WorldWideScience

Sample records for university entitled configurational

  1. Gender Differences in Pay Histories and Views on Pay Entitlement among University Students.

    Desmarais, Serge; Curtis, James

    1997-01-01

    Examines whether gender differences in recent pay experience influence entitlement views by providing different standards for female and male students' judgments of their entitlements. Responses from 309 undergraduate students reveal that income gaps in the full-time working world extended to their own recent work experiences and that these past…

  2. Cross-cultural invariance of NPI-13: Entitlement as culturally specific, leadership and grandiosity as culturally universal.

    Żemojtel-Piotrowska, Magdalena; Piotrowski, Jarosław; Rogoza, Radosław; Baran, Tomasz; Hitokoto, Hidefumi; Maltby, John

    2018-04-15

    The current study explores the problem with the lack of measurement invariance for the Narcissistic Personality Inventory (NPI) by addressing two issues: conceptual heterogeneity of narcissism and methodological issues related to the binary character of data. We examine the measurement invariance of the 13-item version of the NPI in three populations in Japan, Poland and the UK. Analyses revealed that leadership/authority and grandiose exhibitionism dimensions of the NPI were cross-culturally invariant, while entitlement/exploitativeness was culturally specific. Therefore, we proposed NPI-9 as indicating scalar invariance, and we examined the pattern of correlations between NPI-9 and other variables across three countries. The results suggest that NPI-9 is valid brief scale measuring general levels of narcissism in cross-cultural studies, while the NPI-13 remains suitable for research within specific countries. © 2018 International Union of Psychological Science.

  3. Sustainability Reporting Experience by Universities: A Causal Configuration Approach

    Zorio-Grima, Ana; Sierra-García, Laura; Garcia-Benau, Maria A.

    2018-01-01

    Purpose: The purpose of this research is to identify the combinations of factors leading to experience in sustainability reporting by Spanish public universities. Design/methodology/approach: Using a sample of 49 public universities in Spain, this paper identifies the combinations of factors on innovation profile, political and internal factors…

  4. Auctioning payment entitlements

    Nielsen, Kurt

    2005-01-01

    Payment entitlements is a new commodity that arises from the new European common agricultural policy. The agricultural subsidies are decoupled from the actual production and replaced by the so-called payment entitlements. A payment entitlement has a farm specific value and may be freely traded. T...

  5. Dual-Pump CARS Measurements in the University of Virginia's Dual-Mode Scramjet: Configuration "C"

    Cutler, Andrew D.; Magnotti, Gaetano; Cantu, Luca; Gallo, Emanuela; Danehy, Paul M.; Rockwell, Robert; Goyne, Christopher; McDaniel, James

    2013-01-01

    Measurements have been conducted at the University of Virginia Supersonic Combustion Facility in configuration C of the dual-mode scramjet. This is a continuation of previously published works on configuration A. The scramjet is hydrogen fueled and operated at two equivalence ratios, one representative of the scram mode and the other of the ram mode. Dual-pump CARS was used to acquire the mole fractions of the major species as well as the rotational and vibrational temperatures of N2. Developments in methods and uncertainties in fitting CARS spectra for vibrational temperature are discussed. Mean quantities and the standard deviation of the turbulent fluctuations at multiple planes in the flow path are presented. In the scram case the combustion of fuel is completed before the end of the measurement domain, while for the ram case the measurement domain extends into the region where the flow is accelerating and combustion is almost completed. Higher vibrational than rotational temperature is observed in those parts of the hot combustion plume where there is substantial H2 (and hence chemical reaction) present.

  6. Academic Entitlement in the Context of Learning Styles

    Andrey, Jean; Joakim, Erin; Schoner, Vivian; Hambly, Derrick; Silver, Amber; Jayasundera, Rohan; Nelson, Allen

    2012-01-01

    This study explores the linkages between students' sense of entitlement and their approaches to learning, based on survey research at a large public university in Canada. Through literature review and pilot testing, a questionnaire instrument was developed that measures four constructs: academic entitlement, deep learning, surface learning and…

  7. Academic entitlement in pharmacy education.

    Cain, Jeff; Romanelli, Frank; Smith, Kelly M

    2012-12-12

    The constructs of academic entitlement and student consumerism refer to students' attitudes toward education as a commodity and the underlying belief that as consumers, they should be catered to and given the opportunity to participate in the education process according to their preferences. Most discussions regarding these attitudes are anecdotal, but the pervasiveness of these accounts and the troubling effects that ensue warrant attention. Grade inflation, student incivility, altered classroom practices, and decreased faculty morale are all potential aftereffects of teaching students who hold academic entitlement beliefs. Numerous factors are posited as attributing to academic entitlement including personal issues, societal pressures, and broad academic practices. This paper discusses these factors and offers faculty members and administrators recommendations regarding practices that may curb or alleviate issues associated with academically entitled students.

  8. 43 CFR 426.5 - Ownership entitlement.

    2010-10-01

    ... nonexempt land; (ii) Married couples who hold equal interests are entitled to receive irrigation water on a... entitled to receive irrigation water on that land owned jointly in marriage up to a maximum of 320 acres of... tenant, provided each tenant holds an equal interest in the tenancy; (vi) Partnerships subject to prior...

  9. Measurement of Psychological Entitlement in 28 Countries

    Żemojtel-Piotrowska, M.; Piotrowski, J.; Cieciuch, J.; Calogero, R.M.; Van Hiel, A.; Argentero, P.; Baltatescu, S.; Baran, T.; Bardhwaj, G.; Bukowski, M.; Chargazia, M.; Clinton, A.; Halik, M.H.; Ilisko, D.; Khachatryan, N.; Klicperová-Baker, Martina; Košťál, Jaroslav; Kovacs, M.; Letovancova, E.; Liik, K.; Marganski, A.; Michałowski, J.; Nord, I.; Paspalanova, E.; de Leon, P.P.; Techera, J.; Rojas, M.; Różycka, J.; Sawicka, A.; Seibt, B.; Semkiv, I.; Tiliouine, H.; Truong, H.K.; Van den Bos, K.; Wills-Herrera, E.

    2017-01-01

    Roč. 33, č. 3 (2017), s. 207-217 ISSN 1015-5759 R&D Projects: GA ČR GA15-11062S Institutional support: RVO:68081740 Keywords : psychological entitlement * Entitlement Attitudes Questionnaire * cross-cultural research * measurement invariance Subject RIV: AN - Psychology OBOR OECD: Psychology (including human - machine relations) Impact factor: 2.328, year: 2016 http://econtent.hogrefe.com/doi/abs/10.1027/1015-5759/a000286

  10. Academic Entitlement and Academic Performance in Graduating Pharmacy Students

    Jeffres, Meghan N.; Barclay, Sean M.; Stolte, Scott K.

    2014-01-01

    Objectives. To determine a measurable definition of academic entitlement, measure academic entitlement in graduating doctor of pharmacy (PharmD) students, and compare the academic performance between students identified as more or less academically entitled.

  11. Between availability and entitlement: The Constitution, Grootboom ...

    Between availability and entitlement: The Constitution, Grootboom and the right to food. Danie Brand. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians ...

  12. 38 CFR 21.3045 - Entitlement charges.

    2010-07-01

    ...) VOCATIONAL REHABILITATION AND EDUCATION Survivors' and Dependents' Educational Assistance Under 38 U.S.C...) Entitlement charges for elementary and secondary education. (1) When an eligible spouse or surviving spouse is... of the course or courses as a result of being— (A) Ordered, in connection with the Persian Gulf War...

  13. Tax treaty entitlement issues concerning dual residents

    Sanghavi, D.

    2014-01-01

    The question whether a dual resident taxpayer is entitled to tax treaties concluded by each residence state with a third state has been controversial. Since 2008, the Organisation for Economic Co-operation and Development (OECD) Commentary on Article 4(1) of the OECD Model states that such a

  14. Rights as entitlements and rights as claims

    Azevedo, Marco Antônio Oliveira de

    2010-01-01

    Full Text Available Há pelo menos dois registros diferentes sobre o significado de “direitos”. Segundo um deles, os direitos são relações entre dois termos: uma pessoa e um bem; para o outro, os direitos são relações entre três termos: um indivíduo, uma pessoa e uma ação ou algo. Os registros são diferentes, mas não são totalmente incompatíveis. De acordo com a interpretação de direitos como entitlements, trata-se de direitos morais ou legais, ou seja, as relações de ordem moral ou jurídica das pessoas com bens (de benefícios concedidos a pessoas por uma lei humana, moral ou legal. Como uma espécie de direitos, os direitos humanos são vistos como direitos (entitlements das pessoas ou dos indivíduos a bens essenciais, dos quais podem-se inferir reivindicações (claims contra outras pessoas ou contra governos e representantes. Falamos sobre direitos humanos geralmente desta forma. Mas de acordo com o outro registro, os direitos em sentido próprio têm que ser interpretados como claims. Neste artigo, pretendo apresentar alguns argumentos em favor da vantagem de expor todos os enunciados significativos dos direitos como entitlements em termos explícitos de claims

  15. Entitlement and organizational behaviors: the moderating role of narcissism

    Agata Szalkowska

    2015-10-01

    Full Text Available Background The purpose of this study was to investigate the relationship between psychological entitlement (active, passive, and revenge, narcissism and two types of organizational behaviors in employees. Interactions between narcissism and psychological entitlement as predictors of organizational citizenship behaviors (OCB and counterproductive work behaviors (CWB were explored. Predictors were analyzed in an effort to determine whether psychological entitlement plays a more destructive role among narcissistic employees than among non-narcissistic ones and whether the effects of narcissism on OCB and CWB are mediated by entitlement. Participants and procedure Data were obtained from 100 employees (34% men aged 22 to 59 years (M = 37.00, SD = 9.30 from public and private companies. Participants were asked to complete the Organizational Citizenship Behavior Scale (OCBS, the Counterproductive Organizational Behaviors Scale (COBS, the Entitlement Questionnaire, and the Narcissistic Personality Inventory (NPI. Results Positive aspects of entitlement were positively associated with OCB only among narcissistic employees, and active entitlement mediated the effects of narcissism on CWB. Active entitlement was negatively related to CWB. Negative aspects of entitlement were negatively related to OCB and unrelated to CWB. Conclusions This study provides evidence for positive (healthy aspects of entitlement for organizations. The unexpected interaction between narcissism and entitlement in predicting higher levels of OCB suggests that among narcissistic employees, healthy aspects of entitlement are desirable and profitable for an organization. Psychological entitlement was observed to be an important predictor of organizational behaviors beyond narcissism itself.

  16. Reforming Equalization: Balancing Efficiency, Entitlement and Ownership

    Bev Dahlby

    2014-08-01

    Full Text Available In this paper, we provide an overview of the equalization grant system in Canada and the issues that have been raised concerning the reform of the fiscal transfer system. Any reforms to the equalization grant system have to balance three concerns — “efficiency” effects that arise through federal financing of transfers, and the incentive effects on provincial fiscal policies, “entitlement” to reasonably comparable public services at reasonably comparable levels of taxation, and “ownership” of resources and independence of fiscal policies by provincial governments. Five proposals for reform of the equalization system are discussed. With regard to the inclusion rate for resource revenues in equalization formula, we argue that the rate should be reduced from 50 per cent to 25 per cent and that ceiling on total equalization payments should be eliminated. We argue against the proposal to exempt from the calculation of equalization entitlements that are deposited in provincial sovereign wealth funds because this would not reduce total equalization entitlements in present value terms, it would be complex to implement if it extended to all forms of savings by provinces (such as debt reduction, and it would not alter the resource rich provinces’ incentives to save more of their resource revenues. We argue against a proposal to reduce CHT and CST to provinces with above average fiscal capacities because this would reduce their incentive to develop and tax their resources, and it would be counter to the purpose of these block grants, which is to reduce the vertical fiscal imbalance between the federal and the provincial governments. We review the Gusen (2012a proto-type model for incorporating variations in costs and needs in the computation of the equalization entitlements and argue that this procedure seems feasible and merits further analysis.

  17. Configuration Management

    Morcos, A.; Taylor, H. S.

    1989-01-01

    This paper will briefly discuss the reason for and content of configuration management both for new plants and, when adapted, for older plants. It will then address three types of activities a utility may undertake as part of a nuclear CAM program and with which Sargent and Leyden has been actively involved. The first activity is a methodology for preparing design-basis documentation. The second is the identification of essential data required to be kept by the utility in support of the operation of a nuclear plant. The third activity is a computerized classification system of plant components, allowing ready identification of plant functional and physical characteristics. Plant configuration documentation describes plant components, the ways they arranged to interact, and the ways they are enabled to interact. Configuration management, on the other hand, is more than the control of such documentation. It is a dynamic process for ensuring that a plant configuration meets all relevant requirements for safety and economy, even while the configuration changes and even while the requirements change. Configuration management for a nuclear plant is so complex that it must be implemented in phases and modules. It takes advantage of and integrates existing programs. Managing complexity and streamlining the change process become important additional objectives of configuration management. The example activities fulfill essential goals of an overall CAM program: definition of design baseline, definition of essential plant data, and classification of plant components

  18. 42 CFR 31.11 - Persons entitled to treatment.

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Persons entitled to treatment. 31.11 Section 31.11... § 31.11 Persons entitled to treatment. To the extent and under the circumstances prescribed in this part, the following persons shall be entitled to medical, surgical, and dental treatment and...

  19. 20 CFR 725.219 - Duration of entitlement; child.

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Duration of entitlement; child. 725.219... of entitlement; child. (a) An individual is entitled to benefits as a child for each month beginning... month in which any one of the following events first occurs: (1) The child dies; (2) The child marries...

  20. 20 CFR 725.218 - Conditions of entitlement; child.

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Conditions of entitlement; child. 725.218... Conditions of entitlement; child. (a) An individual is entitled to benefits where he or she meets the... the child of a deceased miner who: (1) Was receiving benefits under section 415 or part C of title IV...

  1. 20 CFR 410.212 - Conditions of entitlement; child.

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Conditions of entitlement; child. 410.212...; Filing of Claims and Evidence § 410.212 Conditions of entitlement; child. (a) An individual is entitled to benefits if such individual: (1) Is the child or stepchild (see § 410.330) of (i) a deceased miner...

  2. 20 CFR 410.213 - Duration of entitlement; child.

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Duration of entitlement; child. 410.213...; Filing of Claims and Evidence § 410.213 Duration of entitlement; child. (a) An individual is entitled to benefits as a child for each month beginning with the first month in which all of the conditions of...

  3. Learning Based on the Project Entitled "Design and Construction of a Wooden Bridge"

    Barris, Cristina; Torres, Lluís; Simon, Enric

    2016-01-01

    This article presents the results of a case involving the application of project-based learning carried out with students in the Mechanical Engineering degree program at the University of Girona. The project, entitled "Design and construction of a wooden bridge", was conducted at the Polytechnic School in the third-year Structures…

  4. Language configurations of degree-related denotations in the spoken production of a group of Colombian EFL university students: A corpus-based study

    Wilder Yesid Escobar

    2015-05-01

    Full Text Available Recognizing that developing the competences needed to appropriately use linguistic resources according to contextual characteristics (pragmatics is as important as the cultural-imbedded linguistic knowledge itself (semantics and that both are equally essential to form competent speakers of English in foreign language contexts, we feel this research relies on corpus linguistics to analyze both the scope and the limitations of the sociolinguistic knowledge and the communicative skills of English students at the university level. To such end, a linguistic corpus was assembled, compared to an existing corpus of native speakers, and analyzed in terms of the frequency, overuse, underuse, misuse, ambiguity, success, and failure of the linguistic parameters used in speech acts. The findings herein describe the linguistic configurations employed to modify levels and degrees of descriptions (salient sematic theme exhibited in the EFL learners´ corpus appealing to the sociolinguistic principles governing meaning making and language use which are constructed under the social conditions of the environments where the language is naturally spoken for sociocultural exchange.

  5. Can a sense of entitlement increase stealing?

    Gravert, Christina Annette

    Are people more likely to steal when the payoff they deserve is determined randomly or when it depends on their performance in a difficult task? In this paper I investigate how the probability of stealing is affected by the way in which payoff is earned. After answering a short survey one group...... to take the (undeserved) maximum payoff than the participants in the random payment scheme. In contrast to previous findings in the cheating literature, stealing is an all-or-nothing decision rather than a trade-off between a slightly higher payoff and the desire to keep ones moral values intact....... The results support the theory that unethical behavior is increased by a sense of entitlement, which is more pronounced when wealth depends on performance than on the roll of a die....

  6. Agentic and communal narcissism and satisfaction with life: The mediating role of psychological entitlement and self-esteem.

    Żemojtel-Piotrowska, Magdalena A; Piotrowski, Jarosław P; Maltby, John

    2017-10-01

    This study examined the mediational role of self-esteem (as an enhancement) and psychological entitlement (as a cost) in the relationship between an agentic-communal model of grandiose narcissism and satisfaction with life. Two hundred and forty-eight university undergraduate students completed measures of agentic and communal narcissism, self-esteem, psychological entitlement and satisfaction with life. The findings suggest that there is support for the usefulness of the agentic-communal model of narcissism, and, consistent with predictions in the wider literature, self-esteem and psychological entitlement mediated the relationship between agentic-communal narcissism and life satisfaction. © 2015 International Union of Psychological Science.

  7. Configuration management

    Beavers, R.R.; Sumiec, K.F.

    1989-01-01

    Increasing regulatory and industry attention has been focused on properly controlling electrical design changes. These changes can be controlled by using configuration management techniques. Typically, there are ongoing modifications to various process systems or additions due to new requirements at every power plant. Proper control of these changes requires that an organized method be used to ensure that all important parameters of the electrical auxiliary systems are analyzed and that these parameters are evaluated accurately. This process, commonly referred to as configuration management, is becoming more important on both fossil and nuclear plants. Recent NRC- and utility-initiated inspections have identified problems due to incomplete analysis of changes to electrical auxiliary systems at nuclear stations

  8. Teaching Rational Entitlement and Responsibility: A Socratic Exercise

    David Godden

    2014-02-01

    Full Text Available The paper reports on a Socratic exercise that introduces participants to the norm of rational entitlement, as distinct from political entitlement, and the attendant norm of rational responsibility. The exercise demonstrates that, because participants are not willing to exchange their own opinion at random for another differing opinion to which the owner is, by the participants’ own admission, entitled, they treat their entitlement to their own opinion differently, giving it a special status. This gives rise to rational obligations such as the obligation to provide reasons, and a willingness to risk those opinions to the force of the better reason.

  9. A Longitudinal Study of Sexual Entitlement and Self-Efficacy among Young Women and Men: Gender Differences and Associations with Age and Sexual Experience

    Gillian Hewitt-Stubbs

    2016-01-01

    Full Text Available Many scholars have called for an increased focus on positive aspects of sexual health and sexuality. Using a longitudinal design with two assessments, we investigated patterns of entitlement to sexual partner pleasure and self-efficacy to achieve sexual pleasure among 295 young men and women aged 17–25 years attending one Australian university. We also tested whether entitlement and efficacy differed by gender, and hypothesized that entitlement and efficacy would be higher in older participants and those with more sexual experience. A sense of entitlement to sexual partner pleasure increased significantly over the year of the study, whereas, on average, there was no change in self-efficacy over time. At Time 1 (T1, young women reported more entitlement than young men. Age was positively associated with T1 entitlement, and experience with a wider range of partnered sexual behaviors was concurrently associated with more entitlement and efficacy and was also associated with increased entitlement to partner pleasure and increased self-efficacy in achieving sexual pleasure at T2 relative to T1. A group with the least amount of sexual experience was particularly low in entitlement and efficacy when compared to groups with a history of coital experience. There was no evidence that any association differed between young men and young women. Limitations of the study include a sample of predominantly middle class, Caucasian students at one university and the possibility that students more interested in sex and relationships, and with more sexual experience, chose to participate.

  10. A Longitudinal Study of Sexual Entitlement and Self-Efficacy among Young Women and Men: Gender Differences and Associations with Age and Sexual Experience

    Hewitt-Stubbs, Gillian; Zimmer-Gembeck, Melanie J.; Mastro, Shawna; Boislard, Marie-Aude

    2016-01-01

    Many scholars have called for an increased focus on positive aspects of sexual health and sexuality. Using a longitudinal design with two assessments, we investigated patterns of entitlement to sexual partner pleasure and self-efficacy to achieve sexual pleasure among 295 young men and women aged 17–25 years attending one Australian university. We also tested whether entitlement and efficacy differed by gender, and hypothesized that entitlement and efficacy would be higher in older participants and those with more sexual experience. A sense of entitlement to sexual partner pleasure increased significantly over the year of the study, whereas, on average, there was no change in self-efficacy over time. At Time 1 (T1), young women reported more entitlement than young men. Age was positively associated with T1 entitlement, and experience with a wider range of partnered sexual behaviors was concurrently associated with more entitlement and efficacy and was also associated with increased entitlement to partner pleasure and increased self-efficacy in achieving sexual pleasure at T2 relative to T1. A group with the least amount of sexual experience was particularly low in entitlement and efficacy when compared to groups with a history of coital experience. There was no evidence that any association differed between young men and young women. Limitations of the study include a sample of predominantly middle class, Caucasian students at one university and the possibility that students more interested in sex and relationships, and with more sexual experience, chose to participate. PMID:26797642

  11. Entitlement Attitudes Predict Students' Poor Performance in Challenging Academic Conditions

    Anderson, Donna; Halberstadt, Jamin; Aitken, Robert

    2013-01-01

    Excessive entitlement--an exaggerated or unrealistic belief about what one deserves--has been associated with a variety of maladaptive behaviors, including a decline in motivation and effort. In the context of tertiary education, we reasoned that if students expend less effort to obtain positive outcomes to which they feel entitled, this should…

  12. 42 CFR 31.2 - Persons entitled to treatment.

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Persons entitled to treatment. 31.2 Section 31.2... Public Health Service § 31.2 Persons entitled to treatment. To the extent and under the circumstances... treatment and hospitalization by the Service: (a) Coast Guard. (1) Commissioned officers, chief warrant...

  13. Personality, Self-Regulated Learning, and Academic Entitlement

    McLellan, Chelsea K.; Jackson, Dennis L.

    2017-01-01

    The current study explored the relation between the Big-Five personality domains, self-regulated learning, and academic entitlement. Academic entitlement is defined as the tendency to possess expectations of unearned academic success, unearned/undeserved academic services, and/or the expectation of unrealistic accommodation (Chowning and Campbell…

  14. Academic Entitlement and Its Relationship with Perception of Cheating Ethics

    Elias, Rafik Z.

    2017-01-01

    Cheating is an epidemic in higher education. The author examined the psychological variable of academic entitlement and its relationship with the ethical perception of cheating using a sample of business students. Contrary to some previous research, the author found that millennials were only slightly more academically entitled than students from…

  15. Local solutions of harmonical and Bi-harmonical equations, universal field equation and self-dual configurations of Yang-Mills fields in four dimensions

    Leznov, A.N.

    1994-01-01

    A general method for the construction of solutions of the d'Alamberian and double d'Alamberian (harmonic and bi-harmonic) equations with local dependence of arbitrary functions upon two independent arguments is proposed. The connection between solutions of this kind and self-dual configurations of gauge fields having no singularities is established. 5 refs

  16. A Software Configuration Management Course

    Asklund, U.; Bendix, Lars Gotfred

    2003-01-01

    Software Configuration Management has been a big success in research and creation of tools. There are also many vendors in the market of selling courses to companies. However, in the education sector Software Configuration Management has still not quite made it - at least not into the university...... curriculum. It is either not taught at all or is just a minor part of a general course in software engineering. In this paper, we report on our experience with giving a full course entirely dedicated to Software Configuration Management topics and start a discussion of what ideally should be the goal...

  17. Initial Design of the 60 Megawatt Rotating Magnetic Field (RMF) Oscillator System for the University of Washington ''TCS'' Field Reversed Configuration Experiment

    Reass, W.A.; Miera, D.A.; Wurden, G.A.

    1997-01-01

    This paper presents the initial electrical and mechanical design of two phase-locked 30 Megawatt RMS, 150 kHz oscillator systems used for current drive and plasma sustainment of the ''Translation, Confinement, and Sustainment'' (TCS) field reversed configuration (FRC) plasma. By the application of orthogonally-placed saddle coils on the surface of the glass vacuum vessel, the phase-controlled rotating magnetic field perturbation will induce an electric field in the plasma which should counter the intrinsic ohmic decay of the plasma, and maintain the FRC. Each system utilizes a bank of 6 parallel magnetically beamed ML8618 triodes. These devices are rated at 250 Amperes cathode current and a 45 kV plate voltage. An advantage of the magnetically beamed triode is their extreme efficiency, requiring only 2.5 kW of filament and a few amps and a few kV of grid drive. Each 3.5 uH saddle coil is configured with an adjustable tank circuit (for tuning). Assuming no losses and a nominal 18 kV plate voltage, the tubes can circulate about 30 kV and 9 kA (pk to pk) in the saddle coil antenna, a circulating power of over 33 megawatts RMS. On each cycle the tubes can kick in up to 1500 Amperes, providing a robust phase control. DC high-voltage from the tubes is isolated from the saddle coil antennas and tank circuits by a 1:1 coaxial air-core balun transformer. To control the ML8618's phase and amplitude, fast 150 Ampere ''totem-pole'' grid drivers, an ''on'' hot-deck and an ''off'' hot-deck are utilized. The hot-decks use up to 6 each 3CPX1500A7 slotted radial beam triodes. By adjusting the conduction angle, amplitude may be regulated, with inter-pulse timing, phase angle can be controlled. A central feedback timing chassis monitors each systems' saddle coil antenna and appropriately derives each systems timing signals. Fiber-optic cables are used to isolate between the control room timing chassis and the remote power oscillator system. Complete system design detail will be

  18. Social policy and entitlements : a proposal for reform

    Nentjes, Andries; Meijer, G; Heijman, WJM; VanOphem, JAC; Verstegen, BHJ

    2006-01-01

    Welfare states citizens have entitlements to a variety of social services provided for free or a price far below cost, such as education, health care, social security and housing. Every citizen benefits, but in their present organisation the social services also have major deficiencies: lack of

  19. Safe water: an enquiry into water entitlements and human rights

    Gaay Fortman, B. de

    2006-01-01

    Privatisation of water delivery is a human rights issue in two distinct ways. Firstly, it implies an institutional change that will tend to impinge on existing access to water. While basic water entitlements are supposed to be protected by human rights law, this is likely to influence

  20. Intellectual Freedom and Economic Sufficiency as Educational Entitlements.

    Morse, Jane Fowler

    2001-01-01

    Using the theories of John Stuart Mill and Karl Marx, this article supports the educational entitlements of intellectual freedom and economic sufficiency. Explores these issues in reference to their implications for teaching, the teaching profession and its training. Concludes that ideas cannot be controlled by the interests of the dominant class.…

  1. 21 CFR 1.401 - Who is entitled to appeal?

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Who is entitled to appeal? 1.401 Section 1.401 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GENERAL ENFORCEMENT REGULATIONS Administrative Detention of Food for Human or Animal Consumption What Is the Appeal...

  2. Review Article: Revisiting the Entitlement Approach to Famine ...

    Sen's (1981b) entitlement approach conceptualises famine as the characteristics of some people not having enough food to eat but not of there being not enough food to eat. Famine from this perspective is one that occurs without a decline in the macro level supply of food and, hence, it is all about demand failure/shift in the ...

  3. 75 FR 52619 - Entitlement and Termination Requirements for Stepchildren

    2010-08-27

    ... site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: Electronic... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 404 [Docket No. SSA-2006-0154] RIN 0960-AF78 Entitlement and Termination Requirements for Stepchildren AGENCY: Social Security Administration. ACTION...

  4. Cover Letter Dear Editor, Please find enclosed a paper entitled ...

    Ajamein

    Dear Editor,. Please find enclosed a paper entitled ' Intrinsic Kinetics of Fischer- Tropsch Synthesis Over a. Promoted Iron Catalyst '. I am submitting to your journal to be considered for publication as a research paper in Bulletin of the Chemical Society of Ethiopia. The manuscript has not been previously published, is not ...

  5. Robert Nozick's entitlement theory of justice: a critique | Nnajiofor ...

    The burden of this paper is to critique Robert Nozick's entitlement theory of justice which was drafted as an argument against traditional distribution theories. Nozick's theory of justice claims that whether a distribution is just or not depend entirely on how it came about. By contrast, justice according to equality, need, desert or ...

  6. 20 CFR 410.214 - Conditions of entitlement; parent, brother, or sister.

    2010-04-01

    ... entitlement to brother's benefits may be established for any month before January 1973, based on a disability... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Conditions of entitlement; parent, brother...; Duration of Entitlement; Filing of Claims and Evidence § 410.214 Conditions of entitlement; parent, brother...

  7. Universe

    2009-01-01

    The Universe, is one book in the Britannica Illustrated Science Library Series that is correlated to the science curriculum in grades 5-8. The Britannica Illustrated Science Library is a visually compelling set that covers earth science, life science, and physical science in 16 volumes.  Created for ages 10 and up, each volume provides an overview on a subject and thoroughly explains it through detailed and powerful graphics-more than 1,000 per volume-that turn complex subjects into information that students can grasp.  Each volume contains a glossary with full definitions for vocabulary help and an index.

  8. Intelligent Universe

    Hoyle, F

    1983-01-01

    The subject is covered in chapters, entitled: chance and the universe (synthesis of proteins; the primordial soup); the gospel according to Darwin (discussion of Darwin theory of evolution); life did not originate on earth (fossils from space; life in space); the interstellar connection (living dust between the stars; bacteria in space falling to the earth; interplanetary dust); evolution by cosmic control (microorganisms; genetics); why aren't the others here (a cosmic origin of life); after the big bang (big bang and steady state); the information rich universe; what is intelligence up to; the intelligent universe.

  9. Software configuration management

    Arribas Peces, E.; Martin Faraldo, P.

    1993-01-01

    Software Configuration Management is directed towards identifying system configuration at specific points of its life cycle, so as to control changes to the configuration and to maintain the integrity and traceability of the configuration throughout its life. SCM functions and tasks are presented in the paper

  10. Conceptualizing Embedded Configuration

    Oddsson, Gudmundur Valur; Hvam, Lars; Lysgaard, Ole

    2006-01-01

    and services. The general idea can be named embedded configuration. In this article we intend to conceptualize embedded configuration, what it is and is not. The difference between embedded configuration, sales configuration and embedded software is explained. We will look at what is needed to make embedded...... configuration systems. That will include requirements to product modelling techniques. An example with consumer electronics will illuminate the elements of embedded configuration in settings that most can relate to. The question of where embedded configuration would be relevant is discussed, and the current...

  11. Wealth and the inflated self: class, entitlement, and narcissism.

    Piff, Paul K

    2014-01-01

    Americans may be more narcissistic now than ever, but narcissism is not evenly distributed across social strata. Five studies demonstrated that higher social class is associated with increased entitlement and narcissism. Upper-class individuals reported greater psychological entitlement (Studies 1a, 1b, and 2) and narcissistic personality tendencies (Study 2), and they were more likely to behave in a narcissistic fashion by opting to look at themselves in a mirror (Study 3). Finally, inducing egalitarian values in upper-class participants decreased their narcissism to a level on par with their lower-class peers (Study 4). These findings offer novel evidence regarding the influence of social class on the self and highlight the importance of social stratification to understanding basic psychological processes.

  12. What Are Occupational Pension Plan Entitlements Worth in Britain?

    Disney, Richard; Whitehouse, Edward

    1996-01-01

    The acquisition of rights by workers in private pension plans underpins retirement behavior, recruitment policy, and wage structure but there is controversy as to how these individual pension rights should be valued. The paper combines four data-sets to calculate pension entitlements for a sample of 3,000 British workers in 1987. Expected scheme tenure is a key variable in valuation; younger workers and women face greater initial uncertainty as to their pension outcomes, which is resolved as ...

  13. Water temperature data collected from water temperature logger at 5 locations in Narraganset Bay by Roger Williams University is support of the grant entitled "Could Diseases of Blue Mussels affect commercial culture in the Northeast?" from 2015-05-21 to 2015-12-09 (NCEI Accession 0162404)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset contains water temperature measurements. Data were collected at 5 Narraganset Bay locations: Arnold Point, Roger Williams University Dock, Dyer Island,...

  14. Universal appeal of how it all started

    Grattan, G

    2002-01-01

    Our current understanding of how the universe was created is being explained in an interactive exhibition developed by PPARC, entitled 'Building the Universe', which opened in the Odyssey, Belfast today.

  15. A REVIEW OF ENGLISH TEXTBOOK ENTITLED "SKILLFUL: READING AND WRITING, STUDENT'S BOOK 1" BY DAVID BOHLKE AND DOROTHY ZEMACH

    Thunyalak Polsuk; Nutprapha K. Dennis, Ph.D

    2017-01-01

    This study aims to evaluate the usefulness of a commercial textbook entitle “Skillful: Reading & Writing, Student’s Book 1”, written by David Bohlke with Dorothy E. Zemach as a series consultant, published by Macmillan publisher. The study also explores the appropriateness for considering to teaching university EFL students. The result of this study assists English teachers in choosing textbooks which will be most appropriate to the learners at various level to develop their reading and writi...

  16. A unix configuration engine

    Burgess, M.

    1994-06-01

    A high level description language is presented for the purpose of automatically configuring large heterogeneous networked unix environments, based on class-oriented abstractions. The configuration engine is portable and easily extensible

  17. MICROCONTROLLER PIN CONFIGURATION TOOL

    Bhaskar Joshi; F. Mohammed Rizwan; Dr. Rajashree Shettar

    2012-01-01

    Configuring the micro controller with large number of pins is tedious. Latest Infine on microcontroller contains more than 200 pins and each pin has classes of signals. Therefore the complexity of the microcontroller is growing. It evolves looking into thousands of pages of user manual. For a user it will take days to configure the microcontroller with the peripherals. We need an automated tool to configure the microcontroller so that the user can configure the microcontroller without having ...

  18. Operational Dynamic Configuration Analysis

    Lai, Chok Fung; Zelinski, Shannon

    2010-01-01

    Sectors may combine or split within areas of specialization in response to changing traffic patterns. This method of managing capacity and controller workload could be made more flexible by dynamically modifying sector boundaries. Much work has been done on methods for dynamically creating new sector boundaries [1-5]. Many assessments of dynamic configuration methods assume the current day baseline configuration remains fixed [6-7]. A challenging question is how to select a dynamic configuration baseline to assess potential benefits of proposed dynamic configuration concepts. Bloem used operational sector reconfigurations as a baseline [8]. The main difficulty is that operational reconfiguration data is noisy. Reconfigurations often occur frequently to accommodate staff training or breaks, or to complete a more complicated reconfiguration through a rapid sequence of simpler reconfigurations. Gupta quantified a few aspects of airspace boundary changes from this data [9]. Most of these metrics are unique to sector combining operations and not applicable to more flexible dynamic configuration concepts. To better understand what sort of reconfigurations are acceptable or beneficial, more configuration change metrics should be developed and their distribution in current practice should be computed. This paper proposes a method to select a simple sequence of configurations among operational configurations to serve as a dynamic configuration baseline for future dynamic configuration concept assessments. New configuration change metrics are applied to the operational data to establish current day thresholds for these metrics. These thresholds are then corroborated, refined, or dismissed based on airspace practitioner feedback. The dynamic configuration baseline selection method uses a k-means clustering algorithm to select the sequence of configurations and trigger times from a given day of operational sector combination data. The clustering algorithm selects a simplified

  19. 75 FR 68035 - Proposed Information Collection (Evidence for Transfer of Entitlement of Education Benefits...

    2010-11-04

    ... (Evidence for Transfer of Entitlement of Education Benefits) Activity: Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Benefits... receive education benefits under the transfer of entitlement provision of law. Affected Public...

  20. 78 FR 59772 - Proposed Information Collection (Evidence for Transfer of Entitlement of Education Benefits...

    2013-09-27

    ... (Evidence for Transfer of Entitlement of Education Benefits) Activity: Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Benefits... receive education benefits under the transfer of entitlement provision of law. Affected Public...

  1. 78 FR 46418 - Proposed Information Collection (Obligation To Report Factors Affecting Entitlement) Activity...

    2013-07-31

    ... (Obligation To Report Factors Affecting Entitlement) Activity; Comment Request AGENCY: Veterans Benefits... use of other forms of information technology. Title: Obligation to Report Factors Affecting... entitlement factors. Individual factors such as income, marital status, and the beneficiary's number of...

  2. Social Vulnerability to Climate Change and the Architecture of Entitlements

    Adger, W.N.; Kelly, P.M.

    1999-01-01

    The objective of this paper is to outline a conceptual model of vulnerability to climate change as the first step in appraising and understanding the social and economic processes which facilitate and constrain adaptation. Vulnerability as defined here pertains to individuals and social groups. It is the state of individuals, of groups, of communities defined in terms of their ability to cope with and adapt to any external stress placed on their livelihoods and well-being. This proposed approach puts the social and economic well-being of society at the centre of the analysis, thereby reversing the central focus of approaches to climate impact assessment based on impacts on and the adaptability of natural resources or ecosystems and which only subsequently address consequences for human well-being. The vulnerability or security of any group is determined by the availability of resources and, crucially, by the entitlement of individuals and groups to call on these resources. This perspective extends the concept of entitlements developed within neoclassical and institutional economics. Within this conceptual framework, vulnerability can be seen as a socially-constructed phenomenon influenced by institutional and economic dynamics. The study develops proxy indicators of vulnerability related to the structure of economic relations and the entitlements which govern them, and shows how these can be applied to a District in coastal lowland Vietnam. This paper outlines the lessons of such an approach to social vulnerability for the assessment of climate change at the global scale. We argue that the socio-economic and biophysical processes that determine vulnerability are manifest at the local, national, regional and global level but the state of vulnerability itself is associated with a specific population. Aggregation one level to another is therefore not appropriate and global-scale analysis is meaningful only in so far as it deals with the vulnerability of the global

  3. 20 CFR 408.816 - When does SVB entitlement end due to death?

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When does SVB entitlement end due to death? 408.816 Section 408.816 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Suspensions and Terminations Termination § 408.816 When does SVB entitlement end due to death? Your SVB entitlement ends wit...

  4. Academic Entitlement: Relations to Perceptions of Parental Warmth and Psychological Control

    Turner, Lisa A.; McCormick, Wesley H.

    2018-01-01

    Academic entitlement characterises students who expect positive academic outcomes without personal effort. The current study examined the relations of perceived parental warmth and parental psychological control with two dimensions of academic entitlement (i.e., entitled expectations and externalised responsibility) among college students.…

  5. HLT configuration management system

    Daponte, Vincenzo

    2015-01-01

    The CMS High Level Trigger (HLT) is implemented running a streamlined version of the CMS offline reconstruction software running on thousands of CPUs. The CMS software is written mostly in C++, using Python as its configuration language through an embedded CPython interpreter. The configuration of each process is made up of hundreds of modules, organized in sequences and paths. As an example, the HLT configurations used for 2011 data taking comprised over 2200 different modules, organized in more than 400 independent trigger paths. The complexity of the HLT configurations and the large number of configuration produced require the design of a suitable data management system. The present work describes the designed solution to manage the considerable number of configurations developed and to assist the editing of new configurations. The system is required to be remotely accessible and OS-independent as well as easly maintainable easy to use. To meet these requirements a three-layers architecture has been choose...

  6. Between Soft Legality and Strong Legitimacy : A Political Economy Approach to the Struggle for Basic Entitlements to Safe Water and Sanitation

    de Gaay Fortman, B.|info:eu-repo/dai/nl/068346581; Marcatelli, M.

    2015-01-01

    This article argues that the internationally declared “human right to safe water and sanitation,” although characterized by soft legality, may yet support universal access to such basic entitlements by virtue of its strong legitimacy. From a strategic perspective, human rights do indeed provide

  7. Runaway universe

    Davies, P

    1978-01-01

    The subject is covered in chapters entitled: the emerging universe (general introduction, history of astronomical and cosmological research, origins, the expanding universe, stars, galaxies, electromagnetic radiation); primeval fire (the big bang model, origin of the elements, properties of the elements and of sub-atomic particles); order out of chaos (galactic evolution, star formation, nuclear fusion, the solar system, origin of life on Earth); a star called Sol (properties of the sun and of other stars); life in the universe; the catastrophe principle (the rise and fall of cosmic order); stardoom (star evolution, neutron stars); black holes and superholes (gravitational collapse); technology and survival; the dying universe (second law of thermodynamics); worlds without end (cosmological models).

  8. Software configuration management

    Keyes, Jessica

    2004-01-01

    Software Configuration Management discusses the framework from a standards viewpoint, using the original DoD MIL-STD-973 and EIA-649 standards to describe the elements of configuration management within a software engineering perspective. Divided into two parts, the first section is composed of 14 chapters that explain every facet of configuration management related to software engineering. The second section consists of 25 appendices that contain many valuable real world CM templates.

  9. CONFIGURATION GENERATOR MODEL

    Alsaed, A.

    2004-01-01

    ''The Disposal Criticality Analysis Methodology Topical Report'' prescribes an approach to the methodology for performing postclosure criticality analyses within the monitored geologic repository at Yucca Mountain, Nevada. An essential component of the methodology is the ''Configuration Generator Model for In-Package Criticality'' that provides a tool to evaluate the probabilities of degraded configurations achieving a critical state. The configuration generator model is a risk-informed, performance-based process for evaluating the criticality potential of degraded configurations in the monitored geologic repository. The method uses event tree methods to define configuration classes derived from criticality scenarios and to identify configuration class characteristics (parameters, ranges, etc.). The probabilities of achieving the various configuration classes are derived in part from probability density functions for degradation parameters. The NRC has issued ''Safety Evaluation Report for Disposal Criticality Analysis Methodology Topical Report, Revision 0''. That report contained 28 open items that required resolution through additional documentation. Of the 28 open items, numbers 5, 6, 9, 10, 18, and 19 were concerned with a previously proposed software approach to the configuration generator methodology and, in particular, the k eff regression analysis associated with the methodology. However, the use of a k eff regression analysis is not part of the current configuration generator methodology and, thus, the referenced open items are no longer considered applicable and will not be further addressed

  10. Ansible configuration management

    Hall, Daniel

    2013-01-01

    Ansible Configuration Management"" is a step-by-step tutorial that teaches the use of Ansible for configuring Linux machines.This book is intended for anyone looking to understand the basics of Ansible. It is expected that you will have some experience of how to set up and configure Linux machines. In parts of the book we cover configuration files of BIND, MySQL, and other Linux daemons, therefore a working knowledge of these would be helpful but are certainly not required.

  11. Configuration management at NEK

    Podhraski, M.

    1999-01-01

    Configuration Management (CM) objectives at NEK are to ensure consistency between Design Requirements, Physical Plant Configuration and Configuration Information. Software applications, supporting Design Change, Work Control and Document Control Processes, are integrated in one module-oriented Management Information System (MIS). Master Equipment Component List (MECL) database is central MIS module. Through a combination of centralized database and process migrated activities it is ensured that the CM principles and requirements (accurate, current design data matching plant's physical configuration while complying to applicable requirements), are followed and fulfilled.(author)

  12. Employee entitlements during pregnancy and maternal psychological well-being.

    Cooklin, Amanda R; Rowe, Heather J; Fisher, Jane R W

    2007-12-01

    Antenatal psychological well-being is multifactorially determined, including by social circumstances. Evidence suggests that workplace conditions are salient determinants of mental health, but it is not known whether employment conditions influence antenatal psychological well-being. To investigate the relationship between employment conditions and antenatal psychological well-being in Australian women. A sociodemographically diverse consecutive cohort of employed nulliparous women was recruited in late pregnancy. Data were collected by a structured interview assessing sociodemographic characteristics, employment arrangements, experience of pregnancy-related discrimination, and access to maternity leave entitlements. Participants completed two standardised psychometric measures of maternal mood: the Edinburgh Depression Scale (EDS) and the Profile of Mood States (PoMS). Comparisons of self-reported mood were made between women by experience of workplace adversity, using a composite measure of workplace events. Of 205 eligible women, 165 agreed to participate. Of these, 114 of 165 (69%) reported at least one form of workplace adversity during pregnancy. More women without private health insurance (78%) reported workplace adversity than those who were privately insured (57%) (chi2(1)=6.95, P=0.008). Women experiencing workplace adversity had significantly worse psychological well-being as indicated by the EDS score (7.7+/-5.1) than those who were experiencing no workplace adversity (5.5+/-3.4), mean difference (95% CI)=-2.2 (-3.7 to -0.8), P=0.003. Similar results were reported for the PoMS. Workplace adversity during pregnancy is associated with poorer maternal psychological well-being. Workplace conditions and entitlements are salient factors for consideration in assessments of antenatal psychosocial well-being.

  13. Pair creation by dynamic field configurations

    Aoyama, H.

    1982-01-01

    This thesis deals with the dynamics of the classical configuration of a quantum field unstable due to pair creation. The effective action method is developed first to treat such problems for a simple two-field model. Physical quantities such as pair creation probabilities are related to a complex function called the effective configuration, which is defined to minimize the effective action. Unitarity of the S-matrix is verified at the lowest order of the weak-field approximation. At the same order, the real valued vacuum expectation value of the quantum field, named the real configuration, is constructed in terms of the effective configuration. An integro-differential equation for the real configuration is given and is used to show that the real configuration is causal, while the effective configuration is not. Two practical applications of the effective action method are discussed. The first deals with pair creation in an anisotropic universe, and the real geometry is given in terms of the effective geometry in the samll anisotropy limit. The second deals with expanding vacuum bubbles. Corresponding to three possible situations, three kinds of field equations of each of the effective configuration and the real configuration are obtained. The behavior of the bubble is also studied by a semi-classical method, and one of the three situations is suggested to be plausible

  14. Simulator configuration maintenance

    2006-01-01

    Requirements and recommendations of this section defines NPP personnel activity aimed to the provision of the simulator configuration compliance with the current configuration of the power-generating unit-prototype, standard and technical requirements and describe a monitoring procedure for a set of simulator software and hardware, training, organizational and technical documents

  15. PIV Logon Configuration Guidance

    Lee, Glen Alan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-03-04

    This document details the configurations and enhancements implemented to support the usage of federal Personal Identity Verification (PIV) Card for logon on unclassified networks. The guidance is a reference implementation of the configurations and enhancements deployed at the Los Alamos National Laboratory (LANL) by Network and Infrastructure Engineering – Core Services (NIE-CS).

  16. Business Model Process Configurations

    Taran, Yariv; Nielsen, Christian; Thomsen, Peter

    2015-01-01

    , by developing (inductively) an ontological classification framework, in view of the BM process configurations typology developed. Design/methodology/approach – Given the inconsistencies found in the business model studies (e.g. definitions, configurations, classifications) we adopted the analytical induction...

  17. Risk-based configuration control

    Szikszai, T.

    1997-01-01

    The presentation discusses the following issues: The Configuration Control; The Risk-based Configuration Control (during power operation mode, and during shutdown mode). PSA requirements. Use of Risk-based Configuration Control System. Configuration Management (basic elements, benefits, information requirements)

  18. Original article Entitlement and subjective well-being: a three-nations study

    Magdalena Żemojtel-Piotrowska

    2015-03-01

    Full Text Available Background The current study investigated the role of three facets of entitlement (active, passive and revenge in various forms of subjective well-being (SWB: hedonistic and two facets of eudaimonic well-being (social and psychological. Social well-being was based on Keyes’ model (1998 and psychological well-being on Ryff’s model (1989. Participants and procedure The study was performed in three nations (Poland, Puerto Rico and Vietnam on student samples (Poland, n = 245, Vietnam, n = 115, and Puerto Rico, n = 300. To assess entitlement level the Entitlement Questionnaire was used. The level of hedonistic well-being was measured with the Satisfaction with Life Scale (SWLS and the Positive and Negative Affect Schedule (PANAS, and eudaimonic well-being by the Mental Health Continuum–Short Form (MHC-SF. Results Active entitlement was positively related to all aspects of SWB. Revenge entitlement was negatively related to hedonistic and psychological SWB in all samples and negatively related to social well-being only in Poland. Passive entitlement was unrelated to SWB. Conclusions The current study shows cross-cultural similarities in relationships of entitlement with hedonistic and psychological well-being and cross-cultural differences in the relationship of entitlement with social well-being. Additionally, the study indicates positive meaning of healthy aspects of entitlement for subjective well-being and negative meaning of dysfunctional aspects of entitlement for subjective well-being.

  19. Experiment Simulation Configurations Used in DUNE CDR

    Alion, T. [Univ. of South Carolina, Columbia, SC (United States); Black, J. J. [Univ. of Warwick, Coventry (United Kingdom); Bashyal, A. [Oregon State Univ., Corvallis, OR (United States); Bass, M. [Univ. of Oxford (United Kingdom); Bishai, M. [Brookhaven National Lab. (BNL), Upton, NY (United States); Cherdack, D. [Colorado State Univ., Fort Collins, CO (United States); Diwan, M. [Brookhaven National Lab. (BNL), Upton, NY (United States); Djurcic, Z. [Argonne National Lab. (ANL), Argonne, IL (United States); Evans, J. [Univ. of Manchester (United Kingdom); Fernandez-Martinez, E. [Madrid Autonama Univ. (Spain); Fields, L. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Fleming, B. [Yale Univ., New Haven, CT (United States); Gran, R. [Univ. of Minnesota, Duluth, MN (United States); Guenette, R. [Univ. of Oxford (United Kingdom); Hewes, J. [Univ. of Manchester (United Kingdom); Hogan, M. [Colorado State Univ., Fort Collins, CO (United States); Hylen, J. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Junk, T. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Kohn, S. [Univ. of California, Berkeley, CA (United States); LeBrun, P. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Lundberg, B. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Marchionni, A. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Morris, C. [Univ. of California, Berkeley, CA (United States); Papadimitriou, V. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Rameika, R. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Rucinski, R. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Soldner-Rembold, S. [Univ. of Manchester (United Kingdom); Sorel, M. [Spanish National Research Council (CSIC), Valencia (Spain). Univ. of Valencia (UV), Inst. de Fisica Corpuscular; Urheim, J. [Indiana Univ., Bloomington, IN (United States); Viren, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Whitehead, L. [Univ. of Houston, TX (United States); Wilson, R. [Colorado State Univ., Fort Collins, CO (United States); Worcester, E. [Brookhaven National Lab. (BNL), Upton, NY (United States); Zeller, G. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)

    2016-06-30

    The LBNF/DUNE CDR describes the proposed physics program and experimental design at the conceptual design phase. Volume 2, entitled The Physics Program for DUNE at LBNF, outlines the scientific objectives and describes the physics studies that the DUNE collaboration will perform to address these objectives. The long-baseline physics sensitivity calculations presented in the DUNE CDR rely upon simulation of the neutrino beam line, simulation of neutrino interactions in the far detector, and a parameterized analysis of detector performance and systematic uncertainty. The purpose of this posting is to provide the results of these simulations to the community to facilitate phenomenological studies of long-baseline oscillation at LBNF/DUNE. Additionally, this posting includes GDML of the DUNE single-phase far detector for use in simulations. DUNE welcomes those interested in performing this work as members of the collaboration, but also recognizes the benefit of making these configurations readily available to the wider community.

  20. Identifying Two Groups of Entitled Individuals: Cluster Analysis Reveals Emotional Stability and Self-Esteem Distinction.

    Crowe, Michael L; LoPilato, Alexander C; Campbell, W Keith; Miller, Joshua D

    2016-12-01

    The present study hypothesized that there exist two distinct groups of entitled individuals: grandiose-entitled, and vulnerable-entitled. Self-report scores of entitlement were collected for 916 individuals using an online platform. Model-based cluster analyses were conducted on the individuals with scores one standard deviation above mean (n = 159) using the five-factor model dimensions as clustering variables. The results support the existence of two groups of entitled individuals categorized as emotionally stable and emotionally vulnerable. The emotionally stable cluster reported emotional stability, high self-esteem, more positive affect, and antisocial behavior. The emotionally vulnerable cluster reported low self-esteem and high levels of neuroticism, disinhibition, conventionality, psychopathy, negative affect, childhood abuse, intrusive parenting, and attachment difficulties. Compared to the control group, both clusters reported being more antagonistic, extraverted, Machiavellian, and narcissistic. These results suggest important differences are missed when simply examining the linear relationships between entitlement and various aspects of its nomological network.

  1. The LHCb configuration database

    Abadie, Lana; Gaspar, Clara; Jacobsson, Richard; Jost, Beat; Neufeld, Niko

    2005-01-01

    The Experiment Control System (ECS) will handle the monitoring, configuration and operation of all the LHCb experimental equipment. All parameters required to configure electronics equipment under the control of the ECS will reside in a configuration database. The database will contain two kinds of information: 1.\tConfiguration properties about devices such as hardware addresses, geographical location, and operational parameters associated with particular running modes (dynamic properties). 2.\tConnectivity between devices : this consists of describing the output and input connections of a device (static properties). The representation of these data using tables must be complete so that it can provide all the required information to the ECS and must cater for all the subsystems. The design should also guarantee a fast response time, even if a query results in a large volume of data being loaded from the database into the ECS. To fulfil these constraints, we apply the following methodology: Determine from the d...

  2. Drupal 8 configuration management

    Borchert, Stefan

    2015-01-01

    Drupal 8 Configuration Management is intended for people who use Drupal 8 to build websites, whether you are a hobbyist using Drupal for the first time, a long-time Drupal site builder, or a professional web developer.

  3. Configuration by Modularisation

    Riitahuhta, Asko; Andreasen, Mogens Myrup

    1998-01-01

    Globally operating companies have realized that locally customized products and services are today the prerequisite for the success. The capability or the paradigm to act locally in global markets is called Mass Customization [Victor 1997]. The prerequisite for Mass Customization is Configuration...... Management and i Configuration Management the most important means is Modularisation.The goal of this paper is to show Configuration Management as a contribution to the Mass Customisation and Modularisation as a contribution to the industrialisation of the design area [Andreasen 1997]. A basic model...... for the creation of a structured product family is presented and examples are given. The concepts of a novel Dynamic Modularisation method, Metrics for Modularisation and Design for Configurability are presented....

  4. Configuration Management Automation (CMA) -

    Department of Transportation — Configuration Management Automation (CMA) will provide an automated, integrated enterprise solution to support CM of FAA NAS and Non-NAS assets and investments. CMA...

  5. Computer software configuration management

    Pelletier, G.

    1987-08-01

    This report reviews the basic elements of software configuration management (SCM) as defined by military and industry standards. Several software configuration management standards are evaluated given the requirements of the nuclear industry. A survey is included of available automated tools for supporting SCM activities. Some information is given on the experience of establishing and using SCM plans of other organizations that manage critical software. The report concludes with recommendations of practices that would be most appropriate for the nuclear power industry in Canada

  6. Reference frame for Product Configuration

    Ladeby, Klaes Rohde; Oddsson, Gudmundur Valur

    2011-01-01

    a reference frame for configuration that permits 1) a more precise understanding of a configuration system, 2) a understanding of how the configuration system relate to other systems, and 3) a definition of the basic concepts in configuration. The total configuration system, together with the definition...

  7. Remembering facial configurations.

    Bruce, V; Doyle, T; Dench, N; Burton, M

    1991-02-01

    Eight experiments are reported showing that subjects can remember rather subtle aspects of the configuration of facial features to which they have earlier been exposed. Subjects saw several slightly different configurations (formed by altering the relative placement of internal features of the face) of each of ten different faces, and they were asked to rate the apparent age and masculinity-femininity of each. Afterwards, subjects were asked to select from pairs of faces the configuration which was identical to one previously rated. Subjects responded strongly to the central or "prototypical" configuration of each studied face where this was included as one member of each test pair, whether or not it had been studied (Experiments 1, 2 and 4). Subjects were also quite accurate at recognizing one of the previously encountered extremes of the series of configurations that had been rated (Experiment 3), but when unseen prototypes were paired with seen exemplars subjects' performance was at chance (Experiment 5). Prototype learning of face patterns was shown to be stronger than that for house patterns, though both classes of patterns were affected equally by inversion (Experiment 6). The final two experiments demonstrated that preferences for the prototype could be affected by instructions at study and by whether different exemplars of the same face were shown consecutively or distributed through the study series. The discussion examines the implications of these results for theories of the representation of faces and for instance-based models of memory.

  8. LGBT: equally entitled to human rights and dignity

    Anne C Richard

    2013-04-01

    Full Text Available Recognition that LGBT rights are universal rights is gaining ground.The trend, finally, is positive. But greater respect for LGBT rights andinclusion of LGBT people still is not a worldwide movement.

  9. FORUM: Instructional Communication and Millennial Students: Millennial Students in the College Classroom: Adjusting to Academic Entitlement

    Goldman, Zachary W.; Martin, Matthew M.

    2016-01-01

    Academic entitlement (AE) refers to the expectation of educational success despite the input of personal effort needed to earn it (Boswell, 2012). Entitled students feel that learning should require minimal work and that difficulties encountered during the learning process should be attributed to instructors, rather than themselves. AE has become…

  10. The Effects of Reducing the Entitlement Period to Unemployment Insurance Benefits

    de Groot, N.; van der Klaauw, B.

    This paper exploits a substantial reform of the Dutch UI law to study the effect of the entitlement period on job finding and subsequent labor market outcomes. Using detailed administrative data covering the full population we find that reducing the entitlement period increases the job finding rate,

  11. 76 FR 2758 - Agency Information Collection (Evidence for Transfer of Entitlement of Education Benefits (CFR 21...

    2011-01-14

    ... for Transfer of Entitlement of Education Benefits (CFR 21.7080)) Activity Under OMB Review AGENCY... INFORMATION: Title: Evidence for Transfer of Entitlement of Education Benefits (CFR 21.7080). OMB Control... DOD Form 2366-1 to determine whether the dependent qualifies to receive education benefits under the...

  12. 76 FR 28789 - Draft Alert Entitled “Preventing Occupational Respiratory Disease From Dampness in Office...

    2011-05-18

    ... NIOSH-238] Draft Alert Entitled ``Preventing Occupational Respiratory Disease From Dampness in Office... Institute for Occupational Safety and Health (NIOSH) of the Centers for Disease Control and Prevention (CDC), announces the availability of a draft Alert entitled ``Preventing Occupational Respiratory Disease from...

  13. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's... Entitlement of a Participant in favor of the United States to secure deposits of public money, including...

  14. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  15. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Creation of participant's security entitlement... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security... public money, including without limitation deposits to the Treasury tax and loan accounts, or other...

  16. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests... to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  17. Permissive Parenting and Mental Health in College Students: Mediating Effects of Academic Entitlement

    Barton, Alison L.; Hirsch, Jameson K.

    2016-01-01

    Objective: Student mental health may suffer due to unreasonable expectations associated with academic entitlement; permissive parenting may be one source of these expectations. The authors examined the role of academic entitlement as a mediator of the relationship between permissive parenting and psychological functioning. Participants:…

  18. Entitlement attitude in the workplace and its relationship to job satisfaction and organizational commitment

    Sonya Asenova Dragova-Koleva

    2017-05-01

    Full Text Available Background This article is focused on the entitlement attitude in an organizational context. Its purpose was to examine the relationship of entitlement and its 3 components (active, passive and revengefulness with job satisfaction and organizational commitment. Participants and procedure Two independent studies were conducted to examine the discussed relationships. In study 1 and study 2 there participated respectively 110 and 95 full-time employees from both genders working in public and private organizations. The 30-item Bulgarian version of the Entitlement Questionnaire was used. Job satisfaction measurement included employees’ affective response to their overall job and to various aspects of their job. The three aspects of organizational commitment (affective, instrumental and normative were measured. Results Active entitlement had a positive effect on satisfaction with results, satisfaction with supervisor, pay satisfaction and overall job satisfaction. It was not related to organizational commitment. Passive entitlement had a positive effect on satisfaction with tasks, but it correlated negatively with pay satisfaction. Higher level of passive entitlement predicted instrumental commitment. Revengefulness was negatively related to task satisfaction, satisfaction with supervisor and overall satisfaction, and had a negative effect on affective commitment. Conclusions Different forms of entitlement have a diverse influence on the various aspects of job satisfaction and components of organizational commitment. Active and passive types of entitlement are more adaptive, whereas revengefulness is a maladaptive and dysfunctional attitude.

  19. 7 CFR 272.11 - Systematic Alien Verification for Entitlements (SAVE) Program.

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Systematic Alien Verification for Entitlements (SAVE... FOR PARTICIPATING STATE AGENCIES § 272.11 Systematic Alien Verification for Entitlements (SAVE... and Naturalization Service (INS), in order to verify the validity of documents provided by aliens...

  20. Configuration Control Office

    Beltramello, O

    In order to enable Technical Coordination to manage the detector configuration and to be aware of all changes in this configuration, a baseline of the envelopes has been created in April 2001. Fifteen system and multi-system envelope drawings have been approved and baselined. An EDMS file is associated with each approved envelope, which provides a list of the current known unsolved conflicts related to the envelope and a list of remaining drawing inconsistencies to be corrected. The envelope status with the associated drawings and EDMS file can be found on the web at this adress: http://atlasinfo.cern.ch/Atlas/TCOORD/Activities/Installation/Configuration/ Any modification in the baseline has to be requested via the Engineering Change Requests. The procedure can be found under: http://atlasinfo.cern.ch/Atlas/TCOORD/Activities/TcOffice/Quality/ECR/ TC will review all the systems envelopes in the near future and manage conflict resolution with the collaboration of the systems.

  1. The LHCb configuration database

    Abadie, L; Van Herwijnen, Eric; Jacobsson, R; Jost, B; Neufeld, N

    2005-01-01

    The aim of the LHCb configuration database is to store information about all the controllable devices of the detector. The experiment's control system (that uses PVSS ) will configure, start up and monitor the detector from the information in the configuration database. The database will contain devices with their properties, connectivity and hierarchy. The ability to store and rapidly retrieve huge amounts of data, and the navigability between devices are important requirements. We have collected use cases to ensure the completeness of the design. Using the entity relationship modelling technique we describe the use cases as classes with attributes and links. We designed the schema for the tables using relational diagrams. This methodology has been applied to the TFC (switches) and DAQ system. Other parts of the detector will follow later. The database has been implemented using Oracle to benefit from central CERN database support. The project also foresees the creation of tools to populate, maintain, and co...

  2. Oxygen configurations in silica

    Chelikowsky, James R.; Chadi, D. J.; Binggeli, N.

    2000-01-01

    We propose a transition state for oxygen in silica. This state is produced by the insertion of an oxygen molecule into the Si-O-Si bond, i.e., it consists of producing a Si-O-O-O-Si bond. This state allows molecular oxygen diffusion in silica without breaking the molecular O 2 bond and it is energetically more stable than a peroxy configuration. This configuration may allow for exchange of molecular oxygen with the oxygen in the silica framework. (c) 2000 The American Physical Society

  3. Permissive parenting and mental health in college students: Mediating effects of academic entitlement.

    Barton, Alison L; Hirsch, Jameson K

    2016-01-01

    Student mental health may suffer due to unreasonable expectations associated with academic entitlement; permissive parenting may be one source of these expectations. The authors examined the role of academic entitlement as a mediator of the relationship between permissive parenting and psychological functioning. Participants were 524 undergraduate students at a single institution (52% female; age range = 18-22). Data collection was completed in May 2011. Cross-sectional design. Participants completed online self-report measures of parenting styles, academic entitlement, stress, depressive symptoms, and well-being. Permissive parenting was associated with greater academic entitlement and, in turn, to more perceived stress and poorer mental health. Mother/father differences were found in some cases. Academic entitlement may partially explain why permissive parenting is detrimentally related to mental health for college students. Implications for academic affairs and counseling include helping students develop an appreciation of the role of self-regulation in college success.

  4. XVCL: XML-based Variant Configuration Language

    Jarzabek, Stan; Basset, Paul; Zhang, Hongyu

    2003-01-01

    XVCL (XML-based Variant Configuration Language) is a meta-programming technique and tool that provides effective reuse mechanisms. XVCL is an open source software developed at the National University of Singapore. Being a modern and versatile version of Bassett's frames, a technology that has...

  5. Stirling Engine Configuration Selection

    Jose Egas

    2018-03-01

    Full Text Available Unlike internal combustion engines, Stirling engines can be designed to work with many drive mechanisms based on the three primary configurations, alpha, beta and gamma. Hundreds of different combinations of configuration and mechanical drives have been proposed. Few succeed beyond prototypes. A reason for poor success is the use of inappropriate configuration and drive mechanisms, which leads to low power to weight ratio and reduced economic viability. The large number of options, the lack of an objective comparison method, and the absence of a selection criteria force designers to make random choices. In this article, the pressure—volume diagrams and compression ratios of machines of equal dimensions, using the main (alpha, beta and gamma crank based configurations as well as rhombic drive and Ross yoke mechanisms, are obtained. The existence of a direct relation between the optimum compression ratio and the temperature ratio is derived from the ideal Stirling cycle, and the usability of an empirical low temperature difference compression ratio equation for high temperature difference applications is tested using experimental data. It is shown that each machine has a different compression ratio, making it more or less suitable for a specific application, depending on the temperature difference reachable.

  6. Global Value Chain Configuration

    Hernandez, Virginia; Pedersen, Torben

    2017-01-01

    modes chosen and the different ways of coordinating them. We also examine the outcomes of a global value chain configuration in terms of performance and upgrading. Our aim is to review the state of the art of these issues, identify research gaps and suggest new lines for future research that would...

  7. Inclusive Services Innovation Configuration

    Holdheide, Lynn R.; Reschly, Daniel J.

    2011-01-01

    Teacher preparation to deliver inclusive services to students with disabilities is increasingly important because of changes in law and policy emphasizing student access to, and achievement in, the general education curriculum. This innovation configuration identifies the components of inclusive services that should be incorporated in teacher…

  8. Ansible configuration management

    Hall, Daniel

    2015-01-01

    This book is intended for anyone who wants to learn Ansible starting from the basics. Some experience of how to set up and configure Linux machines and a working knowledge of BIND, MySQL, and other Linux daemons is expected.

  9. An approach for the development of visual configuration systems

    Hvam, Lars; Ladeby, Klaes Rohde

    2007-01-01

    How can a visual configuration system be developed to support the specification process' in companies that manufacture customer tailored products? This article focuses on how visual configuration systems can be developed. The approach for developing visual configuration systems has been developed...... by Centre for Product Modelling (CPM) at The Technical University of Denmark. The approach is based on experiences from a visualization project in co-operation between CPM and the global provider of power protection American Power Conversion (APC). The visual configuration system was developed in 2001...... of the product in the visual configuration system....

  10. [Formian 2 and a Formian Function for Processing Polyhedric Configurations

    Nooshin, H.; Disney, P. L.; Champion, O. C.

    1996-01-01

    The work began in October 1994 with the following objectives: (1) to produce an improved version of the programming language Formian; and (2) to create a means for computer aided handling of polyhedric configurations including the geodesic forms of all kinds. A new version of Formian, referred to as Formian 2, is being implemented to operate in the Windows 95 environment. It is an ideal tool for configuration management in a convenient and user-friendly manner. The second objective was achieved by creating a standard Formian function that allows convenient handling of all types of polyhedric configurations. In particular, the focus of attention is on polyhedric configurations that are of importance in architectural and structural engineering fields. The natural medium for processing of polyhedric configurations is a programming language that incorporates the concepts of 'formex algebra'. Formian is such a programming language in which the processing of polyhedric configurations can be carried out using the standard elements of the language. A description of this function is included in a chapter for a book entitled 'Beyond the Cube: the Architecture of space Frames and Polyhedra'. A copy of this chapter is appended.

  11. Symmetries of cluster configurations

    Kramer, P.

    1975-01-01

    A deeper understanding of clustering phenomena in nuclei must encompass at least two interrelated aspects of the subject: (A) Given a system of A nucleons with two-body interactions, what are the relevant and persistent modes of clustering involved. What is the nature of the correlated nucleon groups which form the clusters, and what is their mutual interaction. (B) Given the cluster modes and their interaction, what systematic patterns of nuclear structure and reactions emerge from it. Are there, for example, families of states which share the same ''cluster parents''. Which cluster modes are compatible or exclude each other. What quantum numbers could characterize cluster configurations. There is no doubt that we can learn a good deal from the experimentalists who have discovered many of the features relevant to aspect (B). Symmetries specific to cluster configurations which can throw some light on both aspects of clustering are discussed

  12. Analyzing Visibility Configurations.

    Dachsbacher, C

    2011-04-01

    Many algorithms, such as level of detail rendering and occlusion culling methods, make decisions based on the degree of visibility of an object, but do not analyze the distribution, or structure, of the visible and occluded regions across surfaces. We present an efficient method to classify different visibility configurations and show how this can be used on top of existing methods based on visibility determination. We adapt co-occurrence matrices for visibility analysis and generalize them to operate on clusters of triangular surfaces instead of pixels. We employ machine learning techniques to reliably classify the thus extracted feature vectors. Our method allows perceptually motivated level of detail methods for real-time rendering applications by detecting configurations with expected visual masking. We exemplify the versatility of our method with an analysis of area light visibility configurations in ray tracing and an area-to-area visibility analysis suitable for hierarchical radiosity refinement. Initial results demonstrate the robustness, simplicity, and performance of our method in synthetic scenes, as well as real applications.

  13. Mechanical configuration and maintenance

    Brown, T.G.; Casini, G.; Churakov, G.F.

    1982-01-01

    The INTOR engineering design has been strongly influenced by considerations for assembly and maintenance. A maintenance philosophy was established at the outset of the conceptual design to insure that the tokamak configuration would be developed to accommodate maintenance requirements. The main features of the INTOR design are summarized in this paper with primary emphasis on the impact of maintenance considerations. The most apparent configuration design feature is the access provided for torus maintenance. Particular attention was given to the size and location of superconducting magnets and the location of vacuum boundaries. All of the poloidal field (PF) coils are placed outside of the bore of the toroidal field (TF) coils and located above and below an access opening between adjacent TF coils through which torus sectors are removed. A magnet structural configuration consisting of mechanically attached reinforcing members has been designed which facilitates the open access space for torus sector removal. For impurity control, a single null poloidal divertor was selected over a double null design in order to maintain sufficient access for pumping and maintenance of the collector. A double null divertor was found to severely limit access to the torus with the addition of divertor collectors and pumping at the top. For this reason, a single null concept was selected in spite of the more difficult design problems associated with the required asymmetric PF system and higher particle loadings

  14. Can we make a new deal? Entitlement reform sounds alluring, but the reality is stark.

    Wagner, L

    1995-01-20

    After simmering for more than a decade, the Great Entitlement Debate promises to dominate the 1995 congressional agenda. But lost amid a tangle of conflicting parochial interests, voter confusion and searing partisan rhetoric are some harsh truths about our options.

  15. The intelligent Universe

    Hoyle, F.

    1983-01-01

    The subject is covered in chapters, entitled: chance and the universe (synthesis of proteins; the 'primordial soup'); the gospel according to Darwin (discussion of Darwin theory of evolution); life did not originate on earth (fossils from space; life in space); the interstellar connection (living dust between the stars; bacteria in space falling to the earth; interplanetary dust); evolution by cosmic control (microorganisms; genetics); why aren't the others here (a cosmic origin of life); after the big bang (big bang and steady state); the information rich universe; what is intelligence up to; the intelligent universe. (U.K.)

  16. 20 CFR 404.337 - When does my entitlement to widow's and widower's benefits start and end?

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When does my entitlement to widow's and widower's benefits start and end? 404.337 Section 404.337 Employees' Benefits SOCIAL SECURITY... does my entitlement to widow's and widower's benefits start and end? (a) We will find you entitled to...

  17. 20 CFR 725.228 - Effect of conviction of felonious and intentional homicide on entitlement to benefits.

    2010-04-01

    ... intentional homicide on entitlement to benefits. 725.228 Section 725.228 Employees' Benefits EMPLOYMENT... intentional homicide on entitlement to benefits. An individual who has been convicted of the felonious and intentional homicide of a miner or other beneficiary shall not be entitled to receive any benefits payable...

  18. Configuration Management Program Plan

    1991-01-01

    Westinghouse Savannah River Company (WSRC) has established a configuration management (CM) plan to execute the SRS CM Policy and the requirements of the DOE Order 4700.1. The Reactor Restart Division (RRD) has developed its CM Plan under the SRS CM Program and is implementing it via the RRD CM Program Plan and the Integrated Action Plan. The purpose of the RRD CM program is to improve those processes which are essential to the safe and efficient operation of SRS production reactors. This document provides details of this plan

  19. Ames Optimized TCA Configuration

    Cliff, Susan E.; Reuther, James J.; Hicks, Raymond M.

    1999-01-01

    Configuration design at Ames was carried out with the SYN87-SB (single block) Euler code using a 193 x 49 x 65 C-H grid. The Euler solver is coupled to the constrained (NPSOL) and the unconstrained (QNMDIF) optimization packages. Since the single block grid is able to model only wing-body configurations, the nacelle/diverter effects were included in the optimization process by SYN87's option to superimpose the nacelle/diverter interference pressures on the wing. These interference pressures were calculated using the AIRPLANE code. AIRPLANE is an Euler solver that uses a unstructured tetrahedral mesh and is capable of computations about arbitrary complete configurations. In addition, the buoyancy effects of the nacelle/diverters were also included in the design process by imposing the pressure field obtained during the design process onto the triangulated surfaces of the nacelle/diverter mesh generated by AIRPLANE. The interference pressures and nacelle buoyancy effects are added to the final forces after each flow field calculation. Full details of the (recently enhanced) ghost nacelle capability are given in a related talk. The pseudo nacelle corrections were greatly improved during this design cycle. During the Ref H and Cycle 1 design activities, the nacelles were only translated and pitched. In the cycle 2 design effort the nacelles can translate vertically, and pitch to accommodate the changes in the lower surface geometry. The diverter heights (between their leading and trailing edges) were modified during design as the shape of the lower wing changed, with the drag of the diverter changing accordingly. Both adjoint and finite difference gradients were used during optimization. The adjoint-based gradients were found to give good direction in the design space for configurations near the starting point, but as the design approached a minimum, the finite difference gradients were found to be more accurate. Use of finite difference gradients was limited by the

  20. Gas/liquid flow configurations

    Bonin, Jacques; Fitremann, J.-M.

    1978-01-01

    Prediction of flow configurations (morphology) for gas/liquid or liquid/vapour mixtures is an important industrial problem which is not yet fully understood. The ''Flow Configurations'' Seminar of Societe Hydrotechnique de France has framed recommendations for investigation of potential industrial applications for flow configurations [fr

  1. Software Configurable Multichannel Transceiver

    Freudinger, Lawrence C.; Cornelius, Harold; Hickling, Ron; Brooks, Walter

    2009-01-01

    Emerging test instrumentation and test scenarios increasingly require network communication to manage complexity. Adapting wireless communication infrastructure to accommodate challenging testing needs can benefit from reconfigurable radio technology. A fundamental requirement for a software-definable radio system is independence from carrier frequencies, one of the radio components that to date has seen only limited progress toward programmability. This paper overviews an ongoing project to validate the viability of a promising chipset that performs conversion of radio frequency (RF) signals directly into digital data for the wireless receiver and, for the transmitter, converts digital data into RF signals. The Software Configurable Multichannel Transceiver (SCMT) enables four transmitters and four receivers in a single unit the size of a commodity disk drive, programmable for any frequency band between 1 MHz and 6 GHz.

  2. Configuring the autism epidemic

    Seeberg, Jens; Christensen, Fie Lund Lindegaard

    2017-01-01

    Autism has been described as an epidemic, but this claim is contested and may point to an awareness epidemic, i.e. changes in the definition of what autism is and more attention being invested in diagnosis leading to a rise in registered cases. The sex ratio of children diagnosed with autism...... is skewed in favour of boys, and girls with autism tend to be diagnosed much later than boys. Building and further developing the notion of ‘configuration’ of epidemics, this article explores the configuration of autism in Denmark, with a particular focus on the health system and social support to families...... with children diagnosed with autism, seen from a parental perspective. The article points to diagnostic dynamics that contribute to explaining why girls with autism are not diagnosed as easily as boys. We unfold these dynamics through the analysis of a case of a Danish family with autism....

  3. Deployable reflector configurations

    Meinel, A. B.; Meinel, M. P.; Woolf, N. J.

    Both the theoretical reasons for considering a non-circular format for the Large Deployable Reflector, and a potentially realizable concept for such a device, are discussed. The optimum systems for diffraction limited telescopes with incoherent detection have either a single filled aperture, or two such apertures as an interferometer to synthesize a larger aperture. For a single aperture of limited area, a reflector in the form of a slot can be used to give increased angular resolution. It is shown how a 20 x 8 meter telescope can be configured to fit the Space Shuttle bay, and deployed with relatively simple operations. The relationship between the sunshield design and the inclination of the orbit is discussed. The possible use of the LDR as a basic module to permit the construction of supergiant space telescopes and interferometers both for IR/submm studies and for the entire ultraviolet through mm wave spectral region is discussed.

  4. Application of Configurators in Networks

    Malis, Martin; Hvam, Lars

    2003-01-01

    Shorter lead-time, improved quality of product specifications and better communication with customers and suppliers are benefits derived from the application of configurators. Configurators are knowledge-based IT-systems that can be applied to deal with product knowledge and to support different...... processes in a company. Traditionally, configurators have been used as an internal tool. In this paper focus will be on the application of configurators in a network of companies, and a procedure for developing product configurators in a network of companies will be presented. The aim is to present...... a structured guideline, tools and methods on how to successfully develop configurators in a network perspective. Findings presented in this paper are supported by research in a case company. The results from the empirical work show a huge potential for the application of configurators in networks of companies....

  5. Evolution of the Fusion Power Demonstration tandem mirror reactor configuration

    O'Toole, J.A.; Lousteau, D.C.

    1985-01-01

    This paper gives a presentation of the evolution of configurations proposed for tandem mirror Fusion Power Demonstration (FPD) machines. The FPD study was undertaken to scope the mission as well as the technical and design requirements of the next tandem mirror device. Three configurations, entitled FPD I, II, and III were studied. During this process new systems were conceived and integrated into the design, resulting in a significantly changed overall machine configuration. The machine can be divided into two areas. A new center cell configuration, minimizing magnetic field ripple and thus maximizing center cell fusion power, features a semicontinuous solenoid. A new end cell has evolved which maintains the required thermal barrier in a significantly reduced axial length. The reduced end cell effective length leads to a shorter central cell length being required to obtain minimum ignition conditions. Introduced is the concept of an electron mantle stabilized octopole arrangement. The engineering features of the new end cell and maintenance concepts developed are influenced to a great extent by the octopole-based design. The new ideas introduced during the FPD study have brought forth a new perspective of the size, design, and maintenance of tandem mirror reactors, making them more attractive as commercial power sources

  6. Entitlement to vote in the Canton of Geneva and entitlement to vote and eligibility for election in the Canton of Vaud

    DG Unit

    2009-01-01

    You are reminded that, at commune level, certain international civil servants and their family members: are entitled to vote in the Canton of Geneva are entitled to vote and are eligible for election in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise these entitlements, you are invited to consult the information published, in French only, on the Swiss Mission’s website: for the Canton of Genevafor the Canton of VaudThe dates of the forthcoming ballots are available on the official websites of the cantonal administrative authorities: for Geneva: referendum and forthcoming ballots ; for Vaud: forthcoming ballots In this context, please note, especially with regard to eligibility for election, that: in accordance with Articles S I 3.05 and I 3.06 of the Staff Rules "Members of the personnel wishing to take part in the public and political life of a State shall comply with the relevant legislat...

  7. Entitlement to vote in the Canton of Geneva and entitlement to vote and eligibility for election in the Canton of Vaud

    DG Unit

    2011-01-01

    You are reminded that, at commune level, certain international civil servants and their family members: are entitled to vote in the Canton of Geneva are entitled to vote and are eligible for election in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise these entitlements, you are invited to consult the information published, in French only, on the Swiss Mission’s website (topic « Privileges and immunities (Manual) » : http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt1.html (for the Canton of Geneva), http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt2.html (for the Canton of Vaud). The dates of the forthcoming ballots are available on the official websites of the cantonal administrative authorities : for Geneva: http://www.ge.ch/votations-elections/prochains-scrutins/; for Vaud: http://www.vd.ch/fr/themes/etat-droit-financ...

  8. Configurable software for satellite graphics

    Hartzman, P D

    1977-12-01

    An important goal in interactive computer graphics is to provide users with both quick system responses for basic graphics functions and enough computing power for complex calculations. One solution is to have a distributed graphics system in which a minicomputer and a powerful large computer share the work. The most versatile type of distributed system is an intelligent satellite system in which the minicomputer is programmable by the application user and can do most of the work while the large remote machine is used for difficult computations. At New York University, the hardware was configured from available equipment. The level of system intelligence resulted almost completely from software development. Unlike previous work with intelligent satellites, the resulting system had system control centered in the satellite. It also had the ability to reconfigure software during realtime operation. The design of the system was done at a very high level using set theoretic language. The specification clearly illustrated processor boundaries and interfaces. The high-level specification also produced a compact, machine-independent virtual graphics data structure for picture representation. The software was written in a systems implementation language; thus, only one set of programs was needed for both machines. A user can program both machines in a single language. Tests of the system with an application program indicate that is has very high potential. A major result of this work is the demonstration that a gigantic investment in new hardware is not necessary for computing facilities interested in graphics.

  9. Configurational isomerism in polyoxovanadates

    Mahnke, Lisa K.; Naether, Christian; Bensch, Wolfgang [Institut fuer Anorganische Chemie, Christian-Albrechts-Universitaet, Kiel (Germany); Kondinski, Aleksandar; Van Leusen, Jan; Monakhov, Kirill Yu.; Koegerler, Paul [Institut fuer Anorganische Chemie, RWTH Aachen University (Germany); Warzok, Ulrike; Schalley, Christoph A. [Institut fuer Chemie und Biochemie, Freie Universitaet Berlin (Germany)

    2018-03-05

    A water-soluble derivative of the polyoxovanadate {V_1_5E_6O_4_2} (E=semimetal) archetype enables the study of cluster shell rearrangements driven by supramolecular interactions. A reaction unique to E=Sb, induced exclusively by ligand metathesis in peripheral [Ni(ethylenediamine){sub 3}]{sup 2+} counterions, results in the formation of the metastable α{sub 1}* configurational isomer of the {V_1_4Sb_8O_4_2} cluster type. Contrary to all other polyoxovanadate shell architectures, this isomer comprises an inward-oriented vanadyl group and is ca. 50 and 12 kJ mol{sup -1} higher in energy than the previously isolated α and β isomers, respectively. We discuss this unexpected reaction in light of supramolecular Sb-O..V and Sb-O..Sb contacts manifested in {V_1_4Sb_8O_4_2}{sub 2} dimers detected in the solid state. ESI MS experiments confirm the stability of these dimers also in solution and in the gas phase. DFT calculations indicate that other, as of yet elusive isomers of {V_1_4Sb_8}, might be accessible as well. (copyright 2018 Wiley-VCH Verlag GmbH and Co. KGaA, Weinheim)

  10. Configuration space Faddeev calculations

    Payne, G.L.; Klink, W.H.; Ployzou, W.N.

    1991-01-01

    The detailed study of few-body systems provides one of the most precise tools for studying the dynamics of nuclei. Our research program consists of a careful theoretical study of the nuclear few-body systems. During the past year we have completed several aspects of this program. We have continued our program of using the trinucleon system to investigate the validity of various realistic nucleon-nucleon potentials. Also, the effects of meson-exchange currents in nuclear systems have been studied. Initial calculations using the configuration-space Faddeev equations for nucleon-deuteron scattering have been completed. With modifications to treat relativistic systems, few-body methods can be applied to phenomena that are sensitive to the structure of the individual hadrons. We have completed a review of Relativistic Hamiltonian Dynamics in Nuclear and Particle Physics for Advances in Nuclear Physics. Although it is called a review, it is a large document that contains a significant amount of new research

  11. Simulator configuration management system

    Faulent, J.; Brooks, J.G.

    1990-01-01

    The proposed revisions to ANS 3.5-1985 (Section 5) require Utilities to establish a simulator Configuration Management System (CMS). The proposed CMS must be capable of: Establishing and maintaining a simulator design database. Identifying and documenting differences between the simulator and its reference plant. Tracking the resolution of identified differences. Recording data to support simulator certification, testing and maintenance. This paper discusses a CMS capable of meeting the proposed requirements contained in ANS 3.5. The system will utilize a personal computer and a relational database management software to construct a simulator design database. The database will contain records to all reference nuclear plant data used in designing the simulator, as well as records identifying all the software, hardware and documentation making up the simulator. Using the relational powers of the database management software, reports will be generated identifying the impact of reference plant changes on the operation of the simulator. These reports can then be evaluated in terms of training needs to determine if changes are required for the simulator. If a change is authorized, the CMS will track the change through to its resolution and then incorporate the change into the simulator design database

  12. Approaching Corporate Social Responsibility through Kenneth Burke's Notions of Terministic Screens and Entitlement

    Kampf, Constance

    summarizes Burke's essay, "Antinomies of Definition," from a Grammar of Motives as demonstrating that 'the intrinsic and the extrinsic can change places' "such that to define is always to contextualize and to uncover the absence of a solid ground for a claim to knowledge."2   So if the intrinsic...... allow for user agency, whereas entitlement appears to be focused more at the cultural level, with the agency shared by the 'tribe,' the language itself, and the context of situation.1 In other words, "terministic screens" appear to be extrinsic, while "entitlement" appears to be intrinsic.  Carmichael...... and extrinsic can change places, the interpretive process of "terministic screens" and the constitutive process of "entitlement" may well be reciprocal.  The implications of this reciprocity can be used as a basis for understanding the linguistic and cultural components of Corporate Social Responsibility...

  13. Restricted health care entitlements for child migrants in Europe and Australia

    Østergaard, Liv Stubbe; Norredam, Marie; Mock-Munoz de Luna, Claire

    2017-01-01

    Background: More than 300 000 asylum seeking children were registered in Europe alone during 2015. In this study, we examined entitlements for health care for these and other migrant children in Europe and Australia in a framework based on United Nations Convention of the Rights of the Child (UNCRC......). Methods: Survey to child health professionals, NGO's and European Ombudspersons for Children in 30 EU/EEA countries and Australia, supplemented by desktop research of official documents. Migrant children were categorised as asylum seekers and irregular/undocumented migrants. Results: Five countries....... Twelve European countries have limited entitlements to health care for asylum seeking children, including Germany that stands out as the country with the most restrictive health care policy for migrant children. In Australia entitlements for health care are restricted for asylum seeking children...

  14. Desarrollo de los créditos de libre configuración en el diseño curricular de la Escuela de Enfermería de la Universidad de Huelva Development of free configuration credits in the curriculum of the Nursign College of the University of Huelva

    Enrique Bono Santos

    2004-06-01

    Full Text Available TIPO DE ESTUDIO: cualitativo, basado en el análisis de discursos sociales del profesorado y del alumnado de la Escuela de Enfermería de la Universidad de Huelva sobre el desarrollo de los créditos de Libre Configuración en el diseño curricular de los estudios conducentes a la obtención del título de Diplomado de Enfermería. OBJETIVO: conocer las actitudes, intereses, creencias, expectativas y vivencias de la comunidad educativa de la Escuela de Enfermería de la Universidad de Huelva respecto al desarrollo de los créditos de Libre Configuración. SUJETO Y MÉTODO: se realizaron entrevistas semiestructuradas y grupos de discusión a los sectores del alumnado, profesorado y cargos directivos. RESULTADOS PRINCIPALES: El análisis de los diferentes discursos sociales pone de manifiesto que el desarrollo de los créditos de Libre Configuración en el diseño curricular de Enfermería no cumple su misión formativa global, detectándose, por tanto, una fuerte contradicción entre la filosofía de la Libre Configuración y lo que realmente se lleva a la práctica. Los actores participantes en este proceso formativo lo viven como una carga curricular adicional con escaso valor educativo. CONCLUSIONES: La Libre Configuración no alcanza el objetivo de formación global que se pretendió al ser introducida en el currículo de Enfermería. El malestar generalizado que provoca el desarrollo de la Libre Configuración se ve agravado por la sobrecarga curricular que ya tienen los estudios de Enfermería, cuestionándose no sólo el proceso de aprendizaje específico, sino también la función social de la Institución Universitaria.TYPE OF STUDY: qualitative, bases on the analysis of social speech of teaching staff and student body at the Nursing College of the University of Huelva about the development of Free Configuration credits in the curriculum leading to obtain the Nursing degree. OBJETIVE: to know the attitudes, believes, expectations and

  15. Configuration studies of LHD plasmas

    Okamoto, M.

    1997-01-01

    Configuration studies are performed on the plasmas of The Large Helical Device (LHD), the construction of which is almost completed at the National Institute for Fusion Science. The LHD has flexibility as an experimental device and can have various configurations by changing the poloidal magnetic fields, the pitch of the helical coils (pitch parameter), and the ratio of currents flowing in the two helical coils. Characteristics of the plasma are investigated for the standard configuration, the change in the pitch parameter, and the helical axis configuration

  16. Configuration studies of LHD plasmas

    Okamoto, Masao

    1997-03-01

    Configuration studies are performed on the plasmas of The Large Helical Device (LHD), the construction of which is almost completed at the National Institute for Fusion Science. The LHD has flexibility as an experimental device and can have various configurations by changing the poloidal magnetic fields, the pitch of the helical coils (pitch parameter), and the ratio of currents flowing in the two helical coils. Characteristics of the plasma are investigated for the standard configuration, the change in the pitch parameter, and the helical axis configuration. (author)

  17. The Impact of Active Labor Market Programs and Benefit Entitlement Rules on the Duration of Unemployment

    Lalive, R.; van Ours, J.C.; Zweimüller, J.

    2000-01-01

    Swiss policy makers created a unique link between unemployment benefits and active labor market programs (ALMPs) by making benefit payments conditional on program attendance after 7 months of unemployment duration. We evaluate the effect of ALMPs and benefit entitlement on the duration of

  18. 75 FR 69521 - Evidence for Transfer of Entitlement of Education Benefits; Correction

    2010-11-12

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0708] Evidence for Transfer of Entitlement of Education Benefits; Correction AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice; correction. SUMMARY: The Department of Veterans Affairs (VA) published a collection of...

  19. The Relationship between Academic Entitlement, Academic Performance, and Satisfaction with Life in a College Student Population

    Reysen, Rebekah H.

    2013-01-01

    Although academic entitlement (AE) has become a popular topic of discussion in the media, it has received very little scholarly focus in the higher education literature to date. AE has been defined as a belief held by students that they deserve high grades in school despite a lack of effort put forth into their work (Chowning & Campbell,…

  20. Student Entitlement Models in Australia's National Training System: Expert Views. Occasional Paper

    Bowman, Kaye; McKenna, Suzy

    2016-01-01

    This occasional paper provides the views of 17 "thought leaders" in the Australian vocational education and training (VET) sector. Their insight and opinions were sought to inform a larger research project focused on the student entitlement reforms that were introduced into the national VET system from 2012. These individuals offered a…

  1. Generation Me in the spotlight : Linking reality TV to materialism, entitlement, and narcissism

    Opree, S.J.; Kühne, R.

    2016-01-01

    Today’s youth, the Generation Me, is deemed materialistic, entitled, and narcissistic. Individuality has become an important value in child-rearing and is cultivated in the media—especially within the reality TV genre. The aim of this study was to investigate whether adolescents’ and emerging

  2. Human Rights as Practice: Dalit Women's Collective Action to Secure Livelihood Entitlements in rural South India

    Mangubhai, Y.

    2012-01-01

    In this dissertation, I investigate how Dalit women in rural South India secure livelihood entitlements by analysing processes of social exclusion as well as collective action by these women through their perspectives. This problematic requires focus on how caste, class and gender mutually construct

  3. 76 FR 30366 - Draft Alert Entitled “Preventing Occupational Respiratory Disease From Dampness in Office...

    2011-05-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention [Docket Number NIOSH-238] Draft Alert Entitled ``Preventing Occupational Respiratory Disease From Dampness in Office... Institute for Occupational Safety and Health, Centers for Disease Control and Prevention. [FR Doc. 2011...

  4. International comparison of systems to determine entitlements to medical specialist care: performance and organizational issues

    E.A. Stolk (Elly); A.A. de Bont (Antoinette); M.J. Poley (Marten); S. Jerak (Sonja); M. Stroet (Mary); F.F.H. Rutten (Frans)

    2008-01-01

    textabstractSummary Objective: CVZ has asked us to provide a comparison of criteria and procedures that different countries use to determine entitlements to medical specialist care. This question was asked within the context of the recent introduction of the DBC (diagnosis treatment combinations)

  5. 20 CFR 725.201 - Who is entitled to benefits; contents of this subpart.

    2010-04-01

    ... surviving spouse or child, or the surviving dependent brothers or sisters, where there is no surviving... part the term “total disability” shall mean partial disability with respect to a claim for which... entitlement to benefits applicable to a miner, or a surviving spouse, child, parent, brother, or sister, and...

  6. 24 CFR 350.5 - Creation of Participant's Security Entitlement; Security Interests.

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Creation of Participant's Security... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.5 Creation of Participant's Security Entitlement... States to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  7. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security... of the United States to secure deposits of public money, including, without limitation, deposits to...

  8. Entitlement Can Both Decrease and Increase Consumer Susceptibility to Social Influence

    van der Heide, Martine; Fennis, Bob; van Ittersum, Koert; Trampe, Debra; Diehl, Kristin; Yoon, Carolyn

    2015-01-01

    Two studies indicate that entitlement—a sense that one deserves special treatment and is exempt from normal social demands—can both buffer and boost consumers’ proneness to social influence. Specifically, Study 1 shows that entitlement reduces susceptibility to consistency appeals. Study 2, however,

  9. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    2010-07-01

    ... REGULATIONS GOVERNING BOOK-ENTRY SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.4... Entitlement is created when a Federal Reserve Bank indicates by book-entry that a Book-entry Sallie Mae... the books of a Federal Reserve Bank is thereby effected and perfected, and has priority over any other...

  10. 41 CFR 302-2.3 - What determines my entitlements and allowances for relocation?

    2010-07-01

    ... 41 Public Contracts and Property Management 4 2010-07-01 2010-07-01 false What determines my entitlements and allowances for relocation? 302-2.3 Section 302-2.3 Public Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES INTRODUCTION 2-EMPLOYEES ELIGIBILITY REQUIREMENTS...

  11. A Non-Member Spouse's Entitlement To The Member's Pension Interest

    Motseotsile Clement Marumoagae

    2014-12-01

    Full Text Available It is important that married couples seek legal advice with regard to the assets falling within their joint estate, more particularly their retirement benefits. This article reflects on the entitlement (if any of non-member spouses to their spouses' retirement fund benefits. Pension benefits can be due before, during or after divorce, and parties to the marriage should be aware of their rights with regard to the accruing pension benefits of their spouses. While it is settled law that non-member spouses are entitled to receive a portion of their member spouses' pension benefits (known as "pension interest" immediately on divorce, it is not particularly clear whether non-member spouses are also entitled to receive the same before or sometime after divorce. In this article I provide a contextual understanding of the entitlements (if any which spouses or former spouses of members of pension funds have on such member spouses' retirement benefits. Furthermore, it shown in this article that various divisions of South African High Courts have been inconsistent in how they have approached the issue of the pension interest between divorcing spouses or divorced ex-spouses.

  12. 38 CFR 3.274 - Relationship of net worth to pension entitlement.

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Relationship of net worth to pension entitlement. 3.274 Section 3.274 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUDICATION Pension, Compensation, and Dependency and Indemnity Compensation Regulations...

  13. Developmental Trajectories of Work Values and Job Entitlement Beliefs in the Transition to Adulthood

    Chow, Angela; Krahn, Harvey J.; Galambos, Nancy L.

    2014-01-01

    Employing a life span developmental systems perspective, this study used a 5-wave (1985-1992) Canadian longitudinal data set (N = 404) to examine trajectories of intrinsic and extrinsic work values and job entitlement beliefs from age 18 to 25. Piecewise growth models (Slope 1: age 18-20; Slope 2: age 20-25) showed intriguing patterns of change.…

  14. Measuring policy entitlements at the micro-level: maternity and parental leave in Europe

    Bártová, A.; Emery, T.

    2018-01-01

    Comparative social policy analysis has been shaped by the measurement of policy as a macro phenomenon. However, social policy theories have consistently asserted that policy entitlements vary across class, gender, ethnicity and the life-course. This paper synthesises a number of innovations to

  15. 20 CFR 404.467 - Nonpayment of benefits; individual entitled to disability insurance benefits or childhood...

    2010-04-01

    ... type of substantial gainful activity. (b) Childhood disability benefits. An individual who has attained... Nonpayments of Benefits § 404.467 Nonpayment of benefits; individual entitled to disability insurance benefits... definition of disability for disability insurance benefits purposes based on statutory blindness, as defined...

  16. 5 CFR 1651.2 - Entitlement to funds in a deceased participant's account.

    2010-01-01

    ... BOARD DEATH BENEFITS § 1651.2 Entitlement to funds in a deceased participant's account. (a) Death... participant will be paid as a death benefit to the individual or individuals surviving the participant, in the... representation in accordance with § 1651.6; (4) If there are no beneficiaries or persons as described in...

  17. Configurational entropy of glueball states

    Bernardini, Alex E., E-mail: alexeb@ufscar.br [Departamento de Física, Universidade Federal de São Carlos, PO Box 676, 13565-905, São Carlos, SP (Brazil); Braga, Nelson R.F., E-mail: braga@if.ufrj.br [Instituto de Física, Universidade Federal do Rio de Janeiro, Caixa Postal 68528, RJ 21941-972 (Brazil); Rocha, Roldão da, E-mail: roldao.rocha@ufabc.edu.br [CMCC, Universidade Federal do ABC, UFABC, 09210-580, Santo André (Brazil)

    2017-02-10

    The configurational entropy of glueball states is calculated using a holographic description. Glueball states are represented by a supergravity dual picture, consisting of a 5-dimensional graviton–dilaton action of a dynamical holographic AdS/QCD model. The configurational entropy is studied as a function of the glueball spin and of the mass, providing information about the stability of the glueball states.

  18. Distance between configurations in Markov chain Monte Carlo simulations

    Fukuma, Masafumi; Matsumoto, Nobuyuki; Umeda, Naoya

    2017-12-01

    For a given Markov chain Monte Carlo algorithm we introduce a distance between two configurations that quantifies the difficulty of transition from one configuration to the other configuration. We argue that the distance takes a universal form for the class of algorithms which generate local moves in the configuration space. We explicitly calculate the distance for the Langevin algorithm, and show that it certainly has desired and expected properties as distance. We further show that the distance for a multimodal distribution gets dramatically reduced from a large value by the introduction of a tempering method. We also argue that, when the original distribution is highly multimodal with large number of degenerate vacua, an anti-de Sitter-like geometry naturally emerges in the extended configuration space.

  19. Viscous Design of TCA Configuration

    Krist, Steven E.; Bauer, Steven X. S.; Campbell, Richard L.

    1999-01-01

    The goal in this effort is to redesign the baseline TCA configuration for improved performance at both supersonic and transonic cruise. Viscous analyses are conducted with OVERFLOW, a Navier-Stokes code for overset grids, using PEGSUS to compute the interpolations between overset grids. Viscous designs are conducted with OVERDISC, a script which couples OVERFLOW with the Constrained Direct Iterative Surface Curvature (CDISC) inverse design method. The successful execution of any computational fluid dynamics (CFD) based aerodynamic design method for complex configurations requires an efficient method for regenerating the computational grids to account for modifications to the configuration shape. The first section of this presentation deals with the automated regridding procedure used to generate overset grids for the fuselage/wing/diverter/nacelle configurations analysed in this effort. The second section outlines the procedures utilized to conduct OVERDISC inverse designs. The third section briefly covers the work conducted by Dick Campbell, in which a dual-point design at Mach 2.4 and 0.9 was attempted using OVERDISC; the initial configuration from which this design effort was started is an early version of the optimized shape for the TCA configuration developed by the Boeing Commercial Airplane Group (BCAG), which eventually evolved into the NCV design. The final section presents results from application of the Natural Flow Wing design philosophy to the TCA configuration.

  20. Stable configurations in social networks

    Bronski, Jared C.; DeVille, Lee; Ferguson, Timothy; Livesay, Michael

    2018-06-01

    We present and analyze a model of opinion formation on an arbitrary network whose dynamics comes from a global energy function. We study the global and local minimizers of this energy, which we call stable opinion configurations, and describe the global minimizers under certain assumptions on the friendship graph. We show a surprising result that the number of stable configurations is not necessarily monotone in the strength of connection in the social network, i.e. the model sometimes supports more stable configurations when the interpersonal connections are made stronger.

  1. Device configuration-management system

    Nowell, D.M.

    1981-01-01

    The Fusion Chamber System, a major component of the Magnetic Fusion Test Facility, contains several hundred devices which report status to the Supervisory Control and Diagnostic System for control and monitoring purposes. To manage the large number of diversity of devices represented, a device configuration management system was required and developed. Key components of this software tool include the MFTF Data Base; a configuration editor; and a tree structure defining the relationships between the subsystem devices. This paper will describe how the configuration system easily accomodates recognizing new devices, restructuring existing devices, and modifying device profile information

  2. Is the Narcissistic Personality Inventory Still Relevant? A Test of Independent Grandiosity and Entitlement Scales in the Assessment of Narcissism

    Miller, Joshua D.; Price, Joanna; Campbell, W. Keith

    2012-01-01

    Some scholars have called for the replacement of the Narcissistic Personality Inventory (NPI) with more narrow scales measuring grandiosity and entitlement instead. In the current study, the authors examined the relations among the NPI and measures of grandiosity and entitlement, as well as in relation to a measure of the Five-Factor Model (FFM).…

  3. 20 CFR 410.250 - Effect of conviction of felonious and intentional homicide on entitlement to benefits.

    2010-04-01

    ... intentional homicide on entitlement to benefits. 410.250 Section 410.250 Employees' Benefits SOCIAL SECURITY... conviction of felonious and intentional homicide on entitlement to benefits. An individual who has been finally convicted by a court of competent jurisdiction of the felonious and intentional homicide of a...

  4. Airport Configuration Prediction, Phase I

    National Aeronautics and Space Administration — There is presently poor knowledge throughout the National Airspace System (NAS) of the airport configurations currently in use at each airport. There is even less...

  5. Belene NPP project configuration management

    Matveev, A.

    2009-01-01

    The configuration management includes: change identification; change assessment; change coordination; change approval or rejection; Change introduction. One of the main tasks while implementing the above processes is the analysis of the effect of one change upon all the related elements

  6. Bayesian image restoration, using configurations

    Thorarinsdottir, Thordis

    2006-01-01

    In this paper, we develop a Bayesian procedure for removing noise from images that can be viewed as noisy realisations of random sets in the plane. The procedure utilises recent advances in configuration theory for noise free random sets, where the probabilities of observing the different boundary configurations are expressed in terms of the mean normal measure of the random set. These probabilities are used as prior probabilities in a Bayesian image restoration approach. Estimation of the re...

  7. Entitlement to concessionary public transport and wellbeing: a qualitative study of young people and older citizens in London, UK.

    Jones, Alasdair; Goodman, Anna; Roberts, Helen; Steinbach, Rebecca; Green, Judith

    2013-08-01

    Access to transport is an important determinant of health, and concessionary fares for public transport are one way to reduce the 'transport exclusion' that can limit access. This paper draws on qualitative data from two groups typically at risk of transport exclusion: young people (12-18 years of age, n = 118) and older citizens (60+ years of age, n = 46). The data were collected in London, UK, where young people and older citizens are currently entitled to concessionary bus travel. We focus on how this entitlement is understood and enacted, and how different sources of entitlement mediate the relationship between transport and wellbeing. Both groups felt that their formal entitlement to travel for free reflected their social worth and was, particularly for older citizens, relatively unproblematic. The provision of a concessionary transport entitlement also helped to combat feelings of social exclusion by enhancing recipients' sense of belonging to the city and to a 'community'. However, informal entitlements to particular spaces on the bus reflected less valued social attributes such as need or frailty. Thus in the course of travelling by bus the enactment of entitlements to space and seats entailed the negotiation of social differences and personal vulnerabilities, and this carried with it potential threats to wellbeing. We conclude that the process, as well as the substance, of entitlement can mediate wellbeing; and that where the basis for providing a given entitlement is widely understood and accepted, the risks to wellbeing associated with enacting that entitlement will be reduced. Copyright © 2012 Elsevier Ltd. All rights reserved.

  8. Entitlement theory of justice and end-state fairness in the allocation of goods

    Ju, Biung-Ghi; Moreno-Ternero, Juan D.

    2016-01-01

    Robert Nozick allegedly introduced his liberal theory of private ownership as an objection to theories of end-state justice. Nevertheless, we show that, in a stylized framework for the allocation of goods in joint ventures, both approaches can be seen as complementary. More precisely, in such a context, self-ownership (the basis for Nozick's entitlement theory of justice) followed by voluntary transfer (Nozick's principle of just transfer) can lead to end-state fairness (as well as Pareto eff...

  9. Are undocumented migrants’ entitlements and barriers to healthcare a public health challenge for the European Union?

    De Vito, Elisabetta; de Waure, Chiara; Specchia, Maria Lucia; Parente, Paolo; Azzolini, Elena; Frisicale, Emanuela Maria; Favale, Marcella; Teleman, Adele Anna; Ricciardi, Walter

    2016-01-01

    Undocumented migrants (UMs) are at higher risk for health problems because of their irregular status and the consequences of economic and social marginalization. Moreover, the emergent reality of undocumented migration in Europe calls for action in the field of management of UM’s health demands as their access to health services has become a sensitive political and social issue. In this light, this paper aims to address UMs’ entitlement and barriers to healthcare and related policies citing e...

  10. Perceived entitlement causes discrimination against attractive job candidates in the domain of relatively less desirable jobs.

    Lee, Margaret; Pitesa, Marko; Pillutla, Madan M; Thau, Stefan

    2018-03-01

    People generally hold positive stereotypes of physically attractive people and because of those stereotypes often treat them more favorably. However, we propose that some beliefs about attractive people, specifically, the perception that attractive individuals have a greater sense of entitlement than less attractive individuals, can result in negative treatment of attractive people. We examine this in the context of job selection and propose that for relatively less desirable jobs, attractive candidates will be discriminated against. We argue that the ascribed sense of entitlement to good outcomes leads to perceptions that attractive individuals are more likely to be dissatisfied working in relatively less desirable jobs. When selecting candidates for relatively less desirable jobs, decision makers try to ascertain whether a candidate would be satisfied in those jobs, and the stereotype of attractive individuals feeling entitled to good outcomes makes decision makers judge attractive candidates as more likely to be dissatisfied in relatively less (but not more) desirable jobs. Consequently, attractive candidates are discriminated against in the selection for relatively less desirable jobs. Four experiments found support for this theory. Our results suggest that different discriminatory processes operate when decision makers select among candidates for relatively less desirable jobs and that attractive people might be systematically discriminated against in a segment of the workforce. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  11. Knowledge Based Product Configuration - a documentatio tool for configuration projects

    Hvam, Lars; Malis, Martin

    2003-01-01

    . A lot of knowledge isput into these systems and many domain experts are involved. This calls for an effective documentation system in order to structure this knowledge in a way that fits to the systems. Standard configuration systems do not support this kind of documentation. The chapter deals...... with the development of a Lotus Notes application that serves as a knowledge based documentation tool for configuration projects. A prototype has been developed and tested empirically in an industrial case-company. It has proved to be a succes....

  12. Moderator Configuration Options for ESS

    Zanini, L.; Batkov, K.; Klinkby, Esben Bryndt

    2016-01-01

    The current, still evolving status of the design and the optimization work for the moderator configuration for the European Spallation Source is described. The moderator design has been strongly driven by the low-dimensional moderator concept recently proposed for use in spallation neutron sources...... or reactors. Quasi-two dimensional, disc- or tube-shaped moderators,can provide strong brightness increase (factor of 3 or more) with respect to volume para-H2moderators, which constitute the reference, state-of-the-art technology for high-intensity coupled moderators. In the design process other, more...... conventional, principles were also considered,such as the importance of moderator positioning, of the premoderator, and beam extraction considerations. Different design and configuration options are evaluated and compared with the reference volume moderator configuration described in the ESS Technical Design...

  13. Development of Simulator Configuration Tool

    Nedrelid, Olav; Pettersen, Geir

    1996-01-01

    The main objective of the development of a Simulator Configuration Tool (SCT) is to achieve faster and more efficient production of dynamic simulators. Through application of versatile graphical interfaces, the simulator builder should be able to configure different types of simulators including full-scope process simulators. The SCT should be able to serve different simulator environments. The configuration tool communicates with simulator execution environments through a TCP/IP-based interface, Communication with a Model Server System developed at Institutt for energiteknikk has been established and used as test case. The system consists of OSF/Motif dialogues for operations requiring textual input, list selections etc., and uses the Picasso-3 User Interface Management System to handle presentation of static and dynamic graphical information. (author)

  14. BAYESIAN IMAGE RESTORATION, USING CONFIGURATIONS

    Thordis Linda Thorarinsdottir

    2011-05-01

    Full Text Available In this paper, we develop a Bayesian procedure for removing noise from images that can be viewed as noisy realisations of random sets in the plane. The procedure utilises recent advances in configuration theory for noise free random sets, where the probabilities of observing the different boundary configurations are expressed in terms of the mean normal measure of the random set. These probabilities are used as prior probabilities in a Bayesian image restoration approach. Estimation of the remaining parameters in the model is outlined for salt and pepper noise. The inference in the model is discussed in detail for 3 X 3 and 5 X 5 configurations and examples of the performance of the procedure are given.

  15. Projective configurations in projectivegeometrical drawings

    Ivashchenko Andrey Viktorovich

    2015-05-01

    Full Text Available The article focuses on the optimization of the earlier discussed computer method of obtaining new forms of polyhedra based on projective geometry drawings (trace Diagrams.While working on getting new multifaceted forms by projective geometry methods based on the well-known models of polyhedra on the first stage of the work it is required to calculate the parameters of projective geometry drawings, and then to build them. This is an often used apparatus of analytical geometry. According to it, at first the parameters of the polyhedron (core system of planes are calculated, then we obtain the equation of the plane of the face of the polyhedron, and finally we obtain the equations of lines the next plane faces on the selected curve plane. At each stage of application such a method requires the use of the algorithms of floating point arithmetic, on the one hand, leads to some loss of accuracy of the results and, on the other hand, the large amount of computer time to perform these operations in comparison with integer arithmetic operations.The proposed method is based on the laws existing between the lines that make up the drawing - the known configurations of projective geometry (complete quadrilaterals, configuration of Desargues, Pappus et al..The authors discussed in detail the analysis procedure of projective geometry drawing and the presence of full quadrilaterals, Desargues and Pappus configurations in it.Since the composition of these configurations is invariant with respect to projective change of the original nucleus, knowing them, you can avoid the calculations when solving the equations for finding direct projective geometry drawing analytically, getting them on the basis of belonging to a particular configuration. So you can get a definite advantage in accuracy of the results, and in the cost of computer time. Finding these basic configurations significantly enriches the set of methods and the use of projective geometry drawings.

  16. The expanding universe of mass analyzer configurations for biological analysis.

    Calvete, Juan J

    2014-01-01

    Mass spectrometry (MS) is an analytical technique that measures the mass-to-charge ratio of electrically charged gas-phase particles. All mass spectrometers combine ion formation, mass analysis, and ion detection. Although mass analyzers can be regarded as sophisticated devices that manipulate ions in space and time, the rich diversity of possible ways to combine ion separation, focusing, and detection in dynamic mass spectrometers accounts for the large number of instrument designs. A historical perspective of the progress in mass spectrometry that since 1965 until today have contributed to position this technique as an indispensable tool for biological research has been recently addressed by a privileged witness of this golden age of MS (Gelpí J. Mass Spectrom 43:419-435, 2008; Gelpí J. Mass Spectrom 44:1137-1161, 2008). The aim of this chapter is to highlight the view that the operational principles of mass spectrometry can be understood by a simple mathematical language, and that an understanding of the basic concepts of mass spectrometry is necessary to take the most out of this versatile technique.

  17. Instance-specific algorithm configuration

    Malitsky, Yuri

    2014-01-01

    This book presents a modular and expandable technique in the rapidly emerging research area of automatic configuration and selection of the best algorithm for the instance at hand. The author presents the basic model behind ISAC and then details a number of modifications and practical applications. In particular, he addresses automated feature generation, offline algorithm configuration for portfolio generation, algorithm selection, adaptive solvers, online tuning, and parallelization.    The author's related thesis was honorably mentioned (runner-up) for the ACP Dissertation Award in 2014,

  18. Installing, Configuring and Implementing an SMF in Joomla

    Maria Cristina ENACHE

    2009-01-01

    Full Text Available This paper’s goal is to show how an asynchronous communication componentwhich can also be used in teaching activities was installed, configured andimplemented on the website of the Department of Accounting and EconomicInformatics of the Economics Faculty within the Dunarea de Jos University inGalati. This component is known under the name of forum or discussionboard.

  19. Configurable 3D rotational X-ray reconstruction

    Nguyen, Xuan Huy

    2012-01-01

    This report is one of the deliverables of the project "Configurable 3D Rotational X-ray Reconstruction", carried out by the author as the final part of the Professional Doctorate in Engineering (PDEng) degree program in Software Technology provided by Eindhoven University of Technology and Stan

  20. Chunking Strategy as a Tool for Teaching Electron Configuration

    Adhikary, Chandan; Sana, Sibananda; Chattopadhyay, K. N.

    2015-01-01

    Chunk-based strategy and mnemonics have been developed to write ground state electron configurations of elements, which is a routine exercise for the higher secondary (pre-university) level general chemistry students. To assimilate a better understanding of the nature of chemical reactions, an adequate knowledge of the periodic table of elements…

  1. Energy savings from transit passes : an evaluation of the University at Buffalo NFTA transit pass program for students, faculty, and staff.

    2014-04-01

    The University Transportation Research Center Region 2 supported a study entitled Connections Beyond Campus: An Evaluation of the Niagara Frontier Transportation : Authority University at Buffalo Transit Pass Program. Unlimited Access t...

  2. NCCDS configuration management process improvement

    Shay, Kathy

    1993-01-01

    By concentrating on defining and improving specific Configuration Management (CM) functions, processes, procedures, personnel selection/development, and tools, internal and external customers received improved CM services. Job performance within the section increased in both satisfaction and output. Participation in achieving major improvements has led to the delivery of consistent quality CM products as well as significant decreases in every measured CM metrics category.

  3. Kramers Pairs in configuration interaction

    Avery, John Scales; Avery, James Emil

    2003-01-01

    The theory of symmetry-preserving Kramers pair creation operators is reviewed and formulas for applying these operators to configuration interaction calculations are derived. A new and more general type of symmetry-preserving pair creation operator is proposed and shown to commute with the total ...

  4. Bayesian image restoration, using configurations

    Thorarinsdottir, Thordis

    configurations are expressed in terms of the mean normal measure of the random set. These probabilities are used as prior probabilities in a Bayesian image restoration approach. Estimation of the remaining parameters in the model is outlined for salt and pepper noise. The inference in the model is discussed...

  5. Bayesian image restoration, using configurations

    Thorarinsdottir, Thordis Linda

    2006-01-01

    configurations are expressed in terms of the mean normal measure of the random set. These probabilities are used as prior probabilities in a Bayesian image restoration approach. Estimation of the remaining parameters in the model is outlined for the salt and pepper noise. The inference in the model is discussed...

  6. Equilibrium: three-dimensional configurations

    Anon.

    1987-01-01

    This chapter considers toroidal MHD configurations that are inherently three-dimensional. The motivation for investigation such complicated equilibria is that they possess the potential for providing toroidal confinement without the need of a net toroidal current. This leads to a number of advantages with respect to fusion power generation. First, the attractive feature of steady-state operation becomes more feasible since such configurations no longer require a toroidal current transformer. Second, with zero net current, one potentially dangerous class of MHD instabilities, the current-driven kink modes, is eliminated. Finally, three-dimensional configurations possess nondegenerate flux surfaces even in the absence of plasma pressure and plasma current. Although there is an enormous range of possible three-dimensional equilibria, the configurations of interest are accurately described as axisymmetric tori with superimposed helical fields; furthermore, they possess no net toroidal current. Instead, two different and less obvious restoring forces are developed: the helical sideband force and the toroidal dipole current force. Each is discussed in detail in Chapter 7. A detailed discussion of the parallel current constraint, including its physical significance, is given in section 7.2. A general analysis of helical sideband equilibria, along with a detailed description of the Elmo bumpy torus, is presented in sections 7.3 and 7.4. A general description of toroidal dipole-current equilibria, including a detailed discussion of stellarators, heliotrons, and torsatrons, is given in sections 7.5 and 7.6

  7. Product Configuration Systems and Productivity

    Pedersen, Jørgen Lindgaard; Edwards, Kasper

    2004-01-01

    Twelve companies have been interviewed with the purpose to get information about technical, economic and organisational matters in respect of Product Configuration Systems (PCS).Combinations of qualitative interviews and quantitative scoring have been used in ranking expected and realized results...

  8. Environmental restoration project configuration control

    Hutterman, L.L.

    1991-01-01

    This paper provides an overview of the approach that Westinghouse Idaho Nuclear Company, Inc. (WINCO) is using for the implementation of the configuration control requirements for a major system acquisition under the guidance of US Department of Energy (DOE) Order 4700.1, open-quotes Project Management System,close quotes for environmental restoration. The two major features of the WINCO environmental restoration approach relate to (1) the product and (2) the maintenance of the baseline for many sites in different phases at the same time. Historically, a project has typically produced a product. Environmental restoration in some ways produces no typical project product. Essentially, what is produced and what configuration control management is exercised on is one of the following: (1) the development of clean dirt, (2) the documentation to support clean dirt, or (3) the track record of each of the sites. It is the latter approach that this paper deals with. This approach is unique in that there are four baselines [cost, schedule, scope, and technical (the track record product)] rather than the typical three. This is essential in configuration management due to the lack of a uniquely identifiable product for each site. Essentially, the philosophy behind the four-part configuration controls allows the technical baseline to fulfill the function typically met by the identifiable product

  9. Counterstatement to Article Entitled "A Framework for Evaluation of Marine Spatial Data Geoportals Using Case Studies"

    Seip Christian

    2015-12-01

    Full Text Available In December 2014 in volume 60 issue 4 a paper was published entitled “A Framework for Evaluation of Marine Spatial Data Geoportals Using Case Studies” by Marina Tavra, Vlado Cetl and Tea Duplancic Leder which is suspected to constitute academic misconduct. This comment reasons that the core of the paper was taken from another source and thus does not offer new and original scientific work and therefore does not add knowledge to the body of science. Furthermore it argues that apart from the plagiarism the paper shows major weaknesses and thus should have not been published even it was not plagiarized.

  10. Effectiveness of Relationship Marketing Tactics in a University Setting

    Trocchia, Philip J.; Finney, R. Zachary; Finney, Treena Gillespie

    2013-01-01

    We test the correlation between student perception of three university relationship-building tactics--commercial friendships, preferential treatment, and tangible rewards--with university student satisfaction. We also test whether two student characteristics--enduring involvement with education and sense of entitlement--have a moderating effect on…

  11. Alien Registration Number Verification via the U.S. Citizenship and Immigration Service's Systematic Alien Verification for Entitlements System

    Ainslie, Frances M; Buck, Kelly R

    2008-01-01

    The purpose of this study was to evaluate the implications of conducting high-volume automated checks of the United States Citizenship and Immigration Services Systematic Allen Verification for Entitlements System (SAVE...

  12. ATLAS software configuration and build tool optimisation

    Rybkin, Grigory; Atlas Collaboration

    2014-06-01

    ATLAS software code base is over 6 million lines organised in about 2000 packages. It makes use of some 100 external software packages, is developed by more than 400 developers and used by more than 2500 physicists from over 200 universities and laboratories in 6 continents. To meet the challenge of configuration and building of this software, the Configuration Management Tool (CMT) is used. CMT expects each package to describe its build targets, build and environment setup parameters, dependencies on other packages in a text file called requirements, and each project (group of packages) to describe its policies and dependencies on other projects in a text project file. Based on the effective set of configuration parameters read from the requirements files of dependent packages and project files, CMT commands build the packages, generate the environment for their use, or query the packages. The main focus was on build time performance that was optimised within several approaches: reduction of the number of reads of requirements files that are now read once per package by a CMT build command that generates cached requirements files for subsequent CMT build commands; introduction of more fine-grained build parallelism at package task level, i.e., dependent applications and libraries are compiled in parallel; code optimisation of CMT commands used for build; introduction of package level build parallelism, i. e., parallelise the build of independent packages. By default, CMT launches NUMBER-OF-PROCESSORS build commands in parallel. The other focus was on CMT commands optimisation in general that made them approximately 2 times faster. CMT can generate a cached requirements file for the environment setup command, which is especially useful for deployment on distributed file systems like AFS or CERN VMFS. The use of parallelism, caching and code optimisation significantly-by several times-reduced software build time, environment setup time, increased the efficiency of

  13. Narcissistic self-esteem or optimal self-esteem? A Latent Profile Analysis of self-esteem and psychological entitlement

    Stronge, Sam; Cichocka, Aleksandra; Sibley, Chris G.

    2016-01-01

    Research into the relationship between self-esteem and narcissism has produced conflicting results, potentially caused by hidden subpopulations that exhibit distinct positive or negative associations. This research uses Latent Profile Analysis to identify profiles within a national panel study (N = 6,471) with differing relationships between psychological entitlement and self-esteem. We identified a narcissistic self-esteem profile (9%) characterised by high entitlement and high self-esteem, ...

  14. Effects of customer entitlement on service workers' physical and psychological well-being: a study of waitstaff employees.

    Fisk, Glenda M; Neville, Lukas B

    2011-10-01

    This exploratory study examines the nature of customer entitlement and its impact on front-line service employees. In an open-ended qualitative inquiry, 56 individuals with waitstaff experience described the types of behaviors entitled customers engage in and the kinds of service-related "perks" these individuals feel deserving of. Participants explained how they responded to entitled customers, how and when managers became involved, and how their dealings with these patrons influenced their subjective physical and psychological well-being. We found that the behaviors of entitled customers negatively impacted waitstaff employees. Participants reported physiological arousal, negative affect, burnout, and feelings of dehumanization as a result of dealing with these patrons. While respondents drew on a variety of strategies to manage their encounters with entitled customers, they indicated workplace support was often informal and described feeling abandoned by management in dealing with this workplace stressor. Approaching customer entitlement as a form of microaggression, we offer recommendations for practice and suggest new directions for future research. . (PsycINFO Database Record (c) 2011 APA, all rights reserved).

  15. The Making of a Good Woman: Extended Parental Leave Entitlements and Mothers' Work Commitment in Germany.

    Gangl, Markus; Ziefle, Andrea

    2015-09-01

    The authors investigate the relationship between family policy and women's attachment to the labor market, focusing specifically on policy feedback on women's subjective work commitment. They utilize a quasi-experimental design to identify normative policy effects from changes in mothers' work commitment in conjunction with two policy changes that significantly extended the length of statutory parental leave entitlements in Germany. Using unique survey data from the German Socio-Economic Panel and difference-in-differences, triple-differenced, and instrumental variables estimators for panel data, they obtain consistent empirical evidence that increasing generosity of leave entitlements led to a decline in mothers' work commitment in both East and West Germany. They also probe potential mediating mechanisms and find strong evidence for role exposure and norm setting effects. Finally, they demonstrate that policy-induced shifts in mothers' preferences have contributed to. retarding women's labor force participation after childbirth in Germany, especially as far as mothers' return to full-time employment is concerned.

  16. Entitled vengeance: A meta-analysis relating narcissism to provoked aggression.

    Rasmussen, Kyler

    2016-07-01

    Narcissism has long been used to predict aggressive or vengeful responses to provocations from others. The strength of this relation can, however, vary widely from study to study. Narcissism and revenge were examined in 84 independent samples (N = 11297), along with the moderating role of sample type (i.e., child/adolescent, prisoner, undergraduate, or general samples), type of narcissism measure used (i.e., Narcissistic Personality Inventory, Psychological Entitlement Scale, Short D3, etc.), the nature of the provocation, and the type of provoked aggression examined. Narcissism was positively related to provoked aggression across studies (ρ = .25), but that relation was stronger in child/adolescent samples (ρ = .36) and when measures of entitlement or vulnerable narcissism were employed (ρ = .29). Implications for practical research, as well as neglected areas of research on narcissism and provoked aggression are discussed. Aggr. Behav. 42:362-379, 2016. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.

  17. Entitlement to Sickness Benefits in Sweden: The Social Insurance Officers Experiences

    Ulrika Müssener

    2008-01-01

    Full Text Available Background: Social insurance offices (SIOs handle a wide range of complex assessments of the entitlement to sickness benefits for an increasing number of clients on sick leave and consequently, the demands on the SIOs have increased considerably.Aim: To gain deeper knowledge of the problems experienced by the SIOs in their work associated with entitlement to sickness benefits.Method: A descriptive and explorative qualitative approach was used to analyse data from two focus-group interviews, including six participants in each group.Results: The participants discussed different dilemmas in regard to; physicians’ responsibility for issuing sickness certificates, interactions with the insured individuals, disclosure of decisions, communications with medical consultants, documentation of sickness benefit claims, threats in the workplace, as well as their own competence. The SIOs regarded incomplete information on sickness certificates as a main problem, because they frequently had to contact the client and the physicians who issued the certificates in order to obtain further details, leading to delays in the decision-making whether to grant sickness benefits.Conclusions: More knowledge regarding SIOs work is required to improve the methods used in the sickness insurance system and to ensure adequate training of new staff members.

  18. Economic Entitlements via Entrepreneurial Conduct? Women and Financial Inclusion in Neo-liberal India

    K. Kalpana

    2015-08-01

    Full Text Available This paper examines the gendered local character of neoliberalism at the household level by focusing on microcredit/finance programs in India. Microfinance promoted by the state as an informal activity targeting women is intended to alleviate income inequalities, even as it contributes to maintaining the world capitalist system. In India the inception of microfinance-based Self Help Groups (SHGs or peer groups of women savers and borrowers in the 1990s has coincided with a rightward turn towards neoliberal policies of structural adjustment, privatization and economic deregulation. In this paper, I show how Indian policy makers have endeavored to make women's economic entitlements contingent upon their disciplined financial behavior and their willing participation in neoliberal agendas of creating and deepening 'self-regulating' markets at village levels. Drawing on an ethnographic study conducted in a South Indian state, I show that the community level 'neoliberal disciplining' that microfinance entails does not proceed without resistance. Whilst SHGs seek to constitute women as fiscally disciplined savers and borrowers, women stake their 'rightful' entitlement to bank credit even as they reject outright the entrepreneurial subjectivities they are expected to assume. They pursue purposes and ends that extend well beyond 'financial inclusion.'

  19. Configuring Symantec AntiVirus

    Shimonski, Robert

    2003-01-01

    This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec''s philosophy of "Centralized Antivirus Management." For the same reasons that Symantec bundled together these previously separate products, the book will provide system administrators with a holistic approach to defending their networks from malicious viruses. This book will also serve as a Study Guide for those pursuing Symantec Product Specialist Certifications.Configuring Symantec AntiVirus Enterprise Edition contains step-by-step instructions on how to Design, implement and leverage the Symantec Suite of products in the enterprise.ØFirst book published on market leading product and fast-growing certification. Despite the popularity of Symantec''s products and Symantec Product Specialist certifications, there are no other books published or announced.ØLess expensive substitute for costly on-sight training. Symantec off...

  20. Snowflake Divertor Configuration in NSTX

    Soukhanovskii, V.A.; Ahn, Joonwook; Bell, R.E.; Gates, D.A.; Gerhardt, S.; Kaita, R.; Kolemen, E.; Kugel, H.W.; LeBlanc, B.; Maingi, Rajesh; Maqueda, R.J.; McLean, Adam G.; Menard, J.E.; Mueller, D.; Paul, S.F.; Raman, R.; Roquemore, L.; Ryutov, D.D.; Scott, H.A.

    2011-01-01

    Steady-state handling of divertor heat flux is a critical issue for present and future conventional and spherical tokamaks with compact high power density divertors. A novel 'snowflake' divertor (SFD) configuration that takes advantage of magnetic properties of a second-order poloidal null has been predicted to have a larger plasma-wetted area and a larger divertor volume, in comparison with a standard first-order poloidal X-point divertor configuration. The SFD was obtained in 0.8 MA, 4-6 MW NBI-heated H-mode discharges in NSTX using two divertor magnetic coils. The SFD led to a partial detachment of the outer strike point even in low-collisionality scrape-off layer plasma obtained with lithium coatings in NSTX. Significant divertor peak heat flux reduction and impurity screening have been achieved simultaneously with good core confinement and MHD properties.

  1. 'Snowflake' divertor configuration in NSTX

    Soukhanovskii, V.A.; Ahn, J.-W.; Bell, R.E.; Gates, D.A.; Gerhardt, S.; Kaita, R.; Kolemen, E.; Kugel, H.W.; LeBlanc, B.P.; Maingi, R.; Maqueda, R.; McLean, A.; Menard, J.E.; Mueller, D.M.; Paul, S.F.; Raman, R.; Roquemore, A.L.; Ryutov, D.D.; Scott, H.A.

    2011-01-01

    Steady-state handling of divertor heat flux is a critical issue for present and future conventional and spherical tokamaks with compact high power density divertors. A novel 'snowflake' divertor (SFD) configuration that takes advantage of magnetic properties of a second-order poloidal null has been predicted to have a larger plasma-wetted area and a larger divertor volume, in comparison with a standard first-order poloidal X-point divertor configuration. The SFD was obtained in 0.8 MA, 4-6 MW NBI-heated H-mode discharges in NSTX using two divertor magnetic coils. The SFD led to a partial detachment of the outer strike point even in low-collisionality scrape-off layer plasma obtained with lithium coatings in NSTX. Significant divertor peak heat flux reduction and impurity screening have been achieved simultaneously with good core confinement and MHD properties.

  2. "Snowflake" divertor configuration in NSTX

    Soukhanovskii, V. A.; Ahn, J.-W.; Bell, R. E.; Gates, D. A.; Gerhardt, S.; Kaita, R.; Kolemen, E.; Kugel, H. W.; Leblanc, B. P.; Maingi, R.; Maqueda, R.; McLean, A.; Menard, J. E.; Mueller, D. M.; Paul, S. F.; Raman, R.; Roquemore, A. L.; Ryutov, D. D.; Scott, H. A.

    2011-08-01

    Steady-state handling of divertor heat flux is a critical issue for present and future conventional and spherical tokamaks with compact high power density divertors. A novel "snowflake" divertor (SFD) configuration that takes advantage of magnetic properties of a second-order poloidal null has been predicted to have a larger plasma-wetted area and a larger divertor volume, in comparison with a standard first-order poloidal X-point divertor configuration. The SFD was obtained in 0.8 MA, 4-6 MW NBI-heated H-mode discharges in NSTX using two divertor magnetic coils. The SFD led to a partial detachment of the outer strike point even in low-collisionality scrape-off layer plasma obtained with lithium coatings in NSTX. Significant divertor peak heat flux reduction and impurity screening have been achieved simultaneously with good core confinement and MHD properties.

  3. Automatic creation of simulation configuration

    Oudot, G.; Poizat, F.

    1993-01-01

    SIPA, which stands for 'Simulator for Post Accident', includes: 1) a sophisticated software oriented workshop SWORD (which stands for 'Software Workshop Oriented towards Research and Development') designed in the ADA language including integrated CAD system and software tools for automatic generation of simulation software and man-machine interface in order to operate run-time simulation; 2) a 'simulator structure' based on hardware equipment and software for supervision and communications; 3) simulation configuration generated by SWORD, operated under the control of the 'simulator structure' and run on a target computer. SWORD has already been used to generate two simulation configurations (French 900 MW and 1300 MW nuclear power plants), which are now fully operational on the SIPA training simulator. (Z.S.) 1 ref

  4. Microsoft System Center Configuration Manager

    Sandbu, Marius

    2013-01-01

    This book is a step-by-step tutorial that guides you through the key steps in implementing best solutions for high availability and performance tuning. It is split into two distinct approaches: client and site side HA and optimization.Microsoft SCCM High Availability and Performance Tuning is for IT professionals and consultants working with Configuration Manager who wish to learn the skills to deploy a redundant and scalable solution.

  5. Safe Configuration of TLS Connections

    2013-10-16

    comparison with observed flows to flag inconsistencies. Keywords: Transport Layer Security ( TLS ), Secure Socket Layer ( SSL ), configuration, secure...servers. SSL / TLS has evolved over 18 years from SSL 1.0 to TLS 1.2 and has been widely deployed and accepted across Internet servers. This has made...and provides a large-scale view of TLS properties across Internet web sites. The guidance provided in [10] describes best practices for SSL / TLS

  6. Theory of field reversed configurations

    Steinhauer, L.C.

    1990-01-01

    This final report surveys the results of work conducted on the theory of field reversed configurations. This project has spanned ten years, beginning in early 1980. During this period, Spectra Technology was one of the leading contributors to the advances in understanding FRC. The report is organized into technical topic areas, FRC formation, equilibrium, stability, and transport. Included as an appendix are papers published in archival journals that were generated in the course of this report. 33 refs

  7. Drupal 7 Multi Sites Configuration

    Butcher, Matt

    2012-01-01

    Follow the creation of a multi-site instance with Drupal. The practical examples and accompanying screenshots will help you to get multiple Drupal sites set up in no time. This book is for Drupal site builders. It is assumed that readers are familiar with Drupal already, with a basic grasp of its concepts and components. System administration concepts, such as configuring Apache, MySQL, and Vagrant are covered but no previous knowledge of these tools is required.

  8. Low emittance configuration for spear

    Blumberg, L.N.; Harris, J.; Stege, R.; Cerino, J.; Hettel, R.; Hofmann, A.; Liu, R.Z.; Wiedemann, H.; Winick, H.

    1985-01-01

    The quality of synchrotron radiation beams from SPEAR, in particular the brilliance of undulator radiation, can be improved significantly by reducing the emittance of the stored electron beam. A reduction of the horizontal emittance by a factor of 3.5 to a value of 130 nanometer-radians (nm-r) at 3 GeV has been achieved by using stronger focussing, mainly in the horizontal plane. The low emittance configuration also reduces the dispersion and vertical beta functions in the straight sections, making them more suitable for wigglers. The higher betatron tunes lead to a larger phase advance between the two kickers, which has to be corrected during injection by shunting current from some quadrupoles. The configuration was optimized within SPEAR hardware limitations and tested for dynamic aperture with the tracking program PATRICIA. After implementation of this scheme, beam was successfully injected and accumulated. The measured emittance of the stored beam was in agreement with calculations. Presently the configuration is being made operational

  9. Configuration Management Process Assessment Strategy

    Henry, Thad

    2014-01-01

    Purpose: To propose a strategy for assessing the development and effectiveness of configuration management systems within Programs, Projects, and Design Activities performed by technical organizations and their supporting development contractors. Scope: Various entities CM Systems will be assessed dependent on Project Scope (DDT&E), Support Services and Acquisition Agreements. Approach: Model based structured against assessing organizations CM requirements including best practices maturity criteria. The model is tailored to the entity being assessed dependent on their CM system. The assessment approach provides objective feedback to Engineering and Project Management of the observed CM system maturity state versus the ideal state of the configuration management processes and outcomes(system). center dot Identifies strengths and risks versus audit gotcha's (findings/observations). center dot Used "recursively and iteratively" throughout program lifecycle at select points of need. (Typical assessments timing is Post PDR/Post CDR) center dot Ideal state criteria and maturity targets are reviewed with the assessed entity prior to an assessment (Tailoring) and is dependent on the assessed phase of the CM system. center dot Supports exit success criteria for Preliminary and Critical Design Reviews. center dot Gives a comprehensive CM system assessment which ultimately supports configuration verification activities.*

  10. RINGED ACCRETION DISKS: EQUILIBRIUM CONFIGURATIONS

    Pugliese, D.; Stuchlík, Z., E-mail: d.pugliese.physics@gmail.com, E-mail: zdenek.stuchlik@physics.cz [Institute of Physics and Research Centre of Theoretical Physics and Astrophysics, Faculty of Philosophy and Science, Silesian University in Opava, Bezručovo náměstí 13, CZ-74601 Opava (Czech Republic)

    2015-12-15

    We investigate a model of a ringed accretion disk, made up by several rings rotating around a supermassive Kerr black hole attractor. Each toroid of the ringed disk is governed by the general relativity hydrodynamic Boyer condition of equilibrium configurations of rotating perfect fluids. Properties of the tori can then be determined by an appropriately defined effective potential reflecting the background Kerr geometry and the centrifugal effects. The ringed disks could be created in various regimes during the evolution of matter configurations around supermassive black holes. Therefore, both corotating and counterrotating rings have to be considered as being a constituent of the ringed disk. We provide constraints on the model parameters for the existence and stability of various ringed configurations and discuss occurrence of accretion onto the Kerr black hole and possible launching of jets from the ringed disk. We demonstrate that various ringed disks can be characterized by a maximum number of rings. We present also a perturbation analysis based on evolution of the oscillating components of the ringed disk. The dynamics of the unstable phases of the ringed disk evolution seems to be promising in relation to high-energy phenomena demonstrated in active galactic nuclei.

  11. Transport modelling for ergodic configurations

    Runov, A.; Kasilov, S.V.; McTaggart, N.; Schneider, R.; Bonnin, X.; Zagorski, R.; Reiter, D.

    2004-01-01

    The effect of ergodization, either by additional coils like in TEXTOR-dynamic ergodic divertor (DED) or by intrinsic plasma effects like in W7-X, defines the need for transport models that are able to describe the ergodic configuration properly. A prerequisite for this is the concept of local magnetic coordinates allowing a correct discretization with minimized numerical errors. For these coordinates the appropriate full metric tensor has to be known. To study the transport in complex edge geometries (in particular for W7-X) two possible methods are used. First, a finite-difference discretization of the transport equations on a custom-tailored grid in local magnetic coordinates is used. This grid is generated by field-line tracing to guarantee an exact discretization of the dominant parallel transport (thus also minimizing the numerical diffusion problem). The perpendicular fluxes are then interpolated in a plane (a toroidal cut), where the interpolation problem for a quasi-isotropic system has to be solved by a constrained Delaunay triangulation (keeping the structural information for magnetic surfaces if they exist) and discretization. All toroidal terms are discretized by finite differences. Second, a Monte Carlo transport model originally developed for the modelling of the DED configuration of TEXTOR is used. A generalization and extension of this model was necessary to be able to handle W7-X. The model solves the transport equations with Monte Carlo techniques making use of mappings of local magnetic coordinates. The application of this technique to W7-X in a limiter-like configuration is presented. The decreasing dominance of parallel transport with respect to radial transport for electron heat, ion heat and particle transport results in increasingly steep profiles for the respective quantities within the islands. (author)

  12. Variable configuration plasmas in TCV

    Lister, J.B.; Hofmann, F.; Anton, M.

    1994-01-01

    During its first year of operation, TCV has achieved a wide variety of plasma shapes, limited and diverted, attaining 810 kA plasma current and elongation over 2.0. Ohmic H-Modes have been regularly produced, with a maximum confinement time of 80 msec and maximum normalised β N of 1.9. The conditions for the H-Mode transition differ from other experiments. The transitions from ELM-free to ELMy H-Modes and back have been selectively triggered for configurations close to a Double-Null. (author) 3 figs., 5 refs

  13. Variable configuration plasmas in TCV

    Lister, J.B.; Hofmann, F.; Anton, M.

    1995-01-01

    During its first year of operation, TCV has achieved a wide variety of plasma shapes, limited and diverted, attaining 810 kA plasma current and elongation over 2.0. Ohmic H modes have been regularly produced, with a maximum confinement time of 80 ms and a maximum normalized β N of 1.9. The conditions for the H mode transition differ from other experiments. The transitions from ELM free to ELMy H modes and back have been selectively triggered for configurations close to a double-null. (author). 5 refs, 3 figs

  14. FED pumped limiter configuration issues

    Haines, J.R.; Fuller, G.M.

    1983-01-01

    Impurity control in the Fusion Engineering Device (FED) is provided by a toroidal belt pumped limiter. Limiter design issues addressed in this paper are (1) poloidal location of the limiter belt, (2) shape of the limiter surface facing the plasma, and (3) whether the belt is pumped from one or both sides. The criteria used for evaluation of limiter configuration features were sensitivity to plasma-edge conditions and ease of maintenance and fabrication. The evaluation resulted in the selection of a baseline FED limiter that is located at the bottom of the device and has a flat surface with a single leading edge

  15. FED pumped limiter configuration issues

    Haines, J.R.; Fuller, G.M.

    1983-01-01

    Impurity control in the Fusion Engineering Device (FED) is provided by a toroidal belt pumped limiter. Limiter design issues addressed in this paper are (1) poloidal location of the limiter belt, (2) shape of the limiter surface facing the plasma, and (3) whether the belt is pumped from one or both sides. The criteria used for evaluation of limiter configuration features were sensitivity to plasma edge conditions and ease of maintenance and fabrication. The evaluation resulted in the selection of a baseline FED limiter that is located at the bottom of the device and has a flat surface with a single leading edge

  16. Dimensional regularization in configuration space

    Bollini, C.G.; Giambiagi, J.J.

    1995-09-01

    Dimensional regularization is introduced in configuration space by Fourier transforming in D-dimensions the perturbative momentum space Green functions. For this transformation, Bochner theorem is used, no extra parameters, such as those of Feynman or Bogoliubov-Shirkov are needed for convolutions. The regularized causal functions in x-space have ν-dependent moderated singularities at the origin. They can be multiplied together and Fourier transformed (Bochner) without divergence problems. The usual ultraviolet divergences appear as poles of the resultant functions of ν. Several example are discussed. (author). 9 refs

  17. Columbia River System Operation Review final environmental impact statement. Appendix P: Canadian Entitlement Allocation Agreements (CEAA)

    1995-11-01

    The System Operation Review (SOR) is a study and environmental compliance process being used by the three Federal agencies to analyze future operations of the system and river use issues. The goal of the SOR is to achieve a coordinated system operation strategy for the river that better meets the needs of all river users. This technical appendix addresses only the effects of alternative system operating strategies for managing the Columbia River system. The purpose of this technical appendix is to provide the environmental review necessary to enter into agreements regarding the distribution between Federal and non-Federal project owners with respect to delivery of the Canadian Entitlement obligation to Canada for the period 1998 through 2024

  18. Human Rights Discourse in the Sustainable Development Agenda Avoids Obligations and Entitlements

    Williams, Carmel; Blaiklock, Alison

    2016-01-01

    Our commentary on Forman et al paper explores their thesis that right to health language can frame global health policy responses. We examined human rights discourse in the outcome documents from three 2015 United Nations (UN) summits and found rights-related terms are used in all three. However, a deeper examination of the discourse finds the documents do not convey the obligations and entitlements of human rights and international human rights law. The documents contain little that can be used to empower the participation of those already left behind and to hold States and the private sector to account for their human rights duties. This is especially worrying in a neoliberal era. PMID:27285518

  19. International conference entitled Zdeněk Kopal’s Binary Star Legacy

    Drechsel, Horst; ZDENEK KOPAL’S BINARY STAR LEGACY

    2005-01-01

    An international conference entitled "Zdenek Kopal's Binary Star Legacy" was held on the occasion of the late Professor Kopal's 90th birthday in his home town of Litomyšl/Czech Republic and dedicated to the memory of one of the leading astronomers of the 20th century. Professor Kopal, who devoted 60 years of his scientific life to the exploration of close binary systems, initiated a breakthrough in this field with his description of binary components as non-spherical stars deformed by gravity, with surfaces following Roche equipotentials. Such knowledge triggered the development of new branches of astrophysics dealing with the structure and evolution of close binaries and the interaction effects displayed by exciting objects such as cataclysmic variables, symbiotic stars or X-ray binaries. Contributions to this conference included praise of the achievements of a great astronomer and personal reminiscences brought forward by Kopal's former students and colleagues, and reflected the state of the art of the dyn...

  20. Basic package of health entitlements and solidarity in the Federation of Bosnia and Herzegovina.

    Hrabac, B; Ljubic, B; Bagaric, I

    2000-09-01

    The aim of this report is to provide an overview of the methodology for designing a basic package of health entitlements and solidarity in the Federation of Bosnia and Herzegovina which will, respecting the principles of solidarity and equity, guarantee equal rights to all citizens of the Federation. After the analysis of the situation, we specified the reasons for the reform, listed the objectives, and described the basis of the basic package design, the establishment of federal solidarity, and the plan of realization. We discussed the background ethical theories of our policy choice, explicitly stated the normative and technical criteria for priority setting, and deliberated Federal financing solidarity policy and allocation methodology, as well as criteria for "risk equalization" among cantons.

  1. Example of software configuration management model

    Roth, P.

    2006-01-01

    Software configuration management is the mechanism used to track and control software changes and may include the following actions: A tracking system should be established for any changes made to the existing software configuration. Requirement of the configuration management system are the following: - Backup the different software configuration; - Record the details (the date, the subject, the filenames, the supporting documents, the tests, ...) of the changes introduced in the new configuration; - Document all the differences between the different versions. Configuration management allows simultaneous exploitation of one specific version and development of the next version. Minor correction can be perform in the current exploitation version

  2. Vertical and horizontal access configurations

    Spampinato, P.T.

    1987-01-01

    A number of configuration features and maintenance operations are influenced by the choice of whether a design is based on vertical or horizontal access for replacing reactor components. The features which are impacted most include the first wall/blanket segmentation, the poloidal field coil locations, the toroidal field coil number and size, access port size for in-vessel components, and facilities. Since either configuration can be made to work, the choice between the two is not clear cut because both have certain advantages. It is apparent that there are large cost benefits in the poloidal field coil system for ideal coil locations for high elongation plasmas and marginal savings for the INTOR case. If we assume that a new tokamak design will require a higher plasma elongation, the recommendation is to arrange the poloidal field coils in a cost-effective manner while providing reasonable midplane access for heating interfaces and test modules. If a new design study is not based on a high elongation plasma, it still appears prudent to consider this approach so that in-vessel maintenance can be accomplished without moving very massive structures such as the bulk shield. 10 refs., 29 figs., 3 tabs

  3. Computational methods for stellerator configurations

    Betancourt, O.

    1992-01-01

    This project had two main objectives. The first one was to continue to develop computational methods for the study of three dimensional magnetic confinement configurations. The second one was to collaborate and interact with researchers in the field who can use these techniques to study and design fusion experiments. The first objective has been achieved with the development of the spectral code BETAS and the formulation of a new variational approach for the study of magnetic island formation in a self consistent fashion. The code can compute the correct island width corresponding to the saturated island, a result shown by comparing the computed island with the results of unstable tearing modes in Tokamaks and with experimental results in the IMS Stellarator. In addition to studying three dimensional nonlinear effects in Tokamaks configurations, these self consistent computed island equilibria will be used to study transport effects due to magnetic island formation and to nonlinearly bifurcated equilibria. The second objective was achieved through direct collaboration with Steve Hirshman at Oak Ridge, D. Anderson and R. Talmage at Wisconsin as well as through participation in the Sherwood and APS meetings

  4. Valence configurations in 214Rn

    Dracoulis, G.D.; Byrne, A.P.; Stuchbery, A.E.; Bark, R.A.; Poletti, A.R.

    1987-01-01

    Excited states of 214 Rn, up to spins of ≅ 24 ℎ have been studied using γ-ray and electron spectroscopy following the 208 Pb( 9 Be,3n) 214 Rn reaction. The level scheme (which differs substantially from earlier work) is compared with the results of a semi-empirical shell model calculation. The availability of high-spin orbitals for the four valence protons and two valence neutrons, and the effect of the attractive proton-neutron interaction, leads to the prediction of high-spin states at an unusually low excitation energy. Experimentally, the high level density leads to difficulties in the level scheme assignments at high spin. Nevertheless, configuration assignments, supported by transition strengths deduced from the measured lifetimes (in the nanosecond region) are suggested for the main yrast states. The decay properties also suggest that configuration mixing is important. The possibility of a gradual transition to octupole deformation, implied by the decay properties of the 11 - and 10 + yrast states is also discussed. (orig.)

  5. Equilibrium: two-dimensional configurations

    Anon.

    1987-01-01

    In Chapter 6, the problem of toroidal force balance is addressed in the simplest, nontrivial two-dimensional geometry, that of an axisymmetric torus. A derivation is presented of the Grad-Shafranov equation, the basic equation describing axisymmetric toroidal equilibrium. The solutions to equations provide a complete description of ideal MHD equilibria: radial pressure balance, toroidal force balance, equilibrium Beta limits, rotational transform, shear, magnetic wall, etc. A wide number of configurations are accurately modeled by the Grad-Shafranov equation. Among them are all types of tokamaks, the spheromak, the reversed field pinch, and toroidal multipoles. An important aspect of the analysis is the use of asymptotic expansions, with an inverse aspect ratio serving as the expansion parameter. In addition, an equation similar to the Grad-Shafranov equation, but for helically symmetric equilibria, is presented. This equation represents the leading-order description low-Beta and high-Beta stellarators, heliacs, and the Elmo bumpy torus. The solutions all correspond to infinitely long straight helices. Bending such a configuration into a torus requires a full three-dimensional calculation and is discussed in Chapter 7

  6. Tank waste remediation system configuration management plan

    Vann, J.M.

    1998-01-01

    The configuration management program for the Tank Waste Remediation System (TWRS) Project Mission supports management of the project baseline by providing the mechanisms to identify, document, and control the functional and physical characteristics of the products. This document is one of the tools used to develop and control the mission and work. It is an integrated approach for control of technical, cost, schedule, and administrative information necessary to manage the configurations for the TWRS Project Mission. Configuration management focuses on five principal activities: configuration management system management, configuration identification, configuration status accounting, change control, and configuration management assessments. TWRS Project personnel must execute work in a controlled fashion. Work must be performed by verbatim use of authorized and released technical information and documentation. Application of configuration management will be consistently applied across all TWRS Project activities and assessed accordingly. The Project Hanford Management Contract (PHMC) configuration management requirements are prescribed in HNF-MP-013, Configuration Management Plan (FDH 1997a). This TWRS Configuration Management Plan (CMP) implements those requirements and supersedes the Tank Waste Remediation System Configuration Management Program Plan described in Vann, 1996. HNF-SD-WM-CM-014, Tank Waste Remediation System Configuration Management Implementation Plan (Vann, 1997) will be revised to implement the requirements of this plan. This plan provides the responsibilities, actions and tools necessary to implement the requirements as defined in the above referenced documents

  7. Hanford Environmental Information System Configuration Management Plan

    1996-06-01

    The Hanford Environmental Information System (HEIS) Configuration Management Plan establishes the software and data configuration control requirements for the HEIS and project-related databases maintained within the Environmental Restoration Contractor's data management department

  8. Configurations and level structure of 219Rn

    Sheline, R.K.; Liang, C.F.; Paris, P.

    1998-01-01

    The level structure of 219 Rn has been studied using the alpha decay of 223 Ra and coincident gamma rays. While only modest changes are required in the level structure, and only above 342.8 keV, severe changes are required throughout the level scheme in the spin assigments. These changes allow the assignment of two sets of anomalous bands with K=5/2 ± and K=3/2 ± . The K=5/2 ± bands have configurations intermediate between the reflection asymmetric configuration and the g 9/2 shell model configuration, while the K=3/2 ± bands have configurations intermediate between the mixed reflection asymmetric configuration and the i 11/2 shell model configuration. Comparison of the systematics of 219 Rn with neighboring isotones, isobars, and isotopes shows clearly the collapse of the quadrupole-octupole-type configurations into the less degenerate shell model configurations. copyright 1998 The American Physical Society

  9. Configuration management theory, practice, and application

    Quigley, Jon M

    2015-01-01

    Configuration Management: Theory, Practice, and Application details a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to extend products for a variety of markets due to configuration options. The book also describes the importance of configuration management to other parts of the organization. It supplies an overview of configuration management and its process elements to provide readers with a contextual understanding of the theory, practice, and application of CM. Explaining what a configuration item is and what it implies, the book illustrates the interplay of configuration and data management with all enterprise resources during each phase of a product lifecycle. It also demonstrates the interrelationship of CM to functional resources. Shedding light on current practice, the book describes CM baselines, configuration identification, management baseline changes, and acceptance criteria ...

  10. Industrial requirements for interactive product configurators

    Queva, Matthieu Stéphane Benoit; Probst, Christian W.; Vikkelsøe, Per

    2009-01-01

    The demand for highly customized products at low cost is driving the industry towards Mass Customization. Interactive product configurators play an essential role in this new trend, and must be able to support more and more complex features. The purpose of this paper is, firstly, to identify...... requirements for modern interactive configurators. Existing modeling and solving technologies for configuration are then reviewed and their limitations discussed. Finally, a proposition for a future product configuration system is described....

  11. FPGA based, modular, configurable controller with fast synchronous optical network

    Graczyk, R.; Pozniak, K.T.; Romaniuk, R.S. [Warsaw Univ. of Technology (Poland). Inst. of Electronic Systems

    2006-07-01

    The paper describes a configurable controller equipped with programmable VLSI FPGA circuit, universal expansion modules PMC, synchronous, optical, multi-gigabit links, commonly used industrial and computer communication interfaces, Ethernet 100TB, system of automatic initialization ACE etc. There are characterized the basic functional characteristics of the device. The possibilities of its usage in various work modes were presented. Realization of particular blocks of the device were discussed. Resulting, during the realization of this project, new hardware layer solutions were also characterized. (orig.)

  12. FPGA based, modular, configurable controller with fast synchronous optical network

    Graczyk, R.; Pozniak, K.T.; Romaniuk, R.S.

    2006-01-01

    The paper describes a configurable controller equipped with programmable VLSI FPGA circuit, universal expansion modules PMC, synchronous, optical, multi-gigabit links, commonly used industrial and computer communication interfaces, Ethernet 100TB, system of automatic initialization ACE etc. There are characterized the basic functional characteristics of the device. The possibilities of its usage in various work modes were presented. Realization of particular blocks of the device were discussed. Resulting, during the realization of this project, new hardware layer solutions were also characterized. (orig.)

  13. Offshore Vendors’ Software Development Team Configurations

    Chakraborty, Suranjan; Sarker, Saonee; Rai, Sudhanshu

    2012-01-01

    This research uses configuration theory and data collected from a major IT vendor organization to examine primary configurations of distributed teams in a global off-shoring context. The study indicates that off-shoring vendor organizations typically deploy three different types of configurations...

  14. Multi level configuration of ETO products

    Petersen, Thomas Ditlev; Jørgensen, Kaj Asbjørn; Hvolby, Hans-Henrik

    2007-01-01

    The paper introduces and defines central concepts related to multi level configuration and analyzes which challenges an engineer to order company must deal with to be able to realize a multi level configuration system. It is argued that high flexibility can be achieved and focus can be directed...... in certain business processes if a multi level configuration system is realized....

  15. Configuration mixing for spin-isospin modes

    Ichimura, Munetake

    2005-01-01

    Development of theories of configuration mixing is reviewed, concentrating on their application to spin-isospin modes, especially to the Gamow-Teller transitions. This talk is divided into three historical stages, the first order configuration mixing as the first stage, the second order configuration mixing as the second stage, and the delta-isobar-hole mixing as the third stage

  16. Code organization and configuration management

    Wellisch, J.P.; Ashby, S.; Williams, C.; Osborne, I.

    2001-01-01

    Industry experts are increasingly focusing on team productivity as the key to success. The base of the team effort is the four-fold structure of software in terms of logical organisation, physical organisation, managerial organisation, and dynamical structure. The authors describe the ideas put into action within the CMS software for organising software into sub-systems and packages, and to establish configuration management in a multi-project environment. The authors use a structure that allows to maximise the independence of software development in individual areas, and at the same time emphasises the overwhelming importance of the interdependencies between the packages and components in the system. The authors comment on release procedures, and describe the inter-relationship between release, development, integration, and testing

  17. Knowledge Engineering for Embedded Configuration

    Oddsson, Gudmundur Valur

    2008-01-01

    into the system the knowledge needed to achieve them. In order to understand the system, one draws simplified functional streams and identifies archetypes from the product assortment, and then one maps the two together into a system breakdown model. The system model indicates how many encapsulation models (EMs......This thesis presents a way to simplify setup of complex product systems with the help of embedded configuration. To achieve this, one has to focus on what subsystems need to communicate between themselves. The required internal knowledge is then structured at three abstraction levels......, and predefined relation types are suggested. The models are stringent and thought out so they can be implemented in software. They should allow both import and export of product knowledge from the knowledge-based system. The purpose of this work is to simplify the installation process of product systems...

  18. Study of High Lift Configurations

    Edward, Jack R.; Hassan, Hassan A.

    2000-01-01

    This project focus on the implementation of the Warren-Hassan transition / turbulence model (Journal of Aircraft, Vol. 35, No. 5) into the NASA code CFL3D and its testing for multi-element airfoils in landing configuration at different angles of attack. The Warren-Hassan transition model solves an evolution equation for a kinetic energy characteristic of non-turbulent fluctuations. This is combined with an empirical estimate of the frequency of the most amplified first-mode disturbance to yield an expression for an eddy viscosity characteristic of non-turbulent fluctuations. This is combined with the k - zeta model for fully turbulent flow to yield a unified approach capable of predicting both transition onset and extent. Blending of the non-turbulent and turbulent components of the model is accomplished by an intermittency function based on the work of Dhawan and Narasimha (Journal of Fluid Mechanics, Vol. 3, No. 4).

  19. National Health Service Principles as Experienced by Vulnerable London Migrants in "Austerity Britain": A Qualitative Study of Rights, Entitlements, and Civil-Society Advocacy.

    Rafighi, Elham; Poduval, Shoba; Legido-Quigley, Helena; Howard, Natasha

    2016-05-08

    Recent British National Health Service (NHS) reforms, in response to austerity and alleged 'health tourism,' could impose additional barriers to healthcare access for non-European Economic Area (EEA) migrants. This study explores policy reform challenges and implications, using excerpts from the perspectives of non-EEA migrants and health advocates in London. A qualitative study design was selected. Data were collected through document review and 22 in-depth interviews with non-EEA migrants and civil-society organisation representatives. Data were analysed thematically using the NHS principles. The experiences of those 'vulnerable migrants' (ie, defined as adult non-EEA asylum-seekers, refugees, undocumented, low-skilled, and trafficked migrants susceptible to marginalised healthcare access) able to access health services were positive, with healthcare professionals generally demonstrating caring attitudes. However, general confusion existed about entitlements due to recent NHS changes, controversy over 'health tourism,' and challenges registering for health services or accessing secondary facilities. Factors requiring greater clarity or improvement included accessibility, communication, and clarity on general practitioner (GP) responsibilities and migrant entitlements. Legislation to restrict access to healthcare based on immigration status could further compromise the health of vulnerable individuals in Britain. This study highlights current challenges in health services policy and practice and the role of non-governmental organizations (NGOs) in healthcare advocacy (eg, helping the voices of the most vulnerable reach policy-makers). Thus, it contributes to broadening national discussions and enabling more nuanced interpretation of ongoing global debates on immigration and health. © 2016 by Kerman University of Medical Sciences

  20. Reactor Configuration Development for ARIES-CS

    Ku LP

    2005-01-01

    New compact, quasi-axially symmetric stellarator configurations have been developed as part of the ARIES-CS reactor studies. These new configurations have good plasma confinement and transport properties, including low losses of α particles and good integrity of flux surfaces at high β. We summarize the recent progress by showcasing two attractive classes of configurations--configurations with judiciously chosen rotational transforms to avoid undesirable effects of low order resonances on the flux surface integrity and configurations with very small aspect ratios (∼2.5) that have excellent quasi-axisymmetry and low field ripples

  1. Exercise in Configurable Products using Creo parametric

    Christensen, Georg Kronborg

    2017-01-01

    Family tables is a long know method with ProEngineer/Creo parametric to make families of products – like families of bolts and roller bearings. Configurable Products expand these possibilities in two major ways: First it makes configurable assemblies possible where one topologically different com...... been available as: configurable assemblies in earlier versions of Creo) An example of a practical application of configurable products is shown below where an outdoor Play/Exercise system is transferred from AutoCAD 2D to a 3D configurable product in Creo 3.0....

  2. Supply chain configuration concepts, solutions, and applications

    Chandra, Charu

    2016-01-01

    This book discusses the models and tools available for solving configuration problems, emphasizes the value of model integration to obtain comprehensive and robust configuration decisions, proposes solutions for supply chain configuration in the presence of stochastic and dynamic factors, and illustrates application of the techniques discussed in applied studies. It is divided into four parts, which are devoted to defining the supply chain configuration problem and identifying key issues, describing solutions to various problems identified, proposing technologies for enabling supply chain confirmations, and discussing applied supply chain configuration problems. Its distinguishing features are: an explicit focus on the configuration problem an in-depth coverage of configuration models an emphasis on model integration and application of information modeling techniques in decision-making New to this edition is Part II: Technologies, which introduces readers to various technologies being utilized for supply chai...

  3. Overworked and underpaid: on the nature of gender differences in personal entitlement.

    Major, B; McFarlin, D B; Gagnon, D

    1984-12-01

    This research investigated gender differences in feelings of personal entitlement with respect to monetary payment for work performed. Two experiments were conducted to test the hypothesis that women's internal standards of fair pay for their work are lower than men's and to examine possible causes of this difference. In Experiment 1, men and women were asked to pay themselves in a private situation what they thought was fair pay for a fixed amount of work. Social comparison information was varied. As predicted, women paid themselves less money than men in the absence, but not the presence, of social comparison information. In Experiment 2, men and women were asked to do as much work as they thought was fair for a fixed, prepaid, amount of money. Subjects believed that their work was either monitored or unmonitored. Women worked significantly longer, did more work, and did more correct work than men in both public and private work settings. Furthermore, women, but not men, worked longer when they believed their work was monitored than when they believed it was unmonitored. Possible explanations for these gender differences are discussed.

  4. Federalism, entitlements, and discretionary grants: the fiscal context of national support for immunization programs.

    Miller, V J

    2000-10-01

    This paper defines the appropriation and resource allocation structure of federal government programs that deliver vaccines to the public through state and local governments, with a special focus on the Centers for Disease Control and Prevention (CDC) Section 317 program. The paper places these programs in the context of the overall intergovernmental finance system of the United States, and the manner in which that system has responded to societal changes in other areas, such as unemployment insurance and environmental protection. The paper concludes that a changing environment for vaccine financing, and uncertain appropriations for state government immunization infrastructure, may have made the current CDC Section 317 program inadequate. Increased entitlement resources for federally funded vaccines have not been matched with increased and stable resources for the balance of program costs. To the contrary, funding provided to the Section 317 program has proven unstable, and its discretionary appropriations have proven vulnerable to both executive and legislative branch earmarking for such activities as overseas disease eradication or home state earmarking by congressional appropriations subcommittee members. In addition, the rigidity of some CDC program requirements makes it difficult for states to effectively use program funds. Consideration should be given to strengthening the Section 317 program and its relationships to other federal aid programs to ensure that adequate immunization protections are provided in all states to adequately protect all citizens.

  5. Possible administrative structures and procedures (for implementing a tradeable entitlement approach to controlling global warming)

    Tietenberg, T.; Victor, D.G.

    1994-01-01

    The United Nations Framework Convention on Climate Change was opened for signature at the United Nations Conference on Environment and Development (UNCED) held at Rio de Janeiro in June 1992. By August 1994, it had been signed by representatives of some 166 countries; with 93 ratifications. Reducing greenhouse gas emissions to 1990 levels by the year 2000 was specified as a voluntary target within the Convention. Making this target mandatory was originally supported by the European Union, Japan and most other countries, but opposed by the United States. Following the change of administrations, however, the new United States President announced his support for both the concept of holding emissions at their 1990 levels and the deadline for achieving that target. Limiting greenhouse gas emissions to specific levels now appears to be an internationally recognized objective. In this paper we examine how to implement a tradeable entitlements system for greenhouse-gas emissions, using the United Nations Framework Convention on Climate Change as our point of departure. Using this particular point of departure establishes certain parameters of our inquiry. Currently no mandatory targets for emission reductions have been accepted by the participating States. Furthermore, even the stabilization goal, to the extent it is a factor at all, will be a factor only for the industrialized countries

  6. POLITENESS PRINCIPLE ANALYSIS IN CARTOON MOVIE ENTITLED STAND BY ME DORAEMON

    Eko Mulyono

    2016-04-01

    Full Text Available This article examines the use of politeness principle in cartoon movie entitled “Stand By Me Doraemon”. It aims at giving a description on the use of politeness principle in this movie so that this is the source of data as well. The data are collected by note taking technique and then analyzed descriptively. After analyzing the data, the researcher finds the use of politeness principle in the movie script. They are utterances of the use of politeness principle covering the kinds of maxim in politeness principle. The utterances covey the use of tact maxim, generosity maxim, approbation maxim, modesty maxim, agreement maxim, and sympathy maxim. Then, it focused also in politeness scale such as formality scale, hesitancy scale, and equality scale. The finding result showed that there are 25 politeness principle found in cartoon movie “Stand By Me Doraemon”. 1 tact maxim, 3 generosity maxim, 6 approbation maxim, 1 modesty maxim, 2 agreement maxim, 3 sympathy maxim, 2 formality scale, 4 hesitancy scale, and 3 equality scale. Approbation maxim is the maxim of the most numerous in the movie. This is because the characters in this film seek to avoid conflict and create an environment that is comfortable in communication.   Key words: politeness principle, cartoon movie, utterance, maxim, scale.

  7. 45 CFR 506.18 - Entitlement of survivors to award in case of death of prisoner of war.

    2010-10-01

    ... of prisoner of war. 506.18 Section 506.18 Public Welfare Regulations Relating to Public Welfare..., ADMINISTRATION, AND PAYMENT OF CLAIMS UNDER TITLE I OF THE WAR CLAIMS ACT OF 1948, AS AMENDED ELIGIBILITY REQUIREMENTS FOR COMPENSATION Prisoners of War § 506.18 Entitlement of survivors to award in case of death of...

  8. 20 CFR 222.53 - When a legally adopted child is dependent-child adopted after entitlement.

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false When a legally adopted child is dependent-child adopted after entitlement. 222.53 Section 222.53 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT FAMILY RELATIONSHIPS Child Support and Dependency § 222.53 When...

  9. 20 CFR 222.54 - When a legally adopted child is dependent-grandchild or stepgrandchild adopted after entitlement.

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false When a legally adopted child is dependent-grandchild or stepgrandchild adopted after entitlement. 222.54 Section 222.54 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT FAMILY RELATIONSHIPS Child Support and...

  10. 20 CFR 404.340 - How do I become entitled to mother's or father's benefits as a surviving divorced spouse?

    2010-04-01

    ... described in § 404.345 or you were deemed to be validly married as described in § 404.346 but the marriage... not entitled to widow's or widower's benefits, or to an old-age benefit that is equal to or larger...

  11. 12 CFR 617.7100 - Who must make and who is entitled to receive an effective interest rate disclosure?

    2010-01-01

    ... effective interest rate disclosure? 617.7100 Section 617.7100 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM BORROWER RIGHTS Disclosure of Effective Interest Rates § 617.7100 Who must make and who is entitled to receive an effective interest rate disclosure? (a) A qualified lender must make the...

  12. Reconfigurable Mixed Mode Universal Filter

    Neelofer Afzal

    2014-01-01

    Full Text Available This paper presents a novel mixed mode universal filter configuration capable of working in voltage and transimpedance mode. The proposed single filter configuration can be reconfigured digitally to realize all the five second order filter functions (types at single output port. Other salient features of proposed configuration include independently programmable filter parameters, full cascadability, and low sensitivity figure. However, all these features are provided at the cost of quite large number of active elements. It needs three digitally programmable current feedback amplifiers and three digitally programmable current conveyors. Use of six active elements is justified by introducing three additional reduced hardware mixed mode universal filter configurations and its comparison with reported filters.

  13. Metrics for measuring distances in configuration spaces

    Sadeghi, Ali; Ghasemi, S. Alireza; Schaefer, Bastian; Mohr, Stephan; Goedecker, Stefan; Lill, Markus A.

    2013-01-01

    In order to characterize molecular structures we introduce configurational fingerprint vectors which are counterparts of quantities used experimentally to identify structures. The Euclidean distance between the configurational fingerprint vectors satisfies the properties of a metric and can therefore safely be used to measure dissimilarities between configurations in the high dimensional configuration space. In particular we show that these metrics are a perfect and computationally cheap replacement for the root-mean-square distance (RMSD) when one has to decide whether two noise contaminated configurations are identical or not. We introduce a Monte Carlo approach to obtain the global minimum of the RMSD between configurations, which is obtained from a global minimization over all translations, rotations, and permutations of atomic indices

  14. In-memory interconnect protocol configuration registers

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  15. Contrast configuration influences grouping in apparent motion.

    Ma-Wyatt, Anna; Clifford, Colin W G; Wenderoth, Peter

    2005-01-01

    We investigated whether the same principles that influence grouping in static displays also influence grouping in apparent motion. Using the Ternus display, we found that the proportion of group motion reports was influenced by changes in contrast configuration. Subjects made judgments of completion of these same configurations in a static display. Generally, contrast configurations that induced a high proportion of group motion responses were judged as more 'complete' in static displays. Using a stereo display, we then tested whether stereo information and T-junction information were critical for this increase in group motion. Perceived grouping was consistently higher for same contrast polarity configurations than for opposite contrast polarity configurations, regardless of the presence of stereo information or explicit T-junctions. Thus, while grouping in static and moving displays showed a similar dependence on contrast configuration, motion grouping showed little dependence on stereo or T-junction information.

  16. In-memory interconnect protocol configuration registers

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  17. A configurable CDS for the production laboratory

    Meek, Irish

    2003-01-01

    Various aspects of a configurable chromatography data system (CDS) for the production laboratory are discussed. The Atlas CDS can be configured extensively to fit the production laboratory work flow and meet the needs of analysts. The CDS can also be configured to automatically create a sample sequence with the required number of injections and download methods to the dedicated instrument. The Atlas Quick Start wizard offers uses quick way of generating a sequence from a predefined template and starting a run. (Edited abstract).

  18. Visualization of the CMS python configuration system

    Erdmann, M; Fischer, R; Klimkovich, T; Mueller, G; Steggemann, J; Hegner, B; Hinzmann, A

    2010-01-01

    The job configuration system of the CMS experiment is based on the Python programming language. Software modules and their order of execution are both represented by Python objects. In order to investigate and verify configuration parameters and dependencies naturally appearing in modular software, CMS employs a graphical tool. This tool visualizes the configuration objects, their dependencies, and the information flow. Furthermore it can be used for documentation purposes. The underlying software concepts as well as the visualization are presented.

  19. Visualization of the CMS python configuration system

    Erdmann, M; Fischer, R; Klimkovich, T; Mueller, G; Steggemann, J [RWTH Aachen University, Physikalisches Institut 3A, 52062 Aachen (Germany); Hegner, B [CERN, CH-1211 Geneva 23 (Switzerland); Hinzmann, A, E-mail: andreas.hinzmann@cern.c

    2010-04-01

    The job configuration system of the CMS experiment is based on the Python programming language. Software modules and their order of execution are both represented by Python objects. In order to investigate and verify configuration parameters and dependencies naturally appearing in modular software, CMS employs a graphical tool. This tool visualizes the configuration objects, their dependencies, and the information flow. Furthermore it can be used for documentation purposes. The underlying software concepts as well as the visualization are presented.

  20. AN ANALYSIS OF FIGURATIVE LANGUAGES USED IN COELHOS’S NOVEL ENTITLED “ALCHEMIST”

    Trisna Dinillah Harya

    2017-05-01

    Full Text Available The title of this study is, “An Analysis of Figurative Languages Used in Paulo Coelho’s novel Entitled “The Alchemist”. The objectives of the study are to describe the types of the figurative language found in the book and to identify the contextual meaning of the figurative language. The method used in collecting the data related to the subject of this research is documentation method because the researcher collected the data from novel. This study was conducted by collecting any relevant data and information about the topic or problem of the study from novels and internet that are available for the analysis. The data collection used the following steps: reading the novel, and then selecting the data that used the types of figurative language. While the steps to analyze the data are identifying the types of figurative language according to Leech, identifying the contextual meaning of the figurative language, and the last is interpreting the data.The result shows that there are 70 sentences that have figurative language. From all the sentences, there are 30 items or 42.9% of simile, 27 items or 38.6% of personification, 12 items or 17.1% of metaphor, and 1 item or 1.4% of hyperbole. It can be indicated that the dominant type of figurative language in the novel is simile. The author uses simile to explain circumstances, to describe the characters, to express emotion of the characters, and to make his writing more vivid and entertaining. It can be concluded that figurative language has important roles in this novel. That‘s why the author used so many sentences that have figurative language in this novel. Using figurative language makes the novel more interesting to read, and helps the readers to imagine the story, the character based on the illustration that the author has already given in the story.

  1. Exclusive purpose: abstinence-only proponents create federal entitlement in welfare reform.

    Daley, D

    1997-01-01

    Since 1981, the US government has funded a program promoting sexual abstinence among young people through its Office of Population's Adolescent Family Life Demonstration Grants program (AFLA). A 1983 court challenge which held that AFLA violated the separation of church and state by endorsing a particular religious viewpoint was settled out of court in 1993 with stipulations that AFLA-funded sexuality education must not include religious references, must be medically accurate, must respect the principle of self-determination of teenagers regarding contraceptive referrals, and must not be implemented on church property. Critics continue to charge that AFLA's abstinence-only programs have failed to receive proper evaluation. While AFLA has no broad-based support, it is backed by the same small group of Congressional proponents who are attempting to promote broad-scale, federally-funded abstinence-only programs. Thus, the August 1996 welfare reform legislation represents the broadest attack on the provision of comprehensive sexuality education in the US. While opponents of sexuality education could not restrict the content of education programs, they could restrict programs through health policy and funding mechanisms. Congress, thus, mandated $50 million a year for 1998-2002 to a matching grant with entitlement status, which was tagged on to final versions of the larger welfare reform bill. The intent of this action was to use federal law to change the social norm of premarital sexual activity. Funds will not go to programs which discuss contraception. Additional problems with the statute include misinformation, ambiguity, and a lack of evaluation requirements. It remains for states to decide whether to accept the restricted funds and for parties on both sides of the issue to continue to lobby for their positions.

  2. International Space Station Configuration Analysis and Integration

    Anchondo, Rebekah

    2016-01-01

    Ambitious engineering projects, such as NASA's International Space Station (ISS), require dependable modeling, analysis, visualization, and robotics to ensure that complex mission strategies are carried out cost effectively, sustainably, and safely. Learn how Booz Allen Hamilton's Modeling, Analysis, Visualization, and Robotics Integration Center (MAVRIC) team performs engineering analysis of the ISS Configuration based primarily on the use of 3D CAD models. To support mission planning and execution, the team tracks the configuration of ISS and maintains configuration requirements to ensure operational goals are met. The MAVRIC team performs multi-disciplinary integration and trade studies to ensure future configurations meet stakeholder needs.

  3. The Ragnarok Architectural Software Configuration Management Model

    Christensen, Henrik Bærbak

    1999-01-01

    The architecture is the fundamental framework for designing and implementing large scale software, and the ability to trace and control its evolution is essential. However, many traditional software configuration management tools view 'software' merely as a set of files, not as an architecture....... This introduces an unfortunate impedance mismatch between the design domain (architecture level) and configuration management domain (file level.) This paper presents a software configuration management model that allows tight version control and configuration management of the architecture of a software system...

  4. Configuration management: Phase II implementation guidance

    1994-03-01

    Configuration management (CM) is essential to maintaining an acceptable level of risk to the public, workers, environment, or mission success. It is a set of activities and techniques used to maintain consistency among physical and functional configuration, applicable requirements, and key documents. This document provides guidance for continuing the implementation of CM in a phased and graded manner. It describes a cost-effective approach to documented consistency with requirements, with early emphasis on items most important to safety and environmental protection. It is intended to help responsible line managers and configuration management staff personnel in meeting the Energy Systems configuration management policy standard.

  5. Comparison between four dissimilar solar panel configurations

    Suleiman, K.; Ali, U. A.; Yusuf, Ibrahim; Koko, A. D.; Bala, S. I.

    2017-12-01

    Several studies on photovoltaic systems focused on how it operates and energy required in operating it. Little attention is paid on its configurations, modeling of mean time to system failure, availability, cost benefit and comparisons of parallel and series-parallel designs. In this research work, four system configurations were studied. Configuration I consists of two sub-components arranged in parallel with 24 V each, configuration II consists of four sub-components arranged logically in parallel with 12 V each, configuration III consists of four sub-components arranged in series-parallel with 8 V each, and configuration IV has six sub-components with 6 V each arranged in series-parallel. Comparative analysis was made using Chapman Kolmogorov's method. The derivation for explicit expression of mean time to system failure, steady state availability and cost benefit analysis were performed, based on the comparison. Ranking method was used to determine the optimal configuration of the systems. The results of analytical and numerical solutions of system availability and mean time to system failure were determined and it was found that configuration I is the optimal configuration.

  6. Configuration-defined control algorithms with the ASDEX Upgrade DCS

    Treutterer, Wolfgang, E-mail: Wolfgang.Treutterer@ipp.mpg.de [Max-Planck-Institut für Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany); Cole, Richard [Unlimited Computer Systems, Seeshaupter Str. 15, 82393 Iffeldorf Germany (Germany); Gräter, Alexander [Max-Planck-Institut für Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany); Lüddecke, Klaus [Unlimited Computer Systems, Seeshaupter Str. 15, 82393 Iffeldorf Germany (Germany); Neu, Gregor; Rapson, Christopher; Raupp, Gerhard; Zehetbauer, Thomas [Max-Planck-Institut für Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany)

    2016-11-15

    the configuration. The concept has been developed in view of Simulink block libraries and MARTe General Application Modules (GAM) but extends these with the DCS virtues of distributed computing and multi-threading. With growing diversity of general-purpose blocks the DCS framework will reach an unprecedented degree of universality and flexibility. Configuration-defined algorithms will gradually replace many existing DCS applications. Finally, the concept might also become of interest for the upcoming ITER plasma control system.

  7. The California Central Coast Research Partnership: Building Relationships, Partnerships and Paradigms for University-Industry Research Collaboration. Appendix A. Telecommunications Asset Management in A Global Environment

    Griggs, Ken

    2003-01-01

    ... (CPSU Grant Proposal Number 02-007) entitled "California Central Coast Research Partnership" awarded to the Research and Graduate Programs office at California Polytechnic State University, San Luis Obispo, California...

  8. 20 CFR 416.986 - Why and when we will find that you are no longer entitled to benefits based on statutory blindness.

    2010-04-01

    ... longer entitled to benefits based on statutory blindness. 416.986 Section 416.986 Employees' Benefits... Disability and Blindness Blindness § 416.986 Why and when we will find that you are no longer entitled to benefits based on statutory blindness. (a) If your vision does not meet the definition of blindness. If you...

  9. College instruction is not so stress free after all: A qualitative and quantitative study of academic entitlement, uncivil behaviors, and instructor strain and burnout.

    Jiang, Lixin; Tripp, Thomas M; Hong, Phan Y

    2017-12-01

    The vast majority of today's college students are millennials, who have traits of confidence, tolerance, but also of entitlement and narcissism (Twenge, 2006). Therefore, college instructors face a unique challenge: dealing with the requests from academically entitled students, who have unreasonable expectations of receiving academic success, regardless of performance (Chowning & Campbell, 2009). We conducted two studies to examine whether student academic entitlement would increase instructors' strain and burnout via uncivil behaviors. A qualitative inquiry asked 136 instructors with college-teaching experience to describe types of behaviors entitled students display, their responses to entitled students, and the influence of these interactions on instructors' well-being. Next, a quantitative study with data from 857 college students nested in 34 instructors tested a multilevel mediation model where students' academic entitlement was related to instructor-reported uncivil behaviors, which in turn related to instructors' strain and burnout. Both studies largely support our hypothesis that uncivil behaviors fully mediate the relationship between students' academic entitlement and instructors' strain and burnout. We recommend employing behavioral modification strategies to decrease uncivil behaviors (e.g., class rules regarding uncivil behaviors might be specified in the course syllabus and consistently enforced) because academic entitlement attitudes are largely stable beliefs and thus may be less amenable to modification. Copyright © 2017 John Wiley & Sons, Ltd.

  10. 38 CFR 3.1000 - Entitlement under 38 U.S.C. 5121 to benefits due and unpaid upon death of a beneficiary.

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Entitlement under 38 U.S.C. 5121 to benefits due and unpaid upon death of a beneficiary. 3.1000 Section 3.1000 Pensions... Dependency and Indemnity Compensation Accrued § 3.1000 Entitlement under 38 U.S.C. 5121 to benefits due and...

  11. Measurement of the Clinical Usability of a Configurable EHR

    Møller-Jensen, John; Lund Pedersen, Ivan; Simonsen, Jesper

    2006-01-01

    during a series of workshops with the clinicians after which the XML configuration files were written and deployed. In parallel with this, the participants from the University identified, prioritised and further specified a number of effects related to the clinical practice to be measured. The effects......The objective of the project was to measure the clinical usability of an EHR configured by use of participatory design with clinicians from a neurological stroke unit in order to get input to the County’s future strategy for incremental implementation of EHR. The content of the EHR was defined...... requested by the clinicians focused on improving their overview and assessment of patients as well as on more efficient coordination in three specific and highly cooperative situations, viz. nursing handover, ward round and patient conference. All three situations were measured before (using paper...

  12. Measuring Effects on the Clinical Practice from a Configured EHR

    Møller-Jensen, John; Simonsen, Jesper; K. Iversen, Rikke

    2006-01-01

    during a series of workshops with the clinicians after which the XML configuration files were written and deployed. In parallel with this, the participants from the University specified a number of effects related to the clinical practice to be measured. Measurements were focused on the requested effects......The objective of the project was to measure the clinical usability of an EHR configured by use of participatory design with clinicians from a neurological stroke unit in order to get input to the County’s future strategy for incremental implementation of EHR. The content of the EHR was defined...... and acquired using various techniques including questionnaires, interviews, observations, and Task Load Index (TLX) ratings. In total, 15 nursing handovers, 8 ward rounds, and 11 patient conferences involving a total of 35 patients and more than 20 clinicians were included in the measurements. Data from...

  13. TWRS authorization basis configuration control summary

    Mendoza, D.P.

    1997-01-01

    This document was developed to define the Authorization Basis management functional requirements for configuration control, to evaluate the management control systems currently in place, and identify any additional controls that may be required until the TWRS [Tank Waste Remediation System] Configuration Management system is fully in place

  14. Deformed configurations, band structures and spectroscopic ...

    2014-03-20

    Mar 20, 2014 ... The deformed configurations and rotational band structures in =50 Ge and Se nuclei are studied by deformed Hartree–Fock with quadrupole constraint and angular momentum projection. Apart from the `almost' spherical HF solution, a well-deformed configuration occurs at low excitation. A deformed ...

  15. Improving the quotation process with product configuration

    Hvam, Lars; Christensen, Simon Pape

    2006-01-01

    How can product configuration support the process of engineering highly complex industrial products? This article describes how an IT-based product configuration system was developed to support the process of mak-ing budget quotations. The article is based on a research project carried out...

  16. Configuration of Web services as parametric design

    Ten Teije, Annette; Van Harmelen, Frank; Wielinga, Bob

    2004-01-01

    The configuration of Web services is particularly hard given the heterogeneous, unreliable and open nature of the Web. Furthermore, such composite Web services are likely to be complex services, that will require adaptation for each specific use. Current approaches to Web service configuration are

  17. Upgrades to the ISIS moderator configuration

    Taylor, A.D.

    1989-01-01

    The current ISIS moderator configuration, was designed in 1980 to provide a flexible set of beams for a hypothetical instrument suite. The use of fluid moderators at three different temperatures offering six faces to the instruments, has proved to be effective. In this paper we discuss an upgrade of these moderators in the light of the current and projected instrument configuration. (author)

  18. Overview of Java application configuration frameworks

    Denisov, Victor

    2013-01-01

    This paper reviews three major application configuration frameworks for Java-based applications: java.util.Properties, Apache Commons Configuration and Preferences API. Basic functionality of each framework is illustrated with code examples. Pros and cons of each framework are described in moderate detail. Suggestions are made about typical use cases for each framework.

  19. Synthesis and configurational analysis of phosphonate cavitands

    Jacopozzi, Paola; Dalcanale, Enrico; Spera, Silvia; Chrisstoffels, L.A.J.; Reinhoudt, David; Lippmann, Tino; Mann, Gerhard

    1998-01-01

    Synthesis, separation and configurational analysis of phosphonated and partially phosphonated cavitands derived from resorcinarenes are described. The configuration of all diastereomers has been elucidated by their 1H, 31P NMR spectra and 13C relaxation times. In all cases the course of the bridging

  20. Microsoft System Center Configuration Manager advanced deployment

    Coupland, Martyn

    2014-01-01

    If you are an experienced Configuration Manager administrator looking to advance your career or get more from your current environment, then this book is ideal for you. Prior experience of deploying and managing a Configuration Manager site would be helpful in following the examples throughout this book.

  1. Generation of Astron-Spherator configuration

    Narihara, Kazumichi; Hasegawa, Mitsuru; Tomita, Yukihiro; Tsuzuki, Tetsuya; Sato, Kuninori; Mohri, Akihiro.

    1983-01-01

    It was experimentally demonstrated that Astron-Spherator configuration is formed by injecting a pulsed relativistic electron beam in a toroidal device SPAC-VI with external toroidal and vertical magnetic fields. A plasma is confined in the extended magnetic region produced by a slender core of current carrying energetic electrons. This configuration continued for 40 ms without fatal instabilities. (author)

  2. Exotic configurations for gauge theory strings

    Yajnik, U.A.

    1987-01-01

    This paper discusses a class of string configurations occuring in nonabelian gauge theories, which are such that a component of the charged scalar field responsible for the string has a nonvanishing expectation value in the core of the string. A systematic procedure is given for setting up the ansatz for such configurations. (orig.)

  3. SRP [Salt Repository Project] configuration management plan

    1987-01-01

    This configuration management plan describes the organization, policies, and procedures that will be used on the Salt Repository Project (SRP) to implement the configuration management disciplines and controls. Configuration management is a part of baseline management. Baseline management is defined in the SRP Baseline Procedures Notebook and also includes cost and schedule baselines. Configuration management is a discipline applying technical and administrative direction and surveillance to identify and document the functional and physical characteristics of an item, to control changes to those characteristics, to record and report change processing and implementation status, and to audit the results. Configuration management is designed as a project management tool to determine and control baselines, and ensure and document all components of a project interface both physically and functionally. The purpose is to ensure that the product acquired satisfies the project's technical and operational requirements, and that the technical requirements are clearly defined and controlled throughout the development and acquisition process. 5 figs

  4. Configuration Management Plan for K Basins

    Weir, W.R.; Laney, T.

    1995-01-01

    This plan describes a configuration management program for K Basins that establishes the systems, processes, and responsibilities necessary for implementation. The K Basins configuration management plan provides the methodology to establish, upgrade, reconstitute, and maintain the technical consistency among the requirements, physical configuration, and documentation. The technical consistency afforded by this plan ensures accurate technical information necessary to achieve the mission objectives that provide for the safe, economic, and environmentally sound management of K Basins and the stored material. The configuration management program architecture presented in this plan is based on the functional model established in the DOE Standard, DOE-STD-1073-93, open-quotes Guide for Operational Configuration Management Programclose quotes

  5. Interactive Cost Configuration Over Decision Diagrams

    Andersen, Henrik Reif; Hadzic, Tarik; Pisinger, David

    2010-01-01

    interaction online. In particular,binary decision diagrams (BDDs) have been successfully used as a compilation target for product and service configuration. In this paper we discuss how to extend BDD-based configuration to scenarios involving cost functions which express user preferences. We first show...... that an efficient, robust and easy to implement extension is possible if the cost function is additive, and feasible solutions are represented using multi-valued decision diagrams (MDDs). We also discuss the effect on MDD size if the cost function is non-additive or if it is encoded explicitly into MDD. We...... then discuss interactive configuration in the presence of multiple cost functions. We prove that even in its simplest form, multiple-cost configuration is NP-hard in the input MDD. However, for solving two-cost configuration we develop a pseudo-polynomial scheme and a fully polynomial approximation scheme...

  6. Evolution of the Configuration Database Design

    Salnikov, A.

    2006-01-01

    The BABAR experiment at SLAC successfully collects physics data since 1999. One of the major parts of its on-line system is the configuration database which provides other parts of the system with the configuration data necessary for data taking. Originally the configuration database was implemented in the Objectivity/DB ODBMS. Recently BABAR performed a successful migration of its event store from Objectivity/DB to ROOT and this prompted a complete phase-out of the Objectivity/DB in all other BABAR databases. It required the complete redesign of the configuration database to hide any implementation details and to support multiple storage technologies. In this paper we describe the process of the migration of the configuration database, its new design, implementation strategy and details

  7. Communicating knowledge: Making embedded configuration work

    Oddsson, Gudmundur Valur; Hvam, Lars

    2007-01-01

    A lot of systems are assembled from near-independent mechatronic subsystems that have to be configured to match each other. An example of such systems are e.g. home entertainment systems, where TV, DVD and Receiver are matched to form an overall system, and compilation of pumps and controllers...... to form fresh water supply systems. Sometimes an external knowledge system keeps track of how each subsystem has to be configured, but the actual configuration is often done manually. Installing and maintaining those kinds of systems can be a tedious task and often requires repetitive labour. The idea...... is to “split-up” the product knowledge and encapsulate it into each subsystem. Then, when the subsystems are assembled, the configuration of each subsystem can either be done automatically or with minimum input. The concept could be called: embedded configuration. This article will try to connect three aspects...

  8. Magnetic reconnection and current sheet formation in 3D magnetic configurations

    Frank, A.G.

    1999-01-01

    The problem of magnetic reconnection in three-dimensional (3D) magnetic configurations has been studied experimentally. The research has concentrated on the possibilities of formation of current sheets, which represent crucial objects for a realization of magnetic reconnection phenomena. Different types of 3D magnetic configurations were examined, including configurations with singular lines of the X-type, non-uniform fields containing isolated magnetic null-points and without null-points. It was revealed that formation of quasi-one-dimensional current sheets is the universal process for plasma dynamics in 3D magnetic fields both with null-points and without. At the same time the peculiarities of current sheets, plasma dynamics and magnetic reconnection processes depend essentially on characteristics of 3D magnetic configurations. The result of principal significance obtained was that magnetic reconnection phenomena can take place in a wide range of 3D magnetic configurations as a consequence of their ability to form current sheets. (author)

  9. NASA Hydrogen Research at Florida Universities

    David L Block; Ali T-Raissi

    2006-01-01

    This paper presents a summary of the activities and results from 36 hydrogen research projects being conducted over a four-year period by Florida universities for the U. S. National Aeronautics and Space Administration (NASA). The program entitled 'NASA Hydrogen Research at Florida Universities' is managed by the Florida Solar Energy Center (FSEC). FSEC has 22 years of experience in conducting research in areas related to hydrogen technologies and fuel cells. The R and D activities under this program cover technology areas related to production, cryogenics, sensors, storage, separation processes, fuel cells, resource assessments and education. (authors)

  10. Transfer of single farm payment entitlements to farm successors: impact on structural change and rental prices in Switzerland

    Gabriele Mack

    2013-09-01

    Full Text Available This paper analyses the impact of tradable and non-tradable single farm payment (SFP entitlements for farm successors on structural change and the lease market. Using the example of Swiss agriculture, the effects on rental-price trends and farm-exit rates are investigated. An ex-ante normative impact analysis is performed with the agent-based agricultural-sector model SWISSland, which simulates structural change processes and income trends in Swiss agriculture over a period of up to 15 years. A land market implemented at municipality level simulates the plot-by-plot leasing of land to surrounding neighbouring agents that is common in Switzerland. Allocation of plots to tenants as well as lease pricing is modelled taking into account the farm-specific land rents. The results show that personalised SFP entitlements which could not be transferred to a farm successor not only cause an intensification of structural change, but would also thus lead to a substantial reduction in rental prices. SFP entitlements which were successfully transferred to farm successors have only a slight impact on structural change and the rental prices of arable land. Only for grassland in the mountain region does a stronger shift result in a significant reduction in rental prices.

  11. Entitlement to vote in the Cantons of Geneva and Vaud and eligibility for election in the Canton of Vaud

    2006-01-01

    The Permanent Mission of Switzerland has informed CERN that some international civil servants and members of their families are henceforth entitled to vote on commune matters in the Canton of Geneva and are entitled to vote and are eligible for election at commune level in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise this entitlement, you are invited to consult the information published, in French only, on the Swiss Mission's website: http://www.dfae.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt1.html (for the Canton of Geneva), http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt2.html (for the Canton of Vaud), In this regard, you are reminded that: Under Articles I 3.05 and I 3.07 of the Staff Rules, a member of the personnel 'may take part, outside the Organization, in the public and political life of a State in accordance with the relevant legislation' and 'express his own person...

  12. Onset of pseudo-thermal equilibrium within configurations and super-configurations

    Busquet, Michel

    2006-01-01

    Level populations within a configuration and configuration populations within super-configuration or within one ion are shown to follow a Boltzmann law at some effective temperature different from the actual electron temperature (as it would be when Griem criterion is valid). Origin of this pseudo-thermal equilibrium is discussed and basis of a model are presented

  13. Onset of pseudo-thermal equilibrium within configurations and super-configurations

    Busquet, Michel [ARTEP Inc., 2922 Excelsior Springs Court, Elicott City, MD 21042 (United States)]. E-mail: busquet@this.nrl.navy.mil

    2006-05-15

    Level populations within a configuration and configuration populations within super-configuration or within one ion are shown to follow a Boltzmann law at some effective temperature different from the actual electron temperature (as it would be when Griem criterion is valid). Origin of this pseudo-thermal equilibrium is discussed and basis of a model are presented.

  14. Texture and inflation in a closed universe

    Hacyan, S.; Sarmiento, A.

    1993-01-01

    We present a cosmological model with a global homogeneous texture and inflation, but without an initial singularity. The Universe starts from an equilibrium configuration in a symmetric vacuum; the dynamic stability of this configuration is studied. We obtain numerical solutions which show that the Universe expands exponentially and the texture field decays in a finite time; this corresponds to a period of inflation followed naturally by a Friedmann expansion

  15. Improving motorcycle conspicuity through innovative headlight configurations.

    Ranchet, Maud; Cavallo, Viola; Dang, Nguyen-Thong; Vienne, Fabrice

    2016-09-01

    Most motorcycle crashes involve another vehicle that violated the motorcycle's right-of-way at an intersection. Two kinds of perceptual failures of other road users are often the cause of such accidents: motorcycle-detection failures and motion-perception errors. The aim of this study is to investigate the effect of different headlight configurations on motorcycle detectability when the motorcycle is in visual competition with cars. Three innovative headlight configurations were tested: (1) standard yellow (central yellow headlight), (2) vertical white (one white light on the motorcyclist's helmet and two white lights on the fork in addition to the central white headlight), and (3) vertical yellow (same configuration as (2) with yellow lights instead of white). These three headlight configurations were evaluated in comparison to the standard configuration (central white headlight) in three environments containing visual distractors formed by car lights: (1) daytime running lights (DRLs), (2) low beams, or (3) DRLs and low beams. Video clips of computer-generated traffic situations were displayed briefly (250ms) to 57 drivers. The results revealed a beneficial effect of standard yellow configuration and the vertical yellow configuration on motorcycle detectability. However, this effect was modulated by the car-DRL environment. Findings and practical recommendations are discussed with regard to possible applications for motorcycles. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. National Ignition Facility Configuration Management Plan

    Cabral, S G; Moore, T L

    2002-01-01

    This Configuration Management Plan (CMP) describes the technical and administrative management process for controlling the National Ignition Facility (NIF) Project configuration. The complexity of the NIF Project (i.e., participation by multiple national laboratories and subcontractors involved in the development, fabrication, installation, and testing of NIF hardware and software, as well as construction and testing of Project facilities) requires implementation of the comprehensive configuration management program defined in this plan. A logical schematic illustrating how the plan functions is provided in Figure 1. A summary of the process is provided in Section 4.0, Configuration Change Control. Detailed procedures that make up the overall process are referenced. This CMP is consistent with guidance for managing a project's configuration provided in Department of Energy (DOE) Order 430.1, Guide PMG 10, ''Project Execution and Engineering Management Planning''. Configuration management is a formal discipline comprised of the following four elements: (1) Identification--defines the functional and physical characteristics of a Project and uniquely identifies the defining requirements. This includes selection of components of the end product(s) subject to control and selection of the documents that define the project and components. (2) Change management--provides a systematic method for managing changes to the project and its physical and functional configuration to ensure that all changes are properly identified, assessed, reviewed, approved, implemented, tested, and documented. (3) Data management--ensures that necessary information on the project and its end product(s) is systematically recorded and disseminated for decision-making and other uses. Identifies, stores and controls, tracks status, retrieves, and distributes documents. (4) Assessments and validation--ensures that the planned configuration requirements match actual physical configurations and

  17. Configurations of Leadership Practices in Hospital Units

    Meier, Ninna

    2015-01-01

    configurations of leadership practices varied in four different clinical settings, thus contributing with contextual accounts of leadership as practice, and suggested “configurations of practice” as a way to carve out similarities and differences in leadership practices across settings....... and interviews with ten interdisciplinary clinical managers. Findings: – Comparing leadership as configurations of practices across four different clinical settings, the author shows how flexible and often shared leadership practices were embedded in and central to the core clinical work in all units studied...

  18. Atom localization with double-cascade configuration

    Gordeev, Maksim Yu; Rozhdestvensky, Yuri V; Efremova, Ekaterina A

    2016-01-01

    We investigate the one-dimensional (1D) and two-dimensional (2D) atom localization of a four-level system in a double-cascade configuration. We demonstrate the possibility of 1D localization in the field of a standing wave, 2D localization in the field of two standing waves and 2D localization only in the field of running waves by using different configurations of driven waves on transitions. In addition, for each configuration we reached a high-precision atom localization in one of the states at scales much smaller than the wavelength of the incident optical radiation. (paper)

  19. A configural dominant account of contextual cueing: Configural cues are stronger than colour cues.

    Kunar, Melina A; John, Rebecca; Sweetman, Hollie

    2014-01-01

    Previous work has shown that reaction times to find a target in displays that have been repeated are faster than those for displays that have never been seen before. This learning effect, termed "contextual cueing" (CC), has been shown using contexts such as the configuration of the distractors in the display and the background colour. However, it is not clear how these two contexts interact to facilitate search. We investigated this here by comparing the strengths of these two cues when they appeared together. In Experiment 1, participants searched for a target that was cued by both colour and distractor configural cues, compared with when the target was only predicted by configural information. The results showed that the addition of a colour cue did not increase contextual cueing. In Experiment 2, participants searched for a target that was cued by both colour and distractor configuration compared with when the target was only cued by colour. The results showed that adding a predictive configural cue led to a stronger CC benefit. Experiments 3 and 4 tested the disruptive effects of removing either a learned colour cue or a learned configural cue and whether there was cue competition when colour and configural cues were presented together. Removing the configural cue was more disruptive to CC than removing colour, and configural learning was shown to overshadow the learning of colour cues. The data support a configural dominant account of CC, where configural cues act as the stronger cue in comparison to colour when they are presented together.

  20. An Entitlement Approach to Address the Water-Energy-Food Nexus in Rural India

    Siegfried, T. U.; Fishman, R.; Modi, V.; Lall, U.

    2008-12-01

    prices and rainfall patterns due to climate change only enhance these concerns. Given these deficiencies, any corrective strategy should at least target the following long-term policy goals: a) increase the efficiency of rural electricity consumption in terms of grain production and rural income, b) providing the farmers greater flexibility with timely, high quality energy and more efficient means of production, c) enable proper energy accounting on the use side so as to recover costs at sufficient levels for the SEBs and thus enable long-term investments in energy infrastructure and d) secure and eventually increase agricultural production without depleting groundwater resources over the long run. We will present an entitlement approach with which the above issues can be addressed in the future. A case study example from the semi-arid Telangana Region in Andhra Pradesh will be discussed in depth and preliminary results shown.

  1. Configuration interaction in charge exchange spectra of tin and xenon

    D'Arcy, R.; Morris, O.; Ohashi, H.; Suda, S.; Tanuma, H.; Fujioka, S.; Nishimura, H.; Nishihara, K.; Suzuki, C.; Kato, T.; Koike, F.; O'Sullivan, G.

    2011-06-01

    Charge-state-specific extreme ultraviolet spectra from both tin ions and xenon ions have been recorded at Tokyo Metropolitan University. The electron cyclotron resonance source spectra were produced from charge exchange collisions between the ions and rare gas target atoms. To identify unknown spectral lines of tin and xenon, atomic structure calculations were performed for Sn14+-Sn17+ and Xe16+-Xe20+ using the Hartree-Fock configuration interaction code of Cowan (1981 The Theory of Atomic Structure and Spectra (Berkeley, CA: University of California Press)). The energies of the capture states involved in the single-electron process that occurs in these slow collisions were estimated using the classical over-barrier model.

  2. External magnetic field configurations for EXTRAP

    Bonnevier, B.

    1982-08-01

    The strongly inhomogeneous magnetic field for stabilization of a pinch in an Extrap configuration can be created in various ways. Some possibilities both for the linear case and for the toroidal case are discussed. (author)

  3. Space shuttle configuration accounting functional design specification

    1974-01-01

    An analysis is presented of the requirements for an on-line automated system which must be capable of tracking the status of requirements and engineering changes and of providing accurate and timely records. The functional design specification provides the definition, description, and character length of the required data elements and the interrelationship of data elements to adequately track, display, and report the status of active configuration changes. As changes to the space shuttle program levels II and III configuration are proposed, evaluated, and dispositioned, it is the function of the configuration management office to maintain records regarding changes to the baseline and to track and report the status of those changes. The configuration accounting system will consist of a combination of computers, computer terminals, software, and procedures, all of which are designed to store, retrieve, display, and process information required to track proposed and proved engineering changes to maintain baseline documentation of the space shuttle program levels II and III.

  4. Configuration Management for Wendelstein 7-X

    Brakel, R.; Eeten, P.v.; Hartmann, D.A.; Henkelmann, K.; Knauer, J.; Mueller, K.; Okkenga-Wolf, A.; Wenzel, U.

    2009-01-01

    A complex system like the large superconducting Wendelstein 7-X stellarator necessitates a dedicated organizational structure which assures permanent consistency between the requirements of its system specification and the performance attributes of all its components throughout its life time. This includes well-defined processes and centrally coordinated information structures. For this purposes the department Configuration Management (CM) has recently been established at W7-X. The detailed tasks of CM for W7-X are oriented along common CM standards and comprise configuration identification, change management, configuration status accounting and configuration verification. While the assembly of W7-X is proceeding some components are still under procurement or even under design. Thus design changes and non-conformances may have a direct impact on the assembly process. Highest priority has therefore been assigned to efficient control of change and non-conformance processes which might delay the assembly schedule.

  5. Molecular Electronic Terms and Molecular Orbital Configurations.

    Mazo, R. M.

    1990-01-01

    Discussed are the molecular electronic terms which can arise from a given electronic configuration. Considered are simple cases, molecular states, direct products, closed shells, and open shells. Two examples are provided. (CW)

  6. Deformed configurations, band structures and spectroscopic ...

    2014-03-20

    Mar 20, 2014 ... Our study gives insight into possible deformed structures at spherical shell closure. ... Considerable experimental and theoretical efforts ... True deformation effects can be seen only by considering configuration mixing.

  7. Microsoft Windows 2000 Router Configuration Guide

    Richburg, Florence

    2001-01-01

    The purpose of this guide is to provide technical guidance to network administrators of small to medium size networks in the configuration and integration of Microsoft Windows 2000 Server Router features...

  8. Configuring the development space for conceptualization

    Brønnum, Louise; Clausen, Christian

    2013-01-01

    This paper addresses issues of conceptualization in the early stages of concept development noted as the Front End of Innovation [FEI]. We examine this particular development space as a socio technical space where a diversity of technological knowledge, user perspectives and organizational agendas...... meet and interact. Based on a case study from an industrial medical company, the paper addresses and analyses the configuration of the development space in a number of projects aiming to take up user oriented perspectives in their activities. It presents insights on how the FEI was orchestrated...... and staged and how different elements and objects contributed to the configuration of the space in order to make it perform in a certain way. The analysis points at the importance of the configuration processes and indicate how these configurations often may act as more or less hidden limitations on concept...

  9. Status Configurations, Military Service and Higher Education.

    Wang, Lin; Elder, Glen H; Spence, Naomi J

    2012-12-01

    The U.S. Armed Forces offer educational and training benefits as incentives for service. This study investigates the influence of status configurations on military enlistment and their link to greater educational opportunity. Three statuses (socioeconomic status of origin, cognitive ability and academic performance) have particular relevance for life course options. We hypothesize that young men with inconsistent statuses are more likely to enlist than men with consistent status profiles, and that military service improves access to college for certain configurations. Analyses of the National Longitudinal Study of Adolescent Health (Add Health) show (1. that several status configurations markedly increased the likelihood of military enlistment and (2. within status configurations, recruits were generally more likely to enroll in higher education than nonveterans, with associate degrees being more likely.

  10. Optimal sensor configuration for complex systems

    Sadegh, Payman; Spall, J. C.

    1998-01-01

    . The procedure for sensor configuration is based on the simultaneous perturbation stochastic approximation (SPSA) algorithm. SPSA avoids the need for detailed modeling of the sensor response by simply relying on the observed responses obtained by limited experimentation with test sensor configurations. We......The paper considers the problem of sensor configuration for complex systems with the aim of maximizing the useful information about certain quantities of interest. Our approach involves: 1) definition of an appropriate optimality criterion or performance measure; and 2) description of an efficient...... and practical algorithm for achieving the optimality objective. The criterion for optimal sensor configuration is based on maximizing the overall sensor response while minimizing the correlation among the sensor outputs, so as to minimize the redundant information being provided by the multiple sensors...

  11. Optimal sensor configuration for complex systems

    Sadegh, Payman; Spall, J. C.

    1998-01-01

    configuration is based on maximizing the overall sensor response while minimizing the correlation among the sensor outputs. The procedure for sensor configuration is based on simultaneous perturbation stochastic approximation (SPSA). SPSA avoids the need for detailed modeling of the sensor response by simply......Considers the problem of sensor configuration for complex systems. Our approach involves definition of an appropriate optimality criterion or performance measure, and description of an efficient and practical algorithm for achieving the optimality objective. The criterion for optimal sensor...... relying on observed responses as obtained by limited experimentation with test sensor configurations. We illustrate the approach with the optimal placement of acoustic sensors for signal detection in structures. This includes both a computer simulation study for an aluminum plate, and real...

  12. Theorem on axially symmetric gravitational vacuum configurations

    Papadopoulos, A; Le Denmat, G [Paris-6 Univ., 75 (France). Inst. Henri Poincare

    1977-01-24

    A theorem is proved which asserts the non-existence of axially symmetric gravitational vacuum configurations with non-stationary rotation only. The eventual consequences in black-hole physics are suggested.

  13. Status Configurations, Military Service and Higher Education

    Wang, Lin; Elder, Glen H.; Spence, Naomi J.

    2012-01-01

    The U.S. Armed Forces offer educational and training benefits as incentives for service. This study investigates the influence of status configurations on military enlistment and their link to greater educational opportunity. Three statuses (socioeconomic status of origin, cognitive ability and academic performance) have particular relevance for life course options. We hypothesize that young men with inconsistent statuses are more likely to enlist than men with consistent status profiles, and that military service improves access to college for certain configurations. Analyses of the National Longitudinal Study of Adolescent Health (Add Health) show (1. that several status configurations markedly increased the likelihood of military enlistment and (2. within status configurations, recruits were generally more likely to enroll in higher education than nonveterans, with associate degrees being more likely. PMID:24511161

  14. Configurable Web Warehouses construction through BPM Systems

    Andrea Delgado

    2016-08-01

    Full Text Available The process of building Data Warehouses (DW is well known with well defined stages but at the same time, mostly carried out manually by IT people in conjunction with business people. Web Warehouses (WW are DW whose data sources are taken from the web. We define a flexible WW, which can be configured accordingly to different domains, through the selection of the web sources and the definition of data processing characteristics. A Business Process Management (BPM System allows modeling and executing Business Processes (BPs providing support for the automation of processes. To support the process of building flexible WW we propose a two BPs level: a configuration process to support the selection of web sources and the definition of schemas and mappings, and a feeding process which takes the defined configuration and loads the data into the WW. In this paper we present a proof of concept of both processes, with focus on the configuration process and the defined data.

  15. Universal Health Coverage - The Critical Importance of Global Solidarity and Good Governance Comment on "Ethical Perspective: Five Unacceptable Trade-offs on the Path to Universal Health Coverage".

    Reis, Andreas A

    2016-06-07

    This article provides a commentary to Ole Norheim' s editorial entitled "Ethical perspective: Five unacceptable trade-offs on the path to universal health coverage." It reinforces its message that an inclusive, participatory process is essential for ethical decision-making and underlines the crucial importance of good governance in setting fair priorities in healthcare. Solidarity on both national and international levels is needed to make progress towards the goal of universal health coverage (UHC). © 2016 by Kerman University of Medical Sciences.

  16. Discharge breakdown in the EXTRAP configuration

    Drake, J.R.

    1982-02-01

    The breakdown of a discharge in a linear EXTRAP configuration has been studied experimentally. In this configuration the breakdown occurs along the zero B-field line, which is the axis of the linear octupole magnetic field, between the anode and cathode which constitute the ends of the linear device. Breakdown could be described by a modified Townsend criterion which included additional electron losses due to the presence of the B-field transverse to the discharge. (author)

  17. An intelligent sales assistant for configurable products

    Molina, Martin

    2001-01-01

    Some of the recent proposals of web-based applications are oriented to provide advanced search services through virtual shops. Within this context, this paper proposes an advanced type of software application that simulates how a sales assistant dialogues with a consumer to dynamically configure a product according to particular needs. The paper presents the general knowl- edge model that uses artificial intelligence and knowledge-based techniques to simulate the configuration process. Finall...

  18. Particle transort in field-reversed configurations

    Tuszewski, M.; Linford, R.K.; Lipson, J.; Sgro, A.G.

    1981-01-01

    A field reversed configuration (FRC) is a compact toroid that contains no toroidal field. These plasmas are observed to be grossly stable for about 10-100 ..mu..sec. The lifetimes appear limited by an n = 2 rotational instability which may be caused by particle loss. Particle transport is therefore an important issue for these configurations. We investigate particle loss with a steady-state, 1-D model which approximates the experimental observation of elongated FRC equilibrium with about constant separatrix radius.

  19. Control Configuration Selection for Multivariable Descriptor Systems

    Shaker, Hamid Reza; Stoustrup, Jakob

    2012-01-01

    Control configuration selection is the procedure of choosing the appropriate input and output pairs for the design of SISO (or block) controllers. This step is an important prerequisite for a successful industrial control strategy. In industrial practices it is often the case that the system, whi...... is that it can be used to propose a richer sparse or block diagonal controller structure. The interaction measure is used for control configuration selection of the linearized CSTR model with descriptor from....

  20. Benzofuranoid and bicyclooctanoid neolignans:absolute configuration

    Alvarenga, M.A. de; Giesbrecht, A.M.; Gottlieb, O.R.; Yoshida, M.

    1977-01-01

    The naturally occuring benzofuranoid and bicyclo (3,2,1) octanoid neolignans have their relative configurations established by 1 H and 13 C NMR, inclusively with aid of the solvent shift technique. Interconversion of the benzofuranoid type compounds, as well as for a benzofuranoid to a bicyclooctanoid derivate, make ORD correlations, ultimately with (2S, 3S) - and (2R,3R)-2,3- dihydrobenzofurans, possible, and led to the absolute configurations of both series of neolignans [pt

  1. Observed benefits from product configuration systems

    Hvam, Lars; Haug, Anders; Mortensen, Niels Henrik

    2013-01-01

    This article presents a study of the benefits obtained from applying product configuration systems based on a case study in four industry companies. The impacts are described according to main objectives in literature for imple-menting product configuration systems: lead time in the specification...... affected by the use of product configu-ration systems e.g. increased sales, decrease in the number of SKU's, improved ability to introduce new products, and cost reductions.......This article presents a study of the benefits obtained from applying product configuration systems based on a case study in four industry companies. The impacts are described according to main objectives in literature for imple-menting product configuration systems: lead time in the specification...... processes, on-time delivery of the specifica-tions, and resource consumption for making specifications, quality of specifications, optimization of products and services, and other observations. The purpose of the study is partly to identify specific impacts observed from implementing product configuration...

  2. Dynamic airspace configuration by genetic algorithm

    Marina Sergeeva

    2017-06-01

    Full Text Available With the continuous air traffic growth and limits of resources, there is a need for reducing the congestion of the airspace systems. Nowadays, several projects are launched, aimed at modernizing the global air transportation system and air traffic management. In recent years, special interest has been paid to the solution of the dynamic airspace configuration problem. Airspace sector configurations need to be dynamically adjusted to provide maximum efficiency and flexibility in response to changing weather and traffic conditions. The main objective of this work is to automatically adapt the airspace configurations according to the evolution of traffic. In order to reach this objective, the airspace is considered to be divided into predefined 3D airspace blocks which have to be grouped or ungrouped depending on the traffic situation. The airspace structure is represented as a graph and each airspace configuration is created using a graph partitioning technique. We optimize airspace configurations using a genetic algorithm. The developed algorithm generates a sequence of sector configurations for one day of operation with the minimized controller workload. The overall methodology is implemented and successfully tested with air traffic data taken for one day and for several different airspace control areas of Europe.

  3. Intellectual Model-Based Configuration Management Conception

    Bartusevics Arturs

    2014-07-01

    Full Text Available Software configuration management is one of the most important disciplines within the software development project, which helps control the software evolution process and allows including into the end project only tested and validated changes. To achieve this, software management completes certain tasks. Concrete tools are used for technical implementation of tasks, such as version control systems, servers of continuous integration, compilers, etc. A correct configuration management process usually requires several tools, which mutually exchange information by generating various kinds of transfers. When it comes to introducing the configuration management process, often there are situations when tool installation is started, yet at that given moment there is no general picture of the total process. The article offers a model-based configuration management concept, which foresees the development of an abstract model for the configuration management process that later is transformed to lower abstraction level models and tools are indicated to support the technical process. A solution of this kind allows a more rational introduction and configuration of tools

  4. Response to Martinez-Novack et al. Comments on Hynes et al. Prevalence of Marijuana Use among University Students in Bolivia, Colombia, Ecuador, and Peru. Int. J. Environ. Res. Public Health, 2015, 12, 5233-5240

    Marya Hynes

    2015-09-01

    Full Text Available We have read with great interest the Comments related to the article entitled “Prevalence of marijuana use among university 20 students in Bolivia, Colombia, Ecuador and Peru” and appreciate the readers’ feedback [1]. [...

  5. On universality in ergoregion mergers

    Elvang, Henriette; Figueras, Pau; Hubeny, Veronika E; Rangamani, Mukund; Horowitz, Gary T

    2009-01-01

    We study non-dynamical mergers of ergoregions in d + 1-dimensional vacuum gravity. At the merger point, where the ergosurfaces bounding each ergoregion just touch, solutions exhibit universal behavior when there is rotation only in one plane: the angle between the merging ergosurfaces depends only on the symmetries of the solution, not on any other details of the configuration. We show that universality follows from the fact that the relevant component of Einstein's equation reduces to Laplace's equation at the point of merger. Thus ergoregion mergers mimic mergers of Newtonian equipotentials and have similar universal behavior. For solutions with rotation in more than one plane, universality is lost. We demonstrate universality and non-universality in several explicit examples.

  6. Configuration affects parallel stent grafting results.

    Tanious, Adam; Wooster, Mathew; Armstrong, Paul A; Zwiebel, Bruce; Grundy, Shane; Back, Martin R; Shames, Murray L

    2018-05-01

    A number of adjunctive "off-the-shelf" procedures have been described to treat complex aortic diseases. Our goal was to evaluate parallel stent graft configurations and to determine an optimal formula for these procedures. This is a retrospective review of all patients at a single medical center treated with parallel stent grafts from January 2010 to September 2015. Outcomes were evaluated on the basis of parallel graft orientation, type, and main body device. Primary end points included parallel stent graft compromise and overall endovascular aneurysm repair (EVAR) compromise. There were 78 patients treated with a total of 144 parallel stents for a variety of pathologic processes. There was a significant correlation between main body oversizing and snorkel compromise (P = .0195) and overall procedural complication (P = .0019) but not with endoleak rates. Patients were organized into the following oversizing groups for further analysis: 0% to 10%, 10% to 20%, and >20%. Those oversized into the 0% to 10% group had the highest rate of overall EVAR complication (73%; P = .0003). There were no significant correlations between any one particular configuration and overall procedural complication. There was also no significant correlation between total number of parallel stents employed and overall complication. Composite EVAR configuration had no significant correlation with individual snorkel compromise, endoleak, or overall EVAR or procedural complication. The configuration most prone to individual snorkel compromise and overall EVAR complication was a four-stent configuration with two stents in an antegrade position and two stents in a retrograde position (60% complication rate). The configuration most prone to endoleak was one or two stents in retrograde position (33% endoleak rate), followed by three stents in an all-antegrade position (25%). There was a significant correlation between individual stent configuration and stent compromise (P = .0385), with 31

  7. Configuring Airspace Sectors with Approximate Dynamic Programming

    Bloem, Michael; Gupta, Pramod

    2010-01-01

    In response to changing traffic and staffing conditions, supervisors dynamically configure airspace sectors by assigning them to control positions. A finite horizon airspace sector configuration problem models this supervisor decision. The problem is to select an airspace configuration at each time step while considering a workload cost, a reconfiguration cost, and a constraint on the number of control positions at each time step. Three algorithms for this problem are proposed and evaluated: a myopic heuristic, an exact dynamic programming algorithm, and a rollouts approximate dynamic programming algorithm. On problem instances from current operations with only dozens of possible configurations, an exact dynamic programming solution gives the optimal cost value. The rollouts algorithm achieves costs within 2% of optimal for these instances, on average. For larger problem instances that are representative of future operations and have thousands of possible configurations, excessive computation time prohibits the use of exact dynamic programming. On such problem instances, the rollouts algorithm reduces the cost achieved by the heuristic by more than 15% on average with an acceptable computation time.

  8. Comparison of hollow cathode discharge plasma configurations

    Farnell, Casey C; Farnell, Cody C; Williams, John D

    2011-01-01

    Hollow cathodes used in plasma contactor and electric propulsion devices provide electrons for sustaining plasma discharges and enabling plasma bridge neutralization. Life tests show erosion on hollow cathodes exposed to the plasma environment produced in the region downstream of these devices. To explain the observed erosion, plasma flow field measurements are presented for hollow cathode generated plasmas using both directly immersed probes and remotely located plasma diagnostics. Measurements on two cathode discharge configurations are presented: (1) an open, no magnetic field configuration and (2) a setup simulating the discharge chamber environment of an ion thruster. In the open cathode configuration, large amplitude plasma potential oscillations, ranging from 20 to 85 V within a 34 V discharge, were observed using a fast response emissive probe. These oscillations were observed over a dc potential profile that included a well-defined potential hill structure. A remotely located electrostatic analyzer (ESA) was used to measure the energy of ions produced within the plasma, and energies were detected that met, and in some cases exceeded, the peak oscillatory plasma potentials detected by the emissive probe. In the ion thruster discharge chamber configuration, plasma potentials from the emissive probe again agreed with ion energies recorded by the remotely located ESA; however, much lower ion energies were detected compared with the open configuration. A simplified ion-transit model that uses temporal and spatial plasma property measurements is presented and used to predict far-field plasma streaming properties. Comparisons between the model and remote measurements are presented.

  9. Configuration Fuzzing for Software Vulnerability Detection.

    Dai, Huning; Murphy, Christian; Kaiser, Gail

    2010-02-15

    Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environment. One approach to detecting these vulnerabilities is fuzz testing, which feeds a range of randomly modified inputs to a software application while monitoring it for failures. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, in this paper we present a new testing methodology called configuration fuzzing. Configuration fuzzing is a technique whereby the configuration of the running application is randomly modified at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks "security invariants" that, if violated, indicate a vulnerability; however, the fuzzing is performed in a duplicated copy of the original process, so that it does not affect the state of the running application. In addition to discussing the approach and describing a prototype framework for implementation, we also present the results of a case study to demonstrate the approach's efficiency.

  10. Evaluating the fermionic determinant of dynamical configurations

    Hasenfratz, Anna; Alexandru, Andrei

    2002-01-01

    We propose and study an improved method to calculate the fermionic determinant of dynamical configurations. The evaluation or at least stochastic estimation of the ratios of fermionic determinants is essential for a recently proposed updating method of smeared link dynamical fermions. This update creates a sequence of configurations by changing a subset of the gauge links by a pure gauge heat bath or over-relaxation step. The acceptance of the proposed configuration depends on the ratio of the fermionic determinants on the new and original configurations. We study this ratio as a function of the number of links that are changed in the heat bath update. We find that even when every link of a given direction and parity of a 10 fm 4 configuration is updated, the average of the determinant ratio is still close to one and with the improved stochastic estimator the proposed change is accepted with about 20% probability. This improvement suggests that the new updating technique can be efficient even on large lattices and could provide an updating method for dynamical overlap actions

  11. System of ispFlash configuration

    Bourrion, Olivier

    2003-01-01

    The aim of this module is to allow the use of FPGA components instead of EPLD components which for an equivalent or even inferior capacity are more expensive. For instance, the idea is to replace CPLD components having 512 macro-cells by one FPGA spartan II of Xilinx. However, due to the configuration's volatility, one configuration means is needed to put under voltage. A solution appears to be the using of a high capacity Flash memory coupled to a CPLD of small size to comply with the FPGA configuration protocol; also, one has to provide an in situ configuration means for this memory. Obviously, a product having an equivalent functionality already exists, since Xilinx and ALTERA supply PROMs of serial configuration. Unfortunately, they are expensive and a dealer is implied while the FLASH, the small CPLD and the FPGA spartan II are currently available. In conclusion, by using this assembly, which requires a small supplementary surface and a delay of upmost 240 ms (for the largest FPGA 1 Mbit), one obtains a solution cheaper and more performing than an EPLD of high capacity

  12. Prediction of Protein Configurational Entropy (Popcoen).

    Goethe, Martin; Gleixner, Jan; Fita, Ignacio; Rubi, J Miguel

    2018-03-13

    A knowledge-based method for configurational entropy prediction of proteins is presented; this methodology is extremely fast, compared to previous approaches, because it does not involve any type of configurational sampling. Instead, the configurational entropy of a query fold is estimated by evaluating an artificial neural network, which was trained on molecular-dynamics simulations of ∼1000 proteins. The predicted entropy can be incorporated into a large class of protein software based on cost-function minimization/evaluation, in which configurational entropy is currently neglected for performance reasons. Software of this type is used for all major protein tasks such as structure predictions, proteins design, NMR and X-ray refinement, docking, and mutation effect predictions. Integrating the predicted entropy can yield a significant accuracy increase as we show exemplarily for native-state identification with the prominent protein software FoldX. The method has been termed Popcoen for Prediction of Protein Configurational Entropy. An implementation is freely available at http://fmc.ub.edu/popcoen/ .

  13. Informing resource-poor populations and the delivery of entitled health and social services in rural India: a cluster randomized controlled trial.

    Pandey, Priyanka; Sehgal, Ashwini R; Riboud, Michelle; Levine, David; Goyal, Madhav

    2007-10-24

    A lack of awareness about entitled health and social services may contribute to poor delivery of such services in developing countries, especially among individuals of low socioeconomic status. To determine the impact of informing resource-poor rural populations about entitled services. Community-based, cluster randomized controlled trial conducted from May 2004 to May 2005 in 105 randomly selected village clusters in Uttar Pradesh state in India. Households (548 intervention and 497 control) were selected by a systematic sampling design, including both low-caste and mid- to high-caste households. Four to 6 public meetings were held in each intervention village cluster to disseminate information on entitled health services, entitled education services, and village governance requirements. No intervention took place in control village clusters. Visits by nurse midwife; prenatal examinations, tetanus vaccinations, and prenatal supplements received by pregnant women; vaccinations received by infants; excess school fees charged; occurrence of village council meetings; and development work in villages. At baseline, there were no significant differences in self-reported delivery of health and social services. After 1 year, intervention villagers reported better delivery of several services compared with control villagers: in a multivariate analysis, 30% more prenatal examinations (95% confidence interval [CI], 17%-43%; P India about entitled services enhanced the delivery of health and social services among both low- and mid- to high-caste households. Interventions that emphasize educating resource-poor populations about entitled services may improve the delivery of such services. clinicaltrials.gov Identifier: NCT00421291.

  14. University Internationalization and University Autonomy

    Turcan, Romeo V.; Gulieva, Valeria

    2016-01-01

    Turcan and Gulieva deepen our theoretical understanding of the process of university internationalisation by exploring the relationship between university internationalisation and university autonomy. They conjecture that the process of university internationalisation and its sustainability are d......, dissimilar, and sometimes conflicting dimensions of the financial, legal, organisational, staffing, and academic autonomy of the host country, are compromising key aspects of their own autonomy and core mission?......Turcan and Gulieva deepen our theoretical understanding of the process of university internationalisation by exploring the relationship between university internationalisation and university autonomy. They conjecture that the process of university internationalisation and its sustainability...... are determined by the structure and exercise of university autonomy settings at home and in the host countries, and that the process itself cannot be successfully achieved and maintained without changes in the autonomy settings. The key question the authors ask is to what degree universities, in embracing new...

  15. PROCEEDINGS OF RIKEN BNL RESEARCH CENTER WORKSHOP ENTITLED: ''PARTON ORBITAL ANGULAR MOMENTUM'' VOLUME 81

    Bunce, G.; Fields, D.; Vogelsang, W.

    2006-01-01

    The joint UNM/RBRC 'Workshop on Parton Orbital Angular Momentum' was held on February 24th through 26th at the University of New Mexico Department of Physics and Astronomy in Albuquerque, New Mexico, and was sponsored by The University of New Mexico (Physics Department, New Mexico Center for Particle Physics, Dean of Arts and Sciences, and Office of the Vice Provost for Research and Economic Development) and the NUN-BNL Research Center. The workshop was motivated by recent and upcoming experimental data based on methods which have been proposed to access partonic angular momenta, including Deeply Virtual Compton Scattering, measuring the Sivers functions, and measuring helicity dependent k t in jets. Our desire was to clarify the state of the art in the theoretical understanding in this area, and to help define what might be learned about partonic orbital angular momenta Erom present and upcoming high precision data, particularly at RHIC, Jlab, COMPASS and HERMES. The workshop filled two rather full days of talks fiom both theorists and experimentalists, with a good deal of discussion during, and in between talks focusing on the relationship between the intrinsic transverse momentum, orbital angular momentum, and observables such as the Sivers Function. These talks and discussions were particularly illuminating and the organizers wish to express their sincere thanks to everyone for contributing to this workshop. Each workshop speaker is encouraged to select a few of the most important transparencies from his or her presentation, accompanied by a page of explanation. This material is collected at the end of the workshop by the organizer to form proceedings, which can therefore be available within a short time. To date there are eighty proceeding volumes available

  16. A Configuration Model of Organizational Culture

    Daniel Dauber

    2012-01-01

    Full Text Available The article proposes a configuration model of organizational culture, which explores dynamic relationships between organizational culture, strategy, structure, and operations of an organization (internal environment and maps interactions with the external environment (task and legitimization environment. A major feature of the configuration model constitutes its well-defined processes, which connect the elements of the model systematically to each other, such as single- and double-loop learning, operationalization of strategies, legitimization management, and so on. The model is grounded in a large review of literature in different research areas and builds on widely recognized models in the field of organization and culture theory. It constitutes a response to the call for new models, which are able to explain and facilitate the exploration of the empirical complexity that organizations face today. The configuration model of organizational culture is of particular interest to scholars who investigate into cultural phenomena and change over time.

  17. Fiber optic configurations for local area networks

    Nassehi, M. M.; Tobagi, F. A.; Marhic, M. E.

    1985-01-01

    A number of fiber optic configurations for a new class of demand assignment multiple-access local area networks requiring a physical ordering among stations are proposed. In such networks, the data transmission and linear-ordering functions may be distinguished and be provided by separate data and control subnetworks. The configurations proposed for the data subnetwork are based on the linear, star, and tree topologies. To provide the linear-ordering function, the control subnetwork must always have a linear unidirectional bus structure. Due to the reciprocity and excess loss of optical couplers, the number of stations that can be accommodated on a linear fiber optic bus is severely limited. Two techniques are proposed to overcome this limitation. For each of the data and control subnetwork configurations, the maximum number of stations as a function of the power margin, for both reciprocal and nonreciprocal couplers, is computed.

  18. Configurational entropy in brane-world models

    Correa, R.A.C. [CCNH, Universidade Federal do ABC, Santo Andre, SP (Brazil); Rocha, Roldao da [CMCC, Universidade Federal do ABC, Santo Andre, SP (Brazil); International School for Advanced Studies (SISSA), Trieste (Italy)

    2015-11-15

    In this work we investigate the entropic information on thick brane-world scenarios and its consequences. The brane-world entropic information is studied for the sine-Gordon model and hence the brane-world entropic information measure is shown to be an accurate way for providing the most suitable range for the bulk AdS curvature, in particular from the informational content of physical solutions. Besides, the brane-world configurational entropy is employed to demonstrate a high organisational degree in the structure of the configuration of the system, for large values of a parameter of the sine-Gordon model but the one related to the AdS curvature. The Gleiser and Stamatopoulos procedure is finally applied in order to achieve a precise correlation between the energy of the system and the brane-world configurational entropy. (orig.)

  19. Configurational entropy in brane-world models

    Correa, R. A. C., E-mail: fis04132@gmail.com [CCNH, Universidade Federal do ABC, 09210-580, Santo André, SP (Brazil); Rocha, Roldão da, E-mail: roldao.rocha@ufabc.edu.br [CMCC, Universidade Federal do ABC, 09210-580, Santo André, SP (Brazil); International School for Advanced Studies (SISSA), Via Bonomea 265, 34136, Trieste (Italy)

    2015-11-02

    In this work we investigate the entropic information on thick brane-world scenarios and its consequences. The brane-world entropic information is studied for the sine-Gordon model and hence the brane-world entropic information measure is shown to be an accurate way for providing the most suitable range for the bulk AdS curvature, in particular from the informational content of physical solutions. Besides, the brane-world configurational entropy is employed to demonstrate a high organisational degree in the structure of the configuration of the system, for large values of a parameter of the sine-Gordon model but the one related to the AdS curvature. The Gleiser and Stamatopoulos procedure is finally applied in order to achieve a precise correlation between the energy of the system and the brane-world configurational entropy.

  20. Configurational entropy in brane-world models

    Correa, R. A. C.; Rocha, Roldão da

    2015-01-01

    In this work we investigate the entropic information on thick brane-world scenarios and its consequences. The brane-world entropic information is studied for the sine-Gordon model and hence the brane-world entropic information measure is shown to be an accurate way for providing the most suitable range for the bulk AdS curvature, in particular from the informational content of physical solutions. Besides, the brane-world configurational entropy is employed to demonstrate a high organisational degree in the structure of the configuration of the system, for large values of a parameter of the sine-Gordon model but the one related to the AdS curvature. The Gleiser and Stamatopoulos procedure is finally applied in order to achieve a precise correlation between the energy of the system and the brane-world configurational entropy

  1. Modelling Configuration Knowledge in Heterogeneous Product Families

    Queva, Matthieu Stéphane Benoit; Männistö, Tomi; Ricci, Laurent

    2011-01-01

    Product configuration systems play an important role in the development of Mass Customisation. The configuration of complex product families may nowadays involve multiple design disciplines, e.g. hardware, software and services. In this paper, we present a conceptual approach for modelling...... the variability in such heterogeneous product families. Our approach is based on a framework that aims to cater for the different stakeholders involved in the modelling and management of the product family. The modelling approach is centred around the concepts of views, types and constraints and is illustrated...... by a motivation example. Furthermore, as a proof of concept, a prototype has been implemented for configuring a non-trivial heterogeneous product family....

  2. Dependability Analysis Methods For Configurable Software

    Dahll, Gustav; Pulkkinen, Urho

    1996-01-01

    Configurable software systems are systems which are built up by standard software components in the same way as a hardware system is built up by standard hardware components. Such systems are often used in the control of NPPs, also in safety related applications. A reliability analysis of such systems is therefore necessary. This report discusses what configurable software is, and what is particular with respect to reliability assessment of such software. Two very commonly used techniques in traditional reliability analysis, viz. failure mode, effect and criticality analysis (FMECA) and fault tree analysis are investigated. A real example is used to illustrate the discussed methods. Various aspects relevant to the assessment of the software reliability in such systems are discussed. Finally some models for quantitative software reliability assessment applicable on configurable software systems are described. (author)

  3. Modeling the planar configuration of extraordinary magnetoresistance

    El-Ahmar, S; Pozniak, A A

    2015-01-01

    Recently the planar version of the extraordinary magnetoresistance (EMR) magnetic field sensor has been constructed and verified in practice. Planar configuration of the EMR device gives many technological advantages, it is simpler than the classic and allows one to build the sensor using electric materials of the new type (such as graphene or topological insulators) much easier. In this work the planar configuration of the EMR sensor is investigated by performing computational simulations using the finite element method (FEM). The computational comparison of the planar and classic configurations of EMR is presented using three-dimensional models. Various variants of the geometry of EMR sensor components are pondered and compared in the planar and classic version. Size of the metal overlap is considered for sensor optimization as well as various semiconductor-metal contact resistance dependences of the EMR signal. Based on computational simulations, a method for optimal placement of electric terminals in a planar EMR device is proposed. (paper)

  4. Model-Driven Configuration of SELinux Policies

    Agreiter, Berthold; Breu, Ruth

    The need for access control in computer systems is inherent. However, the complexity to configure such systems is constantly increasing which affects the overall security of a system negatively. We think that it is important to define security requirements on a non-technical level while taking the application domain into respect in order to have a clear and separated view on security configuration (i.e. unblurred by technical details). On the other hand, security functionality has to be tightly integrated with the system and its development process in order to provide comprehensive means of enforcement. In this paper, we propose a systematic approach based on model-driven security configuration to leverage existing operating system security mechanisms (SELinux) for realising access control. We use UML models and develop a UML profile to satisfy these needs. Our goal is to exploit a comprehensive protection mechanism while rendering its security policy manageable by a domain specialist.

  5. Applying Product Configuration Systems in Engineering Companies

    Ladeby, Klaes Rohde

    This Ph.D. thesis looks into the application of configuration systems in engineering companies, and how configuration systems can be used to support business processes in engineering companies. Often the motivation stated by researchers and practitioners is, that a configuration project...... and sustain competitive advantage” (Teece, Pisano, & Shuen, 1997, pp.509) This question has puzzled academics and preoccupied managers for the last century. Yet, it seems there is still no consensus regarding the meaning of strategy, and how strategy works. Type in the word “strategy” on Amazon.co.uk and 76......,133 books apply. Type it in on Google scholar and 8,580,000 homepages apply3. Obviously, strategy is an important subject. However, the subject also seems to be difficult to perceive. Although this thesis is not about strategy, or strategizing, I would like to pursue the definition of strategy one step...

  6. Physics of the universe

    Sachs, Mendel

    2010-01-01

    This book presents a new approach to the subject of cosmology. It fully exploits Einstein's theory of general relativity. It is found that the most general formal expression of the theory replaces the (10-component) tensor formalism with a (16-component) quaternion formalism. This leads to a unified field theory, where one field incorporates gravitation and electromagnetism. The theory predicts an oscillating universe cosmology with a spiral configuration. Dark matter is explained in terms of a sea of particle-antiparticle pairs, each in a particular (derived) ground state. This leads to an ex

  7. Siroco, a configurable robot control system

    Tejedor, B.G.; Maraggi, G.J.B.

    1988-01-01

    The SIROCO (Configurable Robot Control System) is an electronic system designed to work in applications where mechanized remote control equipment and robots are necessary especially in Nuclear Power Plants. The structure of the system (hardware and software) determines the following user characteristics: a) Reduction in the time spent in NDT and in radiation doses absorbed, due to remote control operation; b) possibility for full automation in NDT, c) the system can simultaneously control up to six axes and can generate movements in remote areas; and d) possibility for equipment unification, due to SIROCO being a configurable system. (author)

  8. Mastering System Center 2012 Configuration Manager

    Rachui, Steve; Martinez, Santos; Daalmans, Peter

    2012-01-01

    Expert coverage of Microsoft's highly anticipated network software deployment tool The latest version of System Center Configuration Manager (SCCM) is a dramatic update of its predecessor Configuration Manager 2007, and this book offers intermediate-to-advanced coverage of how the new SCCM boasts a simplified hierarchy, role-based security, a new console, flexible application deployment, and mobile management. You'll explore planning and installation, migrating from SCCM 2007, deploying software and operating systems, security, monitoring and troubleshooting, and automating and customizing SCC

  9. TWRS configuration management requirement source document

    Vann, J.M.

    1997-01-01

    The TWRS Configuration Management (CM) Requirement Source document prescribes CM as a basic product life-cycle function by which work and activities are conducted or accomplished. This document serves as the requirements basis for the TWRS CM program. The objective of the TWRS CM program is to establish consistency among requirements, physical/functional configuration, information, and documentation for TWRS and TWRS products, and to maintain this consistency throughout the life-cycle of TWRS and the product, particularly as changes are being made

  10. Design review of the INTOR mechanical configuration

    Brown, T.G.

    1981-01-01

    The INTOR conceptual design has been carried out by design teams working in the home countries with periodic workshop sessions in Vienna to review the ongoing work and to make decisions on the evolving design. The decisions taken at each workshop session were then incorporated into each national design activity, so that the four national design contributions would progressively converge toward a single design with increasingly greater detail. This paper defines the final INTOR configuration that has evolved during the conceptual design phase, defining the major system design alternatives that were considered and the rationale for selecting the final system configuration

  11. Automated firewall analytics design, configuration and optimization

    Al-Shaer, Ehab

    2014-01-01

    This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author

  12. Design configuration of GCFR core assemblies

    LaBar, M.P.; Lee, G.E.; Meyer, R.J.

    1980-05-01

    The current design configurations of the core assemblies for the gas-cooled fast reactor (GCFR) demonstration plant reactor core conceptual design are described. Primary emphasis is placed upon the design innovations that have been incorporated in the design of the core assemblies since the establishment of the initial design of an upflow GCFR core. A major feature of the design configurations is that they are prototypical of core assemblies for use in commercial plants; a larger number of the same assemblies would be used in a commercial plant

  13. Runtime accelerator configuration tools at Jefferson Laboratory

    Tiefenback, M.G.; Doolittle, L.; Benesch, J.F.

    1997-01-01

    RF and magnet system configuration and monitoring tools are being implemented at Jefferson Lab to improve system reliability and reduce operating costs. They are prototype components of the Momentum Management System being developed. The RF is of special interest because it affects the momentum and momentum spread of the beam, and because of the immediate financial benefit of managing the klystron DC supply power. The authors describe present and planned monitoring of accelerating system parameters, use of these data, RF system performance calculations, and procedures for magnet configuration for handling beam of any of five beam energies to any of three targets

  14. Configuration Management Issues at Research Reactors

    Morris, Charles R.

    2013-01-01

    Configuration Management (from IAEA TECDOC 1651): • The Main Functions of the configuration management process are to: • maintain design requirements of structures, systems and components; • track current as-built drawings, documents, and design basis library; • confirm design change packages demonstrate compliance to design basis in calculations, procurement, safety reviews, update of affected documents, and SSC data; • confirm work orders demonstrate compliance to mandated preventive maintenance; • surveillance, parts replacement and design change installation requirements; • demonstrate procurement of spare parts qualified to meet design basis for proper make, model and quality-level for the SSC location and form, fit and function

  15. System configuration on Web with mashup.

    清水, 宏泰; SHIMIZU, Hiroyasu

    2014-01-01

    Mashup become trend for create Web service due to popularizing cloud service. Mashup is method for create Web service from several Web services and API. Mashup has a few problems. One of the problem is deference of data format and label. Semantic Web can solve it. This paper propose method of building a system on Web with mashup using semantic Web. Mashup system configuration can express as URL. So, editing URL for mashup is editing system configuration. And any device can use this system on ...

  16. Position paper - primary ventilation system configuration

    Dalpiaz, E.L.

    1994-06-01

    The purpose of this paper is to develop and document a position on the configuration of the primary ventilation system. This configuration will be used on the waste storage tanks currently being designed for the Multi-Function Waste Tank Facility. The primary ventilation system provides a single treatment train and exhaust fan for each waste storage tank. The ventilation systems from each of two tanks are grouped with an additional treatment train and exhaust fan that function as backup to either of the two systems

  17. Calculation of Configurational Entropy in Complex Landscapes

    Samuel A Cushman

    2018-04-01

    Full Text Available Entropy and the second law of thermodynamics are fundamental concepts that underlie all natural processes and patterns. Recent research has shown how the entropy of a landscape mosaic can be calculated using the Boltzmann equation, with the entropy of a lattice mosaic equal to the logarithm of the number of ways a lattice with a given dimensionality and number of classes can be arranged to produce the same total amount of edge between cells of different classes. However, that work seemed to also suggest that the feasibility of applying this method to real landscapes was limited due to intractably large numbers of possible arrangements of raster cells in large landscapes. Here I extend that work by showing that: (1 the proportion of arrangements rather than the number with a given amount of edge length provides a means to calculate unbiased relative configurational entropy, obviating the need to compute all possible configurations of a landscape lattice; (2 the edge lengths of randomized landscape mosaics are normally distributed, following the central limit theorem; and (3 given this normal distribution it is possible to fit parametric probability density functions to estimate the expected proportion of randomized configurations that have any given edge length, enabling the calculation of configurational entropy on any landscape regardless of size or number of classes. I evaluate the boundary limits (4 for this normal approximation for small landscapes with a small proportion of a minority class and show it holds under all realistic landscape conditions. I further (5 demonstrate that this relationship holds for a sample of real landscapes that vary in size, patch richness, and evenness of area in each cover type, and (6 I show that the mean and standard deviation of the normally distributed edge lengths can be predicted nearly perfectly as a function of the size, patch richness and diversity of a landscape. Finally, (7 I show that the

  18. Control of divertor configuration in JT-60

    Yoshino, R.; Kukuchi, M.; Ninomiya, H.; Yoshida, H.; Tsuji, S.; Hosogane, N.; Seki, S.

    1985-01-01

    The control algorithm of JT-60 divertor configuration is presented. JT-60 has five types of poloidal magnetic field coil with each power supply in order to regulate the control objectives mentioned above. However, if one controls each objective by each coil current independently, there must inevitably occur large interaction between control objectives. Because the relation between control objectives and coil currents is complicated. This situation may be the same with a fusion reactor device. For making it possible to control each objective independently without causing large interaction, the authors adopt the noninteracting control algorithm. Hence, this report demonstrates the availability of this method to the control of JT-60 divertor configuration

  19. New superconducting coil configuration for energy storage

    Tokorabet, M.; Mailfert, A.; Colteu, A.

    1998-01-01

    Energy storage using superconducting coils involves the problem of electromagnetic field pollution outside the considered system. Different configurations are widely studied: the torus, the alone solenoid and multiple parallel solenoids enclosed in one container. A new configuration which minimizes the external pollution is studied in this paper. The theoretical system is composed of two spherical distributions of the current which are concentric. The analytical study uses solution of Laplace equations. Parametric study covers energy, flux density and geometrical data. The second study concerns the numerical approach of this design using coaxial solenoids. A comparison between this new system and the known systems is presented as a conclusion. (orig.)

  20. Redetermination and absolute configuration of atalaphylline

    Hoong-Kun Fun

    2010-02-01

    Full Text Available The title acridone alkaloid [systematic name: 1,3,5-trihydroxy-2,4-bis(3-methylbut-2-enylacridin-9(10H-one], C23H25NO4, has previously been reported as crystallizing in the chiral orthorhombic space group P212121 [Chantrapromma et al. (2010. Acta Cryst. E66, o81–o82] but the absolute configuration could not be determined from data collected with Mo radiation. The absolute configuration has now been determined by refinement of the Flack parameter with data collected using Cu radiation. All features of the molecule and its crystal packing are similar to those previously described.

  1. Helical post stellarator. Part 1: Vacuum configuration

    Moroz, P.E.

    1997-08-01

    Results on a novel type of stellarator configuration, the Helical Post Stellarator (HPS), are presented. This configuration is different significantly from all previously known stellarators due to its unique geometrical characteristics and unique physical properties. Among those are: the magnetic field has only one toroidal period (M = 1), the plasma has an extremely low aspect ratio, A ∼ 1, and the variation of the magnetic field, B, along field lines features a helical ripple on the inside of the torus. Among the main advantages of a HPS for a fusion program are extremely compact, modular, and simple design compatible with significant rotational transform, large plasma volume, and improved particle transport characteristics

  2. Design issues for optimum solar cell configuration

    Kumar, Atul; Thakur, Ajay D.

    2018-05-01

    A computer based simulation of solar cell structure is performed to study the optimization of pn junction configuration for photovoltaic action. The fundamental aspects of photovoltaic action viz, absorption, separation collection, and their dependence on material properties and deatails of device structures is discussed. Using SCAPS 1D we have simulated the ideal pn junction and shown the effect of band offset and carrier densities on solar cell performance. The optimum configuration can be achieved by optimizing transport of carriers in pn junction under effect of field dependent recombination (tunneling) and density dependent recombination (SRH, Auger) mechanisms.

  3. Decision Making Configurations: An Alternative to the Centralization/Decentralization Conceptualization.

    Cullen, John B.; Perrewe, Pamela L.

    1981-01-01

    Used factors identified in the literature as predictors of centralization/decentralization as potential discriminating variables among several decision making configurations in university affiliated professional schools. The model developed from multiple discriminant analysis had reasonable success in classifying correctly only the decentralized…

  4. Simulations of drift waves in 3D magnetic configurations

    Jost, G.

    2000-06-01

    Drift waves are commonly held responsible for anomalous transport in tokamak configurations and in particular for the anomalously high heat loss. The next generation of stellarators on the other hand are hoped to be characterized by a much smaller neo-classical transport and by particle confinement close to that of tokamaks. There is nevertheless a strong interest in the stellarator community to study the properties of drift waves in 3D magnetic configurations. To serve this interest we have developed the first global gyrokinetic code, EUTERPE, aimed at the investigation of linear drift wave stability in general toroidal geometry. The physical model assumes electrostatic waves and adiabatic electrons. EUTERPE is a particle-in-cell (PIC) code in which the gyrokinetic Poisson equation is discretized with the finite element method defined in the PEST -1 system of magnetic coordinates. The magnetic geometry is provided by the magnetohydrodynamic (MHD) equilibrium code VMEC. The complete 3D model has been successfully validated in toroidal axisymmetric and straight helical geometries and has permitted the first simulation of unstable global ITG driven modes in non-axisymmetric toroidal configurations. As a first application, two configurations have been studied, the Quasi-Axially symmetric Stellarator with three fields periods (QAS3) currently one system under consideration at the Princeton Plasma Physics Laboratory and the Helically Symmetric experiment (HSX) which has recently started operation at the University of Wisconsin. QAS3 is characterized by a tokamak-Iike field in the outer part of the torus. In this structure the drift waves are mainly affected by the magnetic shear and barely by the shape of the plasma. Also, the results are very close to those obtained for a tokamak. On the other hand, results for the HSX configuration, which is characterized by a dominant helical magnetic field, show a clear 3D effect, namely a strong toroidal variation of the drift wave

  5. The Broader Spectrum of Magnetic Configurations for Fusion

    Prager, S C [Princeton Plasma Physics Laboratory, Princeton, NJ (United States); Ryutov, D D [Lawrence Livermore National Laboratory, Livermore, CA (United States)

    2012-09-15

    Over the decades, a large array of magnetic configurations has been studied, producing a huge amount of fusion plasma science. As configurations are developed, information and techniques learned through one configuration influence the development of other configurations. In this way, configurations evolve unexpectedly in response to new information. Configurations that were at a pause can become unstuck by new discoveries, and configurations that appeared promising for fusion energy can become unattractive as new limits are uncovered. The plasma science of fusion energy is sufficiently complex that, as we approach ever closer to practical fusion power, the need for potential contributions of broad research of multiple magnetic configurations remains strong. (author)

  6. Human Rights Discourse in the Sustainable Development Agenda Avoids Obligations and Entitlements Comment on "Rights Language in the Sustainable Development Agenda: Has Right to Health Discourse and Norms Shaped Health Goals?".

    Williams, Carmel; Blaiklock, Alison

    2016-03-05

    Our commentary on Forman et al paper explores their thesis that right to health language can frame global health policy responses. We examined human rights discourse in the outcome documents from three 2015 United Nations (UN) summits and found rights-related terms are used in all three. However, a deeper examination of the discourse finds the documents do not convey the obligations and entitlements of human rights and international human rights law. The documents contain little that can be used to empower the participation of those already left behind and to hold States and the private sector to account for their human rights duties. This is especially worrying in a neoliberal era. © 2016 by Kerman University of Medical Sciences.

  7. STTR Phase 1 Final Technical Report for Project Entitled "Developing a Mobile Torrefaction Machine"

    James, Joseph J. [President, ATP

    2014-03-11

    The goal of this project, sponsored by Agri-Tech Producers, LLC (ATP), the small business grantee, was to determine if the torrefaction technology, developed by North Carolina State University (NCSU), which ATP has licensed, could be feasibly deployed in a mobile unit. The study adds to the area investigated, by having ATP’s STTR Phase I team give thoughtful consideration to how to use NCSU’s technology in a mobile unit. The findings by ATP’s team were that NCSU’s technology would best perform in units 30’ by 80’ (See Spec Sheet for the Torre-Tech 5.0 Unit in the Appendix) and the technical effectiveness and economic feasibility investigation suggested that such units were not easily, efficiently or safely utilized in a forest or farm setting. (Note rendering of possible mobile system in the Appendix) Therefore, the findings by ATP’s team were that NCSU’s technology could not feasibly be deployed as a mobile unit.

  8. Selecting Actuator Configuration for a Benson Boiler

    Kragelund, Martin Nygaard; Leth, John-Josef; Wisniewski, Rafal

    2009-01-01

    with particular focus on a boiler in a power plant operated by DONG Energy - a Danish energy supplier. The problem has been reformulated using mathematic notions from economics. The selection of actuator configuration has been limited to the fuel system which in the considered plant consists of three different...

  9. Length scale for configurational entropy in microemulsions

    Reiss, H.; Kegel, W.K.; Groenewold, J.

    1996-01-01

    In this paper we study the length scale that must be used in evaluating the mixing entropy in a microemulsion. The central idea involves the choice of a length scale in configuration space that is consistent with the physical definition of entropy in phase space. We show that this scale may be

  10. Quality in Supply in Project Configured Networks

    Koch, Christian; Larsen, Casper Schultz

    2006-01-01

    The paper argues that in the AEC-industry the material and knowledge supply chains are increasingly intertwined and moreover characterised by configuration by project. In such a setting creating value for the customers and the enterprises becomes dependent of the ability to organise and coordinate...

  11. Spent Nuclear Fuel Project Configuration Management Plan

    Reilly, M.A.

    1995-01-01

    This document is a rewrite of the draft ''C'' that was agreed to ''in principle'' by SNF Project level 2 managers on EDT 609835, dated March 1995 (not released). The implementation process philosphy was changed in keeping with the ongoing reengineering of the WHC Controlled Manuals to achieve configuration management within the SNF Project

  12. Offshore Vendors' Software Development Team Configuration

    Chakraborty, Suranjan; Sarker, Saonee; Rai, Sudhanshu

    2011-01-01

    were compared on their inherent process-related and resource-related flexibilities. The thick-at-client configuration emerged as the one that offers superior flexibility (in all dimensions).However, additional analysis also revealed contingencies apart from flexibility that may influence...

  13. Sandia software guidelines, Volume 4: Configuration management

    1992-06-01

    This volume is one in a series of Sandia Software Guidelines for use in producing quality software within Sandia National Laboratories. This volume is based on the IEEE standard and guide for software configuration management. The basic concepts and detailed guidance on implementation of these concepts are discussed for several software project types. Example planning documents for both projects and organizations are included.

  14. Apple Configurator 2 (version 2.3)

    Lara Lasner-Frater

    2018-01-01

    Apple Configurator 2 (AC2) is a free mass-deployment utility that allows you to update multiple iPads, iPhones, iPod Touch devices, and Apple TVs at the same time, including apps, website links, iBooks, and software updates.

  15. DICOM supported sofware configuration by XML files

    LucenaG, Bioing Fabian M; Valdez D, Andres E; Gomez, Maria E; Nasisi, Oscar H

    2007-01-01

    A method for the configuration of informatics systems that provide support to DICOM standards using XML files is proposed. The difference with other proposals is base on that this system does not code the information of a DICOM objects file, but codes the standard itself in an XML file. The development itself is the format for the XML files mentioned, in order that they can support what DICOM normalizes for multiple languages. In this way, the same configuration file (or files) can be use in different systems. Jointly the XML configuration file generated, we wrote also a set of CSS and XSL files. So the same file can be visualized in a standard browser, as a query system of DICOM standard, emerging use, that did not was a main objective but brings a great utility and versatility. We exposed also some uses examples of the configuration file mainly in relation with the load of DICOM information objects. Finally, at the conclusions we show the utility that the system has already provided when the edition of DICOM standard changes from 2006 to 2007

  16. Status Configurations, Military Service and Higher Education

    Wang, Lin; Elder, Glen H., Jr.; Spence, Naomi J.

    2012-01-01

    The U.S. Armed Forces offer educational and training benefits as incentives for service. This study investigates the influence of status configurations on military enlistment and their link to greater educational opportunity. Three statuses (socioeconomic status of origin, cognitive ability and academic performance) have particular relevance for…

  17. Configurable multi-perspective business process models

    La Rosa, M.; Dumas, M.; Hofstede, ter A.H.M.; Mendling, J.

    2011-01-01

    A configurable process model provides a consolidated view of a family of business processes. It promotes the reuse of proven practices by providing analysts with a generic modeling artifact from which to derive individual process models. Unfortunately, the scope of existing notations for

  18. Holistic processing of face configurations and components.

    Hayward, William G; Crookes, Kate; Chu, Ming Hon; Favelle, Simone K; Rhodes, Gillian

    2016-10-01

    Although many researchers agree that faces are processed holistically, we know relatively little about what information holistic processing captures from a face. Most studies that assess the nature of holistic processing do so with changes to the face affecting many different aspects of face information (e.g., different identities). Does holistic processing affect every aspect of a face? We used the composite task, a common means of examining the strength of holistic processing, with participants making same-different judgments about configuration changes or component changes to 1 portion of a face. Configuration changes involved changes in spatial position of the eyes, whereas component changes involved lightening or darkening the eyebrows. Composites were either aligned or misaligned, and were presented either upright or inverted. Both configuration judgments and component judgments showed evidence of holistic processing, and in both cases it was strongest for upright face composites. These results suggest that holistic processing captures a broad range of information about the face, including both configuration-based and component-based information. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  19. Integrating configuration workflows with project management system

    Nilsen, Dimitri; Weber, Pavel

    2014-01-01

    The complexity of the heterogeneous computing resources, services and recurring infrastructure changes at the GridKa WLCG Tier-1 computing center require a structured approach to configuration management and optimization of interplay between functional components of the whole system. A set of tools deployed at GridKa, including Puppet, Redmine, Foreman, SVN and Icinga, provides the administrative environment giving the possibility to define and develop configuration workflows, reduce the administrative effort and improve sustainable operation of the whole computing center. In this presentation we discuss the developed configuration scenarios implemented at GridKa, which we use for host installation, service deployment, change management procedures, service retirement etc. The integration of Puppet with a project management tool like Redmine provides us with the opportunity to track problem issues, organize tasks and automate these workflows. The interaction between Puppet and Redmine results in automatic updates of the issues related to the executed workflow performed by different system components. The extensive configuration workflows require collaboration and interaction between different departments like network, security, production etc. at GridKa. Redmine plugins developed at GridKa and integrated in its administrative environment provide an effective way of collaboration within the GridKa team. We present the structural overview of the software components, their connections, communication protocols and show a few working examples of the workflows and their automation.

  20. Configuration mixing of mean-field states

    Bender, M; Heenen, P-H

    2005-01-01

    Starting from self-consistent mean-field models, we discuss how to include correlations from fluctuations in collective degrees of freedom through symmetry restoration and configuration mixing, which give access to ground-state correlations and collective excitations. As an example for the method, we discuss the spectroscopy of neutron-deficient Pb isotopes

  1. Self Configurable Intelligent Distributed Antenna System

    Kumar, Ambuj; Mihovska, Albena Dimitrova; Prasad, Ramjee

    2016-01-01

    with their respective base stations, spectrum pooling and management at antenna end is not efficient. The situation worsens in Heterogeneous and Dense-net conditions in an Area of Interest (AoI). In this paper, we propose a DAS based intelligent architecture referred to as Self Configurable Intelligent Distributed...

  2. Static Equilibrium Configurations of Charged Metallic Bodies ...

    In this paper we developed a simple numerical scheme to determine the static equilibrium configuration of charged metallic bodies by minimizing the potential energy function. The method developed has some advantages; it combines the general theory and the physical meanings nested in the mathematical model and this ...

  3. Pushing configuration-interaction to the limit

    Vogiatzis, Konstantinos D.; Ma, Dongxia; Olsen, Jeppe

    2017-01-01

    A new large-scale parallel multiconfigurational self-consistent field (MCSCF) implementation in the open-source NWChem computational chemistry code is presented. The generalized active space (GAS) approach is used to partition large configuration interaction (CI) vectors and generate a sufficient...

  4. Studies of a flexible heliac configuration

    Hender, T.C.; Cantrell, J.L.; Harris, J.H.

    1987-07-01

    This paper documents a detailed study of the Flexible Heliac configuration. The remarkable flexibility of this device - which allows variation of the rotational transform, shear, and magnetic well depth over a relatively wide range - is described. Engineering considerations of error fields, finite cross-section conductors, and plasma coil clearances are also discussed

  5. Sibling Gender Configuration and Family Processes

    van der Pol, Lotte D.; Mesman, Judi; Groeneveld, Marleen G.; Endendijk, Joyce J.; van Berkel, Sheila R.; Hallers-Haalboom, Elizabeth T.; Bakermans-Kranenburg, Marian J.

    2016-01-01

    The current study focuses on the effects of sibling gender configuration on family processes during early childhood. In a sample of 369 two-parent families with two children (youngest 12 months, oldest about 2 years older), both siblings’ noncompliant and oppositional behaviors and fathers’ and

  6. Private Cloud Configuration with MetaConfig

    Nielsen, Thomas; Iversen, Christian; Bonnet, Philippe

    2011-01-01

    With the advent of private clouds, the challenge of configuring a mix of physical and virtual machines is no longer reserved to a few system administrator gurus. How to assign virtual machines onto physical machines to leverage the available resources? How to maintain the virtual machine...

  7. Motion-insensitive rapid configuration relaxometry.

    Nguyen, Damien; Bieri, Oliver

    2017-08-01

    Triple echo steady state (TESS) uses the lowest steady state configuration modes for rapid relaxometry. Due to its unbalanced gradient scheme, however, TESS is inherently motion-sensitive. The purpose of this work is to merge TESS with a balanced acquisition scheme for motion-insensitive rapid configuration relaxometry, termed MIRACLE. The lowest order steady state free precession (SSFP) configurations are retrieved by Fourier transformation of the frequency response of N frequency-shifted balanced SSFP (bSSFP) scans and subsequently processed for relaxometry, as proposed with TESS. Accuracy of MIRACLE is evaluated from simulations, phantom studies as well as in vivo brain and cartilage imaging at 3T. Simulations and phantom results revealed no conceptual flaw, and artifact-free configuration imaging was achieved in vivo. Overall, relaxometry results were accurate in phantoms and in good agreement for cartilage and for T2 in the brain, but apparent low T1 values were observed for brain white matter; reflecting asymmetries in the bSSFP profile. Rapid T1 and T2 mapping with MIRACLE offers analogous properties as TESS while successfully mitigating its motion-sensitivity. As a result of the Fourier transformation, relaxometry becomes sensitive to the voxel frequency distribution, which may contain useful physiologic information, such as structural brain integrity. © 2016 International Society for Magnetic Resonance in Medicine. Magn Reson Med 78:518-526, 2017. © 2016 International Society for Magnetic Resonance in Medicine. © 2016 International Society for Magnetic Resonance in Medicine.

  8. Dynamics and configurations of galaxy triplets

    Anosova, J.P.; Orlov, V.V.; Chernin, A.D.; Ivanov, A.V.; Kiseleva, L.G.

    1990-01-01

    The purpose is to infer the probable dynamical states of galaxy triplets by the observed data on their configurations. Two methods are proposed for describing the distributions of the triplet configuration parameters characterizing a tendency to alignment and hierarchy: (1) obtaining a representative sample of configurations and determining its statistical parameters (moments and percentages); and (2) dividing the region of possible configurations of triple systems (Agekian and Anosova, 1967) into a set of segments and finding the probabilities for the configurations to find themselves in each of them. Both these methods allow representation of the data by numerical simulations as well as observations. The effect of projection was studied. It rather overestimates the alignment and hierarchy of the triple systems. Among the parameters of interest there are found some parameters that are least sensitive to projection effects. The samples consist of simulated galaxy triplets (with hidden mass) as well as of 46 probably physical triple galaxies (Karachentseva et al., 1979). The observed triples as well as numerical models show a tendency to alignment. The triple galaxies do not show any tendency to hierarchy (formation of the temporary binaries), but this tendency may be present for simulated triplets without significant dark matter. The significant hidden mass (of order ten times the total mass of a triplet) decreases the probability of forming a binary and so weakens the hierarchy. Small galaxy groups consisting of 3 to 7 members are probably the most prevalent types of galaxy aggregate (Gorbatsky, 1987). Galaxy triplets are the simplest groups, but dynamically nontrivial ones

  9. Final Report for grant entitled "Production of Astatine-211 for U.S. Investigators"

    Wilbur, Daniel Scott

    2012-12-12

    Alpha-particle emitting radionuclides hold great promise in the therapy of cancer, but few alpha-emitters are available to investigators to evaluate. Of the alpha-emitters that have properties amenable for use in humans, 211At is of particular interest as it does not have alpha-emitting daughter radionuclides. Thus, there is a high interest in having a source of 211At for sale to investigators in the US. Production of 211At is accomplished on a cyclotron using an alpha-particle beam irradiation of bismuth metal. Unfortunately, there are few cyclotrons available that can produce an alpha particle beam for that production. The University of Washington has a cyclotron, one of three in the U.S., that is currently producing 211At. In the proposed studies, the things necessary for production and shipment of 211At to other investigators will be put into place at UW. Of major importance is the efficient production and isolation of 211At in a form that can be readily used by other investigators. In the studies, production of 211At on the UW cyclotron will be optimized by determining the best beam energy and the highest beam current to maximize 211At production. As it would be very difficult for most investigators to isolate the 211At from the irradiated target, the 211At-isolation process will be optimized and automated to more safely and efficiently obtain the 211At for shipment. Additional tasks to make the 211At available for distribution include obtaining appropriate shipping vials and containers, putting into place the requisite standard operating procedures for Radiation Safety compliance at the levels of 211At activity to be produced / shipped, and working with the Department of Energy, Isotope Development and Production for Research and Applications Program, to take orders, make shipments and be reimbursed for costs of production and shipment.

  10. From favours to entitlements: community voice and action and health service quality in Zambia.

    Schaaf, Marta; Topp, Stephanie M; Ngulube, Moses

    2017-07-01

    and making ambitious national programs operational at the frontlines of the health system and (3) the feasibility of scale up for certain types of local level responsiveness. © The Author 2017. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine.

  11. Fourth meeting entitled “Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data”

    Vilanova, Anna; Burgeth, Bernhard; Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data

    2014-01-01

    Arising from the fourth Dagstuhl conference entitled Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data (2011), this book offers a broad and vivid view of current work in this emerging field. Topics covered range from applications of the analysis of tensor fields to research on their mathematical and analytical properties. Part I, Tensor Data Visualization, surveys techniques for visualization of tensors and tensor fields in engineering, discusses the current state of the art and challenges, and examines tensor invariants and glyph design, including an overview of common glyphs. The second Part, Representation and Processing of Higher-order Descriptors, describes a matrix representation of local phase, outlines mathematical morphological operations techniques, extended for use in vector images, and generalizes erosion to the space of diffusion weighted MRI. Part III, Higher Order Tensors and Riemannian-Finsler Geometry, offers powerful mathematical language to model and...

  12. An Analysis of Figurative Language Elements upon an American Short Story Entitled “The Monkey’s Paw

    Nur Muhammad Ardiansyah

    2018-04-01

    Full Text Available This article describes the study of semantic in a specified domain of figurative language upon a selected work of American English literature, in form of short story written by the renowned writer and author, William Wymark Jacobs, entitled as ‘The Monkey’s Paw’. Several objectives are deduced by the researcher in quest of finding the forms of this figurative language within the passage. Briefly, figurative language itself is a feature of every languages, which emphasized the use of expression to symbolize a different meaning from the usual literal interpretation. In our analysis of ‘The Monkey’s Paw’, the varieties of figurative language: Metaphor, Personification, Hyperbole, Symbolism, also another terms used to represent unusual words construction or combination such as Onomatopoeia, Idiom, and even Imagery, are discussed in order in relation with true meaning discovery behind each figurative language properties.

  13. Accrual of ROCs LECs and REGOs. Phase 3a: pre-determined entitlements to ROCs for small microgenerators

    NONE

    2005-07-01

    This report describes a proposed scheme to enable microgenerators in the UK to claim Renewable Obligation Certificates (ROCs) on the basis of predetermined estimates of output rather than data from meters. The aim of the scheme, which has been developed following discussions with representatives of the microgeneration community in the UK, is to make it easier for small generators to access to ROCs and thus encourage householders and smaller commercial/business users to install renewable microgeneration technologies. The work was commissioned as part of the review of the Renewables Obligation. The report considers: background information; the Australian scheme for small generating units; eligibility and entitlements; the operation of the scheme; new procedural and legislative requirements; measures to protect and improve the Renewables Obligation; alterative approaches; scheme benefits; and recommendations. An overview of the scheme's key features is given in the report's executive summary.

  14. Improved dynamic equations for the generally configured Stewart platform manipulator

    Pedrammehr, Siamak; Mahboubkhah, Mehran; Khani, Navid

    2012-01-01

    In this paper, a Newton-Euler approach is utilized to generate the improved dynamic equations of the generally configured Stewart platform. Using the kinematic model of the universal joint, the rotational degree of freedom of the pods around the axial direction is taken into account in the formulation. The justifiable direction of the reaction moment on each pod is specified and considered in deriving the dynamic equations. Considering the theorem of parallel axes, the inertia tensors for different elements of the manipulator are obtained in this study. From a theoretical point, the improved formulation is more accurate in comparison with previous ones, and the necessity of the improvement is clear evident from significant differences in the simulation results for the improved model and the model without improvement. In addition to more feasibility of the structure and higher accuracy, the model is highly compatible with computer arithmetic and suitable for online applications for loop control problems in hardware

  15. Combating global warming. Possible rules, regulations and administrative arrangements for a global market in CO2 emission entitlements

    1994-12-01

    When in 1991 the UNCTAD secretariat launched its research into the idea of controlling carbon dioxide emissions through a system of 'tradeable permits', there was little support for this approach. Some felt that the idea was premature and should not detract from efforts to introduce more conventional measures, such as environmental taxes and new regulations. However, in a few short years, the idea of using tradeable market-based instruments to combat global warming has gained widespread acceptance. The UNCTAD secretariat's 1992 study on a global system of tradeable carbon emission entitlements (UNCTAD/RDP/DFP/1), was widely regarded as a major breakthrough in this area. This study argued that tradeable permits were both an efficient means of controlling man-made carbon dioxide emissions at minimum cost, and an effective mechanism for transferring resources to developing countries and countries in transition, to help them to contribute to the international effort to abate emissions of greenhouse gases. The study contained a detailed assessment of key technical elements of a tradeable CO 2 entitlements system, including permit allocation techniques, resource transfers, equity/distributional implications, institutional and administrative requirements. The present publication explores the institutional requirements for both policy-making and the organization of a global market in CO 2 emission allowances. It shows that one can start with a simple pilot scheme based on the joint implementation of commitments, which constitutes the cornerstone of the Framework Convention, and evolve gradually to a more complete system on the basis of 'learning by doing'. Since the use of markets can dramatically lower the cost of controlling greenhouse gas emissions, it is clearly in the self-interest of major emitters to act as 'market leaders' willing to pioneer

  16. Fuel control device for various gas turbine configurations

    Stearns, C F; Tutherly, H W

    1980-09-29

    The hydromechanic fuel control device can be adapted for various engine configurations as for example turbofan-, turbopro-, and turboshaft engines by providing those elements which are common for all engine configurations in the main housing and a detachable block for each individual configuration with all control elements and flow channels necessary for the respective configuration.

  17. Developing a Frame of Reference for understanding configuration systems

    Ladeby, Klaes Rohde; Edwards, Kasper

    2008-01-01

    This paper uses the theory of technical systems to develop a frame of reference of product configuration systems. Following a definition of the configuration task, product model and product configuration system the theory of technical systems are presented. Configuration systems are then related...

  18. Field Studies for Key Stage 4 on Mine Water Pollution: A University and Museum Collaboration

    Hopwood, Jeremy D.; Berry, Stuart D.; Ambrose, Jayne L.

    2013-01-01

    This article describes how a university and a museum have worked together to create a "How science works" workshop entitled "What's in our water?" The workshop teaches students about the continuing pollution from a disused coal mine, how the pollution is cleaned up using a state-of-the-art treatment works and how scientists…

  19. Ontario Universities Benefits Survey, 1990-91: Part I, Benefits Excluding Pensions.

    Council of Ontario Universities, Toronto.

    The report details, in tabular form, non-pension benefits offered by each of 17 Ontario universities. These include: supplementary health insurance; long term disability; sick leave entitlement; sick leave-benefits continuance; long term disability-benefits continuance; life insurance; survivor benefit; dental plan; post-retirement benefits;…

  20. Integrating Critical Thinking Instruction and Assessment into Online University Courses: An Action Research Study

    Mason Heinrichs, Kim R.

    2016-01-01

    Universities claim that improved critical thinking ability is an educational outcome for their graduates, but they seldom create a path for students to achieve that outcome. In this practitioner action research study, the author created a job aid, entitled "Critical Thinking as a Differentiator for Distinguished Performance," to help…

  1. Queer Pedagogy and the Limits of Thought: Teaching Sexualities at University

    Allen, Louisa

    2015-01-01

    What are the limits of queer pedagogy's thought [Britzman, D. (1995). Is there a queer pedagogy or stop reading straight. "Educational Theory," 45(2), 151-165]? This question is considered in relation to how queer pedagogy unfolds in a first-year university course entitled "Learning Sexualities." Examples of how queer pedagogy…

  2. Determinants of Entrepreneurial Intention among Prospective Graduates of Higher Institutions Case of Wolaita Sodo University

    Tegegn, Tesfahun; Paulos, Mesfin; Desalegn, Yonatan

    2016-01-01

    This study entitled "Determinants of Entrepreneurial Intention among Prospective Graduates of Higher Institutions, Case of Wolaita Sodo University" aimed at profiling entrepreneurship among graduating class students at WSU and identify determinants of their entrepreneurial intentions. The study used survey design and collected…

  3. Sustainable supply chain design: a configurational approach.

    Masoumik, S Maryam; Abdul-Rashid, Salwa Hanim; Olugu, Ezutah Udoncy; Raja Ghazilla, Raja Ariffin

    2014-01-01

    Designing the right supply chain that meets the requirements of sustainable development is a significant challenge. Although there are a considerable number of studies on issues relating to sustainable supply chain design (SSCD) in terms of designing the practices, processes, and structures, they have rarely demonstrated how these components can be aligned to form an effective sustainable supply chain (SSC). Considering this gap in the literature, this study adopts the configurational approach to develop a conceptual framework that could configure the components of a SSC. In this respect, a process-oriented approach is utilized to classify and harmonize the design components. A natural-resource-based view (NRBV) is adopted to determine the central theme to align the design components around. The proposed framework presents three types of SSC, namely, efficient SSC, innovative SSC, and reputed SSC. The study culminates with recommendations concerning the direction for future research.

  4. Configuration management in nuclear power plants

    2003-01-01

    Configuration management (CM) is the process of identifying and documenting the characteristics of a facility's structures, systems and components of a facility, and of ensuring that changes to these characteristics are properly developed, assessed, approved, issued, implemented, verified, recorded and incorporated into the facility documentation. The need for a CM system is a result of the long term operation of any nuclear power plant. The main challenges are caused particularly by ageing plant technology, plant modifications, the application of new safety and operational requirements, and in general by human factors arising from migration of plant personnel and possible human failures. The IAEA Incident Reporting System (IRS) shows that on average 25% of recorded events could be caused by configuration errors or deficiencies. CM processes correctly applied ensure that the construction, operation, maintenance and testing of a physical facility are in accordance with design requirements as expressed in the d...

  5. Qualtiy Issues in Project configured Supply Chains

    Koch, Christian; Larsen, Casper Schultz

    by configuration by project. In such a setting creating value for the customers and the enterprises becomes dependent of the ability to organise and coordinate in the supply chains. That the configuration is not always successful can be demonstrated by studying the emergence of failures occurring in the supply...... observation period. These were compiled and analysed. The economic consequences are calculated to be 8% of the production costs. The analysis of relations in the supply chain both show relations to materials and knowledge chains and their interaction. Most of the failures were generated in the knowledge...... stream and then occasionally transform into the material stream. The paper proposes initiatives to strengthen partnerships in supply chains and especially at engineer to order production. The contradiction between the permanent enterprise organisation potentially capable of handling purchasing...

  6. Maximum Profit Configurations of Commercial Engines

    Yiran Chen

    2011-06-01

    Full Text Available An investigation of commercial engines with finite capacity low- and high-price economic subsystems and a generalized commodity transfer law [n ∝ Δ (P m] in commodity flow processes, in which effects of the price elasticities of supply and demand are introduced, is presented in this paper. Optimal cycle configurations of commercial engines for maximum profit are obtained by applying optimal control theory. In some special cases, the eventual state—market equilibrium—is solely determined by the initial conditions and the inherent characteristics of two subsystems; while the different ways of transfer affect the model in respects of the specific forms of the paths of prices and the instantaneous commodity flow, i.e., the optimal configuration.

  7. Fingerprinting Mobile Devices Using Personalized Configurations

    Kurtz Andreas

    2016-01-01

    Full Text Available Recently, Apple removed access to various device hardware identifiers that were frequently misused by iOS third-party apps to track users. We are, therefore, now studying the extent to which users of smartphones can still be uniquely identified simply through their personalized device configurations. Using Apple’s iOS as an example, we show how a device fingerprint can be computed using 29 different configuration features. These features can be queried from arbitrary thirdparty apps via the official SDK. Experimental evaluations based on almost 13,000 fingerprints from approximately 8,000 different real-world devices show that (1 all fingerprints are unique and distinguishable; and (2 utilizing a supervised learning approach allows returning users or their devices to be recognized with a total accuracy of 97% over time

  8. Isabelle dipole and quadrupole coil configurations

    Dahl, P.F.; Hahn, H.

    1980-01-01

    The coil configurations of the ISABELLE dipole and quadrupole magnets have been reviewed and a number of improvements were suggested for incorporation into the final design. The coil designs are basically single layer multiple block approximations to cosine current distributions, wound from a high aspect ratio non-keystoned braided conductor. The blocks are separated by knife-edge wedges to maximize the quench propagation velocity. The current density variation is obtained by an appropriate distribution of the spacer turns and, to a lesser degree, by the wedge locations. The use of inert turns is necessary to minimize the peak field enhancement both in the ends and in the two dimensional section. Schemes for deriving turns distributions yielding harmonic coefficients satisfying the stringent ISABELLE tolerances on field uniformity, while allowing for simplicity in winding and taking into account quench propagation considerations, will be discussed, as well as our approach to the coil end configuration

  9. Symmetric configurations highlighted by collective quantum coherence

    Obster, Dennis [Radboud University, Institute for Mathematics, Astrophysics and Particle Physics, Nijmegen (Netherlands); Kyoto University, Yukawa Institute for Theoretical Physics, Kyoto (Japan); Sasakura, Naoki [Kyoto University, Yukawa Institute for Theoretical Physics, Kyoto (Japan)

    2017-11-15

    Recent developments in quantum gravity have shown the Lorentzian treatment to be a fruitful approach towards the emergence of macroscopic space-times. In this paper, we discuss another related aspect of the Lorentzian treatment: we argue that collective quantum coherence may provide a simple mechanism for highlighting symmetric configurations over generic non-symmetric ones. After presenting the general framework of the mechanism, we show the phenomenon in some concrete simple examples in the randomly connected tensor network, which is tightly related to a certain model of quantum gravity, i.e., the canonical tensor model. We find large peaks at configurations invariant under Lie-group symmetries as well as a preference for charge quantization, even in the Abelian case. In future study, this simple mechanism may provide a way to analyze the emergence of macroscopic space-times with global symmetries as well as various other symmetries existing in nature, which are usually postulated. (orig.)

  10. Co-Configuration in Interaction Work

    Fischer, Louise Harder; Pries-Heje, Lene

    2015-01-01

    How to increase knowledge workers productivity is still a puzzle. While knowledge work has become increasingly virtual, collaborative and interactive, we still witness challenges in the area of productivity. We challenge the widespread perception of the causal relationship between high autonomy...... and high productivity in knowledge work and the fact that configuration and standardization for improving productivity is logical impossible. With a hermeneutical approach we describe and interpret “what is going on” in two different context of interaction knowledge work. Findings suggests that knowledge...... workers often feel caught in counter-productive practices with technology, due to the autonomous use of Interaction-IT and the challenge of configuring work. We witness different behaviors related to “the autonomy paradox” and we see something interesting happening, when introducing Interaction IT. While...

  11. Sustainable Supply Chain Design: A Configurational Approach

    Masoumik, S. Maryam; Raja Ghazilla, Raja Ariffin

    2014-01-01

    Designing the right supply chain that meets the requirements of sustainable development is a significant challenge. Although there are a considerable number of studies on issues relating to sustainable supply chain design (SSCD) in terms of designing the practices, processes, and structures, they have rarely demonstrated how these components can be aligned to form an effective sustainable supply chain (SSC). Considering this gap in the literature, this study adopts the configurational approach to develop a conceptual framework that could configure the components of a SSC. In this respect, a process-oriented approach is utilized to classify and harmonize the design components. A natural-resource-based view (NRBV) is adopted to determine the central theme to align the design components around. The proposed framework presents three types of SSC, namely, efficient SSC, innovative SSC, and reputed SSC. The study culminates with recommendations concerning the direction for future research. PMID:24523652

  12. Instanton Field Configurations and Black Holes

    Konopleva, N P

    2005-01-01

    The role of vacuum relativization in QCD and nucleus theory is discussed. It is shown that relativistic vacuum must be described by vacuum Einstein equations. Black Holes have to make their appearance in QCD because of Schwarzschildean solution of these equations. Instanton configurations of any fields do not change vacuum Einstein equations and their solutions, because their energy-momentum tensors are zero. But they make it possible to determine a space-time topology, which cannot be defined by differential Einstein equations. Therefore, Black Holes number in space-time is possibly connected with instanton configurations of fields and other matter. Instantons do not fall into Black Holes and are the very matter which surrounds them.

  13. Automated software configuration in the MONSOON system

    Daly, Philip N.; Buchholz, Nick C.; Moore, Peter C.

    2004-09-01

    MONSOON is the next generation OUV-IR controller project being developed at NOAO. The design is flexible, emphasizing code re-use, maintainability and scalability as key factors. The software needs to support widely divergent detector systems ranging from multi-chip mosaics (for LSST, QUOTA, ODI and NEWFIRM) down to large single or multi-detector laboratory development systems. In order for this flexibility to be effective and safe, the software must be able to configure itself to the requirements of the attached detector system at startup. The basic building block of all MONSOON systems is the PAN-DHE pair which make up a single data acquisition node. In this paper we discuss the software solutions used in the automatic PAN configuration system.

  14. The International Thermonuclear Experimental Reactor configuration evolution

    Lousteau, D.C.; Nelson, B.E.; Lee, V.D.; Thomson, S.L.; Miller, J.M.; Lindquist, W.B.

    1989-01-01

    The International Thermonuclear Experimental Reactor (ITER) conceptual design activities consist of two phases: a definition phase, completed in September 1988, and a design phase, now in progress. The definition phase was successful in identifying a consistent set of technical characteristics and the broad definition of the required reactor configuration and hardware. Scheduled for completion in November 1990, the design phase is producing a more detailed definition of the required components, a first cost estimate, and a description of site requirements. A major activity in the ITER design phase is the period of joint work conducted at the Max Planck Institute for Plasma Physics, Garching, Federal Republic of Germany, from June through October 1989. An official report of the findings and conclusions of this activity will be submitted to and published by the International Atomic Energy Agency (IAEA). This paper highlights the evolution of the reactor mechanical configuration since the conclusion of the definition phase. 8 figs., 2 tabs

  15. TCV divertor upgrade for alternative magnetic configurations

    H. Reimerdes

    2017-08-01

    Full Text Available The Swiss Plasma Center (SPC is planning a divertor upgrade for the TCV tokamak. The upgrade aims at extending the research of conventional and alternative divertor configurations to operational scenarios and divertor regimes of greater relevance for a fusion reactor. The main elements of the upgrade are the installation of an in-vessel structure to form a divertor chamber of variable closure and enhanced diagnostic capabilities, an increase of the pumping capability of the divertor chamber and the addition of new divertor poloidal field coils. The project follows a staged approach and is carried out in parallel with an upgrade of the TCV heating system. First calculations using the EMC3-Eirene code indicate that realistic baffles together with the planned heating upgrade will allow for a significantly higher compression of neutral particles in the divertor, which is a prerequisite to test the power dissipation potential of various divertor configurations.

  16. Enhancing operability and reliability through configuration management

    Hancock, L.R.

    1993-01-01

    This paper describes the evolution of plant design control techniques from the early 1970's to today's operating environment that demands accurate, up-to-date design data. This evolution of design control is responsible for the increasingly troublesome scenario of design data being very difficult to locate and when found, its credibility is questioned. The design information could be suspect because there are discrepancies between two or more source documents or there is a difference between the design documents and the physical configuration of the plant. This paper discusses the impact these design control problems are having on plant operations and presents common sense solutions for improving configuration management techniques to ultimately enhance operability and reliability

  17. Gravitational collapse of dark energy field configurations and supermassive black hole formation

    Jhalani, V.; Kharkwal, H.; Singh, A.

    2016-01-01

    Dark energy is the dominant component of the total energy density of our Universe. The primary interaction of dark energy with the rest of the Universe is gravitational. It is therefore important to understand the gravitational dynamics of dark energy. Since dark energy is a low-energy phenomenon from the perspective of particle physics and field theory, a fundamental approach based on fields in curved space should be sufficient to understand the current dynamics of dark energy. Here, we take a field theory approach to dark energy. We discuss the evolution equations for a generic dark energy field in curved space-time and then discuss the gravitational collapse for dark energy field configurations. We describe the 3 + 1 BSSN formalism to study the gravitational collapse of fields for any general potential for the fields and apply this formalism to models of dark energy motivated by particle physics considerations. We solve the resulting equations for the time evolution of field configurations and the dynamics of space-time. Our results show that gravitational collapse of dark energy field configurations occurs and must be considered in any complete picture of our Universe. We also demonstrate the black hole formation as a result of the gravitational collapse of the dark energy field configurations. The black holes produced by the collapse of dark energy fields are in the supermassive black hole category with the masses of these black holes being comparable to the masses of black holes at the centers of galaxies.

  18. Gravitational collapse of dark energy field configurations and supermassive black hole formation

    Jhalani, V.; Kharkwal, H.; Singh, A., E-mail: anupamsingh.iitk@gmail.com [L. N. Mittal Institute of Information Technology, Physics Department (India)

    2016-11-15

    Dark energy is the dominant component of the total energy density of our Universe. The primary interaction of dark energy with the rest of the Universe is gravitational. It is therefore important to understand the gravitational dynamics of dark energy. Since dark energy is a low-energy phenomenon from the perspective of particle physics and field theory, a fundamental approach based on fields in curved space should be sufficient to understand the current dynamics of dark energy. Here, we take a field theory approach to dark energy. We discuss the evolution equations for a generic dark energy field in curved space-time and then discuss the gravitational collapse for dark energy field configurations. We describe the 3 + 1 BSSN formalism to study the gravitational collapse of fields for any general potential for the fields and apply this formalism to models of dark energy motivated by particle physics considerations. We solve the resulting equations for the time evolution of field configurations and the dynamics of space-time. Our results show that gravitational collapse of dark energy field configurations occurs and must be considered in any complete picture of our Universe. We also demonstrate the black hole formation as a result of the gravitational collapse of the dark energy field configurations. The black holes produced by the collapse of dark energy fields are in the supermassive black hole category with the masses of these black holes being comparable to the masses of black holes at the centers of galaxies.

  19. Universe symmetries

    Souriau, J.M.

    1984-01-01

    The sky uniformity can be noticed in studying the repartition of objects far enough. The sky isotropy description uses space rotations. The group theory elements will allow to give a meaning at the same time precise and general to the word a ''symmetry''. Universe models are reviewed, which must have both of the following qualities: - conformity with the physic known laws; - rigorous symmetry following one of the permitted groups. Each of the models foresees that universe evolution obeys an evolution equation. Expansion and big-bang theory are recalled. Is universe an open or closed space. Universe is also electrically neutral. That leads to a work hypothesis: the existing matter is not given data of universe but it appeared by evolution from nothing. Problem of matter and antimatter is then raised up together with its place in universe [fr

  20. Education and training in dental schools in Spain, Sevilla University experience

    Mateos, J. C.; Carrera, F.; Gomez, A.; Luis, J.; Rodriguez, M.; Herrador, M.

    2003-01-01

    The ICRP, in its publication 73 entitled Radiological Protection and Safety in Medicine states (paragraph 128) that one important need is to provide adequate resources for the education and training in radiological protection for future professional and technical staff in medical practice. The training programme should include initial training for all incoming staff and regular updating retraining. The European Directive 97/743/EURATOM on Medical Exposure (MED) lays down requirements for education and training. The document RP 116 published by the European commission give guidelines on Education and Training in Radiation Protection and in its paragraph 51 establish that Members States shall encourage the introduction of a course on radiation protection in the basic curriculum of medical and dental schools according to the EC Medical Exposure Directive (MED). In the Spanish legislation RD 815/2001 referred to the medical exposures, it is encourage the need for the introduction of Radiological Protection courses in Medicine and Dental schools with the objective of patient protection. In this study it has been analysed the actual situation of the education and training in Radiation Protection in Dental Schools in Spain. In addition it is described the experience of the University of Sevilla. The results of the study shows that only 4 from 9 dental schools have disciplines of Radiation Protection in its curriculum. In one of them the course is mandatory and has a content of 2 credits (20 hours). In the rest of dental schools the discipline has an optional character with an average of 4 credits. The discipline of Radiation Protection of the curriculum of Dental School at Sevilla university has 4 credits and it is configured as a course with the necessary requirements from the Spanish Nuclear Safety Council to obtain the Radiological Accreditation of Responsible of Dental Radiodiagnostic Installations. This diploma is given once the students have finished the Bachelor

  1. Configuration dependent deformation in 183Au

    Joshi, P.; Kumar, A.; Govil, I.M.; Mukherjee, G.; Singh, R.P.; Muralithar, S.; Bhowmik, R.K.

    1998-01-01

    The lifetime measurements in 183 Au nucleus were carried in order to probe the deformation properties of the band built on the i 3/2 and h 9/2 configurations. The nucleus of 183 Au was populated using a reaction 28 Si( 159 Tb,4n) 183 Au at a beam energy of 140 MeV. Lifetime measurements were carried out using Recoil Distance Measurements (RDM) method

  2. Ultrasonic imaging with a fixed instrument configuration

    Witten, A.; Tuggle, J.; Waag, R.C.

    1988-07-04

    Diffraction tomography is a technique based on an inversion of the wave equation which has been proposed for high-resolution ultrasonic imaging. While this approach has been considered for diagnostic medical applications, it has, until recently, been limited by practical limitations on the speed of data acquisition associated with instrument motions. This letter presents the results of an experimental study directed towards demonstrating tomography utilizing a fixed instrument configuration.

  3. Magnetic Configuration Control of ITER Plasmas

    Albanese, R.; Artaserse, G.; Mattei, M.; Ambrosino, G.; Crisanti, F.; Tommasi, G. de; Fresa, R.; Portone, A.; Sartori, F.; Villone, F.

    2006-01-01

    The aim of this paper is to review the capability of the ITER Poloidal Field (PF) system of controlling the broad range of plasma configurations presently forecasted during ITER operation. The attention is focused on the axi-symmetric aspects of plasma magnetic configuration control since they pose the greatest challenges in terms of control power and they have the largest impact on machine capital cost. The paper is broadly divided in two main sections devoted, respectively, to open loop (feed-forward) and closed loop (feedback) control. In the first part of the study the PF system is assessed with respect to the initiation, ramp-up, sustained burn, ramp-down phases of the main plasma inductive scenario. The limiter-to-divertor configuration transition phase is considered in detail with the aim of assessing the PF capability to form an X-point at the lowest possible current and, therefore, to relax the thermal load on the limiter surfaces. Moreover, during the sustained burn it is important to control plasmas with a broad range of current density profiles. In the second part of the study the plasma vertical feedback control requirements are assessed in details, in particular for the high elongation configurations achievable during the early limiter-to-X point transition phase. Non-rigid plasma displacement models are used to assess the control system voltage and current requirements of different radial field control circuits obtained, for example, by connecting the outermost PF coils, some CS coils, coils sub-sections etc. At last, the main 3D effects of the vessel ports are modeled and their impact of vertical stabilization evaluated. (author)

  4. Optical configurations for the Virgo interferometer

    Hello, P.

    1993-01-01

    We present, in this paper, the potential optical configurations for the VIRGO interferometer, as well as for other similar antennas (LIGO...), and the implications for its sensitivity for the detection of gravitational waves (GW's). The dual recycling arrangement may particularly relax the severe optical specifications required in a power recycling interferometer. Finally, a new idea to improve the symmetry of the interferometer is presented. (author). 11 refs., 2 figs

  5. Configuration management with chef-solo

    Rahman, Naveed ur

    2014-01-01

    This is a step-by-step guide, full of hands-on examples of real-world deployment tasks. Each topic is explained and placed in context, while also pointing out the key details of the concepts used. This book is aimed at system administrators and system engineers who have an understanding of configuration management tools and infrastructure. For novice administrators, it contains easy-to-use application recipes to get started immediately.

  6. Configuration spaces geometry, topology and representation theory

    Cohen, Frederick; Concini, Corrado; Feichtner, Eva; Gaiffi, Giovanni; Salvetti, Mario

    2016-01-01

    This book collects the scientific contributions of a group of leading experts who took part in the INdAM Meeting held in Cortona in September 2014. With combinatorial techniques as the central theme, it focuses on recent developments in configuration spaces from various perspectives. It also discusses their applications in areas ranging from representation theory, toric geometry and geometric group theory to applied algebraic topology.

  7. Numerical Investigation of a Generic Scramjet Configuration

    Karl, Sebastian

    2011-01-01

    A Supersonic Combustion Ramjet (scramjet) is, at least in theory, an efficient air-breathing propulsion system for sustained hypersonic flight at Mach numbers above approximately M=5. Important design issues for such hypersonic propulsion systems, are the lack of ground based facilities capable of testing a full-sized engine at cruise flight conditions and the absence of general scaling laws for the extrapolation of wind tunnel data to flight configurations. Therefore, there is a strong need ...

  8. Configurating computer-controlled bar system

    Šuštaršič, Nejc

    2010-01-01

    The principal goal of my diploma thesis is creating an application for configurating computer-controlled beverages dispensing systems. In the preamble of my thesis I present the theoretical platform for point of sale systems and beverages dispensing systems, which are required for the understanding of the target problematics. As with many other fields, computer tehnologies entered the field of managing bars and restaurants quite some time ago. Basic components of every bar or restaurant a...

  9. Development of configuration risk management tool

    Masuda, Takahiro; Doi, Eiji

    2003-01-01

    Tokyo Electric Power Company (referred to as TEPCO hereinafter), and other Japanese utilities as well, have been trying to improve the capacity factor of their Nuclear Power Plants (NPPs) through modernization of Operation and Maintenance strategy. TEPCO intends to apply risk information to O and M field with maintaining or even improving both safety and production efficiency. Under these situations, TEPCO with some BWR utilities started to develop a Configuration Risk Management (CRM) tool that can estimate risk in various plant conditions due to configuration changes during outage. Moreover, we also intend to apply CRM to on-line maintenance (OLM) in the near future. This tool can calculate the Core Damage Frequency (CDF) according to given plant condition, such as SSCs availability, decay heat level and the inventory of coolant in both outage state and full-power operation. From deterministic viewpoint, whether certain configuration meet the related requirements of Technical Specifications. User-friendly interface is one of the important features of this tool because this enables the site engineers with little experience in PSA to quantify and utilize the risk information by this tool. (author)

  10. The Database Driven ATLAS Trigger Configuration System

    Martyniuk, Alex; The ATLAS collaboration

    2015-01-01

    This contribution describes the trigger selection configuration system of the ATLAS low- and high-level trigger (HLT) and the upgrades it received in preparation for LHC Run 2. The ATLAS trigger configuration system is responsible for applying the physics selection parameters for the online data taking at both trigger levels and the proper connection of the trigger lines across those levels. Here the low-level trigger consists of the already existing central trigger (CT) and the new Level-1 Topological trigger (L1Topo), which has been added for Run 2. In detail the tasks of the configuration system during the online data taking are Application of the selection criteria, e.g. energy cuts, minimum multiplicities, trigger object correlation, at the three trigger components L1Topo, CT, and HLT On-the-fly, e.g. rate-dependent, generation and application of prescale factors to the CT and HLT to adjust the trigger rates to the data taking conditions, such as falling luminosity or rate spikes in the detector readout ...

  11. Loop Quantization and Symmetry: Configuration Spaces

    Fleischhack, Christian

    2018-06-01

    Given two sets S 1, S 2 and unital C *-algebras A_1, A_2 of functions thereon, we show that a map {σ : {S}_1 \\longrightarrow {S}_2} can be lifted to a continuous map \\barσ : spec A_1 \\longrightarrow spec A_2 iff σ^\\ast A_2 := σ^\\ast f | f \\in A_2 \\subseteq A_1. Moreover, \\bar σ is unique if existing, and injective iff σ^\\ast A_2 is dense. Then, we apply these results to loop quantum gravity and loop quantum cosmology. For all usual technical conventions, we decide whether the cosmological quantum configuration space is embedded into the gravitational one; indeed, both are spectra of some C *-algebras, say, A_cosm and A_grav, respectively. Typically, there is no embedding, but one can always get an embedding by the defining A_cosm := C^\\ast(σ^\\ast A_grav), where {σ} denotes the embedding between the classical configuration spaces. Finally, we explicitly determine {C^\\ast(σ^\\ast A_grav) in the homogeneous isotropic case for A_grav generated by the matrix functions of parallel transports along analytic paths. The cosmological quantum configuration space so equals the disjoint union of R and the Bohr compactification of R, appropriately glued together.

  12. A low emittance configuration for spear

    Blumberg, L.N.; Cerino, J.; Harris, J.; Hettel, R.; Hofmann, A.; Liu, R.Z.; Stego, R.; Wiedemann, H.; Winick, H.

    1985-01-01

    The quality of synchrotron radiation beams from SPEAR, in particular the brilliance of undulator radiation, can be improved significantly by reducing the emittance of the stored electron beam. A reduction of the horizontal emittance by a factor of 3.5 to a value of 130 nanometer-radians (nm-r) at 3 GeV has been achieved by using stronger focussing, mainly in the horizontal plane. The low emittance configuration also reduces the dispersion and vertical beta functions in the straight sections, making them more suitable for wigglers. The higher betatron tunes lead to a larger phase advance between the two kickers, which has to be corrected during injection by shunting current from some quadrupoles. The configuration was optimized within SPEAR hardware limitations and tested for dynamic aperture with the tracking program PATRICIA. After implementation of this scheme, beam was successfully injected and accumulated. The measured emittance of the stored beam was in agreement with calculations. Presently the configuration is being made operational

  13. Study on Resource Configuration on Cloud Manufacturing

    Yanlong Cao

    2015-01-01

    Full Text Available The purpose of manufacturing is to realize the requirement of customer. In manufacturing process of cloud system, there exist a lot of resource services which have similar functional characteristics to realize the requirement. It makes the manufacturing process more diverse. To develop the quality and reduce cost, a resource configuration model on cloud-manufacturing platform is put forward in this paper. According to the generalized six-point location principle, a growth design from the requirement of customers to entities with geometric constraints is proposed. By the requirement growing up to product, a configuration process is used to match the entities with the instances which the resources in the database could supply. Different from most existing studies, this paper studies the tolerance design with multiple candidate resource suppliers on cloud manufacturing to make the market play a two-level game considering the benefit of customers and the profit of resources to give an optimal result. A numerical case study is used to illustrate the proposed model and configuration process. The performance and advantage of the proposed method are discussed at the end.

  14. Permutation-invariant distance between atomic configurations

    Ferré, Grégoire; Maillet, Jean-Bernard; Stoltz, Gabriel

    2015-09-01

    We present a permutation-invariant distance between atomic configurations, defined through a functional representation of atomic positions. This distance enables us to directly compare different atomic environments with an arbitrary number of particles, without going through a space of reduced dimensionality (i.e., fingerprints) as an intermediate step. Moreover, this distance is naturally invariant through permutations of atoms, avoiding the time consuming associated minimization required by other common criteria (like the root mean square distance). Finally, the invariance through global rotations is accounted for by a minimization procedure in the space of rotations solved by Monte Carlo simulated annealing. A formal framework is also introduced, showing that the distance we propose verifies the property of a metric on the space of atomic configurations. Two examples of applications are proposed. The first one consists in evaluating faithfulness of some fingerprints (or descriptors), i.e., their capacity to represent the structural information of a configuration. The second application concerns structural analysis, where our distance proves to be efficient in discriminating different local structures and even classifying their degree of similarity.

  15. Permutation-invariant distance between atomic configurations

    Ferré, Grégoire; Maillet, Jean-Bernard; Stoltz, Gabriel

    2015-01-01

    We present a permutation-invariant distance between atomic configurations, defined through a functional representation of atomic positions. This distance enables us to directly compare different atomic environments with an arbitrary number of particles, without going through a space of reduced dimensionality (i.e., fingerprints) as an intermediate step. Moreover, this distance is naturally invariant through permutations of atoms, avoiding the time consuming associated minimization required by other common criteria (like the root mean square distance). Finally, the invariance through global rotations is accounted for by a minimization procedure in the space of rotations solved by Monte Carlo simulated annealing. A formal framework is also introduced, showing that the distance we propose verifies the property of a metric on the space of atomic configurations. Two examples of applications are proposed. The first one consists in evaluating faithfulness of some fingerprints (or descriptors), i.e., their capacity to represent the structural information of a configuration. The second application concerns structural analysis, where our distance proves to be efficient in discriminating different local structures and even classifying their degree of similarity

  16. System engineering and configuration management in ITER

    Chiocchio, S.; Martin, E.; Barabaschi, P.; Bartels, Hans Werner; How, J.; Spears, W.

    2007-01-01

    The construction of ITER will represent a major challenge for the fusion community at large, because of the intrinsic complexity of the tokamak design, the large number of different systems which are all essential for its operation, the worldwide distribution of the design activities and the unusual procurement scheme based on a combination of in-kind and directly funded deliverables. A key requirement for the success of such a large project is that a systematic approach to ensure the consistency of the design with the required performance is adopted. Also, effective project management methods, tools and working practices must be deployed to facilitate the communication and collaboration among the institutions and industries involved in the project. The authors have been involved in the definition and practical implementation of the design integration and configuration control structure inside ITER and in the system engineering process during the selection and optimization of the machine configuration. In parallel, they have assessed design, drawing and documentation management software to be used for the construction phase. Here, they describe the experience gained in recent years, explain the drivers behind the selection of the documents and drawings management systems, and illustrate the scope and issues of the configuration management activities to ensure the congruence of the design, to control and track the design changes and to manage the interfaces among the ITER systems

  17. The self-description data configuration model

    Abadie, Lana, E-mail: lana.abadie@iter.org [ITER Organization, Route de vinon sur Verdon, 13115 St Paul Lez Durance (France); Di Maio, Franck; Klotz, Wolf-Dieter; Mahajan, Kirti; Stepanov, Denis; Utzel, Nadine; Wallander, Anders [ITER Organization, Route de vinon sur Verdon, 13115 St Paul Lez Durance (France)

    2012-12-15

    Highlights: Black-Right-Pointing-Pointer We use the relational model to represent the configuration data for ITER. Black-Right-Pointing-Pointer We explain the different modeled views namely physical, functional and control. Black-Right-Pointing-Pointer We explain how this information is used to generate configuration files. Black-Right-Pointing-Pointer We explain that this information is validated. - Abstract: ITER will consist of roughly 160 plant systems I and C delivered in kind which need to be integrated into the ITER control infrastructure. To make the integration of all these plant systems I and C, a smooth operation, the CODAC (Controls, Data Access and Communications) group release every year the core software environment which consists of many applications. In this paper we would like to describe what configuration data and how it is modeled in the version 2. The model is based on three views, the physical one which lists the components with their signals, the functional view which describes the control functions and variables required to implement them and the control view which links the two previous views. We use Hibernate as an ORM (Object Relational Mapping) framework with a PostgreSQL database and Spring as a framework to handle transactions.

  18. Configuration management plan for the GENII software

    Rittmann, P.D.

    1994-01-01

    The GENII program calculates doses from radionuclides released into the environment for a variety of possible exposure scenarios. The user prepares an input data file with the necessary modelling assumptions and parameters. The program reads the user's input file, computes the necessary doses and stores these results in an output file. The output file also contains a listing of the user's input and gives the title lines from the data libraries which are accessed in the course of the calculations. The purpose of this document is to provide users of the GENII software with the configuration controls which are planned for use by WHC in accordance with WHC-CM-3-10. The controls are solely for WHC employees. Non-WHC individuals are not excluded, but no promise is made or implied that they will be informed of errors or revisions to the software. The configuration controls cover the GENII software, the GENII user's guide, the list of GENII users at WHC, and the backup copies. Revisions to the software must be approved prior to distribution in accordance with this configuration management plan

  19. Performance expectations in the new configuration

    Lallia, P.P.; Rebut, P.-H.

    1989-01-01

    The pumped divertor to be installed in JET should allow a control of the particles and of the impurities. The new hardware required into the vacuum vessel leads to a reduction of the plasma cross section. While a plasma current of 6 MA should still be possible, this will affect the confinement of the plasma. The JET performances in the New Configuration are estimated from the critical electron temperature gradient model by using a 1-D transport code. It has been shown in the past that this model gives a rather satisfactory description of the JET discharges. However it does not address the particle transport and density profiles have to be imposed. By comparison with numerical simulations of the present JET configuration, it is shown that the reduction in plasma size should be more than balanced by the lower impurity concentration expected to result from the divertor. In terms of thermonuclear Q th , a doubling is found relatively to the expectations in the present configuration (≅ .9 against .45). On the other hand Q th should be lowered to .3 if the impurity control is inefficient. In this case as presently observed in JET it is expected that no steady state will be achieved. (author)

  20. REDUNDANT ARRAY CONFIGURATIONS FOR 21 cm COSMOLOGY

    Dillon, Joshua S.; Parsons, Aaron R., E-mail: jsdillon@berkeley.edu [Department of Astronomy, UC Berkeley, Berkeley, CA (United States)

    2016-08-01

    Realizing the potential of 21 cm tomography to statistically probe the intergalactic medium before and during the Epoch of Reionization requires large telescopes and precise control of systematics. Next-generation telescopes are now being designed and built to meet these challenges, drawing lessons from first-generation experiments that showed the benefits of densely packed, highly redundant arrays—in which the same mode on the sky is sampled by many antenna pairs—for achieving high sensitivity, precise calibration, and robust foreground mitigation. In this work, we focus on the Hydrogen Epoch of Reionization Array (HERA) as an interferometer with a dense, redundant core designed following these lessons to be optimized for 21 cm cosmology. We show how modestly supplementing or modifying a compact design like HERA’s can still deliver high sensitivity while enhancing strategies for calibration and foreground mitigation. In particular, we compare the imaging capability of several array configurations, both instantaneously (to address instrumental and ionospheric effects) and with rotation synthesis (for foreground removal). We also examine the effects that configuration has on calibratability using instantaneous redundancy. We find that improved imaging with sub-aperture sampling via “off-grid” antennas and increased angular resolution via far-flung “outrigger” antennas is possible with a redundantly calibratable array configuration.

  1. Configuration and Data Management Process and the System Safety Professional

    Shivers, Charles Herbert; Parker, Nelson C. (Technical Monitor)

    2001-01-01

    This article presents a discussion of the configuration management (CM) and the Data Management (DM) functions and provides a perspective of the importance of configuration and data management processes to the success of system safety activities. The article addresses the basic requirements of configuration and data management generally based on NASA configuration and data management policies and practices, although the concepts are likely to represent processes of any public or private organization's well-designed configuration and data management program.

  2. CRC-cards to support development and maintenance of product configuration systems

    Haug, Anders; Hvam, Lars

    2009-01-01

    This article presents a new definition of special Class, Responsibility and Collaboration (CRC) cards to be used for the development and maintenance of Product Configuration Systems (PCSs). CRC cards were introduced as an informal and user-friendly technique for teaching object-oriented modelling...... and maintenance of PCSs. This procedure has since been applied in several configuration projects and further developed at the Centre for Product Modelling (CPM) at the Technical University of Denmark. However, the investigations of two companies that applies CRC cards to document the knowledge base of their PCSs...

  3. A Fifth Option for Funding Long-Term Care in Canada - Shift the Resources from Medical Treatment and Universal Pension Entitlements.

    Emery, J C Herbert

    2016-01-01

    Needs for non-medical residential care services, long-term care (LTC), will increase over the next 30 years as Canada's population ages. Adams and Vanin (2016) explore four options for raising the public and private monies required to meet LTC needs. In this commentary, I raise a fifth option for finding the resources to meet emerging LTC needs. An alternative approach is to divert resources from Canada's well-resourced, but inefficient, medical treatment system. The dividend of provinces pursuing long overdue reforms to medicare is the liberation of public funds to finance emerging priorities for Canadians like LTC.

  4. Regulations implementing the Byrd Amendments to the Black Lung Benefits Act: determining coal miners' and survivors' entitlement to benefits. Final rule.

    2013-09-25

    This final rule revises the Black Lung Benefits Act (BLBA or Act) regulations to implement amendments made by the Patient Protection and Affordable Care Act (ACA). The ACA amended the BLBA in two ways. First, it revived a rebuttable presumption of total disability or death due to pneumoconiosis for certain claims. Second, it reinstituted automatic entitlement to benefits for certain eligible survivors of coal miners whose lifetime benefit claims were awarded because they were totally disabled due to pneumoconiosis. These regulations clarify how the statutory presumption may be invoked and rebutted and the application and scope of the survivor-entitlement provision. The rule also eliminates several unnecessary or obsolete provisions.

  5. Our Universe

    Stern, Alan

    2001-03-01

    The Universe in which we live is unimaginably vast and ancient, with countless star systems, galaxies, and extraordinary phenomena such as black holes, dark matter, and gamma ray bursts. What phenomena remain mysteries, even to seasoned scientists? Our Universe is a fascinating collection of essays by some of the world's foremost astrophysicists. Some are theorists, some computational modelers, some observers, but all offer their insights into the most cutting-edge, difficult, and curious aspects of astrophysics. Compiled, the essays describe more than the latest techniques and findings. Each of the ten contributors offers a more personal perspective on their work, revealing what motivates them and how their careers and lives have been shaped by their desire to understand our universe. S. Alan Stern is Director of the Department of Space Studies at Southwest Research Institute in Boulder, Colorado. He is a planetary scientist and astrophysicist with both observational and theoretical interests. Stern is an avid pilot and a principal investigator in NASA's planetary research program, and he was selected to be a NASA space shuttle mission specialist finalist. He is the author of more than 100 papers and popular articles. His most recent book is Pluto & Charon (Wiley, 1997). Contributors: Dr. John Huchra, Harvard University Dr. Esther Hu, University of Hawaii, Honolulu Dr. John Mather, NASA Goddard Space Flight Center Dr. Nick Gnedin, University of Colorado, Boulder Dr. Doug Richstone, University of Michigan, Ann Arbor Dr. Bohdan Paczynski, Princeton University, NJ Dr. Megan Donahue, Space Telescope Science Institute, Baltimore, MD Dr. Jerry Ostriker, Princeton University, New Jersey G. Bothun, University of Oregon, Eugene

  6. Risk-based configuration control system: Analysis and approaches

    Samanta, P.K.; Kim, I.S.; Lofgren, E.V.; Vesely, W.E.

    1990-01-01

    This paper presents an analysis of risks associated with component outage configurations during power operation of a nuclear power plant and discusses approaches and strategies for developing a risk-based configuration control system. A configuration, as used here, is a set of component states. The objective of risk-based configuration control is to detect and control plant configurations using a risk-perspective. The configuration contributions to core-melt frequency and core-melt probability are studied for two plants. Large core-melt frequency can be caused by configurations and there are a number of such configurations that are not currently controlled by technical specifications. However, the expected frequency of occurrence of the impacting configurations is small and the actual core-melt probability contributions are also generally small. Effective strategies and criteria for controlling configuration risks are presented. Such control strategies take into consideration the risks associated with configurations, the nature and characteristics of the configuration risks, and also the practical considerations such as adequate repair times and/or options to transfer to low risk configurations. Alternative types of criteria are discussed that are not overly restrictive to result in unnecessary plant shutdown, but rather motivates effective test and maintenance practices that control risk-significant configurations to allow continued operation with an adequate margin to meet challenges to safety

  7. Risk-based configuration control system: Analysis and approaches

    Samanta, P.K.; Vesely, W.E.; Kim, I.S.; Lofgren, E.V.

    1989-01-01

    This paper presents an analysis of risks associated with component outage configurations during power operation of a nuclear power plant and discusses approaches and strategies for developing a risk-based configuration control system. A configuration, as used here, is a set of component states. The objective of risk-based configuration control is to detect and control plant configurations using a risk-perspective. The configuration contributions to core-melt frequency and core-melt probability are studied for two plants. Large core-melt frequency can be caused by configurations and there are a number of such configurations that are not currently controlled by technical specifications. However, the expected frequency of occurrence of the impacting configurations is small and the actual core-melt probability contributions are also generally small. Effective strategies and criteria for controlling configuration risks are presented. Such control strategies take into consideration the risks associated with configurations, the nature and characteristics of the configuration risks, and also the practical considerations such as adequate repair times and/or options to transfer to low risk configurations. Alternative types of criteria are discussed that are not overly restrictive to result in unnecessary plant shutdown, but rather motivates effective tests and maintenance practices that control; risk-significant configurations to allow continued operation with an adequate margin to meet challenges to safety. 3 refs., 7 figs., 2 tabs

  8. "Intelligence and Civilisation": A Ludwig Mond Lecture Delivered at the University of Manchester on 23rd October 1936 by Godfrey H. Thomson. A Reprinting with Background and Commentary

    Deary, Ian J.; Lawn, Martin; Brett, Caroline E.; Bartholomew, David J.

    2009-01-01

    Here we reprint, and provide background and a commentary on, a recently-rediscovered lecture by Godfrey H. Thomson entitled, "Intelligence and civilisation." It was delivered at the University of Manchester, UK, on 23rd October, 1936, printed in 1937 in the short-lived "Journal of the University of Manchester" and as a pamphlet…

  9. Risk-based configuration control system: Analysis and approaches

    Samanta, P.K.; Kim, I.S.; Vesely, W.E.; Lofgren, E.V.

    1989-01-01

    This paper presents an evaluation of the configuration risks associated with the operation of a nuclear power plant and the approaches to control these risks using risk-based configuration control considerations. In that context, the actual and maximum potential configuration risks at a plant are analyzed and the alternative types criteria for a risk-based configuration control systems are described. The risk-based configuration calculations which are studied here focus on the core-melt frequency impacts from given plant configurations. By calculating the core-melt frequency for given configurations, the configurations which cause large core-melt frequency increases can be identified and controlled. The duration time in which the configuration can exist can then be limited or the core-melt frequency level associated with the configuration can be reduced by various actions. Furthermore, maintenances and tests can be scheduled to avoid the configurations which cause large core-melt frequency increases. Present technical specifications do not control many of these configurations which can cause large core-melt frequency increases but instead focus on many risk-unimportant allowed outage times. Hence, risk-based configuration management can be effectively used to reduce core-melt frequency associated risks at a plant and at the same time can provide flexibility in plant operation. The alternative strategies for controlling the core-melt frequency and other risk contributions include: (1) controlling the increased risk level which is associated with the configuration; (2) controlling the individual configuration risk which is associated with a given duration of a configuration; (3) controlling the time period configuration risk from configurations which occur in a time period

  10. Records of Migration in the Exoplanet Configurations

    Michtchenko, Tatiana A.; Rodriguez Colucci, A.; Tadeu Dos Santos, M.

    2013-05-01

    Abstract (2,250 Maximum Characters): When compared to our Solar System, many exoplanet systems exhibit quite unusual planet configurations; some of these are hot Jupiters, which orbit their central stars with periods of a few days, others are resonant systems composed of two or more planets with commensurable orbital periods. It has been suggested that these configurations can be the result of a migration processes originated by tidal interactions of the planets with disks and central stars. The process known as planet migration occurs due to dissipative forces which affect the planetary semi-major axes and cause the planets to move towards to, or away from, the central star. In this talk, we present possible signatures of planet migration in the distribution of the hot Jupiters and resonant exoplanet pairs. For this task, we develop a semi-analytical model to describe the evolution of the migrating planetary pair, based on the fundamental concepts of conservative and dissipative dynamics of the three-body problem. Our approach is based on an analysis of the energy and the orbital angular momentum exchange between the two-planet system and an external medium; thus no specific kind of dissipative forces needs to be invoked. We show that, under assumption that dissipation is weak and slow, the evolutionary routes of the migrating planets are traced by the stationary solutions of the conservative problem (Birkhoff, Dynamical systems, 1966). The ultimate convergence and the evolution of the system along one of these modes of motion are determined uniquely by the condition that the dissipation rate is sufficiently smaller than the roper frequencies of the system. We show that it is possible to reassemble the starting configurations and migration history of the systems on the basis of their final states, and consequently to constrain the parameters of the physical processes involved.

  11. EMMA: a new paradigm in configurable software

    Nogiec, J. M.; Trombly-Freytag, K.

    2017-01-01

    EMMA is a framework designed to create a family of configurable software systems, with emphasis on extensibility and flexibility. It is based on a loosely coupled, event driven architecture. The EMMA framework has been built upon the premise of composing software systems from independent components. It opens up opportunities for reuse of components and their functionality and composing them together in many different ways. As a result, it provides the developer of test and measurement applications with a lightweight alternative to microservices, while sharing their various advantages, including composability, loose coupling, encapsulation, and reuse.

  12. EMMA: a new paradigm in configurable software

    Nogiec, J. M.; Trombly-Freytag, K.

    2017-10-01

    EMMA is a framework designed to create a family of configurable software systems, with emphasis on extensibility and flexibility. It is based on a loosely coupled, event driven architecture. The EMMA framework has been built upon the premise of composing software systems from independent components. It opens up opportunities for reuse of components and their functionality and composing them together in many different ways. It provides the developer of test and measurement applications with a lightweight alternative to microservices, while sharing their various advantages, including composability, loose coupling, encapsulation, and reuse.

  13. Lidar configurations for wind turbine control

    Mirzaei, Mahmood; Mann, Jakob

    2016-01-01

    Lidar sensors have proved to be very beneficial in the wind energy industry. They can be used for yaw correction, feed-forward pitch control and load verification. However, the current lidars are expensive. One way to reduce the price is to use lidars with few measurement points. Finding the best...... by the lidar is compared against the effective wind speed on a wind turbine rotor both theoretically and through simulations. The study provides some results to choose the best configuration of the lidar with few measurement points....

  14. Discrete Morse functions for graph configuration spaces

    Sawicki, A

    2012-01-01

    We present an alternative application of discrete Morse theory for two-particle graph configuration spaces. In contrast to previous constructions, which are based on discrete Morse vector fields, our approach is through Morse functions, which have a nice physical interpretation as two-body potentials constructed from one-body potentials. We also give a brief introduction to discrete Morse theory. Our motivation comes from the problem of quantum statistics for particles on networks, for which generalized versions of anyon statistics can appear. (paper)

  15. Improving motorcycle conspicuity through innovative headlight configurations

    RANCHET, Maud; CAVALLO, Viola; DANG, Nguyen-Thong; VIENNE, Fabrice

    2016-01-01

    L'article décrit une expérimentation qui évalue différentes configurations de feux avant de moto susceptibles d'améliorer la détectabilité des motocycles dans des environnements comportant des distracteurs visuels (constitués par les feux de circulation diurne des voitures). Most motorcycle crashes involve another vehicle that violated the motorcycle's right-of-way at an inter-section. Two kinds of perceptual failures of other road users are often the cause of such accidents:motorcycle-det...

  16. Optimal configuration for programmable Moessbauer experiments

    Pasquevich, Gustavo A; Veiga, Alejandro L; Zelis, Pedro Mendoza; Sanchez, Francisco H, E-mail: gpasquev@fisica.unlp.edu.a [Departamento de Fisica, Facultad de Ciencias Exactas, Universidad Nacional de La Plata (Argentina)

    2010-03-01

    Based on channel independency of recently developed Moessbauer instrumentation an approximation to optimal configuration of experiments is presented. The analysis relies on the presumption that all the available channels of the spectrum are not equally efficient for a given experimental application. A quantification of this concept is presented and a method for different channel layout comparison is proposed. The optimization of recorded spectra is important in dynamic experiments where efficiency in data taking imposes feasibility limits as well as in static applications as a way of reducing experimental time.

  17. Kinetic Stability of the Field Reversed Configuration

    E.V. Belova; R.C. Davidson; H. Ji; and M. Yamada

    2002-01-01

    New computational results are presented which advance the understanding of the stability properties of the Field-Reversed Configuration (FRC). The FRC is an innovative confinement approach that offers a unique fusion reactor potential because of its compact and simple geometry, translation properties, and high plasma beta. One of the most important issues is FRC stability with respect to low-n (toroidal mode number) MHD modes. There is a clear discrepancy between the predictions of standard MHD theory that many modes should be unstable on the MHD time scale, and the observed macroscopic resilience of FRCs in experiments

  18. Configuration Management for eXtreme Programming

    Asklund, U.; Bendix, Lars Gotfred; Ekman, T.

    2003-01-01

    Extreme programming (XP) is a software development method that prescribes the use of 12 different practices. Four of these practices (collective code ownership, continuous integration, small releases and refactoring) can indeed be given good support by the use of simple configuration management (CM......) techniques. We report on our experience in providing many groups of novice developers with CM education, processes and tools to support the four CM-related XP practices in their projects. True to the spirit of XP both education and processes are very lightweight and we found that it was sufficient to focus...

  19. Metasurface Cloaks for Large Cylindrical Cluster Configurations

    Arslanagic, Samel; Yakovlev, A.B.

    2014-01-01

    Here, we investigate the performance of metasurfaces used for cloaking of cluster configurations formed by different arrangements of multiple dielectric cylinders and excited by an electric line source. While a suitably designed metasurface can be used to effectively cloak isolated electrically...... small cylinders, we demonstrate that even electrically large clusters of such particles can be cloaked by covering its constituent cylinders with the metasurface cloaks. This holds for densely packed cylinders due to significantly reduced coupling by the presence of the cloaks. The results may...

  20. Instant Apple Configurator how-to

    Edge, Charles

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich screenshots for easy comprehension.This book follows the Packt How-to approach, offering an informative yet practical guide that is easy to understand. The book takes a meticulous approach to providing quick and simple recipe-based solutions for security and deployment of iOS devices.""Instant Apple iOS Configurator Utility How-to"" book is ideal for anyone with a working knowledge in iO

  1. Resistive instabilities in general toroidal plasma configurations

    Glasser, A.H.; Greene, J.M.; Johnson, J.L.

    1975-01-01

    Previous work by Johnson and Greene on resistive instabilities is extended to finite-pressure configurations. The Mercier criterion for the stability of the ideal magnetohydrodynamic interchange mode is rederived, the generalization of the earlier stability criterion for the resistive interchange mode is obtained, and a relation between the two is noted. Conditions for tearing mode instability are recovered with the growth rate scaling with the resistivity in a more complicated manner than eta 3 / 5 . Nyquist techniques are used to show that favorable average curvature can convert the tearing mode into an overstable mode and can often stabilize it

  2. Remote Sampler Demonstration Isolok Configuration Test

    Kelly, Steve E.

    2016-01-01

    The accuracy and precision of a new Isolok sampler configuration was evaluated using a recirculation flow loop. The evaluation was performed using two slurry simulants of Hanford high-level tank waste. Through testing, the capability of the Isolok sampler was evaluated. Sample concentrations were compared to reference samples that were simultaneously collected by a two-stage Vezin sampler. The capability of the Isolok sampler to collect samples that accurately reflect the contents in the test loop improved – biases between the Isolok and Vezin samples were greatly reduce for fast settling particles.

  3. Business cases for product configuration systems

    Shafiee, Sara; Kristjansdottir, Katrin; Hvam, Lars

    In the recent years, product configuration systems (PCSs) have received greater attention from industries providing customized products as a response to increased demand to fulfil diverse customers’ needs for customized products. Before developing a PCS, a well-established business case has...... to be made in order to secure the success and delivery of the project as it will increase the commitment from the business side. This paper presents a framework for supporting the development of business cases for PCSs and discusses the experiences from multiple case studies benefiting from the suggested...

  4. Configuration management in nuclear power plants

    2003-01-01

    Configuration management (CM) is the process of identifying and documenting the characteristics of a facility's structures, systems and components of a facility, and of ensuring that changes to these characteristics are properly developed, assessed, approved, issued, implemented, verified, recorded and incorporated into the facility documentation. The need for a CM system is a result of the long term operation of any nuclear power plant. The main challenges are caused particularly by ageing plant technology, plant modifications, the application of new safety and operational requirements, and in general by human factors arising from migration of plant personnel and possible human failures. The IAEA Incident Reporting System (IRS) shows that on average 25% of recorded events could be caused by configuration errors or deficiencies. CM processes correctly applied ensure that the construction, operation, maintenance and testing of a physical facility are in accordance with design requirements as expressed in the design documentation. An important objective of a configuration management program is to ensure that accurate information consistent with the physical and operational characteristics of the power plant is available in a timely manner for making safe, knowledgeable, and cost effective decisions with confidence. Currently, the nuclear industry and governmental organizations are showing an increasing interest in the implementation of this process as an effective way of limiting configuration errors and related risks. In this report the necessary attributes of a good operational CM are identified. It is recognized and emphasized that a CM is one aspect of the overall management system. Nevertheless, this is an important part of managerial activity focused on the compliance of knowledge of the plant personnel, plant documentation and records with the state of the plant technology. The concepts developed in this report present a basic approach to CM, taking into

  5. Magnetocrystalline and configurational anisotropies in Fe nanostructures

    Vavassori, P.; Bisero, D.; Carace, F.; Liberati, M.; Di Bona, A.; Gazzadi, G.C.; Valeri, S.

    2005-01-01

    Arrays of single-crystal Fe micron and submicron squares and disks, have been fabricated using a focused ion beam apparatus from a film epitaxially grown on MgO. The hysteresis loops of the patterned areas differ from those of the continuous film as a consequence of the different reversal determined by the lateral confinement of the Fe film. By means of modulated field magneto-optical anisometry measurements we studied the symmetry and the strength of the overall anisotropy. For the smaller square elements we observed a higher-order term in the overall anisotropy with eightfold symmetry arising from the configurational contribution

  6. Remote Sampler Demonstration Isolok Configuration Test

    Kelly, Steve E. [Washington River Protection Solutions, LLC, Richland, WA (United States)

    2016-06-08

    The accuracy and precision of a new Isolok sampler configuration was evaluated using a recirculation flow loop. The evaluation was performed using two slurry simulants of Hanford high-level tank waste. Through testing, the capability of the Isolok sampler was evaluated. Sample concentrations were compared to reference samples that were simultaneously collected by a two-stage Vezin sampler. The capability of the Isolok sampler to collect samples that accurately reflect the contents in the test loop improved – biases between the Isolok and Vezin samples were greatly reduce for fast settling particles.

  7. MHD-stability of the Scyllac configuration

    Berge, G.; Freidberg, J.P.

    1975-01-01

    The results of a stability analysis for a diffuse high-β, l=1 helical configuration are presented. It is shown that there exists a gross m=1 mode whose properties are quite similar to those predicted by the sharp-boundary model. In addition, two new classes of m=1 modes are found, one localized on the inside of the plasma, the other one outside. For any monotonic pressure profile, these modes are unstable although their growth rates are very small. A further study suggests that small changes in the profile may stabilize these modes. (author)

  8. Unusual Configurations of Personality Traits Indicate Multiple Patterns of Their Coalescence

    Allik, Jüri; Hřebíčková, Martina; Realo, Anu

    2018-01-01

    It is widely accepted that the Five Factor Model (FFM) is a satisfactory description of the pattern of covariations among personality traits, which supposedly fits, more or less adequately, every individual. As an amendment to the FFM, we propose that the customary five-factor structure is only a near-universal, because it does not fit all individuals but only a large majority of them. Evidences reveal a small minority of participants who have an unusual configuration of personality traits, which is clearly recognizable, both in self- and observer-ratings. We identified three types of atypical configurations of personality traits, characterized mainly by a scatter of subscale scores within each of the FFM factors. How different configurations of personality traits are formed, persist, and function needs further investigation. PMID:29515499

  9. Unusual Configurations of Personality Traits Indicate Multiple Patterns of Their Coalescence

    Jüri Allik

    2018-02-01

    Full Text Available It is widely accepted that the Five Factor Model (FFM is a satisfactory description of the pattern of covariations among personality traits, which supposedly fits, more or less adequately, every individual. As an amendment to the FFM, we propose that the customary five-factor structure is only a near-universal, because it does not fit all individuals but only a large majority of them. Evidences reveal a small minority of participants who have an unusual configuration of personality traits, which is clearly recognizable, both in self- and observer-ratings. We identified three types of atypical configurations of personality traits, characterized mainly by a scatter of subscale scores within each of the FFM factors. How different configurations of personality traits are formed, persist, and function needs further investigation.

  10. Universal Health Coverage – The Critical Importance of Global Solidarity and Good Governance

    Reis, Andreas A.

    2016-01-01

    This article provides a commentary to Ole Norheim’ s editorial entitled "Ethical perspective: Five unacceptable trade-offs on the path to universal health coverage." It reinforces its message that an inclusive, participatory process is essential for ethical decision-making and underlines the crucial importance of good governance in setting fair priorities in healthcare. Solidarity on both national and international levels is needed to make progress towards the goal of universal health coverage (UHC). PMID:27694683

  11. Complexity of Configurators Relative to Integrations and Field of Application

    Kristjansdottir, Katrin; Shafiee, Sara; Battistello, Loris

    . Moreover, configurators are commonly integrated to various IT systems within companies. The complexity of configurators is an important factor when it comes to performance, development and maintenance of the systems. A direct comparison of the complexity based on the different application...... integrations to other IT systems. The research method adopted in the paper is based on a survey followed with interviews where the unit of analysis is based on operating configurators within a company.......Configurators are applied widely to automate the specification processes at companies. The literature describes the industrial application of configurators supporting both sales and engineering processes, where configurators supporting the engineering processes are described more challenging...

  12. Long-distance configuration of FPGA based on serial communication

    Liu Xiang; Song Kezhu; Zhang Sifeng

    2010-01-01

    To solve FPGA configuration in some nuclear electronics, which works in radioactivity environment, the article introduces a way of long-distance configuration with PC and CPLD, based on serial communication. Taking CYCLONE series FPGA and EPCS configuration chip from ALTERA for example, and using the AS configuration mode, we described our design from the aspects of basic theory, hardware connection, software function and communication protocol. With this design, we could configure several FPGAs in the distance of 100 meters, or we could configure on FPGA in the distance of 150 meters. (authors)

  13. Toward risk-based control of nuclear power plant configurations

    Samanta, P.K.; Veseley, W.E.; Kim, I.S.

    1992-01-01

    This paper presents an evaluation of the configuration risks associated with the operation of a nuclear power plant and the approaches to control these risks using risk-based configuration control considerations. In that context, the actual and maximum potential configuration risks at a plant are analyzed and the alternative types criteria for a risk-based configuration control systems are described. The risk-based configuration calculations which are studied here focus on the core-melt frequency impacts from given plant configurations, the configurations which cause large core-melt frequency increases can be identified and controlled. The duration time in which the configuration can exist can then be limited or the core-melt frequency level associated with the configuration can be reduced by various actions. Futhermore, maintenances and tests can be scheduled to avoid the configurations which cause large core-melt frequency increases. Present technical specifications do not control many of these configurations which can cause large core-melt frequency increases but instead focus on many risk-unimportant allowed outage times. Hence, risk-based configuration management can be effectively used to reduce core-melt frequency associated risks at a plant and at the same time can provide flexibility in plant operation. The alternative strategies for controlling the core-melt frequency and other risk contributions include: (1) controlling the increased risk level which is associated with the configuration; (2) controlling the individual configuration risk which is associated with a given duration of a configuration; (3) controlling the time period configuration risk from configurations which occur in a time period. (orig.)

  14. USAID University

    US Agency for International Development — USAID University is USAID's learning management system. Features include 1) Access online courses 2) Register for instructor-led courses 3)Access your student...

  15. Rhodes University

    Samridhi Sharma

    2013-10-29

    Oct 29, 2013 ... been taken may improve the reception, by the target audience, of the intended communication. This may ... alcohol marketing. Similarly .... of the intended users (Rhodes University support staff ..... Digital Human Modeling and.

  16. Software Configuration Management: The Quality Weakness

    Arrojo, E.; Garcia, P.

    1998-01-01

    At the moment it is very difficult to din any process in the industry where software is not involved. We trust software does minimize the possibility of process failures. In parallel, the quality and safety requirements of our processes have been improved to satisfactory levels. Let's look around us. Every day, thousands of calculations are carried out by our engineers using computer programs. Hundreds of processes are controlled automatically. Safety marging, limits, operation controls..., are derived from them. The tools begin to control our processes but, Who does control the tool? Once they have been installed and once they are running, are they always reliable? NO If you think that your current system are satisfactory, we propose you a game in this report. It is just a test. Which is your score?. Then we revise the concept of Configuration Management and we describe an ideal machine; the ''Perpetuum Mobile'' of the Configuration. We describe some rules to implement and improvement and we comment on the operative experience in ENUSA. (Author)

  17. ICAROUS: Integrated Configurable Architecture for Unmanned Systems

    Consiglio, Maria C.

    2016-01-01

    NASA's Unmanned Aerial System (UAS) Traffic Management (UTM) project aims at enabling near-term, safe operations of small UAS vehicles in uncontrolled airspace, i.e., Class G airspace. A far-term goal of UTM research and development is to accommodate the expected rise in small UAS traffic density throughout the National Airspace System (NAS) at low altitudes for beyond visual line-of-sight operations. This video describes a new capability referred to as ICAROUS (Integrated Configurable Algorithms for Reliable Operations of Unmanned Systems), which is being developed under the auspices of the UTM project. ICAROUS is a software architecture comprised of highly assured algorithms for building safety-centric, autonomous, unmanned aircraft applications. Central to the development of the ICAROUS algorithms is the use of well-established formal methods to guarantee higher levels of safety assurance by monitoring and bounding the behavior of autonomous systems. The core autonomy-enabling capabilities in ICAROUS include constraint conformance monitoring and autonomous detect and avoid functions. ICAROUS also provides a highly configurable user interface that enables the modular integration of mission-specific software components.

  18. Developments of methods for computerized configuration control

    Kafka, P.

    1997-01-01

    It is known that Probabilistic Safety Assessment (PSA) is nowadays the appropriate technology and tool that can be used to optimize, during the design phase, a considered installation taking into account reliability and safety aspects, and also to evaluate and quantify the base-line risk level for the optimized installation. This base-line risk level is normally expressed by an average frequency per plant-year assigned to a scenario of interest (e.g. core damage, in case of a NPP). A considerable number of changes in components and system design can occur during the construction phase and another during the subsequent operation phase due to a continuous change in the plant configurations and their operating procedures, when compared to the configuration considered for the base-line risk quantification. These changes can be originated by planned activities like tests, maintenance and repair or by unplanned actions, mainly random events (failures) on components and systems. This results in a fluctuation of the risk level over operating time and is denominated as the ''risk profile'' (RP) of the installation. Living PSA and risk monitoring programs can assess the RP. An adequate management tool, calculating the ''risk profile'', can be used to control and optimize the operation of the installation with respect to a minimal risk level over the operating time. As a result we obtained a so called fault tolerant operation. 30 refs, 1 tab, figs

  19. Initial DEMO tokamak design configuration studies

    Bachmann, Christian, E-mail: christian.bachmann@efda.org [EFDA, Boltzmannstraße 2, 85748 Garching (Germany); Aiello, G. [CEA-Saclay, DEN, DM2S, SEMT, F-91191 Gif-Sur-Yvette (France); Albanese, R.; Ambrosino, R. [ENEA/CREATE, Universita di Napoli Federico II, Naples (Italy); Arbeiter, F. [Karlsruhe Institute of Technology (KIT), Karlsruhe (Germany); Aubert, J. [CEA-Saclay, DEN, DM2S, SEMT, F-91191 Gif-Sur-Yvette (France); Boccaccini, L.; Carloni, D. [Karlsruhe Institute of Technology (KIT), Karlsruhe (Germany); Federici, G. [EFDA, Boltzmannstraße 2, 85748 Garching (Germany); Fischer, U. [Karlsruhe Institute of Technology (KIT), Karlsruhe (Germany); Kovari, M. [CCFE, Culham Science Centre, Abingdon, Oxon OX14 3DB (United Kingdom); Li Puma, A. [CEA-Saclay, DEN, DM2S, SEMT, F-91191 Gif-Sur-Yvette (France); Loving, A. [CCFE, Culham Science Centre, Abingdon, Oxon OX14 3DB (United Kingdom); Maione, I. [Karlsruhe Institute of Technology (KIT), Karlsruhe (Germany); Mattei, M. [ENEA/CREATE, Universita di Napoli Federico II, Naples (Italy); Mazzone, G. [ENEA C.R. Frascati, via E. Fermi 45, 00044 Frascati, Roma (Italy); Meszaros, B. [EFDA, Boltzmannstraße 2, 85748 Garching (Germany); Palermo, I. [Centro de Investigaciones Energéticas, Medioambientales y Tecnológicas (CIEMAT), Madrid (Spain); Pereslavtsev, P. [Karlsruhe Institute of Technology (KIT), Karlsruhe (Germany); Riccardo, V. [CCFE, Culham Science Centre, Abingdon, Oxon OX14 3DB (United Kingdom); and others

    2015-10-15

    Highlights: • A definition of main DEMO requirements. • A description of the DEMO tokamak design configuration. • A description of issues yet to be solved. - Abstract: To prepare the DEMO conceptual design phase a number of physics and engineering assessments were carried out in recent years in the frame of EFDA concluding in an initial design configuration of a DEMO tokamak. This paper gives an insight into the identified engineering requirements and constraints and describes their impact on the selection of the technologies and design principles of the main tokamak components. The EU DEMO program aims at making best use of the technologies developed for ITER (e.g., magnets, vessel, cryostat, and to some degree also the divertor). However, other systems in particular the breeding blanket require design solutions and advanced technologies that will only partially be tested in ITER. The main differences from ITER include the requirement to breed, to extract, to process and to recycle the tritium needed for plasma operation, the two orders of magnitude larger lifetime neutron fluence, the consequent radiation dose levels, which limit remote maintenance options, and the requirement to use low-activation steel for in-vessel components that also must operate at high temperature for efficient energy conversion.

  20. The configuration of the Brazilian scientific field.

    Barata, Rita B; Aragão, Erika; de Sousa, Luis E P Fernandes; Santana, Taris M; Barreto, Mauricio L

    2014-03-01

    This article describes the configuration of the scientific field in Brazil, characterizing the scientific communities in every major area of knowledge in terms of installed capacity, ability to train new researchers, and capacity for academic production. Empirical data from several sources of information are used to characterize the different communities. Articulating the theoretical contributions of Pierre Bourdieu, Ludwik Fleck, and Thomas Kuhn, the following types of capital are analyzed for each community: social capital (scientific prestige), symbolic capital (dominant paradigm), political capital (leadership in S & T policy), and economic capital (resources). Scientific prestige is analyzed by taking into account the volume of production, activity index, citations, and other indicators. To characterize symbolic capital, the dominant paradigms that distinguish the natural sciences, the humanities, applied sciences, and technology development are analyzed theoretically. Political capital is measured by presidency in one of the main agencies in the S & T national system, and research resources and fellowships define the economic capital. The article discusses the composition of these different types of capital and their correspondence to structural capacities in various communities with the aim of describing the configuration of the Brazilian scientific field.

  1. Configuration study of large wind parks

    Lundberg, Stefan

    2003-07-01

    In this thesis, layouts of various large-scale wind parks, using both AC as well as DC, are investigated. Loss modelling of the wind park components as well as calculations of the energy capture of the turbines using various electrical systems are performed, and the energy production cost of the various park configurations is determined. The most interesting candidate for a DC transmission based wind park was investigated more in detail, the series DC wind park. Finally, the power quality impact in the PCC (point of common coupling) was studied. It was found that from an energy capture point of view, the difference in energy production between various wind turbine systems is very small. Of all the investigated wind park configurations, the wind park with the series connected DC wind turbines seems to have the best potential to give the lowest energy production cost, if the transmission distance is longer then 10-20 km. Regarding the series DC wind park it was found that it is the most difficult one to control. However, a control algorithm for the series park and its turbines was derived and successfully tested. Still, several more details regarding the control of the series wind park has to be dealt with.

  2. Performance comparison of wind park configurations

    Lundberg, Stefan

    2003-07-01

    In this report, layouts of various large-scale wind parks, both AC as well as DC, are investigated. Loss modelling of the wind park components as well as calculations of the energy capture of the turbines using various electrical systems are performed, and the energy production cost of the various park configurations is determined. It was found that from an energy capture point of view, the difference in energy production between various wind turbine systems is very small. In addition, a study of the suitability of various DC/DC-converters is made. Three DC/DC-converters, Boost, Full Bridge and Full Bridge Isolated Boost, are found to be interesting candidates as the 'transformer' component in potential DC-based wind parks. Of all the investigated wind park configurations, the wind park with the series connected DC wind turbines seems to have the best potential to give the lowest energy production cost, if the transmission distance is longer then 10-20 km.

  3. Magnetic configuration control of ITER plasmas

    Albanese, R.; Mattei, M.; Portone, A.; Ambrosino, G.; Artaserse, G.; Crisanti, F.; De Tommasi, G.; Fresa, R.; Sartori, F.; Villone, F.

    2007-01-01

    The aim of this paper is to present some new tools used to review the capability of the ITER Poloidal Field (PF) system in controlling the broad range of plasma configurations presently forecasted during ITER operation. The attention is focused on the axi-symmetric aspects of plasma magnetic configuration control since they pose the greatest challenges in terms of control power and they have the largest impact on machine capital cost. Some preliminary results obtained during ongoing activities in collaboration between ENEA/CREATE and EFDA are presented. The paper is divided in two main parts devoted, respectively, to the presentation of a procedure for the PF current optimisation during the scenario, and of a software environment for the study of the PF system capabilities using the plasma linearized response. The proposed PF current optimisation procedure is then used to assess Scenario 2 design, also taking into account the presence of axisymmetric eddy currents and possible variations of poloidal beta and internal inductance. The numerical linear model based tool derived from the JET oriented eXtreme Shape Controller (XSC) tools is finally used to obtain results on the strike point sweeping in ITER

  4. Valence fluctuations between two magnetic configurations

    Mazzaferro, J.O.

    1982-01-01

    The subject of this work is the study of a microscopic model which describes TmSe through its most important feature, i.e.: the valence fluctuations between two magnetic configurations. Chapter I is a general review of the most important physical properties of rare-earth systems with intermediate valence (I.V.) and a general description of experimental results and theoretical models on Tm compounds. In Chapter II the Hamiltonian model is discussed and the loss of rotational invariance is also analyzed. Chapter III is devoted to the study of non-stoichiometric Tsub(x)Se compounds. It is shown that these compounds can be considered as a mixture of TmSe (I.V. system) and Tm 3+ 0.87Se. Chapter IV is devoted to the calculation of spin-and charge susceptibilities. The results obtained permit to explain the essential features of the neutron scattering spectrum in TmSe. In Chapter V, an exactly solvable periodic Hamiltonian is presented. From the experimental results, some fundamental features are deduced to describe TmSe as an intermediate valence system whose two accessible ionic configurations are magnetic (degenerated fundamental state). (M.E.L) [es

  5. Older people. Courtesy entitles.

    Calnan, Michael; Woolhead, Gillian; Dieppe, Paul

    2003-02-20

    A study of 72 people, with an average age of 72, showed that dignity--and lack of it--were key issues in their estimation of care. Concerns about lack of dignity centred on lack of privacy, mixed sex wards, forms of address and loss of independence. The study suggested that older people do not complain about care for fear of retaliation.

  6. Annexure to Commentary entitled

    Madhsudhan

    (14) Comparing the inputs required for optimal growth of the GMO relative to the parent organism and comparison ... of published data on the progressive increase in the population of pests that were initially known to be resistant ... technology.

  7. 20 CFR 411.552 - What effect will the subsequent entitlement to title II benefits have on EN payments for title...

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What effect will the subsequent entitlement to title II benefits have on EN payments for title XVI beneficiaries after they assign their ticket? 411.552 Section 411.552 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF...

  8. Micro and Macro Content Analysis of English Textbook Entitled "Mosaic One Listening and Speaking (Student's Book)" in the Light of Communicative Competence

    Al-Mashaqba, Nisreen Juma'a Hamed

    2017-01-01

    The purpose of this study is to investigate the extent to which the listening and speaking lessons which are presented in textbook entitled "Mosaic One Listening and speaking (Student's Book)" are characterized with appropriateness and meaningfulness in light of communicative competence and meet the Principles and features of…

  9. Undulant Universe

    Barenboim, Gabriela; /Valencia U.; Mena, Olga; Quigg, Chris; /Fermilab

    2004-12-01

    If the equation of state for ''dark energy'' varies periodically, the expansion of the Universe may have undergone alternating eras of acceleration and deceleration. We examine a specific form that survives existing observational tests, does not single out the present state of the Universe as exceptional, and suggests a future much like the matter-dominated past: a smooth expansion without a final inflationary epoch.

  10. Improving decision making in the early phases of configuration projects

    Mortensen, Niels Henrik; Harlou, Ulf; Haug, Anders

    2008-01-01

    During the early phases of configuration projects very important decisions are made which will heavily influence the performance of the company, benefits in different functional areas (production, sales, purchase, product development, service etc), maintenance of the configuration system...

  11. Improving decision making in the early phases of configuration projects

    Mortensen, Niels Henrik; Hvam, Lars; Harlou, Ulf

    2011-01-01

    During the early phases of configuration projects very important decisions are made which will heavily influence the performance of the company, benefits in different functional areas (production, sales, purchase, product development, service etc), maintenance of the configuration system...

  12. Electronic configurations and energies in some thermodynamically correlated laves compounds

    Campbell, G.M.

    1979-04-01

    The known electronic configurations of simple elements in Laves compounds are correlated with those of the more complex systems to determine their electronic configurations and gaseous state promotion energies

  13. Improving the Performance of Interactive Configuration with Regular String Constraints

    Hansen, Esben Rune; Tiedemann, Peter

    2008-01-01

    A generalization of the problem of interactive configuration has previously been presented in [1]. This generalization utilized decomposition to extend the standard finite domain interactive configuration framework to deal with unbounded string variables and provided features such as prefix auto...

  14. SAP ERP financial accounting and controlling configuration and use management

    Okungbowa, Andrew

    2015-01-01

    SAP ERP modules are notoriously hard to configure and use effectively without a lot of practice and experience. But as SAP ERP Financial Accounting and Controlling: Configuration and Use Management shows, it doesn't have to be so difficult. The book takes a systematic approach that leads SAP Financial Accounting and Controlling (FICO) users step by step through configuring and using all the program's facets. This approach makes configuration complexities manageable. The book's author-SAP expert, trainer, and accountant Andrew Okun

  15. Configuration management plan for Machine Interface Test System (MITS)

    O'Neill, C.K.

    1980-01-01

    The discipline required by this plan will apply from the establishment of a configuration baseline until completion of the final test in the MITS. The plan applies to configured items of hardware and software as well as to the specifications and drawings for these items. The plan encompasses establishment of the facility baseline, interface definition, classes of change, change control, change paper, organizational responsibilities and relationships, test configuration (as opposed to facility), and configuration data retention

  16. Automated allocation and configuration of dual stack IP networks

    Daniels, Wilfried; Vanbrabant, Bart; Hughes, Danny; Joosen, Wouter

    2013-01-01

    The manual configuration and management of a modern network infrastructure is an increasingly complex task. This complexity is caused by factors including heterogeneity, a high degree of change and dependencies between configuration parameters. Due to increasing complexity, manual configuration has become time consuming and error prone. This paper proposes an automatic configuration tool for dual stack IP networks that addresses these issues by using high level abstractions to model the netwo...

  17. Adapting Configuration Management for Agile Teams Balancing Sustainability and Speed

    Moreira, Mario E

    2009-01-01

    Adapting Configuration Management for Agile Teams provides very tangible approaches on how Configuration Management with its practices and infrastructure can be adapted and managed in order to directly benefit agile teams. Written by Mario E. Moreira, author of Software Configuration Management Implementation Roadmap , columnist for CM Crossroads online community and writer for the Agile Journal, this unique book provides concrete guidance on tailoring CM for Agile projects without sacrificing the principles of Configuration Management.

  18. Considerations of an oscillating spiral universe cosmology

    Sachs, M.

    1989-01-01

    It is proposed that if the spiral configuration of galaxies is explicable in terms of the equations of motion of its constituent stars, as an expression of global laws of nature, then the universe as a whole may be similarly described in terms of the motions of its constituent galaxies with a similar spiral dynamics. With the functional form of the spiral paths in terms of Fresnel integrals, taken from solutions of equations in general relativity (from previous analyses of galactic configurations) the density of the universe at the big bang stage is determined. It is found to depend, numerically, on the neutron lifetime and the period of oscillation of the universe as a whole. There is some concluding discussion of the implications of this analysis of the matter of the universe at the big bang stage vis a vis the black hole state of matter

  19. Final report for the field-reversed configuration power plant critical-issue scoping study

    Santarius, John F.; Mogahed, Elsayed A.; Emmert, Gilbert A.; Khater, Hesham Y.; Nguyen, Canh N.; Ryzhkov, Sergei V.; Stubna, Michael D.; Steinhauer, Loren C.; Miley, George H.

    2001-03-01

    This report describes research in which a team from the Universities of Wisconsin, Washington, and Illinois performed a scoping study of critical issues for field-reversed configuration (FRC) power plants. The key tasks for this research were (1) systems analysis of deuterium-tritium (D-T) FRC fusion power plants, and (2) conceptual design of the blanket and shield module for an FRC fusion core.

  20. Models for the Configuration and Integrity of Partially Oxidized Fuel Rod Cladding at High Temperatures

    Siefken, L.J.

    1999-01-01

    Models were designed to resolve deficiencies in the SCDAP/RELAP5/MOD3.2 calculations of the configuration and integrity of hot, partially oxidized cladding. These models are expected to improve the calculations of several important aspects of fuel rod behavior. First, an improved mapping was established from a compilation of PIE results from severe fuel damage tests of the configuration of melted metallic cladding that is retained by an oxide layer. The improved mapping accounts for the relocation of melted cladding in the circumferential direction. Then, rules based on PIE results were established for calculating the effect of cladding that has relocated from above on the oxidation and integrity of the lower intact cladding upon which it solidifies. Next, three different methods were identified for calculating the extent of dissolution of the oxidic part of the cladding due to its contact with the metallic part. The extent of dissolution effects the stress and thus the integrity of the oxidic part of the cladding. Then, an empirical equation was presented for calculating the stress in the oxidic part of the cladding and evaluating its integrity based on this calculated stress. This empirical equation replaces the current criterion for loss of integrity which is based on temperature and extent of oxidation. Finally, a new rule based on theoretical and experimental results was established for identifying the regions of a fuel rod with oxidation of both the inside and outside surfaces of the cladding. The implementation of these models is expected to eliminate the tendency of the SCDAP/RELAP5 code to overpredict the extent of oxidation of the upper part of fuel rods and to underpredict the extent of oxidation of the lower part of fuel rods and the part with a high concentration of relocated material. This report is a revision and reissue of the report entitled, Improvements in Modeling of Cladding Oxidation and Meltdown