the entrance, and finally activate the door accordingly. The experimental results show that the proposed system has the advantages of high precision, safety, reliability, and can be responsive to demands, while preserving the benefits of being low cost and high added value.

  16. Design and Implementation of Ubiquitous Health System U-Health Using Smart-Watches Sensors

    Science.gov (United States)

    Razavi Termeh, V.; Sadeghi Niaraki, A.

    2015-12-01

    Today as diseases grow rapidly, the responsibilities of the health clinics in giving services to patients increase and patients have to be more monitored and controlled. Remote systems of monitoring patients result in reducing cost, ease of movement, and also persistent control of patients by their doctors, so that patient can be monitored without need to go to the clinic. Recent advances in the field of ubiquitous sciences as well as using smartphones have resulted in increasingly use of this devices in remote monitoring of patients. The aim of this paper is to design and implement a ubiquitous health system using smartphones and sensors of smart-watches. This is accomplished through the information sent to the smartphone from the sensors of the watch, e.g. heart beat measurement sensor and ultraviolet ray. Then, this information is analyzed in the smartphone and some information based on the position of the patient and the path of him/her using GIS analyses as well as the information about the health level of the patient is sent to the doctor via SMS or phone call. Unnatural heart beats can be resulted in diseases such as Heart Failure and Arterial Fibrillation. With the approach adopted in this study, the patient or the doctor could be aware of these diseases at any time. The proposed approach is a low cost, without need to complex and resilient equipment, system in ubiquitous health that does not limit the movement of the patient.

  17. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture

    Directory of Open Access Journals (Sweden)

    Francisco Javier Ferrández-Pastor

    2016-07-01

    Full Text Available The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water; however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols, the evolution of Internet technologies (Internet of Things and ubiquitous computing (Ubiquitous Sensor Networks allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists when a project is launched.

  18. Automatic, Global and Dynamic Student Modeling in a Ubiquitous Learning Environment

    Directory of Open Access Journals (Sweden)

    Sabine Graf

    2009-03-01

    Full Text Available Ubiquitous learning allows students to learn at any time and any place. Adaptivity plays an important role in ubiquitous learning, aiming at providing students with adaptive and personalized learning material, activities, and information at the right place and the right time. However, for providing rich adaptivity, the student model needs to be able to gather a variety of information about the students. In this paper, an automatic, global, and dynamic student modeling approach is introduced, which aims at identifying and frequently updating information about students’ progress, learning styles, interests and knowledge level, problem solving abilities, preferences for using the system, social connectivity, and current location. This information is gathered in an automatic way, using students’ behavior and actions in different learning situations provided by different components/services of the ubiquitous learning environment. By providing a comprehensive student model, students can be supported by rich adaptivity in every component/service of the learning environment. Furthermore, the information in the student model can help in giving teachers a better understanding about the students’ learning process.

  19. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture.

    Science.gov (United States)

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-07-22

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.

  20. Internal waves and temperature fronts on slopes

    Directory of Open Access Journals (Sweden)

    S. A. Thorpe

    Full Text Available Time series measurements from an array of temperature miniloggers in a line at constant depth along the sloping boundary of a lake are used to describe the `internal surf zone' where internal waves interact with the sloping boundary. More small positive temperature time derivatives are recorded than negative, but there are more large negative values than positive, giving the overall distribution of temperature time derivatives a small negative skewness. This is consistent with the internal wave dynamics; fronts form during the up-slope phase of the motion, bringing cold water up the slope, and the return flow may become unstable, leading to small advecting billows and weak warm fronts. The data are analysed to detect `events', periods in which the temperature derivatives exceed a set threshold. The speed and distance travelled by `events' are described. The motion along the slope may be a consequence of (a instabilities advected by the flow (b internal waves propagating along-slope or (c internal waves approaching the slope from oblique directions. The propagation of several of the observed 'events' can only be explained by (c, evidence that the internal surf zone has some, but possibly not all, the characteristics of the conventional 'surface wave' surf zone, with waves steepening as they approach the slope at oblique angles.

    Key words. Oceanography: general (benthic boundary layers; limnology, Oceanography: physical (internal and inertial waves

  1. Biomechanics of front and back squat exercises

    International Nuclear Information System (INIS)

    Braidot, A A; Brusa, M H; Lestussi, F E; Parera, G P

    2007-01-01

    Squat constitutes one of the most popular exercises to strengthen the muscles of the lower limbs. It is considered one of the most widely spread exercises for muscle sport training and is part of the competition movements comprised within olympic weight-lifting. In physical rehabilitation, squats are used for muscular recovery after different injuries of the lower limbs, especially the knee. In previous anterior cruciate ligament injuries, the mini-squats are generally used, in a knee flexion motion range from 0 deg. to 50 deg. because in this range the shear forces, the tibiofemoral and patellofemoral compression forces decrease related to greater flexion angles. The aim of this work is to make a comparative bidimensional study of the kinematic and dynamic variables of the excecution of the parallel squat exercise with the front and back bar. It is observed in the knee a better development of energy with the front bar, allowing a better muscular exercise with the same load. The mean power absorbed by the hip with the back bar is considerably greater, associated to the speed of the gesture

  2. Travelling fronts in stochastic Stokes’ drifts

    KAUST Repository

    Blanchet, Adrien

    2008-10-01

    By analytical methods we study the large time properties of the solution of a simple one-dimensional model of stochastic Stokes\\' drift. Semi-explicit formulae allow us to characterize the behaviour of the solutions and compute global quantities such as the asymptotic speed of the center of mass or the effective diffusion coefficient. Using an equivalent tilted ratchet model, we observe that the speed of the center of mass converges exponentially to its limiting value. A diffuse, oscillating front attached to the center of mass appears. The description of the front is given using an asymptotic expansion. The asymptotic solution attracts all solutions at an algebraic rate which is determined by the effective diffusion coefficient. The proof relies on an entropy estimate based on homogenized logarithmic Sobolev inequalities. In the travelling frame, the macroscopic profile obeys to an isotropic diffusion. Compared with the original diffusion, diffusion is enhanced or reduced, depending on the regime. At least in the limit cases, the rate of convergence to the effective profile is always decreased. All these considerations allow us to define a notion of efficiency for coherent transport, characterized by a dimensionless number, which is illustrated on two simple examples of travelling potentials with a sinusoidal shape in the first case, and a sawtooth shape in the second case. © 2008 Elsevier B.V. All rights reserved.

  3. Biomechanics of front and back squat exercises

    Energy Technology Data Exchange (ETDEWEB)

    Braidot, A A [Laboratorio de Biomecanica FI-UNER. Ruta 11 Km 10 Oro Verde Entre Rios (Argentina); Brusa, M H [Laboratorio de Biomecanica FI-UNER. Ruta 11 Km 10 Oro Verde Entre Rios (Argentina); Lestussi, F E [Laboratorio de Biomecanica FI-UNER. Ruta 11 Km 10 Oro Verde Entre Rios (Argentina); Parera, G P [Licenciatura en KinesiologIa y FisiatrIa Universidad Abierta Interamericana. Sede Regional Rosario (Argentina)

    2007-11-15

    Squat constitutes one of the most popular exercises to strengthen the muscles of the lower limbs. It is considered one of the most widely spread exercises for muscle sport training and is part of the competition movements comprised within olympic weight-lifting. In physical rehabilitation, squats are used for muscular recovery after different injuries of the lower limbs, especially the knee. In previous anterior cruciate ligament injuries, the mini-squats are generally used, in a knee flexion motion range from 0 deg. to 50 deg. because in this range the shear forces, the tibiofemoral and patellofemoral compression forces decrease related to greater flexion angles. The aim of this work is to make a comparative bidimensional study of the kinematic and dynamic variables of the excecution of the parallel squat exercise with the front and back bar. It is observed in the knee a better development of energy with the front bar, allowing a better muscular exercise with the same load. The mean power absorbed by the hip with the back bar is considerably greater, associated to the speed of the gesture.

  4. Biomechanics of front and back squat exercises

    Science.gov (United States)

    Braidot, A. A.; Brusa, M. H.; Lestussi, F. E.; Parera, G. P.

    2007-11-01

    Squat constitutes one of the most popular exercises to strengthen the muscles of the lower limbs. It is considered one of the most widely spread exercises for muscle sport training and is part of the competition movements comprised within olympic weight-lifting. In physical rehabilitation, squats are used for muscular recovery after different injuries of the lower limbs, especially the knee. In previous anterior cruciate ligament injuries, the mini-squats are generally used, in a knee flexion motion range from 0° to 50° because in this range the shear forces, the tibiofemoral and patellofemoral compression forces decrease related to greater flexion angles. The aim of this work is to make a comparative bidimensional study of the kinematic and dynamic variables of the excecution of the parallel squat exercise with the front and back bar. It is observed in the knee a better development of energy with the front bar, allowing a better muscular exercise with the same load. The mean power absorbed by the hip with the back bar is considerably greater, associated to the speed of the gesture.

  5. Tracer filamentation at an unstable ocean front

    Science.gov (United States)

    Feng, Yen Chia; Mahadevan, Amala; Thiffeault, Jean-Luc; Yecko, Philip

    2017-11-01

    A front, where two bodies of ocean water with different physical properties meet, can become unstable and lead to a flow with high strain rate and vorticity. Phytoplankton and other oceanic tracers are stirred into filaments by such flow fields, as can often be seen in satellite imagery. The stretching and folding of a tracer by a two-dimensional flow field has been well studied. In the ocean, however, the vertical shear of horizontal velocity is typically two orders of magnitude larger than the horizontal velocity gradient. Theoretical calculations show that vertical shear alters the way in which horizontal strain affects the tracer, resulting in thin, sloping structures in the tracer field. Using a non-hydrostatic ocean model of an unstable ocean front, we simulate tracer filamentation to identify the effect of vertical shear on the deformation of the tracer. In a complementary laboratory experiment, we generate a simple, vertically sheared strain flow and use dye and particle image velocimetry to quantify the filamentary structures in terms of the strain and shear. We identify how vertical shear alters the tracer filaments and infer how the evolution of tracers in the ocean will differ from the idealized two-dimensional paradigm. Support of NSF DMS-1418956 is acknowledged.

  6. The ALICE TPC front end electronics

    CERN Document Server

    Musa, L; Bialas, N; Bramm, R; Campagnolo, R; Engster, Claude; Formenti, F; Bonnes, U; Esteve-Bosch, R; Frankenfeld, Ulrich; Glässel, P; Gonzales, C; Gustafsson, Hans Åke; Jiménez, A; Junique, A; Lien, J; Lindenstruth, V; Mota, B; Braun-Munzinger, P; Oeschler, H; Österman, L; Renfordt, R E; Ruschmann, G; Röhrich, D; Schmidt, H R; Stachel, J; Soltveit, A K; Ullaland, K

    2004-01-01

    In this paper we present the front end electronics for the time projection chamber (TPC) of the ALICE experiment. The system, which consists of about 570000 channels, is based on two basic units: (a) an analogue ASIC (PASA) that incorporates the shaping-amplifier circuits for 16 channels; (b) a mixed-signal ASIC (ALTRO) that integrates 16 channels, each consisting of a 10-bit 25-MSPS ADC, the baseline subtraction, tail cancellation filter, zero suppression and multi-event buffer. The complete readout chain is contained in front end cards (FEC), with 128 channels each, connected to the detector by means of capton cables. A number of FECs (up to 25) are controlled by a readout control unit (RCU), which interfaces the FECs to the data acquisition (DAQ), the trigger, and the detector control system (DCS) . A function of the final electronics (1024 channels) has been characterized in a test that incorporates a prototype of the ALICE TPC as well as many other components of the final set-up. The tests show that the ...

  7. Spatially hybrid computations for streamer discharges with generic features of pulled fronts: I. Planar fronts

    International Nuclear Information System (INIS)

    Li Chao; Ebert, Ute; Hundsdorfer, Willem

    2010-01-01

    Streamers are the first stage of sparks and lightning; they grow due to a strongly enhanced electric field at their tips; this field is created by a thin curved space charge layer. These multiple scales are already challenging when the electrons are approximated by densities. However, electron density fluctuations in the leading edge of the front and non-thermal stretched tails of the electron energy distribution (as a cause of X-ray emissions) require a particle model to follow the electron motion. But present computers cannot deal with all electrons in a fully developed streamer. Therefore, super-particle have to be introduced, which leads to wrong statistics and numerical artifacts. The method of choice is a hybrid computation in space where individual electrons are followed in the region of high electric field and low density while the bulk of the electrons is approximated by densities (or fluids). We here develop the hybrid coupling for planar fronts. First, to obtain a consistent flux at the interface between particle and fluid model in the hybrid computation, the widely used classical fluid model is replaced by an extended fluid model. Then the coupling algorithm and the numerical implementation of the spatially hybrid model are presented in detail, in particular, the position of the model interface and the construction of the buffer region. The method carries generic features of pulled fronts that can be applied to similar problems like large deviations in the leading edge of population fronts, etc.

  8. Door-to-needle time for administration of fibrinolytics in acute ...

    African Journals Online (AJOL)

    Objectives. To determine the current door-to-needle time for the administration of fibrinolytics for acute myocardial infarction (AMI) in emergency centres (ECs) at three hospitals in Cape Town, and to compare it with the American Heart Association/American College of Cardiology (AHA/ACC) recommendation of 30 minutes ...

  9. Online uitlenen van e-books door bibliotheken: verkenning juridische mogelijkheden en economische effecten

    NARCIS (Netherlands)

    van der Noll, R.; Breemen, K.; Breemen, V.; Hugenholtz, B.; Brom, M.; Poort, J.

    2012-01-01

    Het uitlenen van e-books door openbare bibliotheken is in een groeiend aantal landen een realiteit. Dit rapport inventariseert deze praktijk en analyseert de juridische mogelijkheden voor en economische gevolgen van e-lending. In het economische deel van deze verkenning wordt onderzocht in welke

  10. The influence of opening windows and doors on the natural ventilation rate of a residential building

    Science.gov (United States)

    An analysis of air exchange rates due to intentional window and door openings in a research test house located in a residential environment is presented. These data inform the development of ventilation rate control strategies as building envelopes are tightened to improve the e...

  11. The genetic basis of DOORS syndrome: an exome-sequencing study

    NARCIS (Netherlands)

    Campeau, Philippe M.; Kasperaviciute, Dalia; Lu, James T.; Burrage, Lindsay C.; Kim, Choel; Hori, Mutsuki; Powell, Berkley R.; Stewart, Fiona; Félix, Têmis Maria; van den Ende, Jenneke; Wisniewska, Marzena; Kayserili, Hülya; Rump, Patrick; Nampoothiri, Sheela; Aftimos, Salim; Mey, Antje; Nair, Lal D. V.; Begleiter, Michael L.; de Bie, Isabelle; Meenakshi, Girish; Murray, Mitzi L.; Repetto, Gabriela M.; Golabi, Mahin; Blair, Edward; Male, Alison; Giuliano, Fabienne; Kariminejad, Ariana; Newman, William G.; Bhaskar, Sanjeev S.; Dickerson, Jonathan E.; Kerr, Bronwyn; Banka, Siddharth; Giltay, Jacques C.; Wieczorek, Dagmar; Tostevin, Anna; Wiszniewska, Joanna; Cheung, Sau Wai; Hennekam, Raoul C.; Gibbs, Richard A.; Lee, Brendan H.; Sisodiya, Sanjay M.

    2014-01-01

    Deafness, onychodystrophy, osteodystrophy, mental retardation, and seizures (DOORS) syndrome is a rare autosomal recessive disorder of unknown cause. We aimed to identify the genetic basis of this syndrome by sequencing most coding exons in affected individuals. Through a search of available case

  12. The genetic basis of DOORS syndrome : an exome-sequencing study

    NARCIS (Netherlands)

    Campeau, Philippe M.; Kasperaviciute, Dalia; Lu, James T.; Burrage, Lindsay C.; Kim, Choel; Hori, Mutsuki; Powell, Berkley R.; Stewart, Fiona; Felix, Temis Maria; van den Ende, Jenneke; Wisniewska, Marzena; Kayserili, Huelya; Rump, Patrick; Nampoothiri, Sheela; Aftimos, Salim; Mey, Antje; Nair, Lal D. V.; Begleiter, Michael L.; De Bie, Isabelle; Meenakshi, Girish; Murray, Mitzi L.; Repetto, Gabriela M.; Golabi, Mahin; Blair, Edward; Male, Alison; Giuliano, Fabienne; Kariminejad, Ariana; Newman, William G.; Bhaskar, Sanjeev S.; Dickerson, Jonathan E.; Kerr, Bronwyn; Banka, Siddharth; Giltay, Jacques C.; Wieczorek, Dagmar; Tostevin, Anna; Wiszniewska, Joanna; Cheung, Sau Wai; Hennekam, Raoul C.; Gibbs, Richard A.; Lee, Brendan H.; Sisodiya, Sanjay M.

    Background Deafness, onychodystrophy, osteodystrophy, mental retardation, and seizures (DOORS) syndrome is a rare autosomal recessive disorder of unknown cause. We aimed to identify the genetic basis of this syndrome by sequencing most coding exons in affected individuals. Methods Through a search

  13. Diepe grondwatervervuiling door een bouwlandperceel in de 10-jaarszone van waterwingebied Putten

    NARCIS (Netherlands)

    Krajenbrink GJW

    1988-01-01

    In het kader van het stikstofproject heeft het RIVM onderzoek verricht naar de grondwaterverontreiniging tot max. 70 meter diepte onder- en benedenstrooms van een bouwlandperceel, omgeven door bos. Het water in de 180 meter dikke grofzandige freatische aquifer is gedetailleerd bemonsterd met

  14. The IEA's review of France's energy policy: the challenge of opening the doors

    International Nuclear Information System (INIS)

    Appert, O.

    2000-01-01

    There has been a continuity in French energy policy for several decades now - the aim to guarantee a supply of energy under reliable, economical conditions. The review, which the International Energy Agency has just conducted, notes how successful this policy has been. But it also emphasizes the need for France to open the doors of this market to the rest of Europe. (authors)

  15. 40 CFR 63.305 - Alternative standards for coke oven doors equipped with sheds.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Alternative standards for coke oven doors equipped with sheds. 63.305 Section 63.305 Protection of Environment ENVIRONMENTAL PROTECTION... SOURCE CATEGORIES National Emission Standards for Coke Oven Batteries § 63.305 Alternative standards for...

  16. Implications of China's Open-Door Policy for Families: A Family Impact Analysis

    Science.gov (United States)

    Quach, Andrew S.; Anderson, Elaine A.

    2008-01-01

    China's open-door policy (ODP) was created in 1978 as a response to the severe economic depression affecting the country after the Cultural Revolution. The policy was designed to restore China's financial status and lift the nation out of destitution. By all accounts, the ODP has been successful in improving the country's monetary condition.…

  17. Financiële verslaggeving door het Rijk vergeleken met IPSAS

    NARCIS (Netherlands)

    van Schaik, F.

    2014-01-01

    De Europese Commissie bereidt plannen voor om de financiële verslaggeving door de overheden van de lidstaten te harmoniseren met als doel een verbetering van transparantie en vergelijkbaarheid. De Europese schuldencrisis heeft duidelijk gemaakt dat de jaarrekeningen van de overheden van de lidstaten

  18. Extensivering van de begeleiding door het inzetten van peer- en self-assessment in IMTO

    NARCIS (Netherlands)

    Joosten-ten Brinke, Desirée

    2011-01-01

    Joosten-ten Brinke, D. (2011). Extensivering van de begeleiding door het inzetten van peer- en self-Assessment in IMTO. In E. Bakker, W. Giesbertz, J. von Grumbkow, & T. Houtmans (Red.), Ontwikkeling van de onderzoekscompetentie aan de Open Universiteit (pp. 121-128). Heerlen: Open universiteit.

  19. Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit

    NARCIS (Netherlands)

    Junger, Marianne; Montoya, L.; Hartel, Pieter H.; Karemaker, M.

    Dit onderzoek beschrijft de invloed van ICT op de 'traditionele' misdrijven door te onderzoeken hoe delicten als inbraak, overvallen en fraude doordrongen zijn van ICT. In totaal zijn 136 woninginbraken, 140 commerciële inbraken, 259 bedreigingen en 274 fraudeza-ken onderzocht. Uit de resultaten

  20. Scheduling Trucks in a Cross-Dock with Mixed Service Mode Dock Doors

    DEFF Research Database (Denmark)

    Bodnar, Peter; Azadeh, Kaveh; Koster, René de

    2017-01-01

    The problem considered in this paper is how to schedule inbound and outbound trucks subject to time windows at a multidoor cross-dock. Dock doors can either be dedicated to inbound or outbound trucks or be capable of handling both truck types. In addition, loads are allowed to be temporarily...

  1. Leren bedrijfseconomische problemen op te lossen door het maken van vakspecifieke schema’s

    NARCIS (Netherlands)

    Slof, Bert; Erkens, Gijsbert; Kirschner, Paul A.

    2010-01-01

    Slof, B., Erkens, G., & Kirschner, P. A. (2010). Leren bedrijfseconomische problemen op te lossen door het maken van vakspecifieke schema’s [Learning to solve business-economics problems through constructing domainspecific diagrams]. Tijdschrift voor het Economisch Onderwijs (TEO), 110(4), 226–230.

  2. 30 CFR 57.8531 - Construction and maintenance of ventilation doors.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Construction and maintenance of ventilation... NONMETAL MINES Ventilation Underground Only § 57.8531 Construction and maintenance of ventilation doors... constructed of wood; (c) Maintained in good condition; (d) Self-closing, if manually operated; and (e...

  3. Effectieve kolonisatie van aardappelplanten door Dickeya-soorten (Erwinia chrysanthemi) : themanummer fytobacteriologie

    NARCIS (Netherlands)

    Wolf, van der J.M.; Czajkowski, R.L.; Velvis, H.

    2009-01-01

    De bacterieziekten zwartbenigheid en stengelnatrot, veroorzaakt door Pectobacterium en Dickeya (Erwinia)- soorten, berokkenen grote schade aan de pootaardappelteelt. Bij PRI en HZPC wordt onderzoek verricht naar de verspreiding van deze pathogenen tijdens teelt- en (na)oogst. Het was al bekend dat

  4. Bodemverontreiniging en de opname van lood in moestuingewassen : Risico's van lood door bodemverontreiniging

    NARCIS (Netherlands)

    Otte PF; Romkens PFAM; Rietra RPJJ; Lijzen JPA; LER; mev

    2012-01-01

    Lood uit bodemverontreinigingen wordt opgenomen door moestuingewassen die daarop worden geteeld. Deze gewassen kunnen een gezondheidsrisico vormen als zij worden geconsumeerd. Uit onderzoek van RIVM en Alterra blijkt nu dat bij hoge concentraties lood in de bodem de opname minder wordt. Hierdoor

  5. 3D Modeling of Building Indoor Spaces and Closed Doors from Imagery and Point Clouds

    Directory of Open Access Journals (Sweden)

    Lucía Díaz-Vilariño

    2015-02-01

    Full Text Available 3D models of indoor environments are increasingly gaining importance due to the wide range of applications to which they can be subjected: from redesign and visualization to monitoring and simulation. These models usually exist only for newly constructed buildings; therefore, the development of automatic approaches for reconstructing 3D indoors from imagery and/or point clouds can make the process easier, faster and cheaper. Among the constructive elements defining a building interior, doors are very common elements and their detection can be very useful either for knowing the environment structure, to perform an efficient navigation or to plan appropriate evacuation routes. The fact that doors are topologically connected to walls by being coplanar, together with the unavoidable presence of clutter and occlusions indoors, increases the inherent complexity of the automation of the recognition process. In this work, we present a pipeline of techniques used for the reconstruction and interpretation of building interiors based on point clouds and images. The methodology analyses the visibility problem of indoor environments and goes in depth with door candidate detection. The presented approach is tested in real data sets showing its potential with a high door detection rate and applicability for robust and efficient envelope reconstruction.

  6. The Romanesque Bronze Doors at Gniezno Cathedral Church: Some New Remarks

    Directory of Open Access Journals (Sweden)

    Tomasz Węcławowicz

    2017-06-01

    Full Text Available Among many Romanesque bronze doors in Europe the old entrance doors of the metropolitan cathedral in Gniezno, in the North Poland, are exceptional. For over a century many historians and historians of art have been trying to understand and explain its iconographic phenomenon. The Polish, Czech and German scholars have so far been unable to identify with any conviction, either the iconographic models or artistic provenance of the workshop. There were suggested some connections of the alleged bishop patrons to France and there were emphasizes technological possibilities of foundry workshops at the Meuse Valley. This “Meuse hypothesis” based mainly on historical suggestions became established as a certainty. However, it is important to emphasize the significant difference between the creator of the composition and of the craftsman who cast the bronze door. Years ago only Lech Kalinowski pointed out some general formal similarities to the North Italian sculpture. The purpose of this paper is to develop Kalinowski’s suggestions and to emphasise the puzzling similarities between details of Gniezno doors and some Emilian works executed by Master Wiligelmo da Modena and Master Nicolò. The concept of Italian relationship from Emilia province seems to be better for the comparative analysis than relationship with Meuse Valley based mostly on historical context. Crucial here is the additional, parallel analysis of the portal decoration in Czerwinsk Abbey.

  7. 30 CFR 77.303 - Hot gas inlet chamber dropout doors.

    Science.gov (United States)

    2010-07-01

    ... Section 77.303 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE SAFETY AND HEALTH MANDATORY SAFETY STANDARDS, SURFACE COAL MINES AND SURFACE WORK AREAS OF UNDERGROUND... employ a hot gas inlet chamber shall be equipped with drop-out doors at the bottom of the inlet chamber...

  8. The influence of opening windows and doors on the natural ventilation rate of a residential building

    Science.gov (United States)

    Increased building energy efficiency is important in reducing national energy use and greenhouse gas emissions. An analysis of air change rates due to door and window openings in a research test house located in a residential environment are presented. These data inform developme...

  9. DoOR 2.0 - Comprehensive Mapping of Drosophila melanogaster Odorant Responses

    Science.gov (United States)

    Münch, Daniel; Galizia, C. Giovanni

    2016-02-01

    Odors elicit complex patterns of activated olfactory sensory neurons. Knowing the complete olfactome, i.e. the responses in all sensory neurons for all relevant odorants, is desirable to understand olfactory coding. The DoOR project combines all available Drosophila odorant response data into a single consensus response matrix. Since its first release many studies were published: receptors were deorphanized and several response profiles were expanded. In this study, we add unpublished data to the odor-response profiles for four odorant receptors (Or10a, Or42b, Or47b, Or56a). We deorphanize Or69a, showing a broad response spectrum with the best ligands including 3-hydroxyhexanoate, alpha-terpineol, 3-octanol and linalool. We include all of these datasets into DoOR, provide a comprehensive update of both code and data, and new tools for data analyses and visualizations. The DoOR project has a web interface for quick queries (http://neuro.uni.kn/DoOR), and a downloadable, open source toolbox written in R, including all processed and original datasets. DoOR now gives reliable odorant-responses for nearly all Drosophila olfactory responding units, listing 693 odorants, for a total of 7381 data points.

  10. The Glass Door: The Gender Composition of Newly-Hired Workers Across Hierarchical Job Levels

    NARCIS (Netherlands)

    Hassink, W.H.J.|info:eu-repo/dai/nl/090437411; Russo, G.|info:eu-repo/dai/nl/124883206

    This paper examines the gender composition of the flow of new hirees along the organizational hierarchy of jobs. We find that women have a reduced chance to be hired at higher hierarchical levels. We refer to this phenomenon as the “glass door”. The glass door consists of an absolute and a relative

  11. Vector mesons on the light front

    International Nuclear Information System (INIS)

    Naito, K.; Maedan, S.; Itakura, K.

    2004-01-01

    We apply the light-front quantization to the Nambu-Jona-Lasinio model with the vector interaction, and compute vector meson's mass and light-cone wavefunction in the large N limit. Following the same procedure as in the previous analyses for scalar and pseudo-scalar mesons, we derive the bound-state equations of a qq-bar system in the vector channel. We include the lowest order effects of the vector interaction. The resulting transverse and longitudinal components of the bound-state equation look different from each other. But eventually after imposing an appropriate cutoff, one finds these two are identical, giving the same mass and the same (spin-independent) light-cone wavefunction. Mass of the vector meson decreases as one increases the strength of the vector interaction

  12. Light-front quantization of field theory

    Energy Technology Data Exchange (ETDEWEB)

    Srivastava, Prem P. [Universidade do Estado, Rio de Janeiro, RJ (Brazil). Inst. de Fisica]|[Centro Brasileiro de Pesquisas Fisicas (CBPF), Rio de Janeiro, RJ (Brazil)

    1996-07-01

    Some basic topics in Light-Front (LF) quantized field theory are reviewed. Poincare algebra and the LF spin operator are discussed. The local scalar field theory of the conventional framework is shown to correspond to a non-local Hamiltonian theory on the LF in view of the constraint equations on the phase space, which relate the bosonic condensates to the non-zero modes. This new ingredient is useful to describe the spontaneous symmetry breaking on the LF. The instability of the symmetric phase in two dimensional scalar theory when the coupling constant grows is shown in the LF theory renormalized to one loop order. Chern-Simons gauge theory, regarded to describe excitations with fractional statistics, is quantized in the light-cone gauge and a simple LF Hamiltonian obtained which may allow us to construct renormalized theory of anyons. (author). 20 refs.

  13. Light-front quantization of field theory

    International Nuclear Information System (INIS)

    Srivastava, Prem P.

    1996-07-01

    Some basic topics in Light-Front (LF) quantized field theory are reviewed. Poincare algebra and the LF spin operator are discussed. The local scalar field theory of the conventional framework is shown to correspond to a non-local Hamiltonian theory on the LF in view of the constraint equations on the phase space, which relate the bosonic condensates to the non-zero modes. This new ingredient is useful to describe the spontaneous symmetry breaking on the LF. The instability of the symmetric phase in two dimensional scalar theory when the coupling constant grows is shown in the LF theory renormalized to one loop order. Chern-Simons gauge theory, regarded to describe excitations with fractional statistics, is quantized in the light-cone gauge and a simple LF Hamiltonian obtained which may allow us to construct renormalized theory of anyons. (author). 20 refs

  14. The CMS Tracker Readout Front End Driver

    CERN Document Server

    Foudas, C.; Ballard, D.; Church, I.; Corrin, E.; Coughlan, J.A.; Day, C.P.; Freeman, E.J.; Fulcher, J.; Gannon, W.J.F.; Hall, G.; Halsall, R.N.J.; Iles, G.; Jones, J.; Leaver, J.; Noy, M.; Pearson, M.; Raymond, M.; Reid, I.; Rogers, G.; Salisbury, J.; Taghavi, S.; Tomalin, I.R.; Zorba, O.

    2004-01-01

    The Front End Driver, FED, is a 9U 400mm VME64x card designed for reading out the Compact Muon Solenoid, CMS, silicon tracker signals transmitted by the APV25 analogue pipeline Application Specific Integrated Circuits. The FED receives the signals via 96 optical fibers at a total input rate of 3.4 GB/sec. The signals are digitized and processed by applying algorithms for pedestal and common mode noise subtraction. Algorithms that search for clusters of hits are used to further reduce the input rate. Only the cluster data along with trigger information of the event are transmitted to the CMS data acquisition system using the S-LINK64 protocol at a maximum rate of 400 MB/sec. All data processing algorithms on the FED are executed in large on-board Field Programmable Gate Arrays. Results on the design, performance, testing and quality control of the FED are presented and discussed.

  15. Light-Front Holography, Light-Front Wavefunctions, and Novel QCD Phenomena

    Energy Technology Data Exchange (ETDEWEB)

    Brodsky, Stanley J.; /SLAC /Southern Denmark U., CP3-Origins; de Teramond, Guy F.; /Costa Rica U.

    2012-02-16

    Light-Front Holography is one of the most remarkable features of the AdS/CFT correspondence. In spite of its present limitations it provides important physical insights into the nonperturbative regime of QCD and its transition to the perturbative domain. This novel framework allows hadronic amplitudes in a higher dimensional anti-de Sitter (AdS) space to be mapped to frame-independent light-front wavefunctions of hadrons in physical space-time. The model leads to an effective confining light-front QCD Hamiltonian and a single-variable light-front Schroedinger equation which determines the eigenspectrum and the light-front wavefunctions of hadrons for general spin and orbital angular momentum. The coordinate z in AdS space is uniquely identified with a Lorentz-invariant coordinate {zeta} which measures the separation of the constituents within a hadron at equal light-front time and determines the off-shell dynamics of the bound-state wavefunctions, and thus the fall-off as a function of the invariant mass of the constituents. The soft-wall holographic model modified by a positive-sign dilaton metric, leads to a remarkable one-parameter description of nonperturbative hadron dynamics - a semi-classical frame-independent first approximation to the spectra and light-front wavefunctions of meson and baryons. The model predicts a Regge spectrum of linear trajectories with the same slope in the leading orbital angular momentum L of hadrons and the radial quantum number n. The hadron eigensolutions projected on the free Fock basis provides the complete set of valence and non-valence light-front Fock state wavefunctions {Psi}{sub n/H} (x{sub i}, k{sub {perpendicular}i}, {lambda}{sub i}) which describe the hadron's momentum and spin distributions needed to compute the direct measures of hadron structure at the quark and gluon level, such as elastic and transition form factors, distribution amplitudes, structure functions, generalized parton distributions and transverse

  16. Radiation shielding techniques and applications. 3. Analysis of Photon Streaming Through and Around Shield Doors

    International Nuclear Information System (INIS)

    Barnett, Marvin; Hack, Joe; Nathan, Steve; White, Travis

    2001-01-01

    Westinghouse Safety Management Solutions (Westinghouse SMS) has been tasked with providing radiological engineering design support for the new Commercial Light Water Reactor Tritium Extraction Facility (CLWR-TEF) being constructed at the Savannah River Site (SRS). The Remote Handling Building (RHB) of the CLWR-TEF will act as the receiving facility for irradiated targets used in the production of tritium for the U.S. Department of Energy (DOE). Because of the high dose rates, approaching 50 000 rads/h (500 Gy/h) from the irradiated target bundles, significant attention has been made to shielding structures within the facility. One aspect of the design that has undergone intense review is the shield doors. The RHB has six shield doors that needed to be studied with respect to photon streaming. Several aspects had to be examined to ensure that the design meets the radiation dose levels. Both the thickness and streaming issues around the door edges were designed and examined. Photon streaming through and around a shield door is a complicated problem, creating a reliance on computer modeling to perform the analyses. The computer code typically used by the Westinghouse SMS in the evaluation of photon transport through complex geometries is the MCNP Monte Carlo computer code. The complexity of the geometry within the problem can cause problems even with the Monte Carlo codes. Striking a balance between how the code handles transport through the shield door with transport through the streaming paths, particularly with the use of typical variance reduction methods, is difficult when trying to ensure that all important regions of the model are sampled appropriately. The thickness determination used a simple variance reduction technique. In construction, the shield door will not be flush against the wall, so a solid rectangular slab leaves streaming paths around the edges. Administrative controls could be used to control dose to workers; however, 10 CFR 835.1001 states

  17. Bare quantifier fronting as contrastive topicalization

    Directory of Open Access Journals (Sweden)

    Ion Giurgea

    2015-11-01

    Full Text Available I argue that indefinites (in particular bare quantifiers such as ‘something’, ‘somebody’, etc. which are neither existentially presupposed nor in the restriction of a quantifier over situations, can undergo topicalization in a number of Romance languages (Catalan, Italian, Romanian, Spanish, but only if the sentence contains “verum” focus, i.e. focus on a high degree of certainty of the sentence. I analyze these indefinites as contrastive topics, using Büring’s (1999 theory (where the term ‘S-topic’ is used for what I call ‘contrastive topic’. I propose that the topic is evaluated in relation to a scalar set including generalized quantifiers such as {lP $x P(x, lP MANYx P(x, lP MOSTx P(x, lP “xP(x} or {lP $xP(x, lP P(a, lP P(b …}, and that the contrastive topic is the weakest generalized quantifier in this set. The verum focus, which is part of the “comment” that co-occurs with the “Topic”, introduces a set of alternatives including degrees of certainty of the assertion. The speaker asserts that his claim is certainly true or highly probable, contrasting it with stronger claims for which the degree of probability is unknown. This explains the observation that in downward entailing contexts, the fronted quantified DPs are headed by ‘all’ or ‘many’, whereas ‘some’, small numbers or ‘at least n’ appear in upward entailing contexts. Unlike other cases of non-specific topics, which are property topics, these are quantifier topics: the topic part is a generalized quantifier, the comment is a property of generalized quantifiers. This explains the narrow scope of the fronted quantified DP.

  18. Salinity fronts in the tropical Pacific Ocean.

    Science.gov (United States)

    Kao, Hsun-Ying; Lagerloef, Gary S E

    2015-02-01

    This study delineates the salinity fronts (SF) across the tropical Pacific, and describes their variability and regional dynamical significance using Aquarius satellite observations. From the monthly maps of the SF, we find that the SF in the tropical Pacific are (1) usually observed around the boundaries of the fresh pool under the intertropical convergence zone (ITCZ), (2) stronger in boreal autumn than in other seasons, and (3) usually stronger in the eastern Pacific than in the western Pacific. The relationship between the SF and the precipitation and the surface velocity are also discussed. We further present detailed analysis of the SF in three key tropical Pacific regions. Extending zonally around the ITCZ, where the temperature is nearly homogeneous, we find the strong SF of 1.2 psu from 7° to 11°N to be the main contributor of the horizontal density difference of 0.8 kg/m 3 . In the eastern Pacific, we observe a southward extension of the SF in the boreal spring that could be driven by both precipitation and horizontal advection. In the western Pacific, the importance of these newly resolved SF associated with the western Pacific warm/fresh pool and El Niño southern oscillations are also discussed in the context of prior literature. The main conclusions of this study are that (a) Aquarius satellite salinity measurements reveal the heretofore unknown proliferation, structure, and variability of surface salinity fronts, and that (b) the fine-scale structures of the SF in the tropical Pacific yield important new information on the regional air-sea interaction and the upper ocean dynamics.

  19. MMIC front-ends for optical communication systems

    DEFF Research Database (Denmark)

    Petersen, Anders Kongstad

    1993-01-01

    Two different types of optical front-end MMIC amplifiers for a 2.5-Gb/s coherent heterodyne optical receiver are presented. A bandwidth of 6-12 GHz has been obtained for a tuned front-end and 3-13 GHz for a distributed front-end. An input noise current density of 5-15 pA/√Hz has been obtained for...

  20. The upgraded CDF front end electronics for calorimetry

    Energy Technology Data Exchange (ETDEWEB)

    Drake, G.; Frei, D.; Hahn, S.R.; Nelson, C.A.; Segler, S.L.; Stuermer, W.

    1991-11-01

    The front end electronics used in the calorimetry of the CDF detector has been upgraded to meet system requirements for higher expected luminosity. A fast digitizer utilizing a 2 {mu}Sec, 16 bit ADC has been designed and built. Improvements to the front end trigger circuitry have been implemented, including the production of 900 new front end modules. Operational experience with the previous system is presented, with discussion of the problems and performance goals.