WorldWideScience

Sample records for windows mac os

  1. Windows for Intel Macs

    CERN Document Server

    Ogasawara, Todd

    2008-01-01

    Even the most devoted Mac OS X user may need to use Windows XP, or may just be curious about XP and its applications. This Short Cut is a concise guide for OS X users who need to quickly get comfortable and become productive with Windows XP basics on their Macs. It covers: Security Networking ApplicationsMac users can easily install and use Windows thanks to Boot Camp and Parallels Desktop for Mac. Boot Camp lets an Intel-based Mac install and boot Windows XP on its own hard drive partition. Parallels Desktop for Mac uses virtualization technology to run Windows XP (or other operating systems

  2. Mac OS X Forensics

    Science.gov (United States)

    Craiger, Philip; Burke, Paul

    This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.

  3. Java and Mac OS X

    CERN Document Server

    Davis, T Gene

    2010-01-01

    Learn the guidelines of integrating Java with native Mac OS X applications with this Devloper Reference book. Java is used to create nearly every type of application that exists and is one of the most required skills of employers seeking computer programmers. Java code and its libraries can be integrated with Mac OS X features, and this book shows you how to do just that. You'll learn to write Java programs on OS X and you'll even discover how to integrate them with the Cocoa APIs.: Shows how Java programs can be integrated with any Mac OS X feature, such as NSView widgets or screen savers; Re

  4. Enterprise Mac Security Mac OS X Snow Leopard Security

    CERN Document Server

    Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann

    2010-01-01

    A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s

  5. Mac OS X ja tietoturva

    OpenAIRE

    Herranen, Joni

    2011-01-01

    Tämän opinnäytetyön tavoitteena on luoda kattava kokonaiskuva Mac OS X -käyttöjärjestelmän sisäänrakennetuista tietoturvaratkaisuista ja selvittää miten tietoturvaratkaisut toteuttavat tietoturvan kolmea perustavoitetta eli luottamuksellisuutta, eheyttä ja saatavuutta. Työn kohderyhmäksi on valittu edistyneemmät tietokoneenkäyttäjät, joilla ei ole aikaisempaa Mac-kokemusta. Teoriaosuudessa syvennytään aluksi Apple-yhtiöön sekä Mac OS X -järjestelmän teknisiin ominaisuuksiin. Osuuden pääta...

  6. Mac OS X for Astronomy

    Science.gov (United States)

    Pierfederici, F.; Pirzkal, N.; Hook, R. N.

    Mac OS X is the new Unix based version of the Macintosh operating system. It combines a high performance DisplayPDF user interface with a standard BSD UNIX subsystem and provides users with simultaneous access to a broad range of applications which were not previously available on a single system such as Microsoft Office and Adobe Photoshop, as well as legacy X11-based scientific tools and packages like IRAF, SuperMongo, MIDAS, etc. The combination of a modern GUI layered on top of a familiar UNIX environment paves the way for new, more flexible and powerful astronomical tools to be developed while assuring compatibility with already existing, older programs. In this paper, we outline the strengths of the Mac OS X platform in a scientific environment, astronomy in particular, and point to the numerous astronomical software packages available for this platform; most notably the Scisoft collection which we have compiled.

  7. Mac OS X Tiger for Unix Geeks

    CERN Document Server

    Jepson, Brian

    2005-01-01

    If you're one of the many Unix developers drawn to Mac OS X for its Unix core, you'll find yourself in surprisingly unfamiliar territory. Unix and Mac OS X are kissing cousins, but there are enough pitfalls and minefields in going from one to another that even a Unix guru can stumble, and most guides to Mac OS X are written for Mac aficionados. For a Unix developer, approaching Tiger from the Mac side is a bit like learning Russian by reading the Russian side of a Russian-English dictionary. Fortunately, O'Reilly has been the Unix authority for over 25 years, and in Mac OS X Tiger for Unix Gee

  8. Mac OS X for Unix Geeks (Leopard)

    CERN Document Server

    Rothman, Ernest E; Rosen, Rich

    2009-01-01

    If you've been lured to Mac OS X because of its Unix roots, this invaluable book serves as a bridge between Apple's Darwin OS and the more traditional Unix systems. The new edition offers a complete tour of Mac OS X's Unix shell for Leopard and Tiger, and helps you find the facilities that replace or correspond to standard Unix utilities. Learn how to compile code, link to libraries, and port Unix software to Mac OS X and much more with this concise guide.

  9. Macintosh Troubleshooting Pocket Guide for Mac OS

    CERN Document Server

    Lerner, David; Corporation, Tekserve

    2009-01-01

    The Macintosh Troubleshooting Pocket Guide covers the most common user hardware and software trouble. It's not just a book for Mac OS X (although it includes tips for OS X and Jaguar), it's for anyone who owns a Mac of any type-- there are software tips going back as far as OS 6. This slim guide distills the answers to the urgent questions that Tekserve's employee's answer every week into a handy guide that fits in your back pocket or alongside your keyboard.

  10. Take control the Mac OS X lexicon

    CERN Document Server

    Zardetto, Sharon

    2009-01-01

    This ebook explains a little bit of everything; in fact, it's The Mac OS X (and then some) Lexicon because it's never just you and your Mac. It's you and your Mac and the Web, and your email, and that article you just read that threw 17 new acronyms at you or assumed that you knew all sorts of networking terms. Or it's you and your Mac and Finder features you've never touched, such as burn folders, smart folders, or proxy icons, and that mysterious Services submenu. This book is a great guide for Macintosh users everywhere who have trouble keeping up with the latest jargon, fo

  11. CO2calc: A User-Friendly Seawater Carbon Calculator for Windows, Mac OS X, and iOS (iPhone)

    Science.gov (United States)

    Robbins, L.L.; Hansen, M.E.; Kleypas, J.A.; Meylan, S.C.

    2010-01-01

    A user-friendly, stand-alone application for the calculation of carbonate system parameters was developed by the U.S. Geological Survey Florida Shelf Ecosystems Response to Climate Change Project in response to its Ocean Acidification Task. The application, by Mark Hansen and Lisa Robbins, USGS St. Petersburg, FL, Joanie Kleypas, NCAR, Boulder, CO, and Stephan Meylan, Jacobs Technology, St. Petersburg, FL, is intended as a follow-on to CO2SYS, originally developed by Lewis and Wallace (1998) and later modified for Microsoft Excel? by Denis Pierrot (Pierrot and others, 2006). Besides eliminating the need for using Microsoft Excel on the host system, CO2calc offers several improvements on CO2SYS, including: An improved graphical user interface for data entry and results Additional calculations of air-sea CO2 fluxes (for surface water calculations) The ability to tag data with sample name, comments, date, time, and latitude/longitude The ability to use the system time and date and latitude/ longitude (automatic retrieval of latitude and longitude available on iPhone? 3, 3GS, 4, and Windows? hosts with an attached National Marine Electronics Association (NMEA)-enabled GPS) The ability to process multiple files in a batch processing mode An option to save sample information, data input, and calculated results as a comma-separated value (CSV) file for use with Microsoft Excel, ArcGIS,? or other applications An option to export points with geographic coordinates as a KMZ file for viewing and editing in Google EarthTM

  12. Infecting Windows, Linux & Mac in one go

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Still love bashing on Windows as you believe it is an insecure operating system? Hold on a second! Just recently, a vulnerability has been published for Java 7.   It affects Windows/Linux PCs and Macs, Internet Explorer, Safari and Firefox. In fact, it affects all computers that have enabled the Java 7 plug-in in their browser (Java 6 and earlier is not affected). Once you visit a malicious website (and there are plenty already out in the wild), your computer is infected… That's "Game Over" for you.      And this is not the first time. For a while now, attackers have not been targeting the operating system itself, but rather aiming at vulnerabilities inherent in e.g. your Acrobat Reader, Adobe Flash or Java programmes. All these are standard plug-ins added into your favourite web browser which make your web-surfing comfortable (or impossible when you un-install them). A single compromised web-site, however, is sufficient to prob...

  13. Learn Office 2011 for Mac OS X

    CERN Document Server

    Hart-Davis, Guy

    2011-01-01

    Office for Mac remains the leading productivity suite for Mac, with Apple's iWork and the free OpenOffice.org trailing far behind. And now it's being updated with a cleaner interface and more compatibility with Exchange and SharePoint. Learn Office 2011 for Mac OS X offers a practical, hands-on approach to using Office 2011 applications to create and edit documents and get work done efficiently. You'll learn how to customize Office, design, create, and share documents, manipulate data in a spreadsheet, and create lively presentations. You'll also discover how to organize your email, contacts,

  14. Mac OS X Snow Leopard pocket guide

    CERN Document Server

    Seiblod, Chris

    2009-01-01

    Whether you're new to the Mac or a longtime user, this handy book is the quickest way to get up to speed on Snow Leopard. Packed with concise information in an easy-to-read format, Mac OS X Snow Leopard Pocket Guide covers what you need to know and is an ideal resource for problem-solving on the fly. This book goes right to the heart of Snow Leopard, with details on system preferences, built-in applications, and utilities. You'll also find configuration tips, keyboard shortcuts, guides for troubleshooting, lots of step-by-step instructions, and more. Learn about new features and changes s

  15. Windows- ja Mac OS X-käyttöjärjestelmien erot sekä Apple yhtiönä

    OpenAIRE

    Kallio, Rolf

    2011-01-01

    Vaikka monet meistä törmäävät Macintosh-tietokoneisiin eri yhteyksissä melkein päivittäin, liittyy niihin yhä jonkin verran myyttejä. Usein ne mielletään kalliiksi ja vain ammattikäyttöön soveltuviksi tietokoneiksi, joiden ohjelmistovalikoima on rajoittuneempi ja erilainen kuin Windows PC-tietokoneissa. Monet myös pohtivat, miten Macintosh-tietokoneella pärjää nykypäivän tietoyhteiskunnassa, jota Microsoft Windowsillaan dominoi. Applea pidetään seksikkäänä ja haluttavana brändinä. Sen suo...

  16. Mac OS X : Tiger edition the missing manual

    CERN Document Server

    Pogue, David

    2005-01-01

    You can set your watch to it: As soon as Apple comes out with another version of Mac OS X, David Pogue hits the streets with another meticulous Missing Manual to cover it with a wealth of detail. The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and Mac OS X: The Missing Manual. There are many reasons why this is the most popular computer book of all time. With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? Th

  17. MacRuby Ruby and Cocoa on OS X

    CERN Document Server

    Aimonetti, Matt

    2011-01-01

    Want to build native Mac OS X applications with a sleek, developer-friendly alternative to Objective-C? MacRuby is an ideal choice. This in-depth guide shows you how Apple's implementation of Ruby gives you access to all the features available to Objective-C programmers. You'll get clear, detailed explanations of MacRuby, including quick programming techniques such as prototyping. Perfect for programmers at any level, this book is packed with code samples and complete project examples. If you use Ruby, you can tap your skills to take advantage of Interface Builder, Cocoa libraries, the Objec

  18. Forensic investigation into Mac OS X volatile memory

    OpenAIRE

    Coppock, Tom; Gan, Diane

    2013-01-01

    An important area for forensic investigations is live memory analysis captured from a running machine. The RAM may provide an in depth picture of the system when it was seized which could reveal many vital pieces of evidence otherwise unobtainable on the computer hard disk. Research in this area is relatively low on all platforms, but especially for Mac OS X. The aim of this work was to investigate volatile memory analysis for a Mac and to develop a tool, called VolaGUI, to assist forensic ex...

  19. Learn Objective-C on the Mac for OS X and iOS

    CERN Document Server

    Knaster, Scott; Malik, Waqar

    2012-01-01

    Learn to write apps for some of today's hottest technologies, including the iPhone and iPad (using iOS), as well as the Mac (using OS X). It starts with Objective-C, the base language on which the native iOS software development kit (SDK) and the OS X are based. Learn Objective-C on the Mac: For OS X and iOS, Second Edition updates a best selling book and is an extensive, newly updated guide to Objective-C. Objective-C is a powerful, object-oriented extension of C, making this update the perfect follow-up to Dave Mark's bestselling Learn C on the Mac. Whether you're an experienced C programmer

  20. Learning Unix for Mac OS X Tiger Unlock the Power of Unix

    CERN Document Server

    Taylor, Dave

    2005-01-01

    Thoroughly revised and updated for Mac OS X Tiger, this new edition introduces Mac users to the Terminal application and shows you how to navigate the command interface, explore hundreds of Unix applications that come with the Mac, and, most importantly, how to take advantage of both the Mac and Unix interfaces. If you want to master the command-line, this gentle guide to using Unix on Mac OS X Tiger is well worth its cover price

  1. Mac OS X Snow Leopard for Power Users Advanced Capabilities and Techniques

    CERN Document Server

    Granneman, Scott

    2010-01-01

    Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques is for Mac OS X users who want to go beyond the obvious, the standard, and the easy. If want to dig deeper into Mac OS X and maximize your skills and productivity using the world's slickest and most elegant operating system, then this is the book for you. Written by Scott Granneman, an experienced teacher, developer, and consultant, Mac OS X for Power Users helps you push Mac OS X to the max, unveiling advanced techniques and options that you may have not known even existed. Create custom workflows and apps with Automa

  2. Enterprise Mac Administrator's Guide

    CERN Document Server

    Edge, Charles; Hunter, Beau

    2009-01-01

    Charles Edge, Zack Smith, and Beau Hunter provide detailed explanations of the technology required for large-scale Mac OS X deployments and show you how to integrate it with other operating systems and applications. Enterprise Mac Administrator's Guide addresses the growing size and spread of Mac OS X deployments in corporations and institutions worldwide. In some cases, this is due to the growth of traditional Mac environments, but for the most part it has to do with "switcher" campaigns, where Windows and/or Linux environments are migrating to Mac OS X. However, there is a steep cu

  3. Learn AppleScript The Comprehensive Guide to Scripting and Automation on MAC OS X

    CERN Document Server

    Rosenthal, Hanaan

    2009-01-01

    AppleScript is an English-like, easy-to-understand scripting language built into every Mac. AppleScript can automate hundreds of AppleScriptable applications, performing tasks both large and small, complex and simple. Learn AppleScript: The Comprehensive Guide to Scripting and Automation on Mac OS X, Third Edition has been completely updated for Mac OS X Snow Leopard. It's all here, with an emphasis on practical information that will help you solve any automation problem-from the most mundane repetitive tasks to highly integrated workflows of complex systems. * Friendly enough for beginners, d

  4. Project Teaches Students to Diagnose an Ailing Windows OS

    Science.gov (United States)

    Yang, Baijan

    2007-01-01

    Troubleshooting a corrupted Windows operating system (OS) is a must-learn experience for computer technology students. To teach OS troubleshooting, the simplest approach involves introducing the available tools followed by the "how-to's." But how does a teacher teach his or her students to apply their knowledge in real-life scenarios and help them…

  5. Switching to the Mac The Missing Manual

    CERN Document Server

    Pogue, David

    2010-01-01

    Is Windows giving you pause? Ready to make the leap to the Mac instead? There has never been a better time to switch from Windows to Mac, and this incomparable guide will help you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac programs so you can do what you did with Windows, and learning your way around Mac OS X. Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. No viruses, worms, or spyware. No questionable firewalls, inefficien

  6. Learn 2D game development with C# for iOS, Android, Windows Phone, Playstation mobile and more

    CERN Document Server

    Sung, Kelvin; Zhu, Rob; Pavleas, Jebediah

    2014-01-01

    Focuses on teaching key game programming principles and techniques rather than platform specifics, which makes it very appealing to hobbyists and game enthusiasts, and anyone who is thinking about a future career in game development. Uses the free, open source MonoGame framework to make it easy to target a wide range of platforms including Windows 8, Windows Phone, iOS, Android, MacOSX and Playstation Mobile. There are currently no books on the market covering this framework. By the end of the book, readers will have built a full working game and they'll have their own game library of build

  7. The Mac'OS X command line Unix under the hood

    CERN Document Server

    McElhearn, Kirk

    2006-01-01

    The Mac command line offers a faster, easier way to accomplish many tasks. It''s also the medium for many commands that aren''t accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functionality provided by the command line. It''s also packed with information the experienced users need, including little-known shortcuts and several chapters devoted to advanced topics. This is a book to get you started, but also a book you won't soon outgrow.

  8. Concurrent Programming in Mac OS X and iOS Unleash Multicore Performance with Grand Central Dispatch

    CERN Document Server

    Nahavandipoor, Vandad

    2011-01-01

    Now that multicore processors are coming to mobile devices, wouldn't it be great to take advantage of all those cores without having to manage threads? This concise book shows you how to use Apple's Grand Central Dispatch (GCD) to simplify programming on multicore iOS devices and Mac OS X. Managing your application's resources on more than one core isn't easy, but it's vital. Apps that use only one core in a multicore environment will slow to a crawl. If you know how to program with Cocoa or Cocoa Touch, this guide will get you started with GCD right away, with many examples to help you writ

  9. Mac Bible

    CERN Document Server

    Spivey, Dwight

    2009-01-01

    This essential guide answers all your questions on using a Macintosh computer, whether you?re unpacking your very first Mac after switching from a PC or upgrading from an older Mac. You?ll walk through all pre-installed Mac applications, including using Mac OS X, browsing the Web using Safari, downloading music from the iTunes store, troubleshooting Mac-specific problems, organizing photos in iPhoto, organizing calendars in iCal, editing digital video in iMovie, and more.

  10. Mac Programming for Absolute Beginners

    CERN Document Server

    Wang, Wallace

    2011-01-01

    Want to learn how to program on your Mac? Not sure where to begin? Best-selling author Wallace Wang will explain how to get started with Cocoa, Objective-C, and Xcode. Whether you are an experienced Windows coder moving to the Mac, or you are completely new to programming, you'll see how the basic design of a Mac OS X program works, how Objective-C differs from other languages you may have used, and how to use the Xcode development environment. Most importantly, you'll learn how to use elements of the Cocoa framework to create windows, store data, and respond to users in your own Mac programs.

  11. Traducir con ordenadores Mac, ¿es posible?

    OpenAIRE

    Fernando Vidal Carballido

    2009-01-01

    El creciente éxito de los productos de Apple y el impulso que esto ha supuesto para su sistema operativo, Mac OS X, hace que cada vez haya más traductores que se planteen la opción de dejar de utilizar Windows a favor del sistema operativo de Apple. En el presente artículo se ofrece una perspectiva general sobre la situación actual y las distintas opciones, desde el uso de Windows en ordenadores Mac hasta el abandono completo de Microsoft Windows para usar Mac OS X en exclusiva. -------------...

  12. Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2008-12-01

    Full Text Available Varsalone, J. (Tech. Ed., Kubasiak, R.R., Morrissey, S., et al. (2009. Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit. Burlington, MA: Syngress. 551 + xix pages, ISBN: 978-1-59749-297-3, US$59.95.Reviewed by Gary C. Kessler (gary.kessler@champlain.eduAt last! A quality book about computer forensics for Apple products! Alas, I get ahead of myself.Apple's hold on the personal computer marketplace started dwindling on August 12, 1981, the day that the IBM PC was introduced. As an Apple ][+ bigot myself, I refused to touch a PC for some years. But I was also a command line bigot, so when the first Macintosh was introduced in 1983 and hermetically sealed the operating system from users, I did not go out and buy one. In fact, like many of my era, I did eventually end up on the PC side which, ironically, let me do many of the things that my trusty Apple ][+ had in earlier times -- write code, play with the hardware, and, indeed, get to a command line. And, of course, tons of application developers flocked to the PC because of its open architecture.(see PDF for full review

  13. Performance Analysis of an Optical CDMA MAC Protocol With Variable-Size Sliding Window

    Science.gov (United States)

    Mohamed, Mohamed Aly A.; Shalaby, Hossam M. H.; Abdel-Moety El-Badawy, El-Sayed

    2006-10-01

    A media access control protocol for optical code-division multiple-access packet networks with variable length data traffic is proposed. This protocol exhibits a sliding window with variable size. A model for interference-level fluctuation and an accurate analysis for channel usage are presented. Both multiple-access interference (MAI) and photodetector's shot noise are considered. Both chip-level and correlation receivers are adopted. The system performance is evaluated using a traditional average system throughput and average delay. Finally, in order to enhance the overall performance, error control codes (ECCs) are applied. The results indicate that the performance can be enhanced to reach its peak using the ECC with an optimum number of correctable errors. Furthermore, chip-level receivers are shown to give much higher performance than that of correlation receivers. Also, it has been shown that MAI is the main source of signal degradation.

  14. Mobile Device Management horizons for CERN Managed iOS and Mac Self-Service

    CERN Multimedia

    CERN. Geneva; MUSZKOWSKI, Maciek; BIPPUS, Vincent Nicolas

    2015-01-01

    Overview of the MDM (Mobile Device Mamagement) market in the context of the CERN needs and a discussion of technical capabilities of a range of MDM products, followed by a presentation of two new functionalities implemented using an MDM: Self-service Kiosk for Mac and delegated-management solution for professional tablets.

  15. Enterprise Mac administrators guide

    CERN Document Server

    Smith, William

    2015-01-01

    IT departments everywhere will be integrating Macs and Mac OS X into their IT infrastructure and this book will tell them how to do it. It will serve as an authoritative, useful and frequently referenced book on Mac OS X administration.

  16. Macs for dummies

    CERN Document Server

    Baig, Edward C

    2014-01-01

    Get the most out of your Mac with this comprehensive guide Macs For Dummies, 13th Edition is the ultimate guide to your Mac, fully updated to include information about the latest updates. The book walks you through troubleshooting, syncing mobile devices, integrating Windows, and more, so you can take advantage of everything Macs have to offer. Whether you're a new user, a recent convert, or you just want to get the most out of your Mac, this book puts all the information you need in one place. Discover what makes Macs superior computing machines. Learn the basics, from mastering the Dock and

  17. Windows

    DEFF Research Database (Denmark)

    Heiselberg, Per; Svidt, Kjeld; Nielsen, Peter V.

    In natural ventilation systems fresh air is often provided through opening of windows. However, the knowledge of the performance of windows is rather limited. Computation of natural ventilation air flow through windows is most commonly made using discharge coefficients, that are regarded as being...... constant. The reported results show that the discharge coefficient for a window opening cannot be regarded as a constant and that it varies considerably with the size of the opening area, the window type and the temperature difference. Therefore, the use of a constant value can lead to serious errors...

  18. Core Animation für Mac OS X und iPhone Eindrucksvolle dynamische User Interfaces erstellen

    CERN Document Server

    Dudney, Bill

    2009-01-01

    Core Animation wurde mit Mac OS X 10.5 eingeführt und bietet dem Entwickler hervorragende Möglichkeiten, auf einfache Weise animierte User Interfaces für den Mac und das iPhone zu erstellen. Bill Dudney gibt Ihnen in diesem Buch eine umfassende Einführung in Core Animation. In den ersten Kapiteln liegt der Schwerpunkt auf der Nutzung der Integration von Core Animation mit dem AppKit. Der Autor beginnt mit den vertrauten Möglichkeiten aus dem AppKit sowie der Beschreibung der Möglichkeiten, die Cocoa-APIs bieten, und führt langsam die zusätzlichen APIs ein, die zum Core-Animation-Framework gehören. Es werden Ihnen u.a. die verschiedenen Animationsarten vorgestellt, die Core Animation zur Verfügung stellt, sowie die Klassen, die das Timing von Animationen regeln. In den späteren Kapiteln geht es dann hauptsächlich um die Aspekte, die mit einer rein Core-Animation-basierten Benutzerschnittstelle realisiert werden können. Der Autor erläutert Ihnen die Arbeitsweise von Layers sowie deren Geometrie un...

  19. Millisecond timing on PCs and Macs.

    Science.gov (United States)

    MacInnes, W J; Taylor, T L

    2001-05-01

    A real-time, object-oriented solution for displaying stimuli on Windows 95/98, MacOS and Linux platforms is presented. The program, written in C++, utilizes a special-purpose window class (GLWindow), OpenGL, and 32-bit graphics acceleration; it avoids display timing uncertainty by substituting the new window class for the default window code for each system. We report the outcome of tests for real-time capability across PC and Mac platforms running a variety of operating systems. The test program, which can be used as a shell for programming real-time experiments and testing specific processors, is available at http://www.cs.dal.ca/~macinnwj. We propose to provide researchers with a sense of the usefulness of our program, highlight the ability of many multitasking environments to achieve real time, as well as caution users about systems that may not achieve real time, even under optimal conditions.

  20. Mac at Work

    CERN Document Server

    Sparks, David

    2011-01-01

    Bridge the gap between using a Mac at home and at the office. Now that you love your Mac at home, you want to use one at the office without missing a beat of productivity or professionalism. This unique guide shows you how.  You'll find best Mac business practices for handling word processing, spreadsheet and presentation creation, task and project management, and graphics. The book also explores topics such as hardware maintenance, how to synchronize with multiple computers, data backup, and communication with Windows networks.: Covers the nuts and bolts of using a Mac at work, including sync

  1. The effect of windowing on the performance of the CA-CFAR and OS-CFAR algorithms

    CSIR Research Space (South Africa)

    Melebari, A

    2015-10-01

    Full Text Available the sidelobes in both the slant-range and the Doppler domain. A Monte Carlo simulation was used to investigate the performance of Cell Averaging CFAR (CA-CFAR) and Ordered Statistic CFAR (OS-CFAR) algorithms. Results show that the windowing operation induces...

  2. MacBook Teach Yourself VISUALLY

    CERN Document Server

    Miser, Brad

    2010-01-01

    Like the MacBook itself, Teach Yourself VISUALLY MacBook, Second Edition is designed to be visually appealing, while providing excellent functionality at the same time. By using this book, MacBook users will be empowered to do everyday tasks quickly and easily. From such basic steps as powering on or shutting down the MacBook, working on the Mac desktop with the Dashboard and its widgets to running Windows applications, Teach Yourself VISUALLY MacBook, Second Edition covers all the vital information and provides the help and support a reader needs—in many ways it's like having a Mac Genius at

  3. iMac portable genius

    CERN Document Server

    Hart-Davis, Guy

    2010-01-01

    The most up-to-date coverage on the latest iMac advice, tools, and shortcuts Cool and useful tips, full-color screenshots, and savvy advice show you how to get the most out of your iMac. Fully updated to cover the iMac's latest features and capabilities, this guide is packed with indispensible information on iLife '09 and Mac OS X Snow Leopard, and shows you how to customize your iMac in a way that it will work best for you.Explores all the bells and whistles of the iMac, including the new Magic Mouse, iLife apps such as iPhoto and iMovie, and Mac OS X Snow LeopardShows yo

  4. Switching to a Mac For Dummies

    CERN Document Server

    Reinhold, Arnold

    2007-01-01

    Thinking of making the switch from your PC to a Mac? Congratulations! You're in for a great, virus-free ride. And Switching to Mac For Dummies makes it smoother than you ever imagined. From buying the Mac that's right for you to transferring your files to breaking your old Windows habits and learning to do things the (much easier) Mac way, it makes the whole process practically effortless. Whether you've been using Windows XP, Vista, or even Linux, you'll find simple, straightforward ways to make your transition go smoothly. That will leave you plenty of time to get familiar with Mac'

  5. Desde MacBride hasta la CMSI. Diagnósticos plenos, compromisos vacíos

    Directory of Open Access Journals (Sweden)

    Dra. Concepción Travesedo de Castilla

    2006-01-01

    Full Text Available From 2003 to 2005 the World Summit for the Information Society has taken place under the auspices of the UN. Since the MacBride Report was submitted in 1980, this has been the most significant initiative undertaken at international level to confront the challenge of inequalities in the global communication system. So much in an occasion as in another, sectors requiring transformations have obtained a main victory in the area of diagnosis and definition of new paradigms, but their major failure in the refusal of the industrialized countries governments and the media private sector to assume any commitment. This rejection of the concept of Shared Responsibility has for the first time been counteracted by the international actor that supposes the organized civil society.

  6. Learn Excel 2011 for Mac

    CERN Document Server

    Hart-Davis, Guy

    2011-01-01

    Microsoft Excel 2011 for Mac OS X is a powerful application, but many of its most impressive features can be difficult to find. Learn Excel 2011 for Mac by Guy Hart-Davis is a practical, hands-on approach to learning all of the details of Excel 2011 in order to get work done efficiently on Mac OS X. From using formulas and functions to creating databases, from analyzing data to automating tasks, you'll learn everything you need to know to put this powerful application to use for a variety of tasks. What you'll learn * The secrets of the Excel for Mac interface! * How to create effective workbo

  7. MacBook Pro portable genius

    CERN Document Server

    Gruman, Galen

    2013-01-01

    Learn the skills, tools and shortcuts you need in order to make the most of your MacBook Pro This easy-to-use, compact guide skips the fluff and gets right to the essentials so that you can maximize all the latest features of the MacBook Pro. Packed with savvy insights and tips on key tools and shortcuts, this handy book aims to help you increase your productivity and save you time and hassle. From desktop sharing and wireless networking to running Windows applications and more, this book shows you what you want to know. Includes the latest version of OS X, iCloud, FaceTime, and moreCovers al

  8. MacBook for dummies

    CERN Document Server

    Chambers , Mark L

    2014-01-01

    Make friends with your MacBook the fun and easy way! Ultra-light, ultra-fast, and ultra-powerful, the MacBook is the coolest laptop in town, and longtime Mac guru Mark L. Chambers is just the guy to help you get to know your MacBook in no time. Take a closer look at the latest features, get the lowdown on OS X, unleash your creative forces with iLife, take care of business with the iWork applications, and sync it all with iCloud with the expert advice in this bestselling MacBook guide. Whether this is your first MacBook or your first laptop, period, you''ll learn to navigate the Mac desktop, c

  9. Mac configuration management at the Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Marcus, Allan B [Los Alamos National Laboratory

    2010-01-01

    The Los Alamos National Laboratory (LANL) had a need for central configuration management of non-Windows computers. LANL has three to five thousand Macs and an equal number of Linux based systems. The primary goal was to be able to inventory all non-windows systems and patch Mc OS X systems. LANL examined a number of commercial and open source solutions and ultimately selected Puppet. This paper will discuss why we chose Puppet, how we implemented it, and some lessons we learned along the way.

  10. Macs for seniors for dummies

    CERN Document Server

    Chambers, Mark L

    2009-01-01

    Over 50 and thinking about getting your first computer? A user-friendly Mac is a great choice, and Macs For Seniors For Dummies walks you through choosing one and learning to use it. You won't even need your grandchildren to help! Macs For Seniors For Dummies introduces you to all the basic things you may not have encountered before-how to use the keyboard and mouse, work with files and folders, navigate around the Mac OS X desktop, set up an Internet connection, and much more. You'll learn to:Choose the Mac that's right for you, set it up, run programs and manage files, and hook up a printerU

  11. Mycobacterium Avium Complex (MAC)

    Science.gov (United States)

    ... 30, 2014 Select a Language: Fact Sheet 514 Mycobacterium Avium Complex (MAC) WHAT IS MAC? HOW DO ... INTERACTION PROBLEMS THE BOTTOM LINE WHAT IS MAC? Mycobacterium Avium Complex (MAC) is a serious illness caused ...

  12. Take Control of Maintaining Your Mac

    CERN Document Server

    Kissell, Joe

    2009-01-01

    Keep your Mac running smoothly with our easy maintenance program! Regular maintenance is necessary to avoid problems and to ensure your Mac runs at peak performance, but it's hard to know what to do and when to do it. Best-selling author Joe Kissell has now applied his commonsense approach to the task of maintaining your Mac, whether you use Tiger or Leopard! Learn how to start on the right foot; what you should do daily, weekly, monthly, and yearly; and how to prepare for Mac OS X updates. Joe even explains how to monitor your Mac's health and debunks common panaceas. Read this book to lea

  13. Mycobacterium avium complex (MAC isolated from AIDS patients and the criteria required for its implication in disease Complexo Mycobacterium avium (MAC isolado de pacientes com AIDS e os critérios exigidos para sua implicação em doença

    Directory of Open Access Journals (Sweden)

    David Jamil Hadad

    1995-10-01

    Treinamento AIDS e/ou Instituto de Infectologia Emilio Ribas. A doença disseminada foi diagnosticada em 29 destes, com base no isolamento do MAC a partir do sangue e/ou aspirado de medula óssea. Os outros 74 pacientes foram agrupados nas categorias altamente (5, moderadamente (26 e pouco sugestiva de doença (43 de acordo com os postulados de DAVIDSON (198910. Os diferentes critérios para valorizar o seu isolamento de espécimes estéreis e não estéreis são discutidos.

  14. 'Tagger' - a Mac OS X Interactive Graphical Application for Data Inference and Analysis of N-Dimensional Datasets in the Natural Physical Sciences.

    Science.gov (United States)

    Morse, P. E.; Reading, A. M.; Lueg, C.

    2014-12-01

    Pattern-recognition in scientific data is not only a computational problem but a human-observer problem as well. Human observation of - and interaction with - data visualization software can augment, select, interrupt and modify computational routines and facilitate processes of pattern and significant feature recognition for subsequent human analysis, machine learning, expert and artificial intelligence systems.'Tagger' is a Mac OS X interactive data visualisation tool that facilitates Human-Computer interaction for the recognition of patterns and significant structures. It is a graphical application developed using the Quartz Composer framework. 'Tagger' follows a Model-View-Controller (MVC) software architecture: the application problem domain (the model) is to facilitate novel ways of abstractly representing data to a human interlocutor, presenting these via different viewer modalities (e.g. chart representations, particle systems, parametric geometry) to the user (View) and enabling interaction with the data (Controller) via a variety of Human Interface Devices (HID). The software enables the user to create an arbitrary array of tags that may be appended to the visualised data, which are then saved into output files as forms of semantic metadata. Three fundamental problems that are not strongly supported by conventional scientific visualisation software are addressed:1] How to visually animate data over time, 2] How to rapidly deploy unconventional parametrically driven data visualisations, 3] How to construct and explore novel interaction models that capture the activity of the end-user as semantic metadata that can be used to computationally enhance subsequent interrogation. Saved tagged data files may be loaded into Tagger, so that tags may be tagged, if desired. Recursion opens up the possibility of refining or overlapping different types of tags, tagging a variety of different POIs or types of events, and of capturing different types of specialist

  15. OS X Mavericks for dummies

    CERN Document Server

    LeVitus, Bob

    2013-01-01

    Coast through OS X Mavericks with help from Dr. Mac and For Dummies Ready to make friends with Mavericks? Then, Dr. Mac's your man. Author and longtime Mac guru, Bob "Dr. Mac" LeVitus shares his witty insights and helpful tips in this full-color update to his bestselling OS X guide. You'll learn the basics of working with the Dock, Launchpad, and Mission Control before moving on to setting up your e-mail, surfing with Safari, organizing your files, and customizing OS X Mavericks for all you need your Mac to do. Familiarizes you with OS X essentials like navigating the desktop, connecting to

  16. Mac Security Bible

    CERN Document Server

    Kissell, Joe

    2010-01-01

    Your essential, no-holds-barred guide to Mac security threats and solutions. Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide.

  17. Teach yourself visually Mac Mini

    CERN Document Server

    Hart-Davis, Guy

    2012-01-01

    The perfect how-to guide for visual learners Apple?s Mac Mini packs a powerful punch is in a small package, including both HDMI and Thunderbolt ports plus the acclaimed OS X. But if you want to get the very most from all this power and versatility, be sure to get this practical visual guide. With full-color, step-by-step instructions as well as screenshots and illustrations on every page, it clearly shows you how to accomplish tasks rather than burying you in pages of text. Discover helpful visuals and how-tos on the OS, hardware specs, Launchpad, the App Store, multimedia capabilities (such

  18. Data declaration, control and record of an experiment in nuclear physics. Data acquisition system development under X Window with the system OS-9

    International Nuclear Information System (INIS)

    Michel, L.

    1990-09-01

    To compensate for the increase in data produced by experiments in nuclear physics, the development of a data storage system much more compact than the magnetic tape is most important. The first goal of this work is to establish a data storage unit built on a 8 mm video cartridge (Exabyte) at a given experimental site, the 4pi gamma multidetector array Chateau de Cristal, set up at the CNRS unit in Strasbourg. We have built on a VME crate a data acquisition system working with the real time operating system OS-9 and integrating the Exabyte unit. The system control is realized with an original graphic interface that has been developed under X-Window. This interface allows the command and monitoring of data acquisition as well as the set up of acquisition parameters. The system worked up since january 1990 [fr

  19. MacBook Pro Portable Genius

    CERN Document Server

    Miser, Brad

    2012-01-01

    Discover loads of tips and techniques for the newest MacBook Pro You're already ahead of the game with a MacBook Pro. Now you can get even more out the popular Apple notebook with the new edition of this handy, compact book. Crammed with savvy insights and tips on key tools and shortcuts, this book will help you increase your productivity and keep your Apple digital lifestyle on track. From desktop sharing and wireless networking to running Windows applications, this book avoids fluff, doesn't skimp on the essentials, saves you time and hassle, and shows you what you most want to know. Include

  20. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  1. Situación de riesgo y salud de los adolescentes en el valle de los ríos Apurímac, Ene y Mantaro en Perú

    Directory of Open Access Journals (Sweden)

    Fabiola Yeckting Vilela

    Full Text Available Se presenta el diagnóstico de las condiciones de vida de los adolescentes varones y mujeres en la zona del valle de los ríos Apurímac, Ene y Mantaro (VRAEM, quienes atraviesan situaciones de riesgo y vulnerabilidad social y sexual debido a los altos niveles de producción de la hoja de coca y el contexto del narcotráfico, que crean la ilusión del rápido ascenso social. A partir de ello, es necesario preguntarse ¿cuáles son las condiciones de vida y situaciones de riesgo de los adolescentes en el VRAEM? y ¿cuáles son las alternativas para una mejora de su situación desde el acceso a la educación y los programas de atención de su salud? Esta situación de riesgo es el resultado de las relaciones desiguales de género, violencia sexual, deserción escolar, embarazo adolescente, consumo de alcohol y drogas, así como de la falta de oportunidades como consecuencia de la participación en la economía de la coca y el narcotráfico entre los adolescentes en el VRAEM. Finalmente, se presentan los resultados de la atención de profesionales de los centros de salud para favorecer la consejería en salud sexual y reproductiva y el acceso a los servicios de salud del Programa Vida Adolescente, como oportunidad de vincular los contenidos del currículo de educación y las metas de cumplimiento de este sector, visibilizando la necesidad de un enfoque de interculturalidad e igualdad de género en el acceso a la salud y la educación de los adolescentes.

  2. Rails on Windows

    CERN Document Server

    Hibbs, Curt

    2007-01-01

    It's no secret that the entire Ruby onRails core team uses OS X as their preferreddevelopment environment. Becauseof this, it is very easy to findauthoritative information on the webabout using Rails on OS X. But the truthis that Windows developers using Railsprobably outnumber those using otherplatforms. A Windows development environmentcan be just as productive asany other platform. This is a guide to developing with Rubyon Rails under Windows. It won't teachyou how to write Ruby on Rails web applications,but it will show you what toolsto use and how to set them up to createa complete Rail

  3. Windows 8 secrets

    CERN Document Server

    Thurrott, Paul

    2012-01-01

    Tips, tricks, treats, and secrets revealed on Windows 8 Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally recognized Windows experts and Microsoft insiders, authors Paul Thurrott and Rafael Rivera? They cut through the hype to get at useful information you'll not find anywhere else, including what role this new OS plays in a mobile and tablet world. Regardless of your level of knowledge, you'll discover little-known facts about how things work, what's new and different, and h

  4. The MAC framework : Redefining MAC protocols for wireless sensor networks

    NARCIS (Netherlands)

    Parker, T.; Halkes, G.; Bezemer, M.; Langendoen, K.

    2010-01-01

    Most current WSN MAC protocol implementations have multiple tasks to perform—deciding on correct timing, sending of packets, sending of acknowledgements, etc. However, as much of this is common to all MAC protocols, there is duplication of functionality, which leads to larger MAC protocol code size

  5. MAC calorimeters and applications

    International Nuclear Information System (INIS)

    MAC Collaboration.

    1982-03-01

    The MAC detector at PEP features a large solid-angle electromagnetic/hadronic calorimeter system, augmented by magnetic charged-particle tracking, muon analysis and scintillator triggering. Its implementation in the context of electron-positron annihilation physics is described, with emphasis on the utilization of calorimetry

  6. Florence Jessie Mac Williams

    Indian Academy of Sciences (India)

    CPMGIKAlBGE-340/2003-05. Resonance - January 2005. Licenced to post WPP No.6 RT Nagar Postoffice. Florence Jessie Mac Williams. (1917 - 1990). Registered with Registrar of Newspapers in India vide Regn. No. 66273/96. ISSN 0971-8044. Price per copy: Rs 40.

  7. Saunders Mac Lane

    Indian Academy of Sciences (India)

    in the Notices of the American Mathematical Society in 1995. At one point he says that he saw Hitler and Goring in close proximity to him during the intermission of a musical opera and that, had he carried a weapon, he "might have personally changed history"! The collaboration of Mac Lane with Samuel Eilenberg gave rise ...

  8. Windows Azure

    CERN Document Server

    Johnson, Bruce; Chambers, James; Garber, Danny; Malik, Jamal; Fazio, Adam

    2013-01-01

    A collection of five must-have Azure titles, from some of the biggest names in the field Available individually, but at a discounted rate for the collection, this bundle of five e-books covers key developer and IT topics of Windows Azure, including ASP.NET, mobile services, web sites, data storage, and the hybrid cloud. A host of Microsoft employees and MPVs come together to cover the biggest challenges that professionals face when working with Windows Azure. The e-books included are as follows: Windows Azure and ASP.NET MVC MigrationWindows Azure Mobile ServicesWindows Azure Web SitesWindows

  9. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    Science.gov (United States)

    Song, W.-Z.; Huang, R.; Shirazi, B.; Husent, R.L.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and frame into slots. Parent determines children's frame assigmnent based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. Firstly, given any node, at any time slot, there is at most one active sender in its neighborhood (includ ing itself). Secondly, the packet scheduling with TreelMAC is bufferless, which therefore minimizes the probability of network congestion. Thirdly, the data throughput to gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24 node test bed demonstrate that TreeMAC protocol significantly improves network throughput and energy efficiency, by comparing to the TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC[8]. ?? 2009 IEEE.

  10. iMac pocket genius

    CERN Document Server

    Hart-Davis, Guy

    2010-01-01

    If you want to get the very most out of your iMac, put this savvy Portable Genius guide to work. Want to make the most of the new Magic Mouse and the latest iLife apps? Set up a wireless network using your iMac's AirPort card? Watch television on your iMac, or show iMac videos and movies on your television? You'll find cool and useful Genius tips, full-color screenshots, and pages of easy-to-access shortcuts and tools that will save you time and let you enjoy your iMac to the max.

  11. iMac for dummies

    CERN Document Server

    Chambers, Mark L

    2014-01-01

    Do it all with your iMac and this bestselling For Dummies guide! You're still a little giddy from finally scoring your new iMac, and you can't wait to get started. Even if you're already in love with your iMac, it helps to have a little guidance to really get the most out of this ultimate all-in-one computer. This updated edition of iMac For Dummies is the ideal way to learn the iMac fundamentals from setting up and personalizing your machine to importing files, making FaceTime video calls, surfing the web, using your favorite programs and apps, and everything in between. Trusted Mac guru Mark

  12. The MAC detector

    Energy Technology Data Exchange (ETDEWEB)

    Allaby, J.V.; Ash, W.W.; Band, H.R.; Baksay, L.A.; Blume, H.T.; Bosman, M.; Camporesi, T.; Chadwick, G.B.; Clearwater, S.H.; Coombes, R.W.; Delfino, M.C.; De Sangro, R.; Faissler, W.L.; Fernandez, E.; Ford, W.T.; Gettner, M.W.; Goderre, G.P.; Goldschmidt-Clermont, Y.; Gottschalk, B.; Groom, D.E.; Heltsley, B.K.; Hurst, R.B.; Johnson, J.R.; Kaye, H.S.; Lau, K.H.; Lavine, T.L.; Lee, H.Y.; Leedy, R.E.; Leung, S.P.; Lippi, I.; Loh, E.C.; Lynch, H.L.; Marini, A.; Marsh, J.S.; Maruyama, T.; Messner, R.L.; Meyer, O.A.; Michaloswki, S.J.; Morcos, S.; Moromisato, J.H.; Morse, R.M.; Moss, L.J.; Muller, F.; Nelson, H.N.; Peruzzi, I.; Piccolo, M.; Prepost, R.; Pyrlik, J.; Qi, N.; Read, A.L. Jr.; Rich, K.; Ritson, D.M.; Ronga, F.; Rosenberg, L.J.; Shambroom, W.D.; Sleeman, J.C.; Smith, J.G.; Venuti, J.P.; Verdini, P.G.; Goeler, E. von; Wald, H.B.; Weinstein, R.; Wiser, D.E.; Zdarko, R.W. (Colorado Univ., Boulder (USA). Dept. of Physics; Istituto Nazionale di Fisica Nucleare, Frascati (Italy). Lab.

    1989-09-01

    The MAC detector at PEP recorded data for an integrated luminosity of 335 pb{sup -1} between 1980 and 1986. The design of this low-cost MAgnetic Calorimeter was optimized for electron and muon identification, as well as for the measurement of hadronic energy flow. Muon identification is available over 96% of the solid angle, and MAC was the first detector to make large-scale use of gas-sampling calorimetry. Electromagnetic calorimetry in the central selection employs alternating layers of lead and proportional wire chambers (PWCs), and hadron and the remaining electromagnetic calorimetry is accomplished with iron plate and PWC layers. A relatively small central drift chamber in an axial magnetic field provides pattern recognition and modest momentum determination. An outer blanket of drift tubes completes the muon identification system. During the latter two years of operation an innovative 'soda straw' vertex chamber made more precise lifetime measurements possible. With an evolving trigger system and highly automated data acquisition system, this modest detector has exceeded most of its designers' expectations and has produced a gratifying spectrum of physics results. (orig.).

  13. CAVE WINDOW

    Science.gov (United States)

    Levenson, M.

    1960-10-25

    A cave window is described. It is constructed of thick glass panes arranged so that interior panes have smaller windowpane areas and exterior panes have larger areas. Exterior panes on the radiation exposure side are remotely replaceable when darkened excessively. Metal shutters minimize exposure time to extend window life.

  14. Window Stories

    DEFF Research Database (Denmark)

    Hauge, Bettina

    This research project has investigated 17 households in Germany (cities and rural areas). The main aim was to learn about the significance of the window to these people: What they think of their windows, how, when and why they use them in their everyday life, if they have a favorite window and why......, as well as the opposite. The report also includes a special focus on overheating and people’s strategies against this. Knowing about what people appreciate in a window and their actual practices and the reasons for their behaviour may be useful in many different ways, for instance to inform public...... of ethnographic tools that required their involvement, such as making a diary of their heating experiences during a random week in the summer of 2014, taking photos of windows and sending postcards with specific tasks....

  15. iMac for dummies

    CERN Document Server

    Chambers, Mark L

    2012-01-01

    The bestselling guide to the ultimate all-in-one computer—now updated and revised throughout! If you're looking for speed, performance, and power, the iMac is the ultimate all-in-one computer. From its superior performance, powerful operating system, and amazing applications, the iMac is one awesome machine, and the fun, friendly, and approachable style of iMac For Dummies is an ideal way to get started with the basics. You'll learn the fundamentals of the iMac including setting up and customizing your iMac and the software that comes with it, importing files from your old computer, send

  16. Microsoft Windows Operating System Essentials

    CERN Document Server

    Carpenter, Tom

    2012-01-01

    A full-color guide to key Windows 7 administration concepts and topics Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System Essentials is an ideal resource for anyone new to computer administration and looking for a career in computers. Delving into areas such as fundamental Windows 7 administration concepts and various desktop OS topics, this full-color book addresses the skills necessary for individuals looking to break into a career in IT. Each chapter begins with a list of topi

  17. Gotcha! Macs lose their innocence

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Still believe your Mac is secure because Microsoft PCs fall prey to viruses and worms but Macs don’t? Time to wake up! This year has seen the first major compromise of Macs worldwide*. How is yours doing?   The “Flashback” Trojan is affecting Apple’s own variant of Java and compromises Macs via so-called drive-by infections, i.e. when you visit an appropriately prepared (infected!) website - and this might not necessarily be a site with questionable contents, but could well be a popular, reputable one. Security Companies worldwide have been monitoring this particular Trojan for a while and have estimated that more than half a million Macs were compromised. Connected to a few central command and control servers, the compromised Macs were then supporting the malicious activity of the bad guys! Fortunately, the security companies have now been able to take over those command and control servers and stop their destructive drive. So, Mac users, face the f...

  18. MacIntyreov pojam nesumjerljivosti

    OpenAIRE

    Kurelić, Zoran

    1995-01-01

    Autor piše o MacIntyreovoj uporabi pojma nesumjerljivosti u sferi filozofije politike. Prvi je pojam tako rabio Feyerabend, koji je nesumjerljivost stavio u temelj svoga relativističkog napada na liberalizam. MacIntyre se također koncentrira na kritiku liberalizma, no ne s anarhodadaističke, već s neoaristotelijansko-tomističke pozicije. Esej se sastoji od četiri kratka dijela: A) ukratko prikazuje MacIntyreovo razumijevanje pojma nesumjerljivosti u knjigama "After Virtue" i "Whose Justice? W...

  19. Fiverr MacGyver

    Science.gov (United States)

    Hut, Rolf; van de Giesen, Nick; Larson, Martha

    2014-05-01

    Crowdsourcing has become popular over the past years, also for scientific endeavors. There are many Citizen Science projects and crowdfunding platforms, such as Kickstarter, that are make helpful contributions to moving environmental science forward. An interesting underused source of useful crowd-derived contributions to research is the website Fiverr.com. On this platform, thousands of people, acting as small-scale freelance contractors, offer their skills in the form of services. The platform offers a chance for people to take a hobby, skill, or pastime and make it something more by reaching out to a wider audience and by receiving a payment in return for services. As is typical of other crowdsourcing platforms, the tasks are small and usually self contained. As the name Fiverr suggests, offers start at US5 to provide a particular service. Services offered range from graphic design, to messages sung or spoken with various styles or accents, to complete apps for Android or iPhone. Skill providers on the platform can accept a range of variation of definition in the tasks, some can be described in general terms, for others it is more appropriate to provide examples. Fiverr provides a central location for those offering skills and those needing services to find each other, it makes it possible to communicate and exchange files, to make payments, and it provides support for resolving disputes. In all cases, it is important to keep expectations aligned with the nature of the platform: quality can and will vary. Ultimately, the critical contribution of Fiverr is not to replace professional services or otherwise save money, but rather to provide access to a large group of people with specialized skills who are able to make a contribution on short notice. In the context of this session, it can be considered a pool of people with MacGyver skills lying in wait of a MacGyyer task to attack. There are many ways in which Fiverr tasks, which are called 'gigs', can be useful in

  20. Multicollision attack on CBC-MAC, EMAC, and XCBC-MAC of AES-128 algorithm

    Science.gov (United States)

    Brolin Sihite, Alfonso; Hayat Susanti, Bety

    2017-10-01

    A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, and XCBC-MAC constructions are some of MAC schemes that used in the hash function. In this paper, we do multicollision attack on CBC-MAC, EMAC, and XCBC-MAC construction which uses AES-128 block cipher algorithm as basic construction. The method of multicollision attack utilizes the concept of existential forgery on CBC-MAC. The results show that the multicollision can be obtained easily in CBC-MAC, EMAC, and XCBC-MAC construction.

  1. OS X Mountain Lion bible

    CERN Document Server

    Gruman, Galen

    2012-01-01

    The complete guide to Mac OS X, fully updated for the newest release! The Mac's solid, powerful operating system and the exploding popularity of iOS devices are fueling a strong increase in market share for Apple. Previous editions of this book have sold more than 75,000 copies, and this new edition is fully updated with all the exciting features of OS X Mountain Lion, including Game Center, Messages, and Notifications. Written by industry expert Galen Gruman, it covers all the basics and then delves deep into professional and higher-end topics, making it the one book you need to succeed with

  2. OS X Mavericks portable genius

    CERN Document Server

    Spivey, Dwight

    2013-01-01

    Plenty of tips, tricks, and shortcuts help you make the most of Apple's newest OS X OS X Mavericks is Apple's newest operating system, with great new ways to enhance your digital lifestyle. This hip, straightforward guide focuses on helping you get everything you want from your Mac. You'll discover how to customize your computer and workspace, troubleshoot and maintain OS X, and have fun browsing and manipulating images and multimedia. You'll listen to music and podcasts, discover how to work with and connect peripherals, copy music to an iPod, add a printer, sync your Mac to other devices, an

  3. Microsoft Windows Server Administration Essentials

    CERN Document Server

    Carpenter, Tom

    2011-01-01

    The core concepts and technologies you need to administer a Windows Server OS Administering a Windows operating system (OS) can be a difficult topic to grasp, particularly if you are new to the field of IT. This full-color resource serves as an approachable introduction to understanding how to install a server, the various roles of a server, and how server performance and maintenance impacts a network. With a special focus placed on the new Microsoft Technology Associate (MTA) certificate, the straightforward, easy-to-understand tone is ideal for anyone new to computer administration looking t

  4. Strategic Windows

    DEFF Research Database (Denmark)

    Risberg, Annette; King, David R.; Meglio, Olimpia

    We examine the importance of speed and timing in acquisitions with a framework that identifies management considerations for three interrelated acquisition phases (selection, deal closure and integration) from an acquiring firm’s perspective. Using a process perspective, we pinpoint items within...... acquisition phases that relate to speed. In particular, we present the idea of time-bounded strategic windows in acquisitions consistent with the notion of kairòs, where opportunities appear and must be pursued at the right time for success to occur....

  5. Window shopping

    OpenAIRE

    Oz Shy

    2013-01-01

    The terms "window shopping" and "showrooming" refer to the activity in which potential buyers visit a brick-and-mortar store to examine a product but end up either not buying it or buying the product from an online retailer. This paper analyzes potential buyers who differ in their preference for after-sale service that is not offered by online retailers. For some buyers, making a trip to the brick-and-mortar store is costly; however, going to the store to examine the product has the advantage...

  6. Parenthetical Windows

    DEFF Research Database (Denmark)

    Lemi, Esther; Triantafyllidis, Georgios

    2016-01-01

    artificial from natural stimuli and detects common and individual needs by measuring heart pulse and body temperature. The focal point here is light and how light affects human perception while at the same time the perception of sound and how gesture can provide the best possible cognition of actual needs...... light is a form that adapts natures’ properties and modifies the artificial environment as a stage direction, implying at the same time mood and modifying it in collaboration with sound. Having evaluated how this affects the body and human perception in this particular time that we experience nowadays......Parenthetical Window is a project that engages scientific research in human perception providing a platform for users to experience their own limits and needs in their individual circadian rhythm. The presentation focuses on a case study in a community of dancers where the individual needs in light...

  7. Cognitive MAC designs for OSA networks

    CERN Document Server

    Derakhshani, Mahsa

    2014-01-01

    This SpringerBrief presents recent advances in the cognitive MAC designs for opportunistic spectrum access (OSA) networks. It covers the basic MAC functionalities and MAC enhancements of IEEE 802.11. Later chapters discuss the existing MAC protocols for OSA and classify them based on characteristic features. The authors provide new research in adaptive carrier sensing-based MAC designs tailored for OSA, which optimize spectrum utilization and ensure a peaceful coexistence of licensed and unlicensed systems. Analytically devised via optimization and game-theoretic approaches, these adaptive M

  8. The MacNuclide nuclear data environment

    International Nuclear Information System (INIS)

    Stone, C.A.

    1992-01-01

    Advance in technology have produced intriguing tools that can be applied to problems in nuclear science. Information management in nuclear science is an example of how technology is not quickly exploited. The U.S. Department of Energy supports an extensive program to evaluate published nuclear properties and store them in an electronic data base. Much of the evaluation effort has focused on producing the journal Nuclear Data Sheets and the publication Table of Isotopes. Although the electronic data base can itself be a valuable source of information, the software used to access is was designed using decades-old technologies. The authors of this paper have developed a novel data-base management system for nuclear properties. The application is known as MacNuclide. It is a nuclear data-base environment that uses the highly interactive and intuitive windowing environmentsof desk-top computers. The environment is designed around that image of the chart of nuclides. Questions are posed to the data base by placing constraints on properties and defining collections of nuclides to be used in data-base seraches. Results are displayed either as a simple list of nuclides that meet the imposed constraints or as a color chart of nuclides

  9. OS X Mountain Lion Portable Genius

    CERN Document Server

    Spivey, Dwight

    2012-01-01

    Essential tips and techniques on the Mac OS X features you use most! If you want the kind of hip, friendly help you'd get from friends on how to get the most of out of Mac OS X Mountain Lion, this is the guide you need. Jump right into the coolest new Mac OS X features like Game Center, Messages, and Notification, or get a better handle on the basic tools and shortcuts that will help keep your mountain cat purring. From customizing to using multimedia to syncing your Mac to other devices, this book saves you time and hassle, avoids fluff, and covers what you want to know most. New addition t

  10. Technical Report : ContikiMAC vs X-MAC performance analysis

    OpenAIRE

    Michel, Mathieu; Quoitin, Bruno

    2014-01-01

    This paper try to better understand the performance of ContikiMAC compared to X-MAC. ContikiMAC achieves a transmission by repeatedly transmitting a data packet until the reception of an ACK from the destination. While X-MAC uses a stream of small size strobes to advertise the destination of the incoming transmission. A priori, X-MAC is then less bandwidth consumptive. To better understand the efficiency of ContikiMAC, despite an intuitively more consumptive transmitting procedure, we have co...

  11. Analysis of 3gpp-MAC and two-key 3gpp-MAC

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Mitchell, C.J.

    2003-01-01

    Forgery and key-recovery attacks are described on the 3gpp-MAC scheme, proposed for inclusion in the 3gpp specification. Three main classes of attack are given, all of which operate whether or not truncation is applied to the MAC value. Attacks in the first class use a large number of 'chosen MACs......', those in the second class use a large number of 'known MACs', and those in the third class require a large number of MAC verifications, but very few known MACS and no chosen MACS. The first class yields both forgery and key-recovery attacks, whereas the second and third classes are key-recovery attacks...... only. Both single-key and two-key variants of 3gpp-MAC are considered; the forgery attacks are relevant to both variants, whereas the key-recovery attacks are only relevant to the two-key variant....

  12. Macs all-in-one for dummies

    CERN Document Server

    Hutsko, Joe

    2014-01-01

    Your all-in-one guide to unleashing your Mac's full potential It's a Mac world out there. But if you haven't read the instruction manual, you may be neglecting some of your computer's coolest features. Turn to Macs All-in-One For Dummies' jam-packed guide to access the incredible tools within your computer. With this fully updated reference, you will learn how to use Launchpad and Mission Control; protect your Mac; back up and restore data with Time Machine; sync across devices in iCloud; import, organize, and share photos; direct in iMovie; compose in GarageBand; and so much more. The possi

  13. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  14. Quicksilver Power Mac G4

    CERN Multimedia

    2001-01-01

    A new generation with a reworked motherboard is launched on 2001 with however the same Graphite box. It also included a processor speed-bump, and brought the DVD-R "SuperDrive" to the mid-level model. The Quicksilver PowerMac was available in three configurations: The 733 MHz model, with 128 MB of RAM, a 40 GB hard drive, and a CD-RW drive, was 1,699 dollars, the 867 MHz configuration, with 128 MB of RAM, a 60 GB hard drive and a DVD-R drive, was 2,499 dollars, and the high-end dual-800 MHz model, with 256 MB of RAM, an 80 GB hard drive and a DVD-R drive, was 3,499 dollars. The 733 MHz model is the first personal computer to have a DVD burner, named SuperDrive at Apple. The design was updated on 2002 with 800 MHz, 933 MHz and dual 1 GHz configurations, becoming the first Mac to reach 1 GHz.

  15. IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADHOC NETWORKS

    OpenAIRE

    B.Nithya; C.Mala; Vijay Kumar B

    2012-01-01

    TCP congestion control mechanism is highly dependent on MAC layer Backoff algorithms that predict the optimal Contention Window size to increase the TCP performance in wireless adhoc network. This paper critically examines the impact of Contention Window in TCP congestion control approaches. The modified TCP congestion control method gives the stability of congestion window which provides higher throughput and shorter delay than the traditional TCP. Various Backoff algorithms t...

  16. Forensic Memory Analysis for Apple OS X

    Science.gov (United States)

    2012-06-14

    The tool has support for multiple architectures and operating systems, including BSD (from which Apple’s UNIX foundation derives). Vidas (2011...templates are easy to work with programmatically, generating their syntax is labor intensive. The open files module uses (18 classes * 2 versions * 2...01/28/mac-os-forensics-howto- simple-ram-acquisition-analysis-mac-memory-reader-part-1 Vidas , T. (2011, January). MemCorp: An open data corpus for

  17. MacIntyre, Rival Traditions and Education

    Science.gov (United States)

    Stolz, Steven A.

    2016-01-01

    This paper critically discusses MacIntyre's thesis that education is essentially a contested concept. In order to contextualise my discussion, I discuss both whether rival educational traditions of education found in MacIntyre's work--which I refer to as instrumental and non-instrumental justifications of education--can be rationally resolved…

  18. Windows 7 A quick, hands-on introduction

    CERN Document Server

    Lee, Wei-Meng

    2009-01-01

    This compact book offers the quickest path for Windows users to get started with Microsoft's Windows 7 operating system. You get the essential information you need to upgrade or install the system and configure it to fit your activities, along with a tour of Windows 7's features and built-in applications. Microsoft has learned from the mistakes of Windows Vista, and Windows 7 shows it-this new OS is much faster and more stable. With Windows 7: Up and Running, you'll learn what's new and what's changed from XP and Vista, and get advice on ways to use this system for work, entertainment, inst

  19. Windows 10 simplified

    CERN Document Server

    McFedries, Paul

    2015-01-01

    Learn Windows 10 quickly and painlessly with this beginner's guide Windows 10 Simplified is your absolute beginner's guide to the ins and outs of Windows. Fully updated to cover Windows 10, this highly visual guide covers all the new features in addition to the basics, giving you a one-stop resource for complete Windows 10 mastery. Every page features step-by-step screen shots and plain-English instructions that walk you through everything you need to know, no matter how new you are to Windows. You'll master the basics as you learn how to navigate the user interface, work with files, create

  20. Windows 10 for dummies

    CERN Document Server

    Rathbone, Andy

    2015-01-01

    The fast and easy way to get up and running with Windows 10 Windows 10 For Dummies covers the latest version of Windows and gets you up and running with the changes and new features you'll find in this updated operating system. Packed with time-saving tips to help you get the most out of the software, this helpful Windows 10 guide shows you how to manage Windows tasks like navigating the interface with a mouse or touchscreen, connecting to the web, and troubleshooting problems and making quick fixes. Assuming no prior knowledge of the software, Windows 10 For Dummies addresses the updates to

  1. Office 2008 for Mac for dummies

    CERN Document Server

    LeVitus, Bob

    2013-01-01

    Office 2008 for Mac is here, with great new enhancements to all your favorite office productivity tools. Who better than "Dr. Mac, "Bob LeVitus, to show you how to load and use them all? From choosing the best version for your needs to managing your life with your online calendar, Office 2008 For Mac For Dummies covers what you need to know. It compares the Student/Teacher Edition, Standard Edition, and Professional Edition, then walks you through installing your preferred version and keeping it up to date. You'll find out all the things you can do with Word, Excel, PowerPoint, and Entourage,

  2. Schematic Window Methodology Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The aim of this IRAD is to produce a generic launch window analyzer (SWM) that allows for large-scale rapid analysis of a launch window and orbit design trade space....

  3. Antimoulting Activity of Eremanthus erythropappus (DC. MacLeisch

    Directory of Open Access Journals (Sweden)

    Danielle Barbosa

    2012-06-01

    Resumo. Os extratos e metabólitos secundários de plantas podem agir como agentes tóxicos e inibidores do da alimentação e do desenvolvimento em insetos. Neste estudo foi utilizado Oncopeltus fasciatus (Dallas (Hemiptera como modelo experimental a fim de avaliar as atividades do extrato etanólico bruto e frações obtidos das flores ou caules de Eremanthus erythropappus (DC. MacLeisch (Asteraceae, na mortalidade e sobre o desenvolvimento do inseto. A fração butanólica obtida do extrato etanólico mostrou toxidade sobre as ninfas de O. fasciatus, bem como atividade de inibição do crescimento. Os resultados sugerem que a fração butanólica de E. erythropappus possui substâncias ativas sobre a fisiologia, crescimento e desenvolvimento de insetos.

  4. MACS as a tool for international inspections

    International Nuclear Information System (INIS)

    Curtiss, J.A.; Indusi, J.P.

    1995-01-01

    The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites

  5. MACS as a tool for international inspections

    Energy Technology Data Exchange (ETDEWEB)

    Curtiss, J.A.; Indusi, J.P.

    1995-08-01

    The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites.

  6. Enhanced Sleep Mode MAC Control for EPON

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    This paper introduces sleep mode operations for EPON. New MAC control functions are proposed to schedule sleep periods. Traffic profiles are considered to optimize energy efficiency and network performances. Simulation results are analyzed in OPNET modeler.......This paper introduces sleep mode operations for EPON. New MAC control functions are proposed to schedule sleep periods. Traffic profiles are considered to optimize energy efficiency and network performances. Simulation results are analyzed in OPNET modeler....

  7. AeroMACS System Characterization and Demonstrations

    Science.gov (United States)

    Kerczewski, Robert J.; Apaza, Rafael D.; Dimond, Robert P.

    2013-01-01

    The Aeronautical Mobile Airport Communications System (AeroMACS) is being developed to provide a new broadband wireless communications capability for safety critical communications in the airport surface domain, providing connectivity to aircraft and other ground vehicles as well as connections between other critical airport fixed assets. AeroMACS development has progressed from requirements definition through technology definition, prototype deployment and testing, and now into national and international standards development. The first prototype AeroMACS system has been deployed at the Cleveland Hopkins International Airport (CLE) and the adjacent NASA Glenn Research Center (GRC). During the past three years, extensive technical testing has taken place to characterize the performance of the AeroMACS prototype and provide technical support for the standards development process. The testing has characterized AeroMACS link and network performance over a variety of conditions for both fixed and mobile data transmission and has included basic system performance testing and fixed and mobile applications testing. This paper provides a summary of the AeroMACS performance testing and the status of standardization activities that the testing supports.

  8. Pengaruh Window Level Dan Window Width Pada Lung Window Dan Mediastinum Window Pada Kualitas Citra CT-Scan Thorax

    OpenAIRE

    Gaol, Syahnaro Lumban

    2015-01-01

    This Research of image CT-SCAN thorax with influence of window level and window width, to obtain, get value of window level and optimal window width lung window and mediastinum window, so that get image of CT-SCAN thorax which with image quality. Image of CT-SCAN thorax obtained for mediastinum window use window width 350, 400, 450, 500 HU. And Window level 50,100,150 HU. While for lung window use window width 1000,1100 HU. The window level - 500-,600,-700,-800,-900,-1000 HU, by three observe...

  9. Windows® Internals

    CERN Document Server

    Russinovich, Mark E; Ionescu, Alex

    2009-01-01

    See how the core components of the Windows operating system work behind the scenes-guided by a team of internationally renowned internals experts. Fully updated for Windows Server 2008 and Windows Vista, this classic guide delivers key architectural insights on system design, debugging, performance, and support-along with hands-on experiments to experience Windows internal behavior firsthand.Delve inside Windows architecture and internals:Understand how the core system and management mechanisms work-from the object manager to services to the registryExplore internal system data structures usin

  10. Advanced energy efficient windows

    DEFF Research Database (Denmark)

    Thomsen, Kirsten Engelund

    2007-01-01

    energy savings. In terms of energy, windows occupy a special position compared with other thermal envelope structures due to their many functions: 1) windows let daylight into the building and provide occupants with visual contact with their surroundings 2) windows protect against the outdoor climate 3......) windows transmit solar energy that may contribute to a reduction of energy consumption, but which may also lead to unpleasant overheating. In the following paragraphs the current use of windows is reviewed with an emphasis on energy, while special products like solar protection glazing and security......Windows should be paid special attention as they contribute a significant part of the total heat-loss coefficient of the building. Contrary to other parts of the thermal envelope the windows are not only heat loosers, but may gain heat in the day-time. Therefore there are possibilities for large...

  11. Professional Windows Embedded Compact 7

    CERN Document Server

    Phung, Samuel; Joubert, Thierry; Hall, Mike

    2011-01-01

    Learn to program an array of customized devices and solutions As a compact, highly efficient, scalable operating system, Windows Embedded Compact 7 (WEC7) is one of the best options for developing a new generation of network-enabled, media-rich, and service-oriented devices. This in-depth resource takes you through the benefits and capabilities of WEC7 so that you can start using this performance development platform today. Divided into several major sections, the book begins with an introduction and then moves on to coverage of OS design, application development, advanced application developm

  12. High Power Coax Window

    International Nuclear Information System (INIS)

    Neubauer, M.L.; Dudas, A.; Sah, R.; Elliott, T.S.; Rimmer, R.A.; Stirbet, M.

    2010-01-01

    A superconducting RF (SRF) power coupler capable of handling 500 kW CW RF power is required for present and future storage rings and linacs. There are over 35 coupler designs for SRF cavities ranging in frequency from 325 to 1500 MHz. Coupler windows vary from cylinders to cones to disks, and RF power couplers are limited by the ability of ceramic windows to withstand the stresses due to heating and mechanical flexure. We propose a novel robust co-axial SRF coupler design which uses compressed window technology. This technology will allow the use of highly thermally conductive materials for cryogenic windows. Using compressed window techniques on disk co-axial windows will make significant improvements in the power handling of SRF couplers. We present the bench test results of two window assemblies back to back, as well as individual window VSWR in EIA3.125 coax. A vacuum test assembly was made and the windows baked out at 155C. The processes used to build windows is scalable to larger diameter coax and to higher power levels.

  13. Teach yourself visually OS X Mountain Lion

    CERN Document Server

    McFedries, Paul

    2012-01-01

    Get to know the new cat in the pride-Mac OS X Mountain Lion-with this VISUAL guide Apple's new Mac OS X Mountain Lion is impressive, with features and functions that will be familiar to Mac users from their iPhones and iPads. Make sure you get the most out of your new big cat with this practical guide. Using step-by-step instructions and full-color screenshots or illustrations on virtually every page-the hallmark of the practical Teach Yourself VISUALLY series-this book clearly shows you how to accomplish tasks, rather than burying you with paragraphs of text. You'll learn how to customize

  14. MacBook Pro Portable Genius

    CERN Document Server

    Miser, Brad

    2011-01-01

    Tips and techniques for forward-thinking MacBook Pro users Now that you have a MacBook Pro, you need just one more accessory, your very own copy of MacBook Pro Portable Genius, Third Edition. This handy, compact book lets you in on a wealth of tips and tricks, so you get the very most out of Apple's very popular notebook. Discover the latest on the most recent release of iLife, get the skinny on the new Intel Core i7 and i5 processors in the Pro, see how to go wireless in a smart way, and much more. The book is easy to navigate, doesn't skimp on the essentials, and helps you save time and avoi

  15. MacSelfService online tutorial

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Mac Self-Service is a functionality within the Mac Desktop Service built and maintained to empower CERN users by giving them easy access to applications and configurations through the Self-Service application. This tutorial (text attached to the event page) explains how to install Mac Self-Service and how to use it to install applications and printers. Content owner: Vincent Nicolas Bippus Presenter: Pedro Augusto de Freitas Batista Tell us what you think via e-learning.support at cern.ch More tutorials in the e-learning collection of the CERN Document Server (CDS) https://cds.cern.ch/collection/E-learning%20modules?ln=en All info about the CERN rapid e-learning project is linked from http://twiki.cern.ch/ELearning  

  16. Programming Windows Azure

    CERN Document Server

    Krishnan, Sriram

    2010-01-01

    Learn the nuts and bolts of cloud computing with Windows Azure, Microsoft's new Internet services platform. Written by a key member of the product development team, this book shows you how to build, deploy, host, and manage applications using Windows Azure's programming model and essential storage services. Chapters in Programming Windows Azure are organized to reflect the platform's buffet of services. The book's first half focuses on how to write and host application code on Windows Azure, while the second half explains all of the options you have for storing and accessing data on the plat

  17. Windows Powershell Pocket Reference

    CERN Document Server

    Holmes, Lee

    2009-01-01

    This portable reference to Windows PowerShell summarizes both the command shell and scripting language, and provides a concise reference to the major tasks that make PowerShell so successful. Written by Microsoft PowerShell team member Lee Holmes, and excerpted from his Windows PowerShell Cookbook, Windows PowerShell Pocket Reference offers up-to-date coverage of PowerShell's 1.0 release. It's an ideal on-the-job tool for Windows administrators who don't have time to plow through huge books or search online.

  18. Beginning Windows 8

    CERN Document Server

    Halsey, Mike

    2012-01-01

    Windows 8 has been described by Microsoft as its 'boldest' Windows release ever. Beginning Windows 8 takes you through the new features and helps you get more out of the familiar to reveal the possibilities for this amazing new operating system. You will learn, with non-technical language used throughout, how to get up and running in the new Windows interface, minimize downtime, maximize productivity, and harness the features you never knew existed to take control of your computer and enjoy the peace of mind and excitement that comes with it. From tips and tweaks to easy-to-follow guides and d

  19. Mastering Windows 7 Deployment

    CERN Document Server

    Finn, Aidan; van Surksum, Kenneth

    2011-01-01

    Get professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system admi

  20. A MAC Mode for Lightweight Block Ciphers

    DEFF Research Database (Denmark)

    Luykx, Atul; Preneel, Bart; Tischhauser, Elmar Wolfgang

    2016-01-01

    Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits. Such low block sizes lead...... no effect on the security bound, allowing an order of magnitude more data to be processed per key. Furthermore, LightMAC is incredibly simple, has almost no overhead over the block cipher, and is parallelizable. As a result, LightMAC not only offers compact authentication for resource-constrained platforms...

  1. Efficient Windows Collaborative

    Energy Technology Data Exchange (ETDEWEB)

    Nils Petermann

    2010-02-28

    The project goals covered both the residential and commercial windows markets and involved a range of audiences such as window manufacturers, builders, homeowners, design professionals, utilities, and public agencies. Essential goals included: (1) Creation of 'Master Toolkits' of information that integrate diverse tools, rating systems, and incentive programs, customized for key audiences such as window manufacturers, design professionals, and utility programs. (2) Delivery of education and outreach programs to multiple audiences through conference presentations, publication of articles for builders and other industry professionals, and targeted dissemination of efficient window curricula to professionals and students. (3) Design and implementation of mechanisms to encourage and track sales of more efficient products through the existing Window Products Database as an incentive for manufacturers to improve products and participate in programs such as NFRC and ENERGY STAR. (4) Development of utility incentive programs to promote more efficient residential and commercial windows. Partnership with regional and local entities on the development of programs and customized information to move the market toward the highest performing products. An overarching project goal was to ensure that different audiences adopt and use the developed information, design and promotion tools and thus increase the market penetration of energy efficient fenestration products. In particular, a crucial success criterion was to move gas and electric utilities to increase the promotion of energy efficient windows through demand side management programs as an important step toward increasing the market share of energy efficient windows.

  2. The windows method

    DEFF Research Database (Denmark)

    Neighbour, Roger; Larsen, Jan-Helge

    2017-01-01

    through in sequence, each one opening a different viewpoint or window on the case. To experienced tutors, the windows method’s prescriptive structure may at first seem somewhat rigid. However, for learners with less experience of reflection and self-disclosure, it provides the security necessary...

  3. Color Wheel Windows

    Science.gov (United States)

    Leonard, Stephanie

    2012-01-01

    In this article, the author describes a painting and drawing lesson which was inspired by the beautiful circular windows found in cathedrals and churches (also known as "rose windows"). This two-week lesson would reinforce both the concept of symmetry and students' understanding of the color wheel. (Contains 1 online resource.)

  4. The Luminaire Window

    DEFF Research Database (Denmark)

    Hansen, Ellen Kathrine; Horóczi, Eszter

    2017-01-01

    integrated into the window. A qualitative experiment is carried out by integrating controllable LED in the frame of a façade window in a full-scale mock-up. It is examined how this set-up can support the colour spectrum and intensity of the daylight intake during the transmission time from daylight...

  5. Air transparent soundproof window

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sang-Hoon, E-mail: shkim@mmu.ac.kr [Division of Marine Engineering, Mokpo National Maritime University, Mokpo 530-729, R. O. Korea (Korea, Republic of); Lee, Seong-Hyun [Korea Institute of Machinery and Materials, Yuseong-Gu, Daejeon 305-343, R. O. Korea (Korea, Republic of)

    2014-11-15

    A soundproof window or wall which is transparent to airflow is presented. The design is based on two wave theories: the theory of diffraction and the theory of acoustic metamaterials. It consists of a three-dimensional array of strong diffraction-type resonators with many holes centered on each individual resonator. The negative effective bulk modulus of the resonators produces evanescent wave, and at the same time the air holes with subwavelength diameter existed on the surfaces of the window for macroscopic air ventilation. The acoustic performance levels of two soundproof windows with air holes of 20mm and 50mm diameters were measured. The sound level was reduced by about 30 - 35dB in the frequency range of 400 - 5,000Hz with the 20mm window, and by about 20 - 35dB in the frequency range of 700 - 2,200Hz with the 50mm window. Multi stop-band was created by the multi-layers of the window. The attenuation length or the thickness of the window was limited by background noise. The effectiveness of the soundproof window with airflow was demonstrated by a real installation.

  6. Air transparent soundproof window

    Directory of Open Access Journals (Sweden)

    Sang-Hoon Kim

    2014-11-01

    Full Text Available A soundproof window or wall which is transparent to airflow is presented. The design is based on two wave theories: the theory of diffraction and the theory of acoustic metamaterials. It consists of a three-dimensional array of strong diffraction-type resonators with many holes centered on each individual resonator. The negative effective bulk modulus of the resonators produces evanescent wave, and at the same time the air holes with subwavelength diameter existed on the surfaces of the window for macroscopic air ventilation. The acoustic performance levels of two soundproof windows with air holes of 20mm and 50mm diameters were measured. The sound level was reduced by about 30 - 35dB in the frequency range of 400 - 5,000Hz with the 20mm window, and by about 20 - 35dB in the frequency range of 700 - 2,200Hz with the 50mm window. Multi stop-band was created by the multi-layers of the window. The attenuation length or the thickness of the window was limited by background noise. The effectiveness of the soundproof window with airflow was demonstrated by a real installation.

  7. Visual merchandising window display

    Directory of Open Access Journals (Sweden)

    Opris (Cas. Stanila M.

    2013-12-01

    Full Text Available Window display plays a major part in the selling strategies; it does not only include the simple display of goods, nowadays it is a form of art, also having the purpose of sustaining the brand image. This article wants to reveal the tools that are essential in creating a fabulous window display. Being a window designer is not an easy job, you have to always think ahead trends, to have a sense of colour, to know how to use light to attract customers in the store after only one glance at the window. The big store window displays are theatre scenes: with expensive backgrounds, special effects and high fashion mannequins. The final role of the displays is to convince customers to enter the store and trigger the purchasing act which is the final goal of the retail activity.

  8. Teach yourself visually OS X Mavericks

    CERN Document Server

    McFedries, Paul

    2013-01-01

    Clear, step-by-step instruction guides you through OS X Mavericks If you want to get quickly up to speed on the newest (and now cat-free) OS X operating system, OS X Mavericks, this easy-to-follow book is just the ticket. Designed for visual learners, Teach Yourself VISUALLY OS X Mavericks uses rich, full-color screenshots and illustrations to show rather than tell you how to use Mavericks. You'll learn how to customize your Mac, enjoy digital media, connect common peripherals, and get the most out of the very latest enhancements, including iBooks, Maps, iCloud, and Calendar. Shows you how t

  9. MacIntyre, Managerialism and Universities

    Science.gov (United States)

    Stolz, Steven A.

    2017-01-01

    MacIntyre's earlier work and concern with social science enquiry not only exposes its limits, but also provides an insight into how its knowledge claims have been put to ideological use. He maintains that the institutional embodiment of these ideological ideas is the bureaucratic manager who has had a negative role to play in social structures…

  10. Lifetime tests for MAC vertex chamber

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, H.N.

    1986-07-01

    A vertex chamber for MAC was proposed to increase precision in the measurement of the B hadron and tau lepton lifetimes. Thin-walled aluminized mylar drift tubes were used for detector elements. A study of radiation hardness was conducted under the conditions of the proposed design using different gases and different operating conditions. (LEW)

  11. Objective-C for Absolute Beginners iPhone and Mac Programming Made Easy

    CERN Document Server

    Bennett, Gary; Fisher, Mitchell

    2010-01-01

    It seems as if everyone is writing applications for Apple's iPhone and iPad, but how do they all do it? It's best to learn Objective-C, the native language of both the iOS and Mac OS X, but where to begin? Right here, even if you've never programmed before! Objective-C for Absolute Beginners will teach you how to write software for your Mac, iPhone,or iPad using Objective-C, an elegant and powerful language with a rich set of developer tools. Using a hands-on approach, you'll learn to think in programming terms, how to use Objective-C to build program logic, and how to write your own applicati

  12. MACS as a tool for international inspections

    International Nuclear Information System (INIS)

    Curtiss, J.A.; Indusi, J.P.

    1995-01-01

    General acceptance of the challenge provision in the Chemical Weapons Convention has the potential for influence in other arms control areas. While most applications of the challenge inspection may be straightforward, there may be instances where access to the site by inspectors may be problematic. The MACS system described in this paper was developed to respond to these situations. Inspection and verification may be difficult when a host is unwilling,for valid reasons, to permit physical access to a site. We proposed a system of remote sensors which may be used to demonstrate compliance with Chemical Weapons Convention (CWC) challenge inspections even ff the inspector is physically excluded from a sensitive site. The system is based upon alternative-means-of-access provisions of the CWC. The Defense Nuclear Agency (DNA) funded design and construction of a system prototype, designated as MACS for Managed Access by Controlled Sensing. Features of the MACS design allow growth of the prototype into a versatile device for international monitoring of production facilities and other sites. MACS consists of instrumentation and communication equipment allowing site personnel to conduct a facility tour and perform acceptable measurements, while physically excluding the inspector from the facility. MACS consists of a base station used by the inspector, and a mobile unit used within the facility and manipulated by the facility staff. The base station and the mobile unit are at sign ed by a communication system, currently realized as a fiber optic cable. The mobile unit is equipped with television cameras and remote-reading distance-measuring equipment (DME) for use in verifying locations and dimensions. Global Positioning System receivers on the mobile unit provide both precise location and dead reckoning, suitable for tracking the mobile unit's position while within a building when satellite signals are not available

  13. Mammalian Synthetic Biology: Time for Big MACs.

    Science.gov (United States)

    Martella, Andrea; Pollard, Steven M; Dai, Junbiao; Cai, Yizhi

    2016-10-21

    The enabling technologies of synthetic biology are opening up new opportunities for engineering and enhancement of mammalian cells. This will stimulate diverse applications in many life science sectors such as regenerative medicine, development of biosensing cell lines, therapeutic protein production, and generation of new synthetic genetic regulatory circuits. Harnessing the full potential of these new engineering-based approaches requires the design and assembly of large DNA constructs-potentially up to chromosome scale-and the effective delivery of these large DNA payloads to the host cell. Random integration of large transgenes, encoding therapeutic proteins or genetic circuits into host chromosomes, has several drawbacks such as risks of insertional mutagenesis, lack of control over transgene copy-number and position-specific effects; these can compromise the intended functioning of genetic circuits. The development of a system orthogonal to the endogenous genome is therefore beneficial. Mammalian artificial chromosomes (MACs) are functional, add-on chromosomal elements, which behave as normal chromosomes-being replicating and portioned to daughter cells at each cell division. They are deployed as useful gene expression vectors as they remain independent from the host genome. MACs are maintained as a single-copy and can accommodate multiple gene expression cassettes of, in theory, unlimited DNA size (MACs up to 10 megabases have been constructed). MACs therefore enabled control over ectopic gene expression and represent an excellent platform to rapidly prototype and characterize novel synthetic gene circuits without recourse to engineering the host genome. This review describes the obstacles synthetic biologists face when working with mammalian systems and how the development of improved MACs can overcome these-particularly given the spectacular advances in DNA synthesis and assembly that are fuelling this research area.

  14. Selecting windows for energy efficiency

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-05-01

    New window technologies have increased energy benefits and comfort, and have provided more practical options for consumers. This selection guide will help homeowners, architects, and builders take advantage of the expanding window market. The guide contains three sections: an explanation of energy-related window characteristics, a discussion of window energy performance ratings, and a convenient checklist for window selection.

  15. GA microwave window development

    International Nuclear Information System (INIS)

    Moeller, C.P.; Kasugai, A.; Sakamoto, K.; Takahashi, K.

    1994-10-01

    The GA prototype distributed window was tested in a 32 mm diam. waveguide system at a power density suitable for a MW gyrotron, using the JAERI/Toshiba 110 GHz long pulse internal converter gyrotron in the JAERI test stand. The presence of the untilted distributed window had no adverse effect on the gyrotron operation. A pulse length of 10 times the calculated thermal equilibrium time (1/e time) of 30 msec was reached, and the window passed at least 750 pulses greater than 30 msec and 343 pulses greater than 60 msec. Beyond 100 msec, the window calorimetry reached steady state, allowing the window dissipation to be measured in a single pulse. The measured loss of 4.0% agrees both with the estimated loss, on which the stress calculations are based, and with the attenuation measured at low power in the HE 11 mode. After the end of the tests, the window was examined; no evidence of arcing air coating was found in the part of the window directly illuminated by the microwaves, although there was discoloration in a recess containing an optical diagnostic which outgassed, causing a local discharge to occur in that recess. Finally, there was no failure of the metal-sapphire joints during a total operating time of 50 seconds consisting of pulses longer than 30 msec

  16. An Energy-efficient Rate Adaptive Media Access Protocol (RA-MAC for Long-lived Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wen Hu

    2010-06-01

    Full Text Available We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC algorithm for long-lived Wireless Sensor Networks (WSNs. Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application’s link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment.

  17. The Efficient Windows Collaborative

    Energy Technology Data Exchange (ETDEWEB)

    Petermann, Nils

    2006-03-31

    The Efficient Windows Collaborative (EWC) is a coalition of manufacturers, component suppliers, government agencies, research institutions, and others who partner to expand the market for energy efficient window products. Funded through a cooperative agreement with the U.S. Department of Energy, the EWC provides education, communication and outreach in order to transform the residential window market to 70% energy efficient products by 2005. Implementation of the EWC is managed by the Alliance to Save Energy, with support from the University of Minnesota and Lawrence Berkeley National Laboratory.

  18. Windows 8 simplified

    CERN Document Server

    McFedries, Paul

    2012-01-01

    The easiest way for visual learners to get started with Windows 8 The popular Simplified series makes visual learning easier than ever, and with more than 360,000 copies sold, previous Windows editions are among the bestselling Visual books. This guide goes straight to the point with easy-to-follow, two-page tutorials for each task. With full-color screen shots and step-by-step directions, it gets beginners up and running on the newest version of Windows right away. Learn to work with the new interface and improved Internet Explorer, manage files, share your computer, and much more. Perfect fo

  19. Windows 95 Beslutningsguide

    DEFF Research Database (Denmark)

    Sørensen, Jens Otto

    1996-01-01

    Mange virksomheder der bruger pc'er står netop nu over for valget: Skal vi fortsætte med DOS/Windows 3.x som operativsystem, eller skal vi skifte til efterfølgeren Windows 95? Skal vi/kan vi skifte successivt, eller skal det være en "alt eller intet beslutning". Hvornår er det rigtige tidspunkt...... at skifte? Denne artikel vil forsøge at give en baggrundsviden om Windows 95, der kan hjælpe virksomhederne igennem denne beslutningsfase....

  20. Windows 7 resource kit

    CERN Document Server

    Northrup, Tony; Honeycutt, Jerry; Wilson, Ed

    2009-01-01

    In-depth and comprehensive, this RESOURCE KIT delivers the information you need to administer your Windows 7 system. You get authoritative technical guidance from those who know the technology best-Microsoft Most Valuable Professionals (MVPs) and the Windows 7 product team-along with essential scripts and resources. In addition, "Direct from the Source" sidebars offer deep insights and troubleshooting tips from the Windows 7 team. Get expert guidance on how to: Use Microsoft Deployment Toolkit best practices and tools. Plan user-state migration and test application compatibility.

  1. The periplasmic membrane proximal domain of MacA acts as a switch in stimulation of ATP hydrolysis by MacB transporter.

    Science.gov (United States)

    Modali, Sita D; Zgurskaya, Helen I

    2011-08-01

    Escherichia coli MacAB-TolC is a tripartite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation of MacB ATPase activity. Binding of MacA to MacB stabilizes the ATP-bound conformation of MacB, whereas interactions with both MacB and TolC affect the conformation of MacA. A single G353A substitution in the C-terminus of MacA inactivates MacAB-TolC function by changing the conformation of the membrane proximal domain of MacA and disrupting the proper assembly of the MacA-MacB complex. We propose that MacA acts in transport by promoting MacB transition into the closed ATP-bound conformation and in this respect, is similar to the periplasmic solute-binding proteins. © 2011 Blackwell Publishing Ltd.

  2. Windows 10 Technical Preview

    OpenAIRE

    Jyväsjärvi, Teppo

    2015-01-01

    Tässä opinnäytetyössä tutustaan uuden kesällä 2015 virallisesti julkaistavan Windows 10 -käyttöjärjestelmän Technical Preview -kehitysversioon. Ensimmäinen Technical Preview -versio julkaistiin syksyllä 2014. Opinnäytetyössä tutustaan Windows 10:n uusin ominaisuuksiin ja tehdään vertailua aiemman Windows 8.1 -version kanssa. Työssä Windows 10 Technical Preview asennetaan virtuaalikoneelle, käydään läpi asennuksen eri vaiheet sekä suurimmat muutokset käyttöliittymässä ja sovelluksissa. Op...

  3. SAF for Windows

    DEFF Research Database (Denmark)

    Hansen, Timme

    2001-01-01

    SAF for Windows er et computerprogram til parametrisk konstruktion af translationsskaller. Skaloverfladernes tredimensionelle, facetterede form fremkommer ved en kombination af to todimensionelle formbestemmende kurver, som kan vælges og redigeres af brugeren. Programmet kan udfolde de genererede...

  4. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  5. Delineating the conformal window

    DEFF Research Database (Denmark)

    Frandsen, Mads Toudal; Pickup, Thomas; Teper, Michael

    2011-01-01

    We identify and characterise the conformal window in gauge theories relevant for beyond the standard model building, e.g. Technicolour, using the criteria of metric confinement and causal analytic couplings, which are known to be consistent with the phase diagram of supersymmetric QCD from Seiberg...... duality. Using these criteria we find perturbation theory to be consistent throughout the predicted conformal window for several of these gauge theories and we discuss recent lattice results in the light of our findings....

  6. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  7. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  8. High Performance Window Retrofit

    Energy Technology Data Exchange (ETDEWEB)

    Shrestha, Som S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hun, Diana E. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Desjarlais, Andre Omer [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2013-12-01

    The US Department of Energy (DOE) Office of Energy Efficiency and Renewable Energy (EERE) and Traco partnered to develop high-performance windows for commercial building that are cost-effective. The main performance requirement for these windows was that they needed to have an R-value of at least 5 ft2∙ F∙h/Btu. This project seeks to quantify the potential energy savings from installing these windows in commercial buildings that are at least 20 years old. To this end, we are conducting evaluations at a two-story test facility that is representative of a commercial building from the 1980s, and are gathering measurements on the performance of its windows before and after double-pane, clear-glazed units are upgraded with R5 windows. Additionally, we will use these data to calibrate EnergyPlus models that we will allow us to extrapolate results to other climates. Findings from this project will provide empirical data on the benefits from high-performance windows, which will help promote their adoption in new and existing commercial buildings. This report describes the experimental setup, and includes some of the field and simulation results.

  9. MacBook All-in-One For Dummies

    CERN Document Server

    Chambers, Mark L

    2011-01-01

    Get comfortable and confident with your MacBook! Combining the fun-but-straightforward content of nine minibooks, this new edition of MacBook All-in-One For Dummies delivers helpful coverage of the rich features and essential tools you need to know to use the MacBook to its fullest potential. You'll learn an array of MacBook basics while veteran author Mark Chambers walks you through setting up your MacBook, running programs, finding files with Finder, searching with Spotlight, keeping track with Address Book, enjoying music with iTunes, creating cool multimedia projects with iLife, and more.

  10. Thin Film & Deposition Systems (Windows)

    Data.gov (United States)

    Federal Laboratory Consortium — Coating Lab: Contains chambers for growing thin film window coatings. Plasma Applications Coating Lab: Contains chambers for growing thin film window coatings. Solar...

  11. Improved b lifetime measurement from MAC

    International Nuclear Information System (INIS)

    Ford, W.T.

    1984-03-01

    Two recent publications, from the MAC and Mark II collaborations, have reported the somewhat surprising result that the lifetime of particles made up of b quarks is in the 1 to 2 picosecond range, or somewhat longer than the lifetimes of charm particles. Although the charm decays are favored transitions while those of b particles depend upon off-diagonal elements of the weak flavor mixing matrix, the smallness of the b decay rates in face of the large available phase space indicates that the off-diagonal elements are indeed very small. The possibility for complete determination of the mixing matrix was brought significantly nearer by the availability of the lifetime information; what is needed now is to reduce the uncertainty of the measurements, which was about 33% for both experiments. We describe here an extension of the b lifetime study with the MAC detector, incorporating some new data and improvements in the analysis. 12 references

  12. Wound Healing in Mac-1 Deficient Mice

    Science.gov (United States)

    2017-05-01

    significant difference was seen between Mac-1 -/- and WT over the time course of wound healing for these three cytokines (Fig. 3, C, D & E). IL-6 was...approximately 90% collagen I (red-orange) and 10% collagen III (green) (Fig. 5C& D ). By day 7 after wound placement, collagen III was predominant in...counts, increased immunoglobulin levels, a severe defect in T cell proliferation, lymphadenopathy, splenomegaly, and abundant plasma cells in skin

  13. Visualization of integrin Mac-1 in vivo.

    Science.gov (United States)

    Lim, Kihong; Hyun, Young-Min; Lambert-Emo, Kris; Topham, David J; Kim, Minsoo

    2015-11-01

    β2 integrins play critical roles in migration of immune cells and in the interaction with other cells, pathogens, and the extracellular matrix. Among the β2 integrins, Mac-1 (Macrophage antigen-1), composed of CD11b and CD18, is mainly expressed in innate immune cells and plays a major role in cell migration and trafficking. In order to image Mac-1-expressing cells both in live cells and mouse, we generated a knock-in (KI) mouse strain expressing CD11b conjugated with monomeric yellow fluorescent protein (mYFP). Expression of CD11b-mYFP protein was confirmed by Western blot and silver staining of CD11b-immunoprecipitates and total cell lysates from the mouse splenocytes. Mac-1-mediated functions of the KI neutrophils were comparable with those in WT cells. The fluorescence intensity of CD11b-mYFP was sufficient to image CD11b expressing cells in live mice using intravital two-photon microscopy. In vitro, dynamic changes in the intracellular localization of CD11b molecules could be measured by epifluorescent microscopy. Finally, CD11b-expressing immune cells from tissue were easily detected by flow cytometry without anti-CD11b antibody staining. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. Fpga As A Part Of Ms Windows Control Environment

    Directory of Open Access Journals (Sweden)

    Krzysztof Kołek

    2007-01-01

    Full Text Available The attention is focused on the Windows operating system (OS used as a control and measurementenvironment. Windows OS due to extensions becomes a real-time OS (RTOS.Benefits and drawbacks of typical software extensions are compared. As far as hardwaresolutions are concerned the field programmable gate arrays FPGA technology is proposed toensure fast time-critical operations. FPGA-based parallel execution and hardware implementationof the data processing algorithms significantly outperform the classical microprocessoroperating modes. Suitability of the RTOS for a particular application and FPGA hardwaremaintenance is studied.

  15. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  16. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia; Tan, Guozhen; Yu, Chao

    2017-10-09

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  17. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Caixia Song

    2017-10-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  18. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  19. Window modelling in Syrthes

    Energy Technology Data Exchange (ETDEWEB)

    Manias, V.; Peniguel, C. [Electricite de France, 78 - Chatou (France); Rupp, I. [Simulog, N3S, Estet, Simail, 78 - Saint Quentin en Yvelyne (France)

    1997-12-31

    Developments to take into account windows from a thermal point of view have been implemented in SYRTHES. Windows are discretized along their lateral surfaces in several independent patches. Then a one-dimensional analytical model solves the semi-transparent radiation and conduction problem occurring across the window for each patch. The spectral dependence of the absorption coefficient (`non grey` medium) is taken into account through a multi-band model. This window model is coupled with the conduction and radiation capabilities already existing in SYRTHES. When convection is taking place, it is handled by ESTET. This development will be applied to an infra-red system designed to dry paper. The simplified test case presented here consists very schematically in two cavities separated by a window (vitro-ceramic). The top cavity contains a very hot tungsten wire (the infrared source) surrounded by a tube made of quartz. The bottom cavity is where the fast moving sheet of paper will be located. Of Course the real geometry is much more complex. (authors)

  20. Adaptive Liquid Crystal Windows

    Energy Technology Data Exchange (ETDEWEB)

    Taheri, Bahman; Bodnar, Volodymyr

    2011-12-31

    Energy consumption by private and commercial sectors in the U.S. has steadily grown over the last decade. The uncertainty in future availability of imported oil, on which the energy consumption relies strongly, resulted in a dramatic increase in the cost of energy. About 20% of this consumption are used to heat and cool houses and commercial buildings. To reduce dependence on the foreign oil and cut down emission of greenhouse gases, it is necessary to eliminate losses and reduce total energy consumption by buildings. To achieve this goal it is necessary to redefine the role of the conventional windows. At a minimum, windows should stop being a source for energy loss. Ideally, windows should become a source of energy, providing net gain to reduce energy used to heat and cool homes. It is possible to have a net energy gain from a window if its light transmission can be dynamically altered, ideally electronically without the need of operator assistance, providing optimal control of the solar gain that varies with season and climate in the U.S. In addition, the window must not require power from the building for operation. Resolution of this problem is a societal challenge and of national interest and will have a broad global impact. For this purpose, the year-round, allclimate window solution to provide an electronically variable solar heat gain coefficient (SHGC) with a wide dynamic range is needed. AlphaMicron, Inc. (AMI) developed and manufactured 1ft × 1ft prototype panels for the world’s first auto-adjusting Adaptive Liquid Crystal Windows (ALCWs) that can operate from sunlight without the need for external power source and demonstrate an electronically adjustable SHGC. This novel windows are based on AlphaMicron’s patented e-Tint® technology, a guesthost liquid crystal system implemented on flexible, optically clear plastic films. This technology is suitable both for OEM and aftermarket (retro-fitting) lamination to new and existing windows. Low level of

  1. Occupants' window opening behaviour

    DEFF Research Database (Denmark)

    Fabi, Valentina; Andersen, Rune Korsholm; Corgnati, Stefano

    2012-01-01

    systems is proposed, based on studies presented in literature and a general process leading to the effects on energy consumptions is identified.Existing studies on the topic of window opening behaviour are highlighted and a theoretical framework to deal with occupants' interactions with building controls......, aimed at improving or maintaining the preferred indoor environmental conditions, is elaborated. This approach is used to look into the drivers for the actions taken by the occupants (windows opening and closing) and to investigate the existing models in literature of these actions for both residential...... and office buildings. The analysis of the literature highlights how a shared approach on identifying the driving forces for occupants' window opening and closing behaviour has not yet been reached. However, the reporting of variables found not to be drivers may reveal contradictions in the obtained results...

  2. Detection of Spoofed MAC Addresses in 802.11 Wireless Networks

    Science.gov (United States)

    Tao, Kai; Li, Jing; Sampalli, Srinivas

    Medium Access Control (MAC) address spoofing is considered as an important first step in a hacker's attempt to launch a variety of attacks on 802.11 wireless networks. Unfortunately, MAC address spoofing is hard to detect. Most current spoofing detection systems mainly use the sequence number (SN) tracking technique, which has drawbacks. Firstly, it may lead to an increase in the number of false positives. Secondly, such techniques cannot be used in systems with wireless cards that do not follow standard 802.11 sequence number patterns. Thirdly, attackers can forge sequence numbers, thereby causing the attacks to go undetected. We present a new architecture called WISE GUARD (Wireless Security Guard) for detection of MAC address spoofing on 802.11 wireless LANs. It integrates three detection techniques - SN tracking, Operating System (OS) fingerprinting & tracking and Received Signal Strength (RSS) fingerprinting & tracking. It also includes the fingerprinting of Access Point (AP) parameters as an extension to the OS fingerprinting for detection of AP address spoofing. We have implemented WISE GUARD on a test bed using off-the-shelf wireless devices and open source drivers. Experimental results show that the new design enhances the detection effectiveness and reduces the number of false positives in comparison with current approaches.

  3. Windows 8.1 bible

    CERN Document Server

    Boyce, Jim; Tidrow, Rob

    2014-01-01

    Windows 8.1 coverage that goes above and beyond all competitors? Serving as an evolutionary update to Windows 8, Windows 8.1 provides critical changes to parts of Windows 8, such as greater customization of the interface and boot operations, return of a 'start button' that reveals apps, greater integration between the two interfaces, and updates to apps. Weighing in at nearly 1000 pages, Windows 8.1 Bible provides deeper Windows insight than any other book on the market. It's valuable for both professionals needing a guide to the nooks and crannies of Windows and regular users wanting a wide

  4. Windows Deployment Services : Esiasennuspalvelin

    OpenAIRE

    Ahonen, Arto

    2010-01-01

    Opinnäytetyöni aiheena on Windows Deployment Services, jonka tarkoituksena on toimia esiasennus-palvelimena Windows-käyttöjärjestelmien levykuvien jakamiseen sekä asentamiseen. Opinnäytetyö to-teutettiin yhteistyössä Concept.10 IT:n ja tuotannon kanssa. Concept.10:n tuotannon lähtökohtana on valmistaa ja asentaa Suomen markkinoille tietokonelaitteistoja ohjelmistoineen ja tukipalveluineen. Tuo-tantoon olennaisena osana kuuluu esiasennuspalvelin, jolla voidaan asentaa useita tietokoneita samaa...

  5. Microsoft Windows networking essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

  6. Windows Azure Platform

    CERN Document Server

    Redkar, Tejaswi

    2010-01-01

    The Azure Services Platform is a brand-new cloud-computing technology from Microsoft. It is composed of four core components-Windows Azure, .NET Services, SQL Services, and Live Services-each with a unique role in the functioning of your cloud service. It is the goal of this book to show you how to use these components, both separately and together, to build flawless cloud services. At its heart Windows Azure Platform is a down-to-earth, code-centric book. This book aims to show you precisely how the components are employed and to demonstrate the techniques and best practices you need to know

  7. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  8. Superiority of CT imaging reconstruction on Linux OS

    International Nuclear Information System (INIS)

    Lin Shaochun; Yan Xufeng; Wu Tengfang; Luo Xiaomei; Cai Huasong

    2010-01-01

    Objective: To compare the speed of CT reconstruction using the Linux and Windows OS. Methods: Shepp-Logan head phantom in different pixel size was projected to obtain the sinogram by using the inverse Fourier transformation, filtered back projection and Radon transformation on both Linux and Windows OS. Results: CT image reconstruction using the Linux operating system was significantly better and more efficient than Windows. Conclusion: CT image reconstruction using the Linux operating system is more efficient. (authors)

  9. Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols

  10. The periplasmic membrane proximal domain of MacA acts as a switch in stimulation of ATP hydrolysis by MacB transporter

    OpenAIRE

    Modali, Sita D.; Zgurskaya, Helen I.

    2011-01-01

    Escherichia coli MacAB-TolC is a tri-partite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation o...

  11. "Stained Glass" Landscape Windows

    Science.gov (United States)

    Vannata, Janine

    2008-01-01

    Both adults and children alike marvel at the grand vivid stained-glass windows created by American artist Louis Comfort Tiffany. Today he is commonly recognized as one of America's most influential designers and artists throughout the last nineteenth and early twentieth century. In the lesson described in this article, students created their own…

  12. Exploring Shop Window Displays

    Science.gov (United States)

    Christopoulou, Martha

    2011-01-01

    Using visual resources from everyday life in art lessons can enrich students' knowledge about the creation of visual images, artifacts, and sites, and develop their critical understanding about the cultural impact of these images and their effects on people's lives. Through examining an exhibition in the windows of Selfridges department store in…

  13. Opening the Literature Window

    Science.gov (United States)

    Jago, Carol

    2012-01-01

    Great literature gives students a window to other places and times, but it often requires students to step outside their comfort zones and take on challenges they wouldn't usually attempt. Unfortunately, research shows that many schools are not assigning literature that pushes students beyond their current reading level. Jago encourages teachers…

  14. Simple cryogenic infrared window

    NARCIS (Netherlands)

    Hartemink, M.; Hartemink, M.; Godfried, H.P; Godfried, Herman

    1991-01-01

    A simple, cheap technique is reported that allows materials with both large and small thermal expansion coefficients to be mounted as windows in low temperature cryostats while at the same time avoiding thermal stresses. The construction may be thermally cycled many times with no change in its

  15. [A modified MacConkey medium].

    Science.gov (United States)

    Wang, J; Tong, M

    1999-01-01

    We used MacConkey Agar(MCA) medium powder as a basis and added 6-benzoy-2-naphthyl phosphate disodium salt to modify MCA medium. This method was identified by examining several kinds of enteric pathogenic bacteria. Thus it allows us to observe lactose fermentative and phosphatase reaction simultaneously and to recognize Enterobacteriaceae from non-fermentable bacteria on primary culture plates according to the color of colony. This improved method simplifies the recognition procedure and shortens the time so that it is helpful to correctly choosing identification kit.

  16. One of the First Portable Macs

    CERN Multimedia

    1989-01-01

    It was one of the first portable macs released. The Portable had many new advances in mobile computing : The display was crispy clear, and looked beautiful when used in daylight ; The Portable came with a Lead-acid gel/cell battery that could run a anywhere from 6 -12 hours ; It supported to internal hard drives, and an external one. The reaction to the laptop was weak because it was slow, it had no capacity for expansion, it weighed heavily, its price was expensive. It has been stayed 1 year and half on the market.

  17. Turning the Big Mac Index into the Medical MAC Index | Wilson ...

    African Journals Online (AJOL)

    Objective: The purpose of this study was to create a global medical earnings index, called the Medical MAC Index, to enable a comparison of what medical specialists earn in the countries included in the study. Design: The study gathered data on the earnings of specialist anaesthetists employed in state hospitals with five ...

  18. Regularity of Dual Gabor Windows

    Directory of Open Access Journals (Sweden)

    Ole Christensen

    2013-01-01

    Full Text Available We present a construction of dual windows associated with Gabor frames with compactly supported windows. The size of the support of the dual windows is comparable to that of the given window. Under certain conditions, we prove that there exist dual windows with higher regularity than the canonical dual window. On the other hand, there are cases where no differentiable dual window exists, even in the overcomplete case. As a special case of our results, we show that there exists a common smooth dual window for an interesting class of Gabor frames. In particular, for any value of K∈ℕ, there is a smooth function h which simultaneously is a dual window for all B-spline generated Gabor frames {EmbTnBN(x/2}m,n∈ℕ for B-splines BN of order N=1,…,2K+1 with a fixed and sufficiently small value of b.

  19. A Unified NET-MAC-PHY Cross-layer Framework for Performance Evaluation of Multi-hop Ad hoc WLANs

    Directory of Open Access Journals (Sweden)

    Rachid El-Azouzi

    2014-09-01

    Full Text Available Most of the existing works have been evaluated the performance of 802.11 multihop networks by considering the MAC layer or network layer separately. Knowing the nature of the multi-hop ad hoc networks, many factors in different layers are crucial for study the performance of MANET. In this paper we present a new analytic model for evaluating average end-to-end throughput in IEEE 802.11e multihop wireless networks. In particular, we investigate an intricate interaction among PHY, MAC and Network layers. For instance, we incorporate carrier sense threshold, transmission power, contention window size, retransmissions retry limit, multi rates, routing protocols and network topology together. We build a general cross-layered framework to represent multi-hop ad hoc networks with asymmetric topology and asymmetric traffic. We develop an analytical model to predict throughput of each connection as well as stability of forwarding queues at intermediate nodes in saturated networks. To the best of our knowledge, it seems that our work is the first wherein general topology and asymmetric parameters setup are considered in PHY/MAC/Network layers. Performance of such a system is also evaluated through simulation. We show that performance measures of the MAC layer are affected by the traffic intensity of flows to be forwarded. More precisely, attempt rate and collision probability are dependent on traffic flows, topology and routing.

  20. Daylight Redirecting Window Films

    Science.gov (United States)

    2013-09-01

    The open office area (Figure 9) is 48’ deep with a sloped ceiling designed to disperse light down into the cubicle workstations. The sloped ceiling...Ceiling Ht. 9’ , 10’* Window VT 40%, 70%* Office Furniture 60” Cubicle * Lighting Schedule ASHRAE 90.1* Blinds Control Always Closed, Automated...2829 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) ESTCP Program Office Dr. James

  1. Windows with improved energy performances

    DEFF Research Database (Denmark)

    Laustsen, Jacob Birck; Svendsen, Svend

    2003-01-01

    Heat loss through windows represents a considerable part of the total heat loss from houses. However, apart from providing daylight access and view, windows offer a unique potential for solar gain to be exploited during the heating season. Until now valuation of the energy performance of windows...... has primary focused on the heat loss coefficient, U-value. However, as the U-value, especially for the glazing part, has improved considerably during the last years, the total solar energy transmittance, g-value, has become equally important to the total energy performance of windows. Improved energy...... performance of windows can be reached by development of each element of the window, but to gain a considerable improvement in the overall energy performance all elements of the windows need to be examined together and the construction optimised. This paper describes potential improvements of window elements...

  2. Users of the main smartphone operating systems (iOS, Android) differ only little in personality.

    Science.gov (United States)

    Götz, Friedrich M; Stieger, Stefan; Reips, Ulf-Dietrich

    2017-01-01

    The increasingly widespread use of mobile phone applications (apps) as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081) and a German-speaking sample (Study 2; N = 2,438). As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five). Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows). In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1), ηp2 = .005 to .036 (Study 2), respectively) and may reflect differences in sociodemographic composition, rather than operating system of smartphone users.

  3. Understanding and Supporting Window Switching

    NARCIS (Netherlands)

    Tak, S.

    2011-01-01

    Switching between windows on a computer is a frequent activity, but finding and switching to the target window can be inefficient. This thesis aims to better un-derstand and support window switching. It explores two issues: (1) the lack of knowledge of how people currently interact with and switch

  4. A Window-Washing Challenge

    Science.gov (United States)

    Roman, Harry T.

    2010-01-01

    Skyscrapers sure do have a lot of windows, and these windows are cleaned and checked regularly. All this takes time, money, and puts workers at potential risk. Might there be a better way to do it? In this article, the author discusses a window-washing challenge and describes how students can tackle this task, pick up the challenge, and creatively…

  5. Paradox applications integration ATP's for MAC and mass balance programs

    International Nuclear Information System (INIS)

    Russell, V.K.; Mullaney, J.E.

    1994-01-01

    The K Basins Materials Accounting (MAC) and Material Balance (MBA) database system were set up to run under one common applications program. This Acceptance Test Plan (ATP) describes how the code was to be tested to verify its correctness. The scope of the tests is minimal, since both MAC and MBA have already been tested in detail as stand-alone programs

  6. Influence of Mac Arthur Journal Donation Project on Serial ...

    African Journals Online (AJOL)

    Influence of Mac Arthur Journal Donation Project on Serial Resources of Selected University Libraries in Nigeria. Bola Olure, Baba S Aduku. Abstract. This study was carried out to assess the Mac Arthur Journal Donation Project in Selected University Libraries in Nigeria. Four research questions were posed in order to ...

  7. Pair configurations to molecular activity coefficients : PAC-MAC

    NARCIS (Netherlands)

    Sweere, A.J.M.

    2017-01-01

    This thesis provides an overview of the development of the Pair Configuration to Molecular Activity Coefficient (PAC-MAC) model. PAC-MAC is a computational method to predict thermodynamic miscibility properties of various molecular solutions. Examples of calculated thermodynamic miscibility

  8. Steven MacCall: Winner of LJ's 2010 Teaching Award

    Science.gov (United States)

    Berry, John N., III

    2010-01-01

    This article profiles Steven L. MacCall, winner of "Library Journal's" 2010 Teaching Award. An associate professor at the School of Library and Information Studies (SLIS) at the University of Alabama, Tuscaloosa, MacCall was nominated by Kathie Popadin, known as "Kpop" to the members of her cohort in the online MLIS program at SLIS. Sixteen of…

  9. Increasing the permeability of Escherichia coli using MAC13243

    DEFF Research Database (Denmark)

    Muheim, Claudio; Götzke, Hansjörg; Eriksson, Anna U.

    2017-01-01

    -phenylnapthylamine, and (2) more susceptible to large-scaffold antibiotics when sub-inhibitory concentrations of MAC13243 were used. To exclude the possibility that the permeability was caused by an off-target effect, we genetically reconstructed the MAC13243-phenotype by depleting LolA levels using the CRISPRi system....

  10. GENETIC FINGERPRINTING OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS ISOLATED FROM HOSPITAL PATIENTS AND THE ENVIRONMENT

    Science.gov (United States)

    A particularly pathogenic group of mycobacteria belong to the Mycobacterium avium complex (MAC), which includes M. avium and M. intracellulare. MAC organisms cause disease in children, the elderly, and immuno-compromised individuals. A critical step in preventing MAC infections...

  11. Alasdair MacIntyre, joven lector de Freud

    Directory of Open Access Journals (Sweden)

    Ramis Barceló, Rafael

    2010-06-01

    Full Text Available This article tries to show the reading of Freud that MacIntyre made from 1955 to 1970. For this purpose, it summarizes the ideas of MacIntyre in the intellectual context, mainly the use of philosophical ideas of Freud against the Enlightenment project. MacIntyre criticises Marxist interpreters and the mixing between Marx and Freud. MacIntyre uses the philosophical ideas of Freud for answering two problems on determinism: the links between determinism and reasons for action and determinism and Marxism. The main conclusion is that MacIntyre used Freud in his own advantage: as an ally in the criticism of the Enlightenment.

    Este artículo trata de mostrar la lectura que MacIntyre hizo de Freud desde 1955 hasta 1970. Con este fin, se resumen las ideas de MacIntyre en el contexto intelectual, principalmente el uso de las ideas filosóficas de Freud contra el proyecto de la Ilustración. MacIntyre critica a los intérpretes de Marx y a la mezcla entre Marx y Freud. MacIntyre usa las ideas filosóficas de Freud para contestar dos problemas sobre el determinismo: los vínculos entre el determinismo y las razones para la acción y el determinismo y el marxismo. La conclusión principal es que MacIntyre usó a Freud en su propio beneficio: como un aliado en la crítica de la Ilustración.

  12. Windows Home Server users guide

    CERN Document Server

    Edney, Andrew

    2008-01-01

    Windows Home Server brings the idea of centralized storage, backup and computer management out of the enterprise and into the home. Windows Home Server is built for people with multiple computers at home and helps to synchronize them, keep them updated, stream media between them, and back them up centrally. Built on a similar foundation as the Microsoft server operating products, it's essentially Small Business Server for the home.This book details how to install, configure, and use Windows Home Server and explains how to connect to and manage different clients such as Windows XP, Windows Vist

  13. Teach yourself visually Windows 10

    CERN Document Server

    McFedries, Paul

    2015-01-01

    Learn Windows 10 visually with step-by-step instructions Teach Yourself VISUALLY Windows 10 is the visual learner's guide to the latest Windows upgrade. Completely updated to cover all the latest features, this book walks you step-by-step through over 150 essential Windows tasks. Using full color screen shots and clear instruction, you'll learn your way around the interface, set up user accounts, play media files, download photos from your camera, go online, set up email, and much more. You'll even learn how to customize Windows 10 to suit the way you work best, troubleshoot and repair common

  14. Sunlight Responsive Thermochromic Window System

    Energy Technology Data Exchange (ETDEWEB)

    Millett, F,A; Byker,H, J

    2006-10-27

    Pleotint has embarked on a novel approach with our Sunlight Responsive Thermochromic, SRT™, windows. We are integrating dynamic sunlight control, high insulation values and low solar heat gain together in a high performance window. The Pleotint SRT window is dynamic because it reversibly changes light transmission based on thermochromics activated directly by the heating effect of sunlight. We can achieve a window package with low solar heat gain coefficient (SHGC), a low U value and high insulation. At the same time our windows provide good daylighting. Our innovative window design offers architects and building designers the opportunity to choose their desired energy performance, excellent sound reduction, external pane can be self-cleaning, or a resistance to wind load, blasts, bullets or hurricanes. SRT windows would provide energy savings that are estimated at up to 30% over traditional window systems. Glass fabricators will be able to use existing equipment to make the SRT window while adding value and flexibility to the basic design. Glazing installers will have the ability to fit the windows with traditional methods without wires, power supplies and controllers. SRT windows can be retrofit into existing buildings,

  15. Windows Azure web sites

    CERN Document Server

    Chambers, James

    2013-01-01

    A no-nonsense guide to maintaining websites in Windows Azure If you're looking for a straightforward, practical guide to get Azure websites up and running, then this is the book for you. This to-the-point guide provides you with the tools you need to move and maintain a website in the cloud. You'll discover the features that most affect developers and learn how they can be leveraged to work to your advantage. Accompanying projects enhance your learning experience and help you to walk away with a thorough understanding of Azure's supported technologies, site deployment, and manageme

  16. Windows Terminal Servers Orchestration

    Science.gov (United States)

    Bukowiec, Sebastian; Gaspar, Ricardo; Smith, Tim

    2017-10-01

    Windows Terminal Servers provide application gateways for various parts of the CERN accelerator complex, used by hundreds of CERN users every day. The combination of new tools such as Puppet, HAProxy and Microsoft System Center suite enable automation of provisioning workflows to provide a terminal server infrastructure that can scale up and down in an automated manner. The orchestration does not only reduce the time and effort necessary to deploy new instances, but also facilitates operations such as patching, analysis and recreation of compromised nodes as well as catering for workload peaks.

  17. Transparent aerogel Windows

    DEFF Research Database (Denmark)

    Jensen, Karsten Ingerslev; Schultz, Jørgen Munthe

    In a recent EU FP5 project, monolithic silica aerogel was further developed with respect to the production process at pilot-scale, its properties and the application as transparent insulation material in highly insulating and transparent windows. The aerogel production process has been optimised......-value of 0.7 W/m²K for about 14 mm aerogel thickness, which for a 20 mm thickness corresponds to a U-value of approximately 0.5 W/m²K. No other known glazing exhibits such an excellent combination of solar transmittance and heat loss coefficient. At a Danish location and North facing, the energy balance...

  18. Windows on animal minds.

    Science.gov (United States)

    Griffin, D R

    1995-06-01

    The simple kinds of conscious thinking that probably occur in nonhuman animals can be studied objectively by utilizing the same basic procedure that we use every day to infer what our human companions think and feel. This is to base such inferences on communicative behavior, broadly defined to include human language, nonverbal communication, and semantic communication in apes, dolphins, parrots, and honeybees. It seems likely that animals often experience something similar to the messages they communicate. Although this figurative window on other minds is obviously imperfect, it is already contributing significantly to our growing understanding and appreciation of animal mentality.

  19. Invariant sets for Windows

    CERN Document Server

    Morozov, Albert D; Dragunov, Timothy N; Malysheva, Olga V

    1999-01-01

    This book deals with the visualization and exploration of invariant sets (fractals, strange attractors, resonance structures, patterns etc.) for various kinds of nonlinear dynamical systems. The authors have created a special Windows 95 application called WInSet, which allows one to visualize the invariant sets. A WInSet installation disk is enclosed with the book.The book consists of two parts. Part I contains a description of WInSet and a list of the built-in invariant sets which can be plotted using the program. This part is intended for a wide audience with interests ranging from dynamical

  20. Windows Azure Platform

    CERN Document Server

    Redkar, Tejaswi

    2011-01-01

    The Windows Azure Platform has rapidly established itself as one of the most sophisticated cloud computing platforms available. With Microsoft working to continually update their product and keep it at the cutting edge, the future looks bright - if you have the skills to harness it. In particular, new features such as remote desktop access, dynamic content caching and secure content delivery using SSL make the latest version of Azure a more powerful solution than ever before. It's widely agreed that cloud computing has produced a paradigm shift in traditional architectural concepts by providin

  1. Control de torrentes en la cuenca hidrográfica del río Rímac

    OpenAIRE

    Ministerio de Agricultura. Dirección General de Aguas, Suelos e Irrigaciones

    1983-01-01

    Determina los principales factores (naturales o antrópicos) que influyen en la presencia de fenómenos geodinámicos en las principales microcuencas torrenciales del río Rímac. Además, resalta el impacto multisectorial de los daños ocasionados por los fenómenos de avalancha ("huaycos") y formula alternativas de control de las microcuencas torrenciales mediante el estudio sistemático de dos áreas representativas.

  2. Windows on the axion

    International Nuclear Information System (INIS)

    Turner, M.S.

    1989-04-01

    Peccei-Quinn symmetry with attendant axion is a most compelling, and perhaps the most minimal, extension of the standard model, as it provides a very elegant solution to the nagging strong CP-problem associated with the Θ vacuum structure of QCD. However, particle physics gives little guidance as to the axion mass; a priori, the plausible values span the range: 10/sup /minus/12/ eV /approx lt/ m/sub a/ /approx lt/ 10 6 eV, some 18 orders-of-magnitude. Axions have a host of interesting astrophysical and cosmological effects, including, modifying the evolution of stars of all types (our sun, red giants, white dwarfs, and neutron stars), contributing significantly to the mass density of the Universe today, and producing detectable line radiation through the decays of relic axions. Consideration of these effects has probed 14 orders-of-magnitude in axion mass, and has left open only two windows for further exploration: 10/sup /minus/6/ eV /approx lt/ m/sub a/ /approx lt/ 10/sup /minus/3/ eV and 1 eV /approx lt/ m/sub a/ /approx lt/ 5 eV (hadronic axions only). Both these windows are accessible to experiment, and a variety of very interesting experiments, all of which involve ''heavenly axions,'' are being planned or are underway. 58 refs., 6 figs., 1 tab

  3. WINDOW-CLEANING

    CERN Multimedia

    Environmental Section / ST-TFM

    2001-01-01

    The two-month window-cleaning session on the Meyrin, Prévessin and LEP sites will soon begin. The cleaning contractors will work from Monday to Saturday, every week from 4.00 a.m. to 8.00 p.m. The work will be organised so as to disturb users as little as possible. In any event, a work notice will be left in each office 24 hours beforehand. To prevent any damage to documents or items which could occur despite the precautions taken, please clear completely the window-sills and the area immediately around them. If, however, for valid reasons, the work cannot be done on the scheduled day, please inform the Environmental Section by telephoning: 73753 / 74233 / 72242 If you are going to be absent during this two-month period, we should be grateful if you would clear the above mentioned areas before your departure. REMINDER To allow more thorough cleaning of the entrance doors to buildings and also facilitate the weekly work of the cleaning contractors, we ask you to make use of the notice boards at the...

  4. Windows on the axion

    Energy Technology Data Exchange (ETDEWEB)

    Turner, M.S.

    1989-04-01

    Peccei-Quinn symmetry with attendant axion is a most compelling, and perhaps the most minimal, extension of the standard model, as it provides a very elegant solution to the nagging strong CP-problem associated with the THETA vacuum structure of QCD. However, particle physics gives little guidance as to the axion mass; a priori, the plausible values span the range: 10/sup /minus/12/ eV /approx lt/ m/sub a/ /approx lt/ 10/sup 6/ eV, some 18 orders-of-magnitude. Axions have a host of interesting astrophysical and cosmological effects, including, modifying the evolution of stars of all types (our sun, red giants, white dwarfs, and neutron stars), contributing significantly to the mass density of the Universe today, and producing detectable line radiation through the decays of relic axions. Consideration of these effects has probed 14 orders-of-magnitude in axion mass, and has left open only two windows for further exploration: 10/sup /minus/6/ eV /approx lt/ m/sub a/ /approx lt/ 10/sup /minus/3/ eV and 1 eV /approx lt/ m/sub a/ /approx lt/ 5 eV (hadronic axions only). Both these windows are accessible to experiment, and a variety of very interesting experiments, all of which involve ''heavenly axions,'' are being planned or are underway. 58 refs., 6 figs., 1 tab.

  5. Working with Windows 7 at CERN (EN)

    CERN Multimedia

    CERN. Geneva

    2010-01-01

    Overview of new concepts and user interface changes in Windows 7 as compared with older versions of Windows: XP or Vista. Availability of Windows 7 at CERN and its integration with CERN Windows infrastructure will be discussed.

  6. Increased NMDA receptor inhibition at an increased Sevoflurane MAC

    Directory of Open Access Journals (Sweden)

    Brosnan Robert J

    2012-06-01

    Full Text Available Abstract Background Sevoflurane potently enhances glycine receptor currents and more modestly decreases NMDA receptor currents, each of which may contribute to immobility. This modest NMDA receptor antagonism by sevoflurane at a minimum alveolar concentration (MAC could be reciprocally related to large potentiation of other inhibitory ion channels. If so, then reduced glycine receptor potency should increase NMDA receptor antagonism by sevoflurane at MAC. Methods Indwelling lumbar subarachnoid catheters were surgically placed in 14 anesthetized rats. Rats were anesthetized with sevoflurane the next day, and a pre-infusion sevoflurane MAC was measured in duplicate using a tail clamp method. Artificial CSF (aCSF containing either 0 or 4 mg/mL strychnine was then infused intrathecally at 4 μL/min, and the post-infusion baseline sevoflurane MAC was measured. Finally, aCSF containing strychnine (either 0 or 4 mg/mL plus 0.4 mg/mL dizocilpine (MK-801 was administered intrathecally at 4 μL/min, and the post-dizocilpine sevoflurane MAC was measured. Results Pre-infusion sevoflurane MAC was 2.26%. Intrathecal aCSF alone did not affect MAC, but intrathecal strychnine significantly increased sevoflurane requirement. Addition of dizocilpine significantly decreased MAC in all rats, but this decrease was two times larger in rats without intrathecal strychnine compared to rats with intrathecal strychnine, a statistically significant (P  Conclusions Glycine receptor antagonism increases NMDA receptor antagonism by sevoflurane at MAC. The magnitude of anesthetic effects on a given ion channel may therefore depend on the magnitude of its effects on other receptors that modulate neuronal excitability.

  7. Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs

    Directory of Open Access Journals (Sweden)

    Volker Esteves

    2015-05-01

    Full Text Available In this paper, we introduce a cooperative medium access control (MAC protocol, named cooperative energy harvesting (CEH-MAC, that adapts its operation to the energy harvesting (EH conditions in wireless body area networks (WBANs. In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard.

  8. iMac G3 Blueberry 350MHz

    CERN Multimedia

    2000-01-01

    The iMac G3 is an all-in-one personal computer, encompassing both the monitor and the computer in one package. It allowed to revitalize the Apple brand that was in decline and close to financial ruin. Originally released in striking bondi blue and later a range of other translucent plastic envelopes in bright colors. The iMac comes with a keyboard and mouse matching the color of the case. The iMac G3 was sold from 1998 to 2003 and has been updated many times.

  9. Primary Klebsiella identification with MacConkey-inositol-carbenicillin agar.

    Science.gov (United States)

    Bagley, S T; Seidler, R J

    1978-09-01

    MacConkey-inositol-carbenicillin agar has successfully been used as a primary selective medium for Klebsiella enumeration. With pure cultures, nearly 100% recovery of Klebsiella was observed by membrane filtration. With environmental samples using membrane filtration, 95% of typical pink- to red-colored colonies were verified as Klebsiella, as opposed to only 1% of yellow background colonies. Recovery of Klebsiella on MacConkey-inositol-carbenicillin agar was as good or better than on mEndo agar LES (Difco Laboratories). Recovery and percent colony confirmation with MacConkey-inositol-carbenicillin agar were greater than for other proposed Klebsiella selective media.

  10. Handling Deafness Problem of Scheduled Multi-Channel Polling MACs

    Science.gov (United States)

    Jiang, Fulong; Liu, Hao; Shi, Longxing

    Combining scheduled channel polling with channel diversity is a promising way for a MAC protocol to achieve high energy efficiency and performance under both light and heavy traffic conditions. However, the deafness problem may cancel out the benefit of channel diversity. In this paper, we first investigate the deafness problem of scheduled multi-channel polling MACs with experiments. Then we propose and evaluate two schemes to handle the deafness problem. Our experiment shows that deafness is a significant reason for performance degradation in scheduled multi-channel polling MACs. A proper scheme should be chosen depending on the traffic pattern and the design objective.

  11. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  12. Abejide, OS

    African Journals Online (AJOL)

    Abejide, OS. Vol 33, No 1 (2014) - Articles Optimization of design formulations for reinforced concrete slabs. Abstract PDF · Vol 33, No 3 (2014) - Research papers. Reliability Analysis of Bending, Shear and Deflection Criteria of Reinforced Concrete Slabs Abstract PDF · Vol 33, No 4 (2014) - Research papers. Optimizing ...

  13. Dosumu, OS

    African Journals Online (AJOL)

    Dosumu, OS. Vol 5, No 4 (2012): Supplement - Articles Assessment of procurement methods used for executing maintenance works in Lagos state. Abstract PDF · Vol 6, No 1 (2013) - Articles An Analysis of the Factors Responsible for Errors in Nigerian Construction Documents Abstract PDF. ISSN: 1998-0507. AJOL African ...

  14. os odontoideum

    African Journals Online (AJOL)

    aly of the second cervical vertebra which was first ... vertebral column and is also the least stable.1 Os odon- toideum frequently leads to atlanto-axial instability with spinal-cord compression.2 Atlanto-axial instability can arise from multiple causes including inflammatory arthritides, trauma, infection, laxity of the transverse.

  15. Host-Based Systemic Network Obfuscation System for Windows

    Science.gov (United States)

    2011-06-01

    operating system. SNOS obfuscates the Native OS and Native Lan Manager fields, shown in Figure 35, to imitate a Linux operating system running Samba ... Samba can be installed on a Linux operating system to allow a Linux host to share and communicate with the Windows SMB service. The flags are also

  16. The workplace window view

    DEFF Research Database (Denmark)

    Lottrup, Lene Birgitte Poulsen; Stigsdotter, Ulrika K.; Meilby, Henrik

    2015-01-01

    Office workers’ job satisfaction and ability to work are two important factors for the viability and competitiveness of most companies, and existing studies in contexts other than workplaces show relationships between a view of natural elements and, for example, student performance...... and neighbourhood satisfaction. This study investigates whether relationships between window view, and work ability and job satisfaction also exist in the context of the workplace by focusing on office workers’ view satisfaction. The results showed that a view of natural elements was related to high view...... satisfaction, and that high view satisfaction was related to high work ability and high job satisfaction. Furthermore, the results indicated that job satisfaction mediated the effect of view satisfaction on work ability. These findings show that a view of a green outdoor environment at the workplace can...

  17. Window observers for linear systems

    Directory of Open Access Journals (Sweden)

    Utkin Vadim

    2000-01-01

    Full Text Available Given a linear system x ˙ = A x + B u with output y = C x and a window function ω ( t , i.e., ∀ t , ω ( t ∈ {0,1 }, and assuming that the window function is Lebesgue measurable, we refer to the following observer, x ˆ = A x + B u + ω ( t L C ( x − x ˆ as a window observer. The stability issue is treated in this paper. It is proven that for linear time-invariant systems, the window observer can be stabilized by an appropriate design under a very mild condition on the window functions, albeit for linear time-varying system, some regularity of the window functions is required to achieve observer designs with the asymptotic stability. The corresponding design methods are developed. An example is included to illustrate the possible applications

  18. Beam line windows at LAMPF

    International Nuclear Information System (INIS)

    Brown, R.D.; Grisham, D.L.; Lambert, J.E.

    1985-01-01

    The A-6 main beam-line window at LAMPF separates the vacuum of the main beam line from the isotope production station, proton irradiation ports, and the beam stop, which operate in air. This window must withstand the design beam current of 1 mA at 800 MeV for periods of at least 3000 hours without failure. The window is water cooled and must be strong enough to withstand the 2.1 MPa (300 psig) cooling water pressure, as well as beam-induced thermal stresses. Two designs have been used to meet these goals, a stepped-plate window and a hemispherical window, both made from a precipitation-hardened nickel base alloy, Alloy 718. Calculations of the temperatures and stresses in each of these windows are presented

  19. Windows with improved energy performance

    DEFF Research Database (Denmark)

    Noyé, Peter Anders; Laustsen, Jacob Birck; Svendsen, Svend

    2002-01-01

    . Heat loss through windows represents a considerably part of the total heat loss from houses. However windows provide a unique potential of solar energy gain to the building besides from providing daylight access and view. This results in a need for development of windows with improved energy...... performances. During the last 20 years the U-value of the glazing part of windows has been improved considerably, but the frame part has not followed the same development with respect to energy performance. Therefore an increasingly large part of the total heat loss through windows is relating to the frame...... part, for which reason, as far as energy efficiency and total economy are concerned, it has become more interesting to further develop frame structures. Traditionally, the energy performance of windows has primarily been characterised by the heat loss coefficient, U-value. However as the heat loss has...

  20. Improved Windows for Cold Climates

    DEFF Research Database (Denmark)

    Laustsen, Jacob Birck; Svendsen, Svend

    2005-01-01

    A large part of the energy consumption in countries in Nordic and Arctic climates is used for space heating in buildings. In typical buildings the windows are responsible for a con-siderable part of the heat losses. Therefore there is a large potential for energy savings by developing and using...... windows with improved energy performance. Traditionally evaluation of the energy performance of windows has focused on the thermal transmittance, but as windows differ from the rest of the building envelope by allowing solar energy to enter the building, the total solar energy transmittance is equally...... important. In the heating season in cold climates the solar gain through windows can be utilized for space heating which results in a corresponding reduction in the energy production that is often based on fossil fuels. A suitable quantity for evaluating the energy performance of windows in a simple...

  1. Review of World of Money CD-ROM for PC/Mac [CD-ROM

    Directory of Open Access Journals (Sweden)

    Philip de Jersey

    1998-12-01

    Full Text Available Following on from the impressive development of the new HSBC Money Gallery in 1997, the British Museum has launched into the world of electronic publishing with the World of Money, an "interactive exploration of money worldwide from ancient times to the present day". Intended for ages ten to adult, the CD promises "a mine of information about the use, form, history and importance of money around the globe", and "fun and information for all the family". Reviewing in a Mac-unfriendly environment, I have been able to run the CD only on a PC. On a 166Mhz MMX with 32Mb RAM and a 12x CD it runs impressively quickly, with no more than two or three seconds of the "loading new page" display when switching between different parts of the program. Minimum requirements are listed as a 486 with 8Mb RAM, 40Mb free hard disk space, Windows 3.11 or Windows 95, 4x CD drive, 1Mb 256 colours graphics card, 16-bit Sound Blaster compatible sound card, and a VGA monitor. Minimum requirements for the Mac are listed as System 7, 603e processor, 16Mb RAM, 40MB free hard disk space, 6x CD drive, 1Mb video card and Apple monitor or Multisync with adaptor. The CD opens with an image of the British Museum portico, through which we are taken into the foyer, complete with the sound effects of massed ranks of tourists. We have four options available on a lectern, or by turning left, right or going upstairs: History of Money, Information Centre, Activities, and Options. Clicking on a large question mark brings up the Help screens (Figure 1.

  2. Windows 7 The Missing Manual

    CERN Document Server

    Pogue, David

    2010-01-01

    In early reviews, geeks raved about Windows 7. But if you're an ordinary mortal, learning what this new system is all about will be challenging. Fear not: David Pogue's Windows 7: The Missing Manual comes to the rescue. Like its predecessors, this book illuminates its subject with reader-friendly insight, plenty of wit, and hardnosed objectivity for beginners as well as veteran PC users. Windows 7 fixes many of Vista's most painful shortcomings. It's speedier, has fewer intrusive and nagging screens, and is more compatible with peripherals. Plus, Windows 7 introduces a slew of new features,

  3. Subject Responses to Electrochromic Windows

    Energy Technology Data Exchange (ETDEWEB)

    Clear, Robert; Inkarojrit, Vorapat; Lee, Eleanor

    2006-03-03

    Forty-three subjects worked in a private office with switchable electrochromic windows, manually-operated Venetian blinds, and dimmable fluorescent lights. The electrochromic window had a visible transmittance range of approximately 3-60%. Analysis of subject responses and physical data collected during the work sessions showed that the electrochromic windows reduced the incidence of glare compared to working under a fixed transmittance (60%) condition. Subjects used the Venetian blinds less often and preferred the variable transmittance condition, but used slightly more electric lighting with it than they did when window transmittance was fixed.

  4. Live histograms in moving windows

    International Nuclear Information System (INIS)

    Zhil'tsov, V.E.

    1989-01-01

    Application of computer graphics for specific hardware testing is discussed. The hardware is position sensitive detector (multiwire proportional chamber) which is used in high energy physics experiments, and real-out electronics for it. Testing program is described (XPERT), which utilises multi-window user interface. Data are represented as histograms in windows. The windows on the screen may be moved, reordered, their sizes may be changed. Histograms may be put to any window, and hardcopy may be made. Some program internals are discussed. The computer environment is quite simple: MS-DOS IBM PC/XT, 256 KB RAM, CGA, 5.25'' FD, Epson MX. 4 refs.; 7 figs

  5. Thermal monitoring of gyrotron windows

    International Nuclear Information System (INIS)

    Huey, H.E.; Choi, E.; Hu, G.; Mundie, L.

    1983-01-01

    In a practical gyrotron device, the design of a reliable vacuum window to withstand high mean power densities is of utmost importance. Computer modelling of an actual window assumes a number of conditions including the power density profile, the electromagnetic wave attenuation constant of the window material and heat transfer coefficients. The last two factors can vary significantly with temperature. A technique for actually monitoring the real time temperature distribution over the window surface with an IR camera while the gyrotron is in operation has been developed. This measurement serves as an aid for developing the analysis of window designs. The ability to observe small hot spots due to tiny metallic specks on the window surface is also of great value in quality control and window failure prevention. The experimental arrangement involves an infrared camera (AGA780) with an indium antimonide detector (3-5 μm) observing the window through a grid pattern of tiny holes (cutoff for the 3rd harmonic of 60 GHz). A 12 0 FOV lens with a 12mm extension ring was used to defocus the grid. The thermal emissivity E /sub w/ approx. = 0.95. Thus, an IR measurement of the window is a surface temperature measurement. To minimize the problem of external reflections, the outside surface of the waveguide was painted black. This then requires a cool waveguide; room temperature is sufficient

  6. Beginning Windows 8.1

    CERN Document Server

    Halsey, Mike

    2013-01-01

    Windows 8 has been described by Microsoft as its 'boldest' Windows release ever and the 8.1 update enhances the paradigm further. Beginning Windows 8.1 takes you through the new features and helps you get more out of the familiar to reveal the fullest possibilities for this amazing new operating system. You will learn, with non-technical language used throughout, how to get up and running in the new Windows interface, minimize downtime, maximize productivity, and harness the features you never knew existed to take control of your computer and enjoy the peace of mind and excitement that comes w

  7. Windows 7 the definitive guide

    CERN Document Server

    Stanek, William R

    2010-01-01

    This book provides everything you need to manage and maintain Windows 7. You'll learn all of the features and enhancements in complete detail, along with specifics for configuring the operating system to put you in full control. Bestselling author and Windows expert William Stanek doesn't just show you the steps you need to follow, he also tells you how features work, why they work, and how you can customize them to meet your needs. Learn how to squeeze every bit of power out of Windows 7 to take full advantage of its features and programs. Set up, customize, and tune Windows 7-Optimize its

  8. Big Mac arvestab raha ostujõudu / Harli Uljas

    Index Scriptorium Estoniae

    Uljas, Harli

    2005-01-01

    The Economist võrdleb maailma valuutade suhestamiseks Big Mac'i burgeri hindu 120 riigis, kuna see meetod võimaldab saada ülevaate riikide elanikkonna tegelikust ostujõust. Tabel: Hamburgeri standard

  9. After MacIntyre : Kaasaegsest vooruseetikast / Meego Remmel

    Index Scriptorium Estoniae

    Remmel, Meego

    2006-01-01

    Alasdair MacIntyre panus 20. sajandi eetikasse. Tema käsitlus vooruseetikast ja vooruseetilisest perspektiivist, mida on võimalik näha komplekselt, vaadeldes voorust, praktikat, narratiivi ja traditsiooni mõisteid

  10. MacSPOC: Orbital trajectory calculations on a laptop computer

    Science.gov (United States)

    Adamo, Dan

    1991-01-01

    Orbital trajectory calculations on a laptop computer are presented in the form of the viewgraphs. The following subject areas are covered: laptop computing in the Space Shuttle program; current laptop prototyping with MacSPOC; future laptop applications; and summary.

  11. Aeronautical Mobile Airport Communications System (AeroMACS)

    Science.gov (United States)

    Budinger, James M.; Hall, Edward

    2011-01-01

    To help increase the capacity and efficiency of the nation s airports, a secure wideband wireless communications system is proposed for use on the airport surface. This paper provides an overview of the research and development process for the Aeronautical Mobile Airport Communications System (AeroMACS). AeroMACS is based on a specific commercial profile of the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standard known as Wireless Worldwide Interoperability for Microwave Access or WiMAX (WiMax Forum). The paper includes background on the need for global interoperability in air/ground data communications, describes potential AeroMACS applications, addresses allocated frequency spectrum constraints, summarizes the international standardization process, and provides findings and recommendations from the world s first AeroMACS prototype implemented in Cleveland, Ohio, USA.

  12. MAC mini acceptance test procedure, software Version 3.0

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) programs had some major improvements made to it to organize the main-tables by Location, Canister, and Material. This ATP describes how the code was to be tested to verify its correctness

  13. Windows forensic analysis toolkit advanced analysis techniques for Windows 7

    CERN Document Server

    Carvey, Harlan

    2012-01-01

    Now in its third edition, Harlan Carvey has updated "Windows Forensic Analysis Toolkit" to cover Windows 7 systems. The primary focus of this edition is on analyzing Windows 7 systems and on processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. The author presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. New to this edition, the companion and toolkit materials are now hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements "Windows Forensic Analysis Toolkit, 2nd Edition", (ISBN: 9781597494229), which focuses primarily on XP. It includes complete coverage and examples on Windows 7 systems. It contains Lessons from the Field, Case Studies, and War Stories. It features companion online material, including electronic printable checklists, cheat sheets, free custom tools, ...

  14. MacEdward Leach and the Songs of Atlantic Canada

    OpenAIRE

    Beverley Diamond; Ian Brodie

    2013-01-01

    MacEdward Leach made the earliest ethnographic recordings of folksong on both Cape Breton Island and Newfoundland, recordings that remained largely unknown for over 50 years. This essay describes the history of the MacEdward Leach and the Songs of Atlantic Canada website and the efforts to provide context for the songs for two key audiences: the academy in general and the local community who understand the songs as a cultural inheritance.

  15. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  16. Learning Windows Azure Mobile Services for Windows 8 and Windows Phone 8

    CERN Document Server

    Webber-Cross, Geoff

    2014-01-01

    This book is based around a case study game which was written for the book. This means that the chapters progress in a logical way and build upon lessons learned as we go. Real-world examples are provided for each topic that are practical and not given out-of-context so they can be applied directly to other applications.If you are a developer who wishes to build Windows 8 and Phone 8 applications and integrate them with Windows Azure Mobile Services, this book is for you. Basic C# and JavaScript skills are advantageous, as well as some knowledge of building Windows 8 or Windows Phone 8 applica

  17. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  18. Window prototypes during the project

    DEFF Research Database (Denmark)

    Schultz, Jørgen Munthe

    1996-01-01

    The conditions for the PASSYS test and the results of the measurements on one of the aerogel window prototypes are described.......The conditions for the PASSYS test and the results of the measurements on one of the aerogel window prototypes are described....

  19. Thermal bridges of modern windows

    DEFF Research Database (Denmark)

    Hansen, Ernst Jan de Place; Møller, Eva B.; Nielsen, Anker

    2013-01-01

    With its focus on reduced energy consumption, contemporary housing construction requires a highly insulated and airtight building envelope with as few thermal bridges as possible.Windows must be carefully designed, as thermal bridges can lead to surface condensation or mold growth, even if the wi......With its focus on reduced energy consumption, contemporary housing construction requires a highly insulated and airtight building envelope with as few thermal bridges as possible.Windows must be carefully designed, as thermal bridges can lead to surface condensation or mold growth, even...... if the window has an U-factor of 1 W/(m2·K) or lower. This paper describes the development of modern, energy efficient Danish windows with reduced thermal bridges. It focuses on materials, geometry, and sealing of window panes based on a literature review. Examples of modern windows are presented. Experience...... been an important driver for the development of new window solutions in Denmark, increasing the inner-surface temperature at the sealing of window panes. However, it will not stop complaints fromconsumers, as this temperature is calculated under standardized conditions. Increasing requirements...

  20. Inventions on Displaying and Resizing Windows

    OpenAIRE

    Mishra, Umakant

    2014-01-01

    Windows are used quite frequently in a GUI environment. The greatest advantage of using windows is that each window creates a virtual screen space. Hence, although the physical screen space is limited to a few inches, use of windows can create unlimited screen space to display innumerable items. The use of windows facilitates the user to open and interact with multiple programs or documents simultaneously in different windows. Sometimes a single program may also open multiple windows to displ...

  1. Destiny's Earth Observation Window

    Science.gov (United States)

    2002-01-01

    Astronaut Michael J. Bloomfield, STS-110 mission commander, looks through the Earth observation window in the Destiny laboratory aboard the International Space Station (ISS). The STS-110 mission prepared the ISS for future spacewalks by installing and outfitting the S0 (S-zero) truss and the Mobile Transporter. The 43-foot-long S0 Truss, weighing in at 27,000 pounds, was the first of 9 segments that will make up the Station's external framework that will eventually stretch 356 feet (109 meters), or approximately the length of a football field. This central truss segment also includes a flatcar called the Mobile Transporter and rails that will become the first 'space railroad,' which will allow the Station's robotic arm to travel up and down the finished truss for future assembly and maintenance. The completed truss structure will hold solar arrays and radiators to provide power and cooling for additional international research laboratories from Japan and Europe that will be attached to the Station. Milestones of the STS-110 mission included the first time the ISS robotic arm was used to maneuver spacewalkers around the Station and marked the first time all spacewalks were based out of the Station's Quest Airlock. It was also the first Shuttle to use three Block II Main Engines. The Space Shuttle Orbiter Atlantis, STS-110 mission, was launched April 8, 2002 and returned to Earth April 19, 2002.

  2. Improved Windows for Cold Climates

    DEFF Research Database (Denmark)

    Laustsen, Jacob Birck; Svendsen, Svend

    2005-01-01

    considerably by reducing the frame width, which results in a larger transparent area causing a larger solar gain but still main-taining a low thermal transmittance. Using three layers of glass with large gaps, using very slim frame profiles, and omitting the edge constructions that normally causes thermal...... windows with improved energy performance. Traditionally evaluation of the energy performance of windows has focused on the thermal transmittance, but as windows differ from the rest of the building envelope by allowing solar energy to enter the building, the total solar energy transmittance is equally...... important. In the heating season in cold climates the solar gain through windows can be utilized for space heating which results in a corresponding reduction in the energy production that is often based on fossil fuels. A suitable quantity for evaluating the energy performance of windows in a simple...

  3. Windows for tablets for dummies

    CERN Document Server

    Rathbone, Andy

    2013-01-01

    Just for you--Windows 8 from the tablet user's perspective If you're an experienced Windows user, you don't need a guide to everything that Windows 8 can do, just to those tools and functions that work on your tablet. And so here it is. This new book zeros in on what you need to know to work best on your tablet with Windows 8. Topics include navigating the new Windows 8 interface and how it works on a touchscreen, how to safely connect to the Internet, how to work with apps or share your tablet in a group, and much more. If you're a new tablet user, you'll particularly appre

  4. Handbook on Windows and Energy

    DEFF Research Database (Denmark)

    Thomsen, Kirsten Engelund; Schultz, Jørgen Munthe; Svendsen, Sv Aa Højgaard

    transmission through windows is described in detail including radiation, convection and conduction as well as solar transmittance of window glazing. The most used terms related to characterization of window energy performance are defined and calculation methods according to international standards...... flow and detailed calculation of light and solar transmittance is given.Different measurement techniques for characterization of window heat loss coefficient and total solar energy transmittance is described and references to interantional standards are given.Finally, the handbook includes...... a comprehensive list of window related standards and a list of Nordic research and development projects.Two programs are encloased in the handbook for calculation of solar radiation on inclined surfaces including a shadow correction and a simple program for evaluation of energy savings and risk of overtemperature....

  5. False Windows - Yesterday and Today

    Science.gov (United States)

    Niewitecki, Stefan

    2017-10-01

    The article is concerned with a very interesting aspect of architectural design, namely, a contradiction between the building functions and the necessity of giving the building a desired external appearance. One of the possibilities of reconciling this contradiction is using pseudo windows that are visible on the elevation and generally have the form of a black painted recess accompanied by frames and sashes and often single glazing. Of course, there are no windows or openings in the corresponding places in the walls inside the building. The article discusses the differences between false windows and blind widows (German: blende), also known as blank windows, which, in fact, are shallow recesses in the wall having the external appearance of an arcade or a window and which had already been used in Gothic architecture mostly for aesthetic reasons and sometimes to reduce the load of the wall. Moreover, the article describes various false windows that appeared later than blind windows because they did not appear until the 17th century. Contemporary false windows are also discussed and it is shown that contrary to the common belief they are widely used. In his research, the author not only used the Internet data but also carried out his own in situ exploration. The false windows constitute very interesting albeit rare elements of the architectural design of buildings. They have been used successfully for a few hundred years. It might seem that they should have been discarded by now but this has not happened. Quite contrary, since the second half of the 20th century there has been a rapid development of glass curtain walls that serve a similar function in contemporary buildings as the false windows once did, only in a more extensive way.

  6. Simulation of 64-bit MAC Unit using Kogge Stone Adder and Ancient Indian Mathematics

    OpenAIRE

    Aapurva Kaul; Abhijeet Kumar

    2016-01-01

    This paper describes that multiply and accumulate (MAC) unit plays a very vital role in various Digital Signal Processing applications. Speed of these applications depends on the speed of these three sub units of MAC multiply unit, adder unit and accumulator unit. In this paper the delay of 64-bit MAC unit is decreased as compared to the previous MAC units. In this Kogge Stone Adder is used as adder in design Vedic Multiplier using Urdhva Tiryakbhyam sutra. The designing of MAC un...

  7. Role of ATP binding and hydrolysis in assembly of MacAB-TolC macrolide transporter

    Science.gov (United States)

    Lu, Shuo; Zgurskaya, Helen I.

    2012-01-01

    Summary MacB is a founding member of the Macrolide Exporter family of transporters belonging to the ATP-Binding Cassette superfamily. These proteins are broadly represented in genomes of both gram-positive and gram-negative bacteria and are implicated in virulence and protection against antibiotics and peptide toxins. MacB transporter functions together with MacA, a periplasmic membrane fusion protein, which stimulates MacB ATPase. In gram-negative bacteria, MacA is believed to couple ATP hydrolysis to transport of substrates across the outer membrane through a TolC-like channel. In this study, we report a real-time analysis of concurrent ATP hydrolysis and assembly of MacAB-TolC complex. MacB binds nucleotides with a low millimolar affinity and fast on- and off-rates. In contrast, MacA-MacB complex is formed with a nanomolar affinity, which further increases in the presence of ATP. Our results strongly suggest that association between MacA and MacB is stimulated by ATP binding to MacB but remains unchanged during ATP hydrolysis cycle. We also found that the large periplasmic loop of MacB plays the major role in coupling reactions separated in two different membranes. This loop is required for MacA-dependent stimulation of MacB ATPase and at the same time, contributes to recruitment of TolC into a trans-envelope complex. PMID:23057817

  8. Os fundamentos mecânicos do eletromagnetismo

    OpenAIRE

    Dias,Penha Maria Cardozo; Morais,Rodrigo Fernandes

    2014-01-01

    James Clerk Maxwell elaborou uma teoria do Eletromagnetismo, a partir de propriedades dinâmicas de um fluido, o éter. Seguindo os cálculos de Maxwell, é possível identificar princípios, físicos e matemáticos, nos quais a teoria se apóia. A principal propriedade é a elasticidade rotacional do fluido, introduzida por James MacCullagh. Mas a teoria deixa problemas, entre os quais os mais impactantes são a natureza da corrente e o tratamento de condutores. Embora a teoria não seja mais aceita, el...

  9. Windows 8 visual quick tips

    CERN Document Server

    McFedries, Paul

    2012-01-01

    Easy-in, easy-out format covers all the bells and whistles of Windows 8 If you want to learn how to work smarter and faster in Microsoft's Windows 8 operating system, this easy-to-use, compact guide delivers the goods. Designed for visual learners, it features short explanations and full-color screen shots on almost every page, and it's packed with timesaving tips and helpful productivity tricks. From enhancing performance and managing digital content to setting up security and much more, this handy guide will help you get more out of Windows 8. Uses full-color screen shots and short, step-by-

  10. Transparent solar cell window module

    Energy Technology Data Exchange (ETDEWEB)

    Chau, Joseph Lik Hang; Chen, Ruei-Tang; Hwang, Gan-Lin; Tsai, Ping-Yuan [Nanopowder and Thin Film Technology Center, ITRI South, Industrial Technology Research Institute, Tainan County 709 (China); Lin, Chien-Chu [I-Lai Acrylic Corporation, Tainan City (China)

    2010-03-15

    A transparent solar cell window module based on the integration of traditional silicon solar cells and organic-inorganic nanocomposite material was designed and fabricated. The transparent solar cell window module was composed of a nanocomposite light-guide plate and traditional silicon solar cells. The preparation of the nanocomposite light-guide plate is easy without modification of the traditional casting process, the nanoparticles sol can be added directly to the polymethyl methacrylate (PMMA) monomer syrup during the process. The solar energy collected by this window can be used to power up small household electrical appliances. (author)

  11. Big Book of Windows Hacks

    CERN Document Server

    Gralla, Preston

    2008-01-01

    Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB key, or hack the "unhackable" screensavers, you'll find quick and ingenious ways to bend these recalcitrant operating systems to your will. The Big Book of Windows Hacks focuses on Vista, the new bad boy on Microsoft's block, with hacks and workarounds that

  12. Windows Phone 7 Made Simple

    CERN Document Server

    Trautschold, Martin

    2011-01-01

    With Windows Phone 7, Microsoft has created a completely new smartphone operating system that focuses on allowing users to be productive with their smartphone in new ways, while offering seamless integration and use of Microsoft Office Mobile as well as other productivity apps available in the Microsoft App Store. Windows Phone 7 Made Simple offers a clear, visual, step-by-step approach to using your Windows Phone 7 smartphone, no matter what the manufacturer. Author Jon Westfall is an expert in mobile devices, recognized by Microsoft as a "Most Valuable Professional" with experience

  13. Holography through optically active windows

    Science.gov (United States)

    Decker, A. J.

    1979-01-01

    By using two orthogonally polarized reference beams, holograms can be recorded through stressed windows and the reconstructed virtual image will show no stress pattern. As shown analytically, the stress-pattern-free hologram is recordable for any polarization state of the object illumination. Hence, the more efficient nondepolarizing diffuser can be used in performing holography through stressed windows if two reference beams are used. Results are presented for a pair of machined polysulfone windows intended for use in a holographic flow-visualization setup in a single-stage-compressor test rig.

  14. Grab Windows training opportunities; check CERN Windows roadmap!

    CERN Multimedia

    IT Department

    2011-01-01

    CERN Operating Systems and Information Services group (IT-OIS) actively monitors market trends to check how new software products correspond to CERN needs. In the Windows world, Windows 7 has been a big hit, with over 1500 Windows 7 PCs within less than a year since its support was introduced at CERN. No wonder: Windows XP is nearly 10 years old and is steadily approaching the end of its life-cycle. At CERN, support for Windows XP will stop at the end of December 2012. Compared to Vista, Windows 7 has the same basic hardware requirements, but offers higher performance, so the decision to upgrade is rather straightforward. CERN support for Vista will end in June 2011. In the world of Microsoft Office, version 2007 offers better integration with the central services than the older version 2003. Progressive upgrade from 2003 to 2007 is planned to finish in September 2011, but users are encouraged to pro-actively upgrade at their convenience. Please note that Office 2007 brings an important change in the area of ...

  15. Victor Bérard et la Macédoine

    Directory of Open Access Journals (Sweden)

    Ivan Savev

    2011-01-01

    Full Text Available Un helléniste convaincu, Victor Bérard, en vient, au début du XXe siècle à soutenir l’existence de « Macédoniens » et le slogan « la Macédoine aux Macédoniens”.Le Congrès de Berlin en 1878 avait laissé la Macédoine aux mains des Ottomans. La Grèce, la Serbie et la Bulgarie, parvenues à ses limites et prévoyant le retrait futur des Ottomans peaufinent les arguments linguistiques et historiques qui justifieront leurs revendications territoriales. Victor Bérard, un helléniste respecté et bon connaisseur de la région sud balkanique, effectue des enquêtes en Macédoine en 1896 et 1903 qu’il publie à Paris.Cette étude montre comment, dans le contexte de la propagande nationaliste des prétendants à la possession de la Macédoine, Victor Bérard en vient progressivement à affirmer qu’il existe une population autochtone, les Macédoniens. Il soutient leur programme pour la constitution d’une fédération ou confédération avec le slogan « la Macédoine aux Macédoniens » ce qui fait toute l’actualité de ses ouvrages.In 1878, the Congress of Berlin had left Macedonia in the hands of the Ottomans. Greece, Serbia and Bulgaria had reached its limits. Anticipating the Ottoman retreat, they polish language and historical arguments that will justify their territorial claims. Victor Bérard, a respected Hellenist and a good expert of the southern Balkans, is doing researches in Macedonia in 1896 and 1903. These will be later published in Paris.This study shows how, in the context of the nationalist propaganda build-up made by the candidates for the possession of Macedonia, Victor Bérard comes progressively to assert the existence of a native population: the Macedonians. He supports their program for the forming of a federation or confederation which slogan would be “Macedonia to Macedonians”. This makes his works very topical.

  16. Design and FPGA implementation for MAC layer of Ethernet PON

    Science.gov (United States)

    Zhu, Zengxi; Lin, Rujian; Chen, Jian; Ye, Jiajun; Chen, Xinqiao

    2004-04-01

    Ethernet passive optical network (EPON), which represents the convergence of low-cost, high-bandwidth and supporting multiple services, appears to be one of the best candidates for the next-generation access network. The work of standardizing EPON as a solution for access network is still underway in the IEEE802.3ah Ethernet in the first mile (EFM) task force. The final release is expected in 2004. Up to now, there has been no standard application specific integrated circuit (ASIC) chip available which fulfills the functions of media access control (MAC) layer of EPON. The MAC layer in EPON system has many functions, such as point-to-point emulation (P2PE), Ethernet MAC functionality, multi-point control protocol (MPCP), network operation, administration and maintenance (OAM) and link security. To implement those functions mentioned above, an embedded real-time operating system (RTOS) and a flexible programmable logic device (PLD) with an embedded processor are used. The software and hardware functions in MAC layer are realized through programming embedded microprocessor and field programmable gate array(FPGA). Finally, some experimental results are given in this paper. The method stated here can provide a valuable reference for developing EPON MAC layer ASIC.

  17. Alterações de linguagem em pacientes idosos portadores de demência avaliados com a Bateria MAC Language alterations in elderly patients with dementia assessed with the MAC Battery

    Directory of Open Access Journals (Sweden)

    Cristine Koehler

    2012-03-01

    Full Text Available OBJETIVO: Identificar as alterações de linguagem em um grupo de pacientes idosos portadores de demência nas tarefas de evocação lexical livre, com critério ortográfico e com critério semântico, interpretação de metáforas e discurso narrativo da Bateria Montreal de Avaliação da Comunicação - Bateria MAC, bem como, verificar a frequência de déficits. MÉTODOS: Participaram do estudo 13 pacientes com demência de grau leve a moderada, atendidos no Setor de Neurologia do Ambulatório de Distúrbios do Movimento e Demências do Hospital Santa Clara da Irmandade Santa Casa de Misericórdia de Porto Alegre (ISCMPA. O instrumento neuropsicológico de avaliação foi a Bateria MAC e a aplicação das tarefas seguiu a seguinte ordem: evocação lexical livre, evocação lexical com critério ortográfico, evocação lexical com critério semântico, interpretação de metáforas e discurso narrativo. RESULTADOS: O grupo de pacientes com demência apresentou desempenho deficitário em todas as tarefas da Bateria MAC que foram avaliadas, com diferença significativa. Além disso, os participantes apresentaram maior frequência de déficits, em ordem decrescente, nas tarefas de reconto parcial do discurso narrativo (informações essenciais e presentes, seguidas pelas tarefas de evocação lexical com critério ortográfico e com critério semântico, e reconto integral do discurso narrativo. Pelo menos dois pacientes apresentaram alterações de desempenho em alguma das cinco tarefas realizadas da Bateria MAC. CONCLUSÃO: A avaliação de linguagem através da Bateria MAC permitiu a verificação de alterações do processamento linguístico em idosos com demência, o que caracteriza que tal instrumento também é aplicável para esta população clínica.PURPOSE: To identify language deficits in a group of elderly patients with dementia in tasks of free lexical retrieval, lexical retrieval with orthographic and semantic criteria

  18. Infrared monitoring of gyrotron windows

    International Nuclear Information System (INIS)

    Huey, H.; Lopez, N.; Hu, G.; Choi, E.; Mundie, L.

    1983-01-01

    A technique for monitoring the gyrotron output window surface temperature with an infrared camera while the gyrotron is in operation has been developed. The IR camera views the window through a perforated waveguide wall, and serves both as a guide for the safe operation at high average power of the tube, as well as an aid in the analysis of new window designs. Window temperatures were studied as a function of a number of parameters, including gun anode voltage, beam current, magnetic field, coolant flow, and load matching. The IR technique is applicable to many types of high average power microwave and millimeter wave tubes. Successful operation of the Varian 60 GHz gyrotron to 214 kW CW was guided by the infrared camera. Analyses on 28, 56 and 60 GHz gyrotrons have led to a number of design changes. A comparison with computer calculations is also presented

  19. A window on urban sustainability

    International Nuclear Information System (INIS)

    Stigt, Rien van; Driessen, Peter P.J.; Spit, Tejo J.M.

    2013-01-01

    Sustainable urban development requires the integration of environmental interests in urban planning. Although various methods of environmental assessment have been developed, plan outcomes are often disappointing due to the complex nature of decision-making in urban planning, which takes place in multiple arenas within multiple policy networks involving diverse stakeholders. We argue that the concept of ‘decision windows’ can structure this seemingly chaotic chain of interrelated decisions. First, explicitly considering the dynamics of the decision-making process, we further conceptualized decision windows as moments in an intricate web of substantively connected deliberative processes where issues are reframed within a decision-making arena, and interests may be linked within and across arenas. Adopting this perspective in two case studies, we then explored how decision windows arise, which factors determine their effectiveness and how their occurrence can be influenced so as to arrive at more sustainable solutions. We conclude that the integration of environmental interests in urban planning is highly dependent on the ability of the professionals involved to recognize and manipulate decision windows. Finally, we explore how decision windows may be opened. -- Highlights: • Decision-making about sustainable urban development occurs in networks. • The concept of ‘decision windows’ was further elaborated. • Decision windows help understand how environmental interests enter decision-making. • Decision windows can, to some extent, be influenced

  20. Office for iPad and Mac for dummies

    CERN Document Server

    Weverka, Peter

    2015-01-01

    The easy way to work with Office on your iPad or Mac Are you a Mac user who isn't accustomed to working with Microsoft Office? Consider this friendly guide your go-to reference! Written in plain English and packed with easy-to-follow, step-by-step instructions, Office for iPad and Mac For Dummies walks you through every facet of Office, from installing the software and opening files to working with Word, Excel, PowerPoint, and Outlook-and beyond. Plus, you'll discover how to manage files, share content and collaborate online through social media, and find help when you need it. Two things a

  1. Dolphin natures, human virtues: MacIntyre and ethical naturalism.

    Science.gov (United States)

    Glackin, Shane Nicholas

    2008-09-01

    Can biological facts explain human morality? Aristotelian 'virtue' ethics has traditionally assumed so. In recent years Alasdair MacIntyre has reintroduced a form of Aristotle's 'metaphysical biology' into his ethics. He argues that the ethological study of dependence and rationality in other species--dolphins in particular--sheds light on how those same traits in the typical lives of humans give rise to the moral virtues. However, some goal-oriented dolphin behaviour appears both dependent and rational in the precise manner which impresses MacIntyre, yet anything but ethically 'virtuous'. More damningly, dolphin ethologists consistently refuse to evaluate such behaviour in the manner MacIntyre claims is appropriate to moral judgement. In light of this, I argue that virtues--insofar as they name a biological or ethological category--do not name a morally significant one.

  2. SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid.

    Science.gov (United States)

    Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin

    2016-03-31

    The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid.

  3. SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid

    Science.gov (United States)

    Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin

    2016-01-01

    The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid. PMID:27043573

  4. Mastering Microsoft Windows Server 2008 R2

    CERN Document Server

    Minasi, Mark; Finn, Aidan

    2010-01-01

    The one book you absolutely need to get up and running with Windows Server 2008 R2. One of the world's leading Windows authorities and top-selling author Mark Minasi explores every nook and cranny of the latest version of Microsoft's flagship network operating system, Windows Server 2008 R2, giving you the most in-depth coverage in any book on the market.: Focuses on Windows Windows Server 2008 R2, the newest version of Microsoft's Windows' server line of operating system, and the ideal server for new Windows 7 clients; Author Mark Minasi is one of the world's leading Windows authorities and h

  5. Mapping of MAC Address with Moving WiFi Scanner

    Directory of Open Access Journals (Sweden)

    Arief Hidayat

    2017-10-01

    Full Text Available Recently, Wifi is one of the most useful technologies that can be used for detecting and counting MAC Address. This paper described using of WiFi scanner which carried out seven times circulated the bus. The method used WiFi and GPS are to counting MAC address as raw data from the pedestrian smartphone, bus passenger or WiFi devices near from the bus as long as the bus going around the route. There are seven processes to make map WiFi data.

  6. Alasdair MacIntyre: relatividad conceptual, tomismo y liberalismo

    Directory of Open Access Journals (Sweden)

    Carlos Isler S.

    2011-01-01

    Full Text Available Influenciado por Thomas Kuhn, Alasdair MacIntyre presenta una teoría conceptualmente relativista sobre las tradiciones de investigación, la cual pretende no sólo describir la estructura de las distintas tradiciones, sino también encontrar un principioque permita resolver las disputas entre ellas. Se expone esta teoría y se analiza su compatibilidad con el tomismo, tradición a la que MacIntyre dice pertenecer, y con el liberalismo, tradición a la que critica con vigor.

  7. Dynamic Contention Window Control Scheme in IEEE 802.11e EDCA-Based Wireless LANs

    Science.gov (United States)

    Abeysekera, B. A. Hirantha Sithira; Matsuda, Takahiro; Takine, Tetsuya

    In the IEEE 802.11 MAC protocol, access points (APs) are given the same priority as wireless terminals in terms of acquiring the wireless link, even though they aggregate several downlink flows. This feature leads to a serious throughput degradation of downlink flows, compared with uplink flows. In this paper, we propose a dynamic contention window control scheme for the IEEE 802.11e EDCA-based wireless LANs, in order to achieve fairness between uplink and downlink TCP flows while guaranteeing QoS requirements for real-time traffic. The proposed scheme first determines the minimum contention window size in the best-effort access category at APs, based on the number of TCP flows. It then determines the minimum and maximum contention window sizes in higher priority access categories, such as voice and video, so as to guarantee QoS requirements for these real-time traffic. Note that the proposed scheme does not require any modification to the MAC protocol at wireless terminals. Through simulation experiments, we show the effectiveness of the proposed scheme.

  8. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  9. Algorithme distribué pour l'assignation de rôles dans Molecular MAC, une couche MAC multicanal

    OpenAIRE

    Darties, Benoit; Theoleyre, Fabrice; Duda, Andrzej

    2009-01-01

    International audience; Une couche MAC multicanal semble une approche intéressante afin d'optimiser le débit d'un réseau maillé radio en multiplexant les transmissions sur des canaux orthogonaux. En particulier, Molecular MAC pro- posé récemment étends I E E E 802.11 DCF afin d'offrir une telle fonctionnalité. Cependant, ce protocol requiert une assignation de rôles et canaux : certains noeuds utilisent un canal statique tandis que les autres sautent continuellement de canal. Nous étendons ici ...

  10. Switchable Materials for Smart Windows.

    Science.gov (United States)

    Wang, Yang; Runnerstrom, Evan L; Milliron, Delia J

    2016-06-07

    This article reviews the basic principles of and recent developments in electrochromic, photochromic, and thermochromic materials for applications in smart windows. Compared with current static windows, smart windows can dynamically modulate the transmittance of solar irradiation based on weather conditions and personal preferences, thus simultaneously improving building energy efficiency and indoor human comfort. Although some smart windows are commercially available, their widespread implementation has not yet been realized. Recent advances in nanostructured materials provide new opportunities for next-generation smart window technology owing to their unique structure-property relations. Nanomaterials can provide enhanced coloration efficiency, faster switching kinetics, and longer lifetime. In addition, their compatibility with solution processing enables low-cost and high-throughput fabrication. This review also discusses the importance of dual-band modulation of visible and near-infrared (NIR) light, as nearly 50% of solar energy lies in the NIR region. Some latest results show that solution-processable nanostructured systems can selectively modulate the NIR light without affecting the visible transmittance, thus reducing energy consumption by air conditioning, heating, and artificial lighting.

  11. Users of the main smartphone operating systems (iOS, Android differ only little in personality.

    Directory of Open Access Journals (Sweden)

    Friedrich M Götz

    Full Text Available The increasingly widespread use of mobile phone applications (apps as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081 and a German-speaking sample (Study 2; N = 2,438. As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five. Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows. In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1, ηp2 = .005 to .036 (Study 2, respectively and may reflect differences in sociodemographic composition, rather than operating system of smartphone users.

  12. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  13. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  14. God, Sport Philosophy, Kinesiology: A MacIntyrean Examination

    Science.gov (United States)

    Twietmeyer, Gregg

    2015-01-01

    Sport philosophy is in crisis. This subdiscipline of kinesiology garners little to no respect and few tenure track lines in kinesiology departments. Why is this the case? Why isn't philosophy held in greater esteem? Is it possible that philosopher Alasdair MacIntyre's (2009) diagnosis found in "God, Philosophy, Universities" could…

  15. Throughput modeling of the IEEE MAC for sensor networks

    NARCIS (Netherlands)

    M. Onderwater (Martijn); G.J. Hoekstra (Gerard); R.D. van der Mei (Rob)

    2017-01-01

    textabstractIn this paper we provide a model for analyzing the saturation throughput of the ieee 802.15.4 mac protocol, which is the de-facto standard for wireless sensor networks, ensuring fair access to the channel. To this end, we introduce the concept of a natural layer, which reflects the time

  16. MAC/FAC: A Model of Similarity-Based Retrieval.

    Science.gov (United States)

    Forbus, Kenneth D.; And Others

    1995-01-01

    Presents MAC/FAC, a model of similarity-based retrieval that attempts to capture psychological phenomena; discusses its limitations and extensions, its relationship with other retrieval models, and its placement in the context of other work on the nature of similarity. Examines the utility of the model through psychological experiments and…

  17. Evaluation of the MacDonald scabbler for highway use.

    Science.gov (United States)

    1975-01-01

    The MacDonald Scabbler is a small, hand held machine suitable for use in cleaning and roughening concrete surfaces, It weighs 308 pounds (140 kg), has 11 cutting heads, and, as a power source, requires a compressor capable of delivering 365 cubic foo...

  18. Florence Jessie MacWilliams (1917-1990)

    Indian Academy of Sciences (India)

    famous mathematician Oscar Zariski, well known for his work in algebraic geometry, at. Johns Hopkins University, following him to Harvard University to study with him for a year. There was a break in her studies for many years following her marriage in 1941 to. W al ter Mac Williams, an engineer, and the birth and raising of ...

  19. 42 CFR 405.1130 - Effect of the MAC's decision.

    Science.gov (United States)

    2010-10-01

    ....1130 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE PROGRAM FEDERAL HEALTH INSURANCE FOR THE AGED AND DISABLED Determinations, Redeterminations... court within 60 calendar days after the date it receives notice of the MAC's decision. [74 FR 65338, Dec...

  20. 12 CFR 615.5174 - Farmer Mac securities.

    Science.gov (United States)

    2010-01-01

    ... managing credit and interest rate risks, and furthering your mission to finance agriculture. The total... securities. (2) Credit risk parameters including: (i) The quantities and types of Farmer Mac mortgage....5174 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FUNDING AND FISCAL AFFAIRS, LOAN...

  1. 16 CFR 455.3 - Window form.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Window form. 455.3 Section 455.3 Commercial... Window form. (a) Form given to buyer. Give the buyer of a used vehicle sold by you the window form...) Incorporated into contract. The information on the final version of the window form is incorporated into the...

  2. Music@Microsoft.Windows: Composing Ambience

    Science.gov (United States)

    Rickert, Thomas

    2010-01-01

    It is well known, of course, that all Windows versions except for 3.1 have a brief (four to six second) piece of music indicating that Windows is booted and ready for use. While the music may indicate Windows has booted, it bears no immediately discernable relation to the various uses we might actually put Windows to--working, gaming,…

  3. Windows Server 2012 R2 administrator cookbook

    CERN Document Server

    Krause, Jordan

    2015-01-01

    This book is intended for system administrators and IT professionals with experience in Windows Server 2008 or Windows Server 2012 environments who are looking to acquire the skills and knowledge necessary to manage and maintain the core infrastructure required for a Windows Server 2012 and Windows Server 2012 R2 environment.

  4. Travailler avec Windows 7 au CERN (FR)

    CERN Multimedia

    CERN. Geneva

    2010-01-01

    Vue d'ensemble des nouveaux concepts et des changements dans l'interface utilisateur survenus dans Windows 7 depuis les versions antérieures de Windows (XP ou Vista). La mise à disposition de Windows 7 au CERN et son intégration dans l’infrastructure de Windows au CERN seront présentées.

  5. Characteristics of Mycobacterium avium complex (MAC pulmonary disease in previously treated lung cancer patients

    Directory of Open Access Journals (Sweden)

    Erin Meier

    2017-01-01

    Conclusion: MAC pulmonary disease in previously treated lung cancer can occur without apparent risk factors for this NTM infection. Symptomatic improvement with MAC antimicrobial therapy appears to be lower than expected but comorbidities might influence outcomes in this patient population.

  6. Pyrogen testing of lipid-based TPN using Mono Mac 6 monocyte cell line and DELFIA

    DEFF Research Database (Denmark)

    Moesby, Lise; Hansen, E W; Christensen, J D

    1997-01-01

    Measurement of lipopolysaccharide (LPS) induced interleukin-6 (IL-6) secretion in Mono Mac 6 cells.......Measurement of lipopolysaccharide (LPS) induced interleukin-6 (IL-6) secretion in Mono Mac 6 cells....

  7. Oscillatory integration windows in neurons

    Science.gov (United States)

    Gupta, Nitin; Singh, Swikriti Saran; Stopfer, Mark

    2016-01-01

    Oscillatory synchrony among neurons occurs in many species and brain areas, and has been proposed to help neural circuits process information. One hypothesis states that oscillatory input creates cyclic integration windows: specific times in each oscillatory cycle when postsynaptic neurons become especially responsive to inputs. With paired local field potential (LFP) and intracellular recordings and controlled stimulus manipulations we directly test this idea in the locust olfactory system. We find that inputs arriving in Kenyon cells (KCs) sum most effectively in a preferred window of the oscillation cycle. With a computational model, we show that the non-uniform structure of noise in the membrane potential helps mediate this process. Further experiments performed in vivo demonstrate that integration windows can form in the absence of inhibition and at a broad range of oscillation frequencies. Our results reveal how a fundamental coincidence-detection mechanism in a neural circuit functions to decode temporally organized spiking. PMID:27976720

  8. Teach yourself visually Windows 8

    CERN Document Server

    McFedries, Paul

    2012-01-01

    A practical guide for visual learners eager to get started with Windows 8 If you learn more quickly when you can see how things are done, this Visual guide is the easiest way to get up and running on Windows 8. It covers more than 150 essential Windows tasks, using full-color screen shots and step-by-step instructions to show you just what to do. Learn your way around the interface and how to install programs, set up user accounts, play music and other media files, download photos from your digital camera, go online, set up and secure an e-mail account, and much more. The tried-and-true format

  9. Windows Server 2012 : Uudet ominaisuudet ja muutokset

    OpenAIRE

    Oksanen, Joni

    2013-01-01

    Tämän opintyön tarkoituksena on valottaa Windows Server 2012 -käyttöjärjestelmän muutoksia verrattuna vanhaan Windows Server 2008 R2 -versioon. Työ aloitettiin ennen Windows Server 2012 -julkaisua Release Candidate -version testauksella ja myöhemmin julkaisun jälkeen Windows Serverin kokeiluversiolla. Työssä on silti ajankohtaista tietoa Windows Server 2012:sta. Aluksi käsitellään Windows Servereiden kehityskaarta lyhyesti ja käsitellään uusinta Windows Serveriä tuotteena se...

  10. Windows 7 is supported at CERN

    CERN Multimedia

    IT Department

    2010-01-01

    The new version of the Windows operating system - Windows 7 - is now officially supported at CERN. Windows 7 32-bit is now the default operating system for the new computers at CERN. What’s new in Windows 7 Users of Windows XP will find many new features and options. Users of Windows Vista will feel very familiar with one major difference: higher performance and better responsiveness of the operating system. Other enhancements include: refined Aero desktop that makes it easier to navigate between your different application windows; new snapping windows that allows user to resize a window simply by dragging it to the edge of the screen and “pin” that allows grouping and arranging often accessed applications on the taskbar. Windows 7 introduces the new concept of libraries – containers for user files that have links to different local or network folders. By default, users can see four libraries: Documents, Music, Pictures and Videos. These libraries point to the cor...

  11. *New* CRITICAL Windows Security patch

    CERN Multimedia

    2003-01-01

    On 10 September 2003, Microsoft issued a new CRITICAL security patch, MS03-039. It must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security hole and patch for MS03-039 (which also includes MS03-026) are at: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp

  12. *New*: CRITICAL Windows Security patch

    CERN Multimedia

    2003-01-01

    On 10 September 2003, Microsoft issued a new CRITICAL security patch, MS03-039. It must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security hole and patch for MS03-039 (which also includes MS03-026) are at: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp

  13. Advanced Control of Electrochromic Windows

    OpenAIRE

    Scartezzini, Jean-Louis; Zarkadis, Nikos; Morel, Nicolas

    2013-01-01

    In our research we use the technology of electrochromic (EC) glazing to maximize the use of daylight and minimize the energy consumption in buildings while preserving visual and thermal comfort of the users. We propose an advanced automatic control of EC windows coupled with an anidolic daylighting system (ADS), blinds and dimmable fluorescent lights. EC windows with a visible transmittance range (Tv) of 0.15 – 0.50 were installed on the southern façade of an office room of the LESO experimen...

  14. What's New in Windows Vista?

    CERN Document Server

    Culp, Brian

    2006-01-01

    Get ready for a quick blast through this significant change to Windows! This guide will give you a quick look at many of the most significant new features in Vista, Microsoft's first revision of Windows in nearly six years. Starting with the changes to the interface, introducing Aero, and showing you some visuals, we then move on to the completely revamped search options. The new task scheduler and printing gadgets, are next with some cool new changes. Probably the most significant changes, however, come in the area of security and this guide takes a look at them from user priveleges, to

  15. Windows Vista Administrator's Pocket Guide

    CERN Document Server

    Stanek, William R

    2007-01-01

    Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of Windows Vista. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You'll get the precise information you need to solve problems and get the job done-whether you're at your desk or in the field! Get fast facts to: Install and configure Windows Vista-and optimize the user workspaceMaintain operating system components, hardware devices, and driversCreate user and group accounts-and control rights and permissionsAdminister group policy se

  16. SNS Proton Beam Window Disposal

    Directory of Open Access Journals (Sweden)

    Popova Irina

    2017-01-01

    Full Text Available In order to support the disposal of the proton beam window assembly of the Spallation Neutron Source beamline to the target station, waste classification analyses are performed. The window has a limited life-time due to radiation-induced material damage. Analyses include calculation of the radionuclide inventory and shielding analyses for the transport package/container to ensure that the container is compliant with the transportation and waste management regulations. In order to automate this procedure and minimize manual work a script in Perl language was written.

  17. f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization

    OpenAIRE

    Roedig, Utz; Barroso, Andre; Sreenan, Cormac J.

    2006-01-01

    Nodes in a wireless network transmit messages through a shared medium. Thus, a Media Access Control (MAC) protocol is necessary to regulate and coordinate medium access. For some application areas it is necessary to have a deterministic MAC protocol which can give guarantees on message delay and channel throughput. Schedule based MAC protocols, based on time synchronization among nodes, are currently used to implement deterministic MAC protocols. Time synchronization is difficult and costly, ...

  18. Forensic Analysis of Windows Registry Against Intrusion

    OpenAIRE

    Haoyang Xie; Keyu Jiang; Xiaohong Yuan

    2012-01-01

    Windows Registry forensics is an important branch of computer and network forensics. Windows Registry is often considered as the heart of Windows Operating Systems because it contains allof the configuration setting of specific users, groups, hardware, software, and networks. Therefore, Windows Registry can be viewed as a gold mine of forensic evidences which could be used in courts. This paper introduces the basics of Windows Registry, describes its structure and its keys and subkeys thathav...

  19. Extended Second Window of Protection of Sevoflurane-induced Preconditioning.

    Science.gov (United States)

    Behmenburg, Friederike; Boekholt, Yvonne; van Caster, Patrick; Dorsch, Marianne; Heinen, André; Hollmann, Markus W; Huhn, Ragnar

    2017-11-01

    Late preconditioning (LPC) can be induced by volatile anesthetics and initiates cardioprotection against ischemia/reperfusion injury for 3-4 days. We investigated the possibility to extend the time window of sevoflurane-induced LPC by repeated sevoflurane administration. An in vivo rat model of regional myocardial ischemia/reperfusion injury was used. Myocardial infarct size was determined by triphenyltetrazolium chloride staining at the end of the experiment. In the first series of experiments, male Wistar rats were randomized to 5 groups (each n = 8). Control animals were not treated further. Animals in the preconditioning groups inhaled sevoflurane for 60 minutes (1 MAC) 24, 48, 72, and 96 hours, respectively, before myocardial ischemia. Based on the findings of the first experimental series, another 6 groups of animals were investigated. Again, control animals were left untreated; all other animals received a second sevoflurane stimulus 72 hours after the first sevoflurane treatment, and myocardial ischemia was induced 24, 48, 72, and 96 hours, respectively, after the second sevoflurane treatment to investigate, whether the cardioprotective effect could be extended. Sevoflurane reduced infarct size after 24, 48, and 72 hours (each P < 0.05 vs. control) but not after 96 hours. The repeated administration of sevoflurane 72 hours after the first stimulus extended the time window of protection for additional 72 hours (each P < 0.05 vs. control). There was no myocardial protection 4 days after the second preconditioning stimulus. The time window of sevoflurane-induced LPC can be extended by an additional sevoflurane stimulus up to 72 hours after the initial sevoflurane exposure.

  20. 42 CFR 421.404 - Assignment of providers and suppliers to MACs.

    Science.gov (United States)

    2010-10-01

    ... (MACs) § 421.404 Assignment of providers and suppliers to MACs. (a) Definitions. As used in this section... 42 Public Health 3 2010-10-01 2010-10-01 false Assignment of providers and suppliers to MACs. 421... indirectly, to significantly influence or direct the actions or policies of the group of suppliers or...

  1. Eficácia do videolaringoscópio C-MAC no manejo de intubações malsucedidas inesperadas

    Directory of Open Access Journals (Sweden)

    Alper Kilicaslan

    2014-01-01

    Full Text Available Justificativa e objetivos: O objetivo deste estudo foi fazer uma revisão das experiências de um departamento de anestesiologia em relação ao uso do videolaringoscópio C-MAC em tentativas malsucedidas de intubação. Métodos: Analisamos os dados de 42 pacientes, cujas tentativas de intubação com o uso delaringoscopia direta (Macintosh tinham falhado e nos quais o videolaringoscópio C-MAC foi usado como o dispositivo de resgate primário. A taxa de sucesso do C-MAC em intubação foi avaliada e a visão da laringe em ambos os dispositivos foi comparada. Resultados: Com o laringoscópio Macintosh, o escore de Cormack e Lehane foi 3 em 41 pacientes e 4 em um paciente e com o CMAC, foi 1 em 27 pacientes, 2 em 14 pacientes e 3 em um paciente. Intubação traqueal com CMAC foi bem-sucedida em 36 pacientes (86% na primeira tentativa e em seis pacientes (14% na segunda tentativa. Nenhuma complicação foi observada, além de pequena lesão (sangue na lâmina em oito pacientes (19%. Conclusão: Esses dados fornecem evidência para a eficácia clínica do videolaringoscópio C-MAC no manejo de intubações malsucedidas inesperadas em assistência rotineira de anestesia. O videolaringoscópio C-MAC é eficiente e seguro como dispositivo de resgate primário em intubações malsucedidas inesperadas.

  2. Exceptional and Spinorial Conformal Windows

    DEFF Research Database (Denmark)

    Mojaza, Matin; Pica, Claudio; Ryttov, Thomas

    2012-01-01

    We study the conformal window of gauge theories containing fermionic matter fields, where the gauge group is any of the exceptional groups with the fermions transforming according to the fundamental and adjoint representations and the orthogonal groups where the fermions transform according...

  3. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad; Hassan, Mohammad; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-01-01

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC, a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS de...

  4. Una lectura interpretativa de Tras la virtud, de Alasdair MacIntyre - An Interpretive Reading of After Virtue, by Alasdair MacIntyre

    Directory of Open Access Journals (Sweden)

    Fernando Fernández-Llebrez

    2010-12-01

    Full Text Available This article centers on the thought of Alasdair MacIntyre, whose most prominente work, After Virtue, is considered a classic of political science. In contrast with other reviews, this article will examine After Virtue within the broader context of MacIntyre’s thinking and publications. An overview of MacIntyre’s literary corpus and the evolution of his thinking will shed light on the volume examined and trace certain ideas that are characteristic of this Scottish political philosopher. Matters that remained unsettled in After Virtue have become over time more defined in MacIntyre’s thinking, such as the influence exerted upon him by Thomas Aquinas.

  5. Removable Window System for Space Vehicles

    Science.gov (United States)

    Grady, James P. (Inventor)

    2015-01-01

    A window system for a platform comprising a window pane, a retention frame, and a biasing system. The window pane may be configured to contact a sealing system. The retention frame may be configured to contact the sealing system and hold the window pane against the support frame. The biasing system may be configured to bias the retention frame toward the support frame while the support frame and the retention frame are in a configuration that holds the window pane. Removal of the biasing system may cause the retention frame and the window pane to be removable.

  6. An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh

    Directory of Open Access Journals (Sweden)

    Gregory H. Carlton

    2008-09-01

    Full Text Available The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budget constraints that limit their access to computer hardware. Currently, Macintosh computer systems are marketed with the ability to accommodate these three common operating system environments, including Windows XP in native and virtual environments. We performed a series of experiments to measure the functionality and performance of the two most commonly used Windows-based computer forensics applications on a Macintosh running Windows XP in native mode and in two virtual environments relative to a similarly configured Dell personal computer. The research results are directly beneficial to practitioners, and the process illustrates affective pedagogy whereby students were engaged in applied research.

  7. LHC@home online tutorial for Mac users - recording

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    A step-by-step online tutorial about LHC@home for Mac users by Alexandre Racine. It contains detailed instructions on how-to-join this volunteer computing project.  There are 3 screen capture videos with the real installation process accelerated attached to the event page. This 5' video is linked from http://lhcathome.web.cern.ch/join-us Also from the CDS e-learning category.

  8. Performance of MAC protocols in beaconing Mobile Adhoc Multibroadcast Networks

    OpenAIRE

    Rico García, Cristina; Lehner, Andreas; Robertson, Patrick; Strang, Thomas

    2010-01-01

    The investigation of infrastructureless safety applications in dierent transportation systems is a hot research topic. The nodes in thevnetwork are designed to advertise to the rest of the nodes informationabout the current traffic situation by means of short beacon messages containing speed, direction, positions and other relevant safety information. The scheduling should be organized by the MAC layer so that the transmitted messages arrive successfully as soon as possible at the recei...

  9. MAC Layer Jamming Mitigation Using a Game Augmented by Intervention

    Directory of Open Access Journals (Sweden)

    Lin Zhichu

    2010-01-01

    Full Text Available MAC layer jamming is a common attack on wireless networks, which is easy to launch by the attacker and which is very effective in disrupting the service provided by the network. Most of the current MAC protocols for wireless networks, for example, IEEE 802.11, do not provide sufficient protection against MAC layer jamming attacks. In this paper, we first use a non-cooperative game model to characterize the interactions among a group of self-interested regular users and a malicious user. It can be shown that the Nash equilibrium of this game is either inefficient or unfair for the regular users. We introduce a policer (an intervention user who uses an intervention function to transform the original non-cooperative game into a new non-cooperative game augmented by the intervention function, in which the users will adjust to play a Nash equilibrium of the augmented game. By properly designing the intervention function, we show that the intervention user can effectively mitigate the jamming attacks from the malicious user, and at the same time let the regular users choose more efficient transmission strategies. It is proved that any feasible point in the rate region can be achieved as a Nash equilibrium of the augmented game by appropriately designing the intervention.

  10. *NEW* CRITICAL Windows Security patches

    CERN Multimedia

    2003-01-01

    On 3 October and 10 September 2003, Microsoft issued new CRITICAL security patches MS03-040 and MS03-039. They must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security holes and patches are at: MS03-039: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp MS03-040: http://cern.ch/it-div/news/hotfix-MS03-040.asp http://www.microsoft.com/technet/security/bulletin/MS03-040.asp

  11. Electrochromic Windows: Advanced Processing Technology

    Energy Technology Data Exchange (ETDEWEB)

    SAGE Electrochromics, Inc

    2006-12-13

    This project addresses the development of advanced fabrication capabilities for energy saving electrochromic (EC) windows. SAGE EC windows consist of an inorganic stack of thin films deposited onto a glass substrate. The window tint can be reversibly changed by the application of a low power dc voltage. This property can be used to modulate the amount of light and heat entering buildings (or vehicles) through the glazings. By judicious management of this so-called solar heat gain, it is possible to derive significant energy savings due to reductions in heating lighting, and air conditioning (HVAC). Several areas of SAGE’s production were targeted during this project to allow significant improvements to processing throughput, yield and overall quality of the processing, in an effort to reduce the cost and thereby improve the market penetration. First, the overall thin film process was optimized to allow a more robust set of operating points to be used, thereby maximizing the yield due to the thin film deposition themselves. Other significant efforts aimed at improving yield were relating to implementing new procedures and processes for the manufacturing process, to improve the quality of the substrate preparation, and the quality of the IGU fabrication. Furthermore, methods for reworking defective devices were developed, to enable devices which would otherwise be scrapped to be made into useful product. This involved the in-house development of some customized equipment. Finally, the improvements made during this project were validated to ensure that they did not impact the exceptional durability of the SageGlass® products. Given conservative estimates for cost and market penetration, energy savings due to EC windows in residences in the US are calculated to be of the order 0.026 quad (0.026×1015BTU/yr) by the year 2017.

  12. Mafai e Scipione: a Scuola Romana di Pittura no MAC-USP

    Directory of Open Access Journals (Sweden)

    Benjamim Saviani

    2012-01-01

    Full Text Available Estudo crítico sobre obras de dois pintores italianos, Mario Mafai e Gino Bonichi (dito Scipione, pertencentes à Scuola Romana di Pittura, presentes no Museu de Arte Contemporânea da Universidade de São Paulo (MAC-USP: Rapaz e Natureza-morta (Mafai e Oceano Indiano (Scipione integram o primeiro acervo do atual museu, e são advindas da antiga coleção do Museu de Arte Moderna de São Paulo (MAM-SP, formada por Ciccillo Matarazzo. Além de estudo iconográfico das obras em si, vem adjunto um estudo sobre sua relação com os acervos de arte moderna paulistanos, em formação em meados do século XX, de forte relação com a arte moderna italiana e os projetos político-culturais de ítalo-descendentes presentes em São Paulo, traço marcante do cenário cultural da cidade.

  13. The flexibility window in zeolites.

    Science.gov (United States)

    Sartbaeva, Asel; Wells, Stephen A; Treacy, M M J; Thorpe, M F

    2006-12-01

    Today synthetic zeolites are the most important catalysts in petrochemical refineries because of their high internal surface areas and molecular-sieving properties. There have been considerable efforts to synthesize new zeolites with specific pore geometries, to add to the 167 available at present. Millions of hypothetical structures have been generated on the basis of energy minimization, and there is an ongoing search for criteria capable of predicting new zeolite structures. Here we show, by geometric simulation, that all realizable zeolite framework structures show a flexibility window over a range of densities. We conjecture that this flexibility window is a necessary structural feature that enables zeolite synthesis, and therefore provides a valuable selection criterion when evaluating hypothetical zeolite framework structures as potential synthetic targets. We show that it is a general feature that experimental densities of silica zeolites lie at the low-density edge of this window--as the pores are driven to their maximum volume by Coulomb inflation. This is in contrast to most solids, which have the highest density consistent with the local chemical and geometrical constraints.

  14. Rugged Ceramic Window for RF Applications

    International Nuclear Information System (INIS)

    Neubauer, Michael; Johnson, Rolland P.; Rimmer, Robert; Elliot, Tom; Stirbet, Mircea

    2009-01-01

    High-current RF cavities that are needed for many accelerator applications are often limited by the power transmission capability of the pressure barriers (windows) that separate the cavity from the power source. Most efforts to improve RF window design have focused on alumina ceramic, the most popular historical choice, and have not taken advantage of new materials. Alternative window materials have been investigated using a novel Merit Factor comparison and likely candidates have been tested for the material properties which will enable construction in the self-matched window configuration. Window assemblies have also been modeled and fabricated using compressed window techniques which have proven to increase the power handling capability of waveguide windows. Candidate materials have been chosen to be used in fabricating a window for high power testing at Thomas Jefferson National Accelerator Facility.

  15. Sounding of the Plasmasphere by McMAC Magnetometers

    Science.gov (United States)

    Chi, P. J.; McMAC Team

    2012-04-01

    Properly positioned ground magnetometers can be used to detect resonance of magnetospheric field lines as a way to make unique observations of the plasma mass density of the magnetosphere. In this paper we describe the field line resonance (FLR) frequencies systematically observed by the Mid-continent MAgnetoseismic Chain (McMAC), which consists of 10 stations in the United States and Mexico along 300° magnetic longitude. With an average separation by 272 km between adjacent stations McMAC is well suited to remotely sensing the plasma density at L-values between 1.6 and 3.3 through the gradient method of FLR measurements. We analyzed a full year of McMAC observations spanning between July 2006 and June 2007, and FLR frequencies were automatically identified in cross-phase and cross-power spectrograms by a computer routine. In all of the FLR observations by pairs of McMAC stations, the occurrence rate of FLR can reach as high as 55% around local noon at L = 2.7. The occurrence rate drops at lower latitudes due to weaker FLR signals. At L = 3.3 the FLR occurrence is clearly reduced in afternoon hours, possibly because of occasional presence of the plasmapause that can obstruct FLR generation and/or detection. By examining the results from all possible pairs of McMAC stations, we find that, at L ≤ 2.5, FLR signatures can still be found even when the separation between two stations exceeds 1000 km. The fundamental mode FLR frequencies, in addition to the inferred equatorial plasma mass densities of the magnetosphere, are tabulated with respect to L-value and time. The most probable fundamental mode frequency is found to be approximately 75 mHz at L = 1.6 and decreases with increasing L-value. The distribution of the fundamental mode frequency at L = 3.3, however, exhibits two distinct groups: The lower frequencies centered at 10 mHz representing the measurements inside the plasmasphere whereas the higher frequencies centered at 39 mHz indicating the faster field

  16. Microsoft Windows Intune 20 Quickstart Administration

    CERN Document Server

    Overton, David

    2012-01-01

    This book is a concise and practical tutorial that shows you how to plan, set up and maintain Windows Intune and manage a group of PCs. If you are an administrator or partner who wants to plan, set up and maintain Windows Intune and manage a group of PCs then this book is for you . You should have a basic understanding of Windows administration, however, knowledge of Windows Intune would not be required.

  17. Beryllium window for an APS diagnostics beamline

    International Nuclear Information System (INIS)

    Sheng, I.C.; Yang, B.X.; Sharma, Y.S.

    1997-01-01

    A beryllium (Be) window for an Advanced Photon Source (APS) diagnostics beamline has been designed and built. The window, which has a double concave axisymmetrical profile with a thickness of 0.5 mm at the center, receives 160 W/mm 2 (7 GeV/100 mA stored beam) from an undulator beam. The window design as well as thermal and thermomechanical analyses, including thermal buckling of the Be window, are presented

  18. MacA, a periplasmic membrane fusion protein of the macrolide transporter MacAB-TolC, binds lipopolysaccharide core specifically and with high affinity.

    Science.gov (United States)

    Lu, Shuo; Zgurskaya, Helen I

    2013-11-01

    The Escherichia coli MacAB-TolC transporter has been implicated in efflux of macrolide antibiotics and secretion of enterotoxin STII. In this study, we found that purified MacA, a periplasmic membrane fusion protein, contains one tightly bound rough core lipopolysaccharide (R-LPS) molecule per MacA molecule. R-LPS was bound specifically to MacA protein with affinity exceeding that of polymyxin B. Sequence analyses showed that MacA contains two high-density clusters of positively charged amino acid residues located in the cytoplasmic N-terminal domain and the periplasmic C-terminal domain. Substitutions in the C-terminal cluster reducing the positive-charge density completely abolished binding of R-LPS. At the same time, these substitutions significantly reduced the functionality of MacA in the protection of E. coli against macrolides in vivo and in the in vitro MacB ATPase stimulation assays. Taken together, our results suggest that R-LPS or a similar glycolipid is a physiological substrate of MacAB-TolC.

  19. Spatial scan statistics using elliptic windows

    DEFF Research Database (Denmark)

    Christiansen, Lasse Engbo; Andersen, Jens Strodl; Wegener, Henrik Caspar

    2006-01-01

    windows and propose a new way to present the information when a spatial point process is considered. This method gives smooth changes for smooth expansions of the set of clusters. A simulation study is used to show how the elliptic windows outperforms the usual circular windows. The proposed method...

  20. Spatial scan statistics using elliptic windows

    DEFF Research Database (Denmark)

    Christiansen, Lasse Engbo; Andersen, Jens Strodl; Wegener, Henrik Caspar

    of confocal elliptic windows and propose a new way to present the information when a spatial point process is considered. This method gives smooth changes for smooth expansions of the set of clusters. A simulation study is used to show how the elliptic windows outperforms the usual circular windows...

  1. Travailler avec Windows 7 au CERN

    CERN Multimedia

    CERN. Geneva

    2011-01-01

    Vue d'ensemble des nouveaux concepts et des changements dans l'interface utilisateur survenus dans Windows 7 depuis les versions antérieures de Windows (XP ou Vista). Le plan de migration à Windows 7 sera aussi débattu.

  2. Travailler avec Windows 7 au CERN

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Vue d'ensemble des nouveaux concepts et des changements dans l'interface utilisateur survenus dans Windows 7 depuis les versions antérieures de Windows (XP ou Vista). Le plan de migration à Windows 7 sera aussi débattu.

  3. Modelling window opening behaviour in Danish dwellings

    DEFF Research Database (Denmark)

    Andersen, Rune Vinther; Olesen, Bjarne W.; Toftum, Jørn

    2011-01-01

    In this paper we present and analyse data from two studies of window opening behaviour in residential buildings in Denmark. Based on measurements of indoor environment, weather and window opening behaviour in 15 dwellings, we propose a model that will predict window opening behaviour. The data...

  4. Setting strategy of delay-optimization-oriented SMAC contention window size.

    Science.gov (United States)

    Rao, Yuan; Deng, Cheng; Su, Jun; Qiao, Yan; Zhu, Jun; Wang, Ru-Chuan

    2017-01-01

    Some frame components, such as SYNC (frame synchronization) and RTS/CTS (Ready to Send/Clear to Send), are not taken into consideration when the traditional setting strategies conduct the optimization of SMAC (Sensor MAC) contention window size. This paper proposes mathematical models that allow the analysis of data packets forwarding delay within one SMAC virtual cluster. Simulation results in OMNeT++ show good agreements with the proposed mathematical models, validating the models' correctness. The curve analyses of the models confirm the existence of delay-optimization-oriented contention window size that is closely related to the number of simultaneously contending nodes. Afterwards, it is shown that SYNC, RTS/CTS and EIFS (Extended InterFrame Space) have impacts on the optimal contention window size and expected delivery delay to various degrees, as well as throughput and energy efficiency. One ideal setting strategy of delay-optimization-oriented SMAC contention window size requires the combination of the network scale, SYNC, RTS/CTS and EIFS. Additionally, it is demonstrated that the proposed setting strategy makes contributions to the improvement in the existing SMAC extensions when they are integrated with each other, in terms of the end-to-end delay, throughput and energy consumption.

  5. Setting strategy of delay-optimization-oriented SMAC contention window size.

    Directory of Open Access Journals (Sweden)

    Yuan Rao

    Full Text Available Some frame components, such as SYNC (frame synchronization and RTS/CTS (Ready to Send/Clear to Send, are not taken into consideration when the traditional setting strategies conduct the optimization of SMAC (Sensor MAC contention window size. This paper proposes mathematical models that allow the analysis of data packets forwarding delay within one SMAC virtual cluster. Simulation results in OMNeT++ show good agreements with the proposed mathematical models, validating the models' correctness. The curve analyses of the models confirm the existence of delay-optimization-oriented contention window size that is closely related to the number of simultaneously contending nodes. Afterwards, it is shown that SYNC, RTS/CTS and EIFS (Extended InterFrame Space have impacts on the optimal contention window size and expected delivery delay to various degrees, as well as throughput and energy efficiency. One ideal setting strategy of delay-optimization-oriented SMAC contention window size requires the combination of the network scale, SYNC, RTS/CTS and EIFS. Additionally, it is demonstrated that the proposed setting strategy makes contributions to the improvement in the existing SMAC extensions when they are integrated with each other, in terms of the end-to-end delay, throughput and energy consumption.

  6. Setting strategy of delay-optimization-oriented SMAC contention window size

    Science.gov (United States)

    Deng, Cheng; Su, Jun; Qiao, Yan; Zhu, Jun; Wang, Ru-chuan

    2017-01-01

    Some frame components, such as SYNC (frame synchronization) and RTS/CTS (Ready to Send/Clear to Send), are not taken into consideration when the traditional setting strategies conduct the optimization of SMAC (Sensor MAC) contention window size. This paper proposes mathematical models that allow the analysis of data packets forwarding delay within one SMAC virtual cluster. Simulation results in OMNeT++ show good agreements with the proposed mathematical models, validating the models’ correctness. The curve analyses of the models confirm the existence of delay-optimization-oriented contention window size that is closely related to the number of simultaneously contending nodes. Afterwards, it is shown that SYNC, RTS/CTS and EIFS (Extended InterFrame Space) have impacts on the optimal contention window size and expected delivery delay to various degrees, as well as throughput and energy efficiency. One ideal setting strategy of delay-optimization-oriented SMAC contention window size requires the combination of the network scale, SYNC, RTS/CTS and EIFS. Additionally, it is demonstrated that the proposed setting strategy makes contributions to the improvement in the existing SMAC extensions when they are integrated with each other, in terms of the end-to-end delay, throughput and energy consumption. PMID:28732020

  7. Stool cultures for Shigella spp: improved specificity by using MacConkey agar with xylose.

    Science.gov (United States)

    Altwegg, M; Buser, J; von Graevenitz, A

    1996-03-01

    A total of 678 stool specimens were cultured on four different agars: on xylose-lysine-desoxycholate agar (XLD), MacConkey agar (Mac), MacConkey agar supplemented with xylose (Mac-X), and Hektoen enteric agar (HE). Isolation rates for shigellae were 77% on HE, 86% on Mac and Mac-X, and 91% on XLD. The specificities of the media were 61% for Mac, 75% for HE, and 78% for XLD and Mac-X. After overnight incubation, Mac-X is much easier to read than XLD, which requires incubation for at least 22 hours. Based on these results and also on the practical aspect that incubation for 22-21 hours does not fit well in our schedule, we now use Mac-X whenever shigellae need to be looked for (i.e. mainly patients with recent travel to tropical countries). As compared to our previous procedure the workload in the laboratory could be reduced by about 20%.

  8. Windows Command Line Administration Instant Reference

    CERN Document Server

    Mueller, John Paul

    2010-01-01

    The perfect companion to any book on Windows Server 2008 or Windows 7, and the quickest way to access critical information. Focusing just on the essentials of command-line interface (CLI), Windows Command-Line Administration Instant Reference easily shows how to quickly perform day-to-day tasks of Windows administration without ever touching the graphical user interface (GUI). Specifically designed for busy administrators, Windows Command-Line Administration Instant Reference replaces many tedious GUI steps with just one command at the command-line, while concise, easy to access answers provid

  9. TMAC: Timestamp-Ordered MAC Protocol for Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2011-05-01

    Wireless Mesh Networks (WMNs) have emerged to meet a need for a self-organized and self-configured multi-hop wireless network infrastructure. Low cost infrastructure and ease of deployment have made WMNs an attractive technology for last mile access. However, 802.11 based WMNs are subject to serious fairness issues. With backlogged TCP traffic, nodes which are two or more hops away from the gateway are subject to starvation, while the one-hop away node saturates the channel with its own local traffic. We study the interactions of TCP and IEEE 802.11 MAC in WMNs to aid us in understanding and overcoming the unfairness problem. We propose a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically derive the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs via a manipulative per-node scheduling mechanism which takes advantage of the age of each packet as a priority metric. Simulation is conducted to validate our model and to illustrate the fairness characteristics of TMAC. Our results show that TMAC achieves excellent resource allocation fairness while maintaining above 90% of maximum link capacity in parking lot and large grid topologies. Our work illuminates the factors affecting TCP fairness in WMNs. Our theoretical and empirical findings can be used in future research to develop more fairness-aware protocols for WMNs.

  10. The prognostic role of MAC30 in advanced gastric cancer patients receiving platinum-based chemotherapy.

    Science.gov (United States)

    Wu, Xiaohong; Zhou, Feiqing; Ji, Xiuhai; Ren, Kewei; Shan, Ye; Mao, Xuhua; Fen, Yan; Chen, Ruhua; Ding, Hui; Fu, Xingli

    2017-12-01

    We aimed to investigate a practical profile of MAC30 on chemotherapeutic response in gastric cancer (GC). We elected 87 GC patients receiving platinum-based chemotherapy in this study. MAC30 levels in tumor and adjuvant nontumor tissues were confirmed via reverse transcription-PCR to identify the clinical profile in GC and the correlation with therapeutic response. We found elevated MAC30 in GC compared with the matched adjacent nontumor tissues. GC with enhanced MAC30 exhibited poorer survival by Kaplan-Meier analysis and poor response to adjuvant platinum-based chemotherapy. A multivariate analysis showed that MAC30 was an independent prognostic factor of overall survival in GC receiving platinum-based chemotherapy. MAC30 could play as a potential biomarker for prognosis of GC with platinum-based chemotherapy.

  11. Computer Security: Bye, Bye, Windows XP security... Welcome infections!

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Rest in peace, Windows XP. Since your birth on 25 October 2001, you have struggled hard to survive this harsh Internet world. You fell prey to “Melissa”, “Sasser” and “Conficker”, and brought CERN its last large-scale infection with “Blaster” in 2004.    After being upgraded to “SP2”, you discovered software development lifecycles, regular “Patch Tuesdays” and a local firewall that rejected everything by default. In the end, you outlived your weird brother “Vista” and survived as the ugly duckling cousin to the beautiful Mr. Mac. But all your ups and downs are over now. On 8 April 2014, you were given your very last security updates. These life-sustaining measures will be stopped now. Game over. From now on, you are a zombie: presumed dead, but still kept running by your master/owner/user. They might not even understand that you now pose a risk ...

  12. Image annotation under X Windows

    Science.gov (United States)

    Pothier, Steven

    1991-08-01

    A mechanism for attaching graphic and overlay annotation to multiple bits/pixel imagery while providing levels of performance approaching that of native mode graphics systems is presented. This mechanism isolates programming complexity from the application programmer through software encapsulation under the X Window System. It ensures display accuracy throughout operations on the imagery and annotation including zooms, pans, and modifications of the annotation. Trade-offs that affect speed of display, consumption of memory, and system functionality are explored. The use of resource files to tune the display system is discussed. The mechanism makes use of an abstraction consisting of four parts; a graphics overlay, a dithered overlay, an image overly, and a physical display window. Data structures are maintained that retain the distinction between the four parts so that they can be modified independently, providing system flexibility. A unique technique for associating user color preferences with annotation is introduced. An interface that allows interactive modification of the mapping between image value and color is discussed. A procedure that provides for the colorization of imagery on 8-bit display systems using pixel dithering is explained. Finally, the application of annotation mechanisms to various applications is discussed.

  13. The plant-window system

    International Nuclear Information System (INIS)

    Wood, R.T.; Mullens, J.A.; Naser, J.A.

    1995-01-01

    Power plant data, and the information that can be derived from it, provide the link to the plant through which the operations, maintenance and engineering staff understand and manage plant performance. The increasing use of computer technology in the U.S. nuclear power industry has greatly expanded the capability to obtain, analyze, and present data about the plant to station personnel. However, it is necessary to transform the vast quantity of available data into clear, concise, and coherent information that can be readily accessed and used throughout the plant. This need can be met by an integrated computer workstation environment that provides the necessary information and software applications, in a manner that can be easily understood and used, to the proper users throughout the plant. As part of a Cooperative Research and Development Agreement with the Electric Power Research Institute, the Oak Ridge National Laboratory has developed functional requirements for a Plant-Wide Integrated Environment Distributed On Workstations (Plant-Window) System. The Plant-Window System (PWS) can serve the needs of operations, engineering, and maintenance personnel at nuclear power stations by providing integrated data and software applications (e.g., monitoring, analysis, diagnosis, and control applications) within a common environment. The PWS requirements identify functional capabilities and provide guidelines for standardized hardware, software, and display interfaces to define a flexible computer environment that permits a tailored implementation of workstation capabilities and facilitates future upgrades

  14. The MacAndrew Scale as a measure of substance of abuse and delinquency among adolescents.

    Science.gov (United States)

    Rathus, S A; Fox, J A; Ortins, J B

    1980-04-01

    Used regression equations to determine the predictive power of the abbreviated MacAndrew Scale of the MMPI-168 on self-reported delinquent behavior of 1,672 suburban high school students. The abbreviated MacAndrew Scale score successfully predicted alcohol abuse, but was also shown to be related to crimes against property and persons and to marijuana usage. It was concluded that the MacAndrew Alcoholism Scale may not be uniquely sensitive to alcohol abuse among the population sampled.

  15. Comparison of two commercial formulations of the MacConkey agar test for mycobacteria.

    Science.gov (United States)

    Kubica, G P; Vitvitsky, J

    1974-05-01

    Recent evaluations of the MacConkey agar test for differentiation of rapidly growing mycobacteria have revealed that certain strains of Mycobacterium fortuitum and M. chelonei that were expected to grow on MacConkey agar failed to do so. Investigation of two formulations of MacConkey agar showed that these two species grew better on the medium when the crystal violet dye was omitted. Several possible reasons for this difficulty are discussed. It is recommended that clinical laboratories engaged in differential identification of mycobacteria utilize commercial MacConkey agar without crystal violet when testing rapidly growing species of this genus.

  16. C-MAC compared with direct laryngoscopy for intubation in patients with cervical spine immobilization: A manikin trial.

    Science.gov (United States)

    Smereka, Jacek; Ladny, Jerzy R; Naylor, Amanda; Ruetzler, Kurt; Szarpak, Lukasz

    2017-08-01

    The aim of this study was to compare C-MAC videolaryngoscopy with direct laryngoscopy for intubation in simulated cervical spine immobilization conditions. The study was designed as a prospective randomized crossover manikin trial. 70 paramedics with immobilization (Scenario A); manual inline cervical immobilization (Scenario B); cervical immobilization using cervical extraction collar (Scenario C). Scenario A: Nearly all participants performed successful intubations with both MAC and C-MAC on the first attempt (95.7% MAC vs. 100% C-MAC), with similar intubation times (16.5s MAC vs. 18s C-MAC). Scenario B: The results with C-MAC were significantly better than those with MAC (pimmobilization. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. Computer Security: Mac security – nothing for old versions

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    A fundamental pillar of computer security is the regular maintenance of your code, operating system and application software – or, in computer lingo: patching, patching, patching.   Only software which is up-to-date should be free from any known vulnerabilities and thus provide you with a basic level of computer security. Neglecting regular updates is putting your computer at risk – and consequently your account, your password, your data, your photos, your videos and your money. Therefore, prompt and automatic patching is paramount. But the Microsofts, Googles and Apples of this world do not always help… Software vendors handle their update policy in different ways. While Android is a disaster – not because of Google, but due to the slow adaptation of many smartphone vendors (see “Android’s Armageddon”) – Microsoft provides updates for their Windows 7, Windows 8 and Windows 10 operating systems through their &ldq...

  18. Learning Microsoft Excel 2011 for Mac video training DVD

    CERN Document Server

    Vaccaro, Guy

    2011-01-01

    In this video tutorial for Microsoft Excel 2011 For Mac, expert author Guy Vaccaro teaches you to effectively utilize the features and functions of Excel through project based learning. You will complete various projects, and along they way learn to leverage the power of the most important features Excel 2011 has to offer the Mac user. Starting your training course with the creation of a spreadsheet to record and monitor sales data, you will learn the basics of what you can do with a spreadsheet. You will then move on to creating a Profit and Loss report, learning formulas along the way. Moving to score sheets for a sports day, you will discover conditional based formatting, lookups, and more. You then create a functional expense claim form, advancing your Excel expertise. Moving on to a sales contact management sheet, you will discover how you can manipulate text, and even create mail merges from Excel. Finally, you will utilize all your knowledge thus far to create a sales report, including charts, pivot ta...

  19. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop and initi......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...... and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it...

  20. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  1. Instant Windows PowerShell

    CERN Document Server

    Menon, Vinith

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical, hands-on tutorial approach that explores the concepts of PowerShell in a friendly manner, taking an adhoc approach to each topic.If you are an administrator who is new to PowerShell or are looking to get a good grounding in these new features, this book is ideal for you. It's assumed that you will have some experience in PowerShell and Windows Server, as well being familiar with the PowerShell command-line.

  2. Editorial - Opening windows onto data

    Directory of Open Access Journals (Sweden)

    Judith Winters

    2012-05-01

    Full Text Available One of Internet Archaeology's strengths and 'unique selling points' not yet replicated by (many other e-journals, is that data is integrated into articles rather than being 'supplementary' or offered for download. The aim has always been for the narrative to be a wave driving readers towards the underlying data. Opening windows onto the data from within the text is one of the things I think the journal does best and is a feature used throughout Emma Durham's article 'Depicting the gods: metal figurines in Roman Britain'. Archaeological data does not speak for itself. It needs a narrative. It needs context. But by intermeshing data with interpretation, readers can dip into the data and start to explore it while reading the article, allowing a more immediate understanding of the bigger picture.

  3. Hybrid window layer for photovoltaic cells

    Science.gov (United States)

    Deng, Xunming

    2010-02-23

    A novel photovoltaic solar cell and method of making the same are disclosed. The solar cell includes: at least one absorber layer which could either be a lightly doped layer or an undoped layer, and at least a doped window-layers which comprise at least two sub-window-layers. The first sub-window-layer, which is next to the absorber-layer, is deposited to form desirable junction with the absorber-layer. The second sub-window-layer, which is next to the first sub-window-layer, but not in direct contact with the absorber-layer, is deposited in order to have transmission higher than the first-sub-window-layer.

  4. Multi-window counting of radioactivity

    International Nuclear Information System (INIS)

    Semkow, T.M.; Beach, S.E.; Khan, A.J.; Bari, A.; Bradt, C.J.; Haines, D.K.; Syed, U.-F.

    2012-01-01

    In counting of radioactivity, using for example gas proportional (GP) or liquid scintillation (LS) counters, one can set up two or more electronic windows, which can measure two or more radiation components. In this work, we derived general equations for n-window counting in matrix notation, including mutual crosstalk between the windows using both the ratio (not normalized) and the fraction (normalized) methods. A solution for n radiation components is presented. For the two-window measurements, we report complete statistical analysis of the results including propagation of all uncertainties. The decision-level and the detection-limit equations were derived including crosstalk correction, uncertainties of the variables, Gaussian continuity correction, interference correction, and the overdispersion correction. Numerical verifications of the two-window systems are presented, including conditions for the detection of a minor component in the presence of a major component. In addition, limited experimental verifications of the two-window systems using LS counting are reported.

  5. Analysis of surface contaminants on beryllium windows

    International Nuclear Information System (INIS)

    Gmur, N.F.

    1986-12-01

    It is known that various crystalline and liquid compounds form on the downstream surfaces of beryllium windows exposed to air. It is also known that the integrity of such windows may be compromised resulting in leaks through the window. The purpose of this report is to document the occurrences described as they pertain to the NSLS and to analyze, where possible, the various substances formed

  6. Aerodynamic window for a laser fusion device

    International Nuclear Information System (INIS)

    Masuda, Wataru

    1983-01-01

    Since the window of a laser system absorbs a part of the laser energy, the output power is determined by the characteristics of the window. The use of an aerodynamic window has been studied. The required characteristics are to keep the large pressure difference. An equation of motion of a vortex was presented and analyzed. The operation power of the system was studied. A multi-stage aerodynamic window was proposed to reduce the power. When the jet flow of 0.3 of the Mach number is used, the operation power will be several Megawatt, and the length of an optical path will be about 100 m. (Kato, T.)

  7. Windows 7 Annoyances Tips, Secrets, and Solutions

    CERN Document Server

    Karp, David

    2010-01-01

    Windows 7 may be faster and more stable than Vista, but it's a far cry from problem-free. David A. Karp comes to the rescue with the latest in his popular Windows Annoyances series. This thorough guide gives you the tools you need to fix the troublesome parts of this operating system, plus the solutions, hacks, and timesaving tips to make the most of your PC. Streamline Windows Explorer, improve the Search tool, eliminate the Green Ribbon of Death, and tame User Account Control promptsExplore powerful Registry tips and tools, and use them to customize every aspect of Windows and solve its sho

  8. Windows PowerShell 20 Bible

    CERN Document Server

    Lee, Thomas; Schill, Mark E; Tanasovski, Tome

    2011-01-01

    Here's the complete guide to Windows PowerShell 2.0 for administrators and developers Windows PowerShell is Microsoft's next-generation scripting and automation language. This comprehensive volume provides the background that IT administrators and developers need in order to start using PowerShell automation in exciting new ways. It explains what PowerShell is, how to use the language, and specific ways to apply PowerShell in various technologies. Windows PowerShell is Microsoft's standard automation tool and something that every Windows administrator will eventually have to understand; this b

  9. Mastering Windows Server 2008 Networking Foundations

    CERN Document Server

    Minasi, Mark; Mueller, John Paul

    2011-01-01

    Find in-depth coverage of general networking concepts and basic instruction on Windows Server 2008 installation and management including active directory, DNS, Windows storage, and TCP/IP and IPv4 networking basics in Mastering Windows Server 2008 Networking Foundations. One of three new books by best-selling author Mark Minasi, this guide explains what servers do, how basic networking works (IP basics and DNS/WINS basics), and the fundamentals of the under-the-hood technologies that support staff must understand. Learn how to install Windows Server 2008 and build a simple network, security co

  10. Windows 8.1 for dummies

    CERN Document Server

    Rathbone, Andy

    2013-01-01

    The bestselling book on Windows, now updated for the new 8.1 features Microsoft has fine-tuned Windows 8 with some important new features, and veteran author Andy Rathbone explains every one in this all-new edition of a long-time bestseller. Whether you're using Windows for the first time, upgrading from an older version, or just moving from Windows 8 to 8.1, here's what you need to know. Learn about the dual interfaces, the new Start button, how to customize the interface and boot operations, and how to work with programs and files, use the web and social media, manage music and photos, and

  11. Manufacturing of diamond windows for synchrotron radiation

    International Nuclear Information System (INIS)

    Schildkamp, W.; Nikitina, L.

    2012-01-01

    A new diamond window construction is presented and explicit manufacturing details are given. This window will increase the power dissipation by about a factor of 4 over present day state of the art windows to absorb 600 W of power. This power will be generated by in-vacuum undulators with the storage ring ALBA operating at a design current of 400 mA. Extensive finite element (FE) calculations are included to predict the windows behavior accompanied by explanations for the chosen boundary conditions. A simple linear model was used to cross-check the FE calculations.

  12. Energy Gaining Windows for Residental Buildings

    DEFF Research Database (Denmark)

    Kragh, Jesper; Laustsen, Jacob Birck; Svendsen, Svend

    2008-01-01

    This paper presents some of the research done during the last 8 years at the Technical University of Denmark developing improved low-energy window solutions. The focus has been on maximizing the net energy gain of windows for residential buildings. The net energy gain of windows is the solar gain...... window is made of fiber-reinforced plastic (plastic reinforced by fine fibers made of glass). This composite material is a weatherproof material with very low thermal conductivity and high mechanical strength. These properties make the material very suitable for frame profiles due to lower heat loss...

  13. Microsoft Windows 7 Administration Instant Reference

    CERN Document Server

    Panek, William

    2010-01-01

    An on-the-spot reference for Windows 7 administrators. Hundreds of thousands of IT administrators, network administrators, and IT support technicians work daily with Windows 7. This well-organized, portable reference covers every facet of Windows 7, providing no-nonsense instruction that is readily accessible when you need it. Designed for busy administrators, it features thumb tabs and chapter outlines to make answers easy to find.: Windows 7 administrative and support personnel need quick answers to situations they confront each day; this Instant Reference is designed to provide information,

  14. Scott Brothers Windows and Doors Information Sheet

    Science.gov (United States)

    Scott Brothers Windows and Doors (the Company) is located in Bridgeville, Pennsylvania. The settlement involves renovation activities conducted at property constructed prior to 1978, located in Pittsburgh, Pennsylvania.

  15. PC vs. Mac--Which Way Should You Go?

    Science.gov (United States)

    Wodarz, Nan

    1997-01-01

    Outlines the factors in hardware, software, and administration to consider in developing specifications for choosing a computer operating system. Compares Microsoft Windows 95/NT that runs on PC/Intel-based systems and System 7.5 that runs on the Apple-based systems. Lists reasons why the Microsoft platform clearly stands above the Apple platform.…

  16. PAGINACIÓN DE MEMORIA EN OS X

    Directory of Open Access Journals (Sweden)

    Nancy Yaneth Gèlvez Garcia

    2013-12-01

    Full Text Available Este artículo expone el esquema de manejo de memoria denominado paginación en el sistema operativo MAC OS. Mediante la implementación de una simulación se evidencia la administración de la memoria, la longitud de los procesos, las paginas correspondientes, los marcos (frames referentes a las paginas, la dirección física en memoria y la tabla de páginas. Además se presenta un ejemplo detallado del manejo del esquema en la simulación propuesta.

  17. 78 FR 65541 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Liquidity...

    Science.gov (United States)

    2013-11-01

    ... that can be traded at fair value and an explicit public backstop.'' From the FCA's perspective, whether... conditions, events that would impact the market's perception of Farmer Mac,\\8\\ or a broad and significant... risk and legal risk could affect the market's perception of Farmer Mac. \\9\\ Id. III. History of This...

  18. THE EFFECT OF TEMPERATURE ON THE GROWTH OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS

    Science.gov (United States)

    MAC organisms are able to grow, persist, and colonize in water distribution systems and may amplify in hospital hot water systems. This study examined the response of MAC organisms (M. avium, M. intracellulare, and MX) to a range of temperatures commonly associated with drinking...

  19. Geochemistry and petrography of the MacAlpine Hills lunar meteorites

    Science.gov (United States)

    Lindstrom, Marilyn M.; Mckay, David S.; Wentworth, Susan J.; Martinez, Rene R.; Mittlefehldt, David W.; Wang, Ming-Sheng; Lipschutz, Michael E.

    1991-01-01

    MacAlpine Hills 88104 and 88105, anorthositic lunar meteorites recovered form the same area in Antartica, are characterized. Petrographic studies show that MAC88104/5 is a polymict breccia dominated by impact melt clasts. It is better classified as a fragmental breccia than a regolith breccia. The bulk composition is ferroan and highly aluminous (Al2O3-28 percent).

  20. Transcriptomic microarray analysis of BoMac cells after infection with bovine foamy virus

    NARCIS (Netherlands)

    Rola-Luszczak, M.; Materniak, M.; Pluta, A.; Hulst, M.M.; Kuz'mak, J.

    2014-01-01

    Bovine foamy virus (BFV) infections are highly prevalent among cattle worldwide. However, relatively little is known about the impact of this virus on the host immune system. In our study, we focused on a bovine macrophage cell line (BoMac) and examined changes in the BoMac transcriptome after in

  1. Age-related iso-MAC charts for isoflurane, sevoflurane and desflurane in man.

    Science.gov (United States)

    Nickalls, R W D; Mapleson, W W

    2003-08-01

    The motivation for this study was the current difficulty in estimating the total age-related MAC for a patient in a clinical setting. Age-related iso-MAC charts for isoflurane, sevoflurane and desflurane were developed for the clinically useful MAC range (0.6-1.6), age range 5-95 yr, and put in a convenient form for use by practising anaesthetists. The charts are based on Mapleson's meta-analysis (1996) of the available MAC data and can be used to allow for the contribution of nitrous oxide to the total MAC. The charts indicate the influence of age on anaesthetic requirements, showing, for example, that a total MAC of 1.2 using isoflurane and nitrous oxide 67% in oxygen requires an end-expired isoflurane concentration of only 0.25% in a patient of 95 yr vs 1% in a 5-yr-old patient. Colleagues found the charts to be helpful and simple to use clinically. The iso-MAC charts show clearly how patient age can be used to guide the choice of end-expired agent concentration. They also allow a consistent total MAC to be maintained when changing the inspired nitrous oxide concentration, thereby reducing the chance of inadvertent awareness, particularly at the extremes of age.

  2. Scheduled MAC in Beacon Overlay Networks for Underwater Localization and Time-Synchronization

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Meratnia, Nirvana; Havinga, Paul J.M.

    2011-01-01

    In this article we introduce a MAC protocol designed for underwater localization and time-synchronisation. The MAC protocol assumes a network of static reference nodes and allows blind nodes to be localized by listening-only to the beacon messages. Such a system is known to be very scalable. We show

  3. The MacAndrew Scale as a Measure of Substance Abuse and Delinquency among Adolescents.

    Science.gov (United States)

    Rathus, Spencer A.; And Others

    1980-01-01

    Used regression equations to determine the predictive power of the abbreviated MacAndrew Scale of the MMPI-168 on self-reported delinquent behavior of 1,672 high school students. The abbreviated MacAndrew Scale score successfully predicted alcohol abuse but was also related to crimes against property and persons and to marijuana usage. (Author)

  4. 77 FR 66375 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Investment...

    Science.gov (United States)

    2012-11-05

    ... investments mature is not a regulatory violation as long as the profits are incidental to the specified... allow Farmer Mac to use non-program investments as a business strategy to enhance returns for investors... Funding and Fiscal Affairs; Farmer Mac Investment Management AGENCY: Farm Credit Administration. ACTION...

  5. Discriminative validity of the MacAndrew Alcoholism Scale with Cluster B personality disorders.

    Science.gov (United States)

    Smith, S R; Hilsenroth, M J

    2001-06-01

    This study was designed to assess the ability of the Minnesota Multiphasic Personality Inventory (MMPI-2) MacAndrew Alcoholism Scale (MAC-R) to differentiate between outpatients with personality disorders with Substance-Related Disorders (SRDs) and without SRDs. MMPI-2 validity, clinical, and MAC-R scale scores were compared in an SRD Cluster B group (comprised of Narcissistic, Antisocial, Borderline, and Histrionic; n = 15), a non-SRD Cluster B group (n = 33), and a non-SRD group with personality disorders from Clusters A and C (n = 18). Results revealed that the substance-abusing Cluster B group scored significantly higher on the MAC-R ( p Personality Disorder (r =.60, p Personality Disorders were most related to MAC-R scores (R =.78, R(2) =.60). This indicates that the MAC-R may be more related to the presence of an SRD than has been suggested, and when used in outpatient settings as MacAndrew (1965) intended, the MAC-R may be useful as a screening device for assessing SRD among outpatients with Axis II psychopathology.

  6. MACS low-background doubly focusing neutron monochromator

    CERN Document Server

    Smee, S A; Scharfstein, G A; Qiu, Y; Brand, P C; Anand, D K; Broholm, C L

    2002-01-01

    A novel doubly focusing neutron monochromator has been developed as part of the Multi-Analyzer Crystal Spectrometer (MACS) at the NIST Center for Neutron Research. The instrument utilizes a unique vertical focusing element that enables active vertical and horizontal focusing with a large, 357-crystal (1428 cm sup 2), array. The design significantly reduces the amount of structural material in the beam path as compared to similar instruments. Optical measurements verify the excellent focal performance of the device. Analytical and Monte Carlo simulations predict that, when mounted at the NIST cold-neutron source, the device should produce a monochromatic beam (DELTA E=0.2 meV) with flux phi>10 sup 8 n/cm sup 2 s. (orig.)

  7. Opportunistic Pathogens Mycobacterium Avium Complex (MAC) and Legionella spp. Colonise Model Shower.

    Science.gov (United States)

    Whiley, Harriet; Giglio, Steven; Bentham, Richard

    2015-07-24

    Legionella spp. and Mycobacterium avium complex (MAC) are opportunistic pathogens of public health concern. Hot water systems, including showers, have been identified as a potential source of infection. This paper describes the colonization of Legionella and MAC on the flexible tubing within a model potable shower system, utilizing thermostatic mixing and a flexible shower head. A MAC qPCR method of enumeration was also developed. MAC and Legionella spp. were detected within the biofilm at maximum concentrations of 7.0 × 104 and 2.0 × 103 copies/cm2 PVC tubing respectively. No significant changes were observed between sample of the flexible shower tubing that dried between uses and those that remained filled with water. This suggested the "unhooking" showerheads and allowing them to dry is not an effective method to reduce the risk of Legionella or MAC colonisation.

  8. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  9. MicMac GIS application: free open source

    Science.gov (United States)

    Duarte, L.; Moutinho, O.; Teodoro, A.

    2016-10-01

    The use of Remotely Piloted Aerial System (RPAS) for remote sensing applications is becoming more frequent as the technologies on on-board cameras and the platform itself are becoming a serious contender to satellite and airplane imagery. MicMac is a photogrammetric tool for image matching that can be used in different contexts. It is an open source software and it can be used as a command line or with a graphic interface (for each command). The main objective of this work was the integration of MicMac with QGIS, which is also an open source software, in order to create a new open source tool applied to photogrammetry/remote sensing. Python language was used to develop the application. This tool would be very useful in the manipulation and 3D modelling of a set of images. The main objective was to create a toolbar in QGIS with the basic functionalities with intuitive graphic interfaces. The toolbar is composed by three buttons: produce the points cloud, create the Digital Elevation Model (DEM) and produce the orthophoto of the study area. The application was tested considering 35 photos, a subset of images acquired by a RPAS in the Aguda beach area, Porto, Portugal. They were used in order to create a 3D terrain model and from this model obtain an orthophoto and the corresponding DEM. The code is open and can be modified according to the user requirements. This integration would be very useful in photogrammetry and remote sensing community combined with GIS capabilities.

  10. Thermal Bridge Effects in Window Grooves

    DEFF Research Database (Denmark)

    Rose, Jørgen

    1997-01-01

    In this report thermal bridge effects in window grooves are analyzed. The analysis is performed using different thicknesses of the window groove insulation, to evaluate what the optimal solution is.All analysis in the report is performed using both 2- and 3-dimensional numerical analysis....

  11. Supporting Multiple Pointing Devices in Microsoft Windows

    DEFF Research Database (Denmark)

    Westergaard, Michael

    2002-01-01

    In this paper the implementation of a Microsoft Windows driver including APIs supporting multiple pointing devices is presented. Microsoft Windows does not natively support multiple pointing devices controlling independent cursors, and a number of solutions to this have been implemented by us...

  12. Characteristics of Air Flow through Windows

    DEFF Research Database (Denmark)

    Heiselberg, Per; Dam, Henrik; Sørensen, Lars C.

    This paper describes the first results of a series of laboratory investigations that is performed to characterise three different window types. The results show the air flow conditions for different ventilation strategies and temperature differences. For one of the windows values of the discharge...

  13. What are windows on language evolution?

    NARCIS (Netherlands)

    Botha, Rudolf

    2008-01-01

    This chapter offers an elucidation of the idea that certain phenomena provide windows on language evolution. Non-metaphorically, such windows are shown to be conceptual constructs used for making inferences about aspects of language evolution from data or assumptions about properties of

  14. Humeral windows in revision total elbow arthroplasty.

    Science.gov (United States)

    Peach, Chris A; Salama, Amir; Stanley, David

    2016-04-01

    The use of cortical windows for revision elbow arthroplasty has not previously been widely reported. Their use aids safe revision of a well fixed humeral prosthesis and can be used in the setting of dislocation, periprosthetic fracture or aseptic loosening of the ulnar component. We describe our technique and results of cortical windows in the distal humerus for revision elbow arthroplasty surgery.

  15. Automatic Water Sensor Window Opening System

    KAUST Repository

    Percher, Michael

    2013-12-05

    A system can automatically open at least one window of a vehicle when the vehicle is being submerged in water. The system can include a water collector and a water sensor, and when the water sensor detects water in the water collector, at least one window of the vehicle opens.

  16. Android is the new Windows

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Do you recall the early virus attacks in the early 2000s? “Blaster”, “I love you” and “Slammer” were attacking the pretty much unprotected Microsoft Windows operating system.   While Microsoft has been hit hard in the past, they have tried to improve and are now on a par with other software vendors. Today, they can even be happy that Android is taking over the baton - at least on mobile platforms. According to the Sophos 2013 Security Threat Report “Android [is] today’s the biggest target” and Android devices in Australia and the U.S. experienced even more malware attacks, whether successful or unsuccessful, than PCs during the past three months. The Kaspersky security company recently added that 99% of all mobile threats target Android. Lucky you if you use an iPhone, or a good old Nokia with no Internet connectivity at all. But why is that? It is partly down to the same fac...

  17. Compact UHV valve with field replaceable windows

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, E.D. (Brookhaven National Lab., Upton, NY (United States)); Freeman, J. (VAT, Inc., Woburn, MA (United States)); Powell, F. (Luxel, Inc., Friday Harbor, WA (United States))

    1991-01-01

    There are many applications in synchrotron radiation research where window valves can be usefully employed. Examples include gas cells for monochromator calibration, filters for high order light rejection, and as vacuum isolation elements between machine and experimental vacua. Often these devices are fairly expensive, and have only fixed (ie non-removable) windows. The development of a new type of seal technology by VAT for their series 01 valves provides a gate surface which is free from obstructions due to internal mechanical elements. This feature allows a threaded recess to be machined into the gate to receive a removable window frame which can carry standard size Luxel thin film windows. The combination of these features results in a DN 40 (2.75in. conflat flange) valve which provides a clear aperture of 21mm diameter for the window material. 8 refs., 2 figs.

  18. Energy Gaining Windows for Residental Buildings

    DEFF Research Database (Denmark)

    Kragh, Jesper; Laustsen, Jacob Birck; Svendsen, Svend

    2008-01-01

    This paper presents some of the research done during the last 8 years at the Technical University of Denmark developing improved low-energy window solutions. The focus has been on maximizing the net energy gain of windows for residential buildings. The net energy gain of windows is the solar gain...... minus the heat loss integrated over the heating season. It is assumed that in northern cold climates all of the solar gain during the heating season can be utilized for space heating. Problems with overheating in the summer period must be solved with overhang or moveable solar shading devices. Two...... and longer durability of the window. The glazing in these fiber reinforced polyester windows is both unsealed and sealed triple glazing units. To increase the net energy gain slim frame profiles have been developed to increase the glazing area and thereby the solar gain. The challenge when developing slim...

  19. Mastering Windows Server 2012 R2

    CERN Document Server

    Minasi, Mark; Booth, Christian; Butler, Robert; McCabe, John; Panek, Robert; Rice, Michael; Roth, Stefan

    2013-01-01

    Check out the new Hyper-V, find new and easier ways to remotely connect back into the office, or learn all about Storage Spaces-these are just a few of the features in Windows Server 2012 R2 that are explained in this updated edition from Windows authority Mark Minasi and a team of Windows Server experts led by Kevin Greene. This book gets you up to speed on all of the new features and functions of Windows Server, and includes real-world scenarios to put them in perspective. If you're a system administrator upgrading to, migrating to, or managing Windows Server 2012 R2, find what you need to

  20. Least Squares Moving-Window Spectral Analysis.

    Science.gov (United States)

    Lee, Young Jong

    2017-08-01

    Least squares regression is proposed as a moving-windows method for analysis of a series of spectra acquired as a function of external perturbation. The least squares moving-window (LSMW) method can be considered an extended form of the Savitzky-Golay differentiation for nonuniform perturbation spacing. LSMW is characterized in terms of moving-window size, perturbation spacing type, and intensity noise. Simulation results from LSMW are compared with results from other numerical differentiation methods, such as single-interval differentiation, autocorrelation moving-window, and perturbation correlation moving-window methods. It is demonstrated that this simple LSMW method can be useful for quantitative analysis of nonuniformly spaced spectral data with high frequency noise.

  1. Compact UHV valve with field replaceable windows

    International Nuclear Information System (INIS)

    Johnson, E.D.; Freeman, J.; Powell, F.

    1991-01-01

    There are many applications in synchrotron radiation research where window valves can be usefully employed. Examples include gas cells for monochromator calibration, filters for high order light rejection, and as vacuum isolation elements between machine and experimental vacua. Often these devices are fairly expensive, and have only fixed (ie non-removable) windows. The development of a new type of seal technology by VAT for their series 01 valves provides a gate surface which is free from obstructions due to internal mechanical elements. This feature allows a threaded recess to be machined into the gate to receive a removable window frame which can carry standard size Luxel thin film windows. The combination of these features results in a DN 40 (2.75in. conflat flange) valve which provides a clear aperture of 21mm diameter for the window material. 8 refs., 2 figs

  2. Windows 8 app projects XAML and C#

    CERN Document Server

    Vermeir, Nico

    2013-01-01

    Become a leading Windows 8 app developer by using Windows 8 App Projects - XAML and C# Edition to learn techniques, tools, and ideas to create successful, 5-star apps. Windows 8 App Projects - XAML and C# Edition shows you the nuts and bolts of the Windows 8 development ecosystem. Then, through a series of example driven chapters, you'll discover how to leverage the platform's unique features. With each project, you'll be one step closer to building full-featured, responsive, and well designed apps that feel like they're a part of the operating system. Windows 8 App Projects - XAML and C# Edit

  3. ScreenOS Cookbook

    CERN Document Server

    Brunner, Stefan; Delcourt, David

    2008-01-01

    In the only book that completely covers ScreenOS, six key members of Juniper Network's ScreenOS development team help you troubleshoot secure networks using ScreenOS firewall appliances. Over 200 recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track. The easy-to-follow format enables you to find the topic and specific recipe you need right away.

  4. IgG Endopeptidase SeMac does not Inhibit Opsonophagocytosis of Streptococcus equi Subspecies equi by Horse Polymorphonuclear Leukocytes

    Science.gov (United States)

    Liu, Mengyao; Lei, Benfang

    2010-01-01

    The secreted Mac protein made by group A Streptococcus (GAS) inhibits opsonophagocytosis of GAS by human polymorphonuclear leukocytes (PMNs). This protein also has the endopeptidase activity against human immunoglobulin G (IgG), and the Cys94, His262 and Asp284 are critical for the enzymatic activity. The horse pathogen Streptococcus equi subspecies equi produces a homologue of Mac (SeMac). SeMac was characterized to determine whether SeMac has IgG endopeptidase activity and inhibits opsonophagocytosis of S. equi by horse PMNs. The gene was cloned and recombinant SeMac was overexpressed in Escherichia coli and purified to homogeneity. Mice with experimental S. equi infection and horses with strangles caused by S. equi seroconverted to SeMac, indicating that SeMac is produced in vivo during infection. SeMac has endopeptidase activity against human IgG. However, the protein just cleaves a small fraction, which may be IgG1 only, of horse IgG. Replacement of Cys102 with Ser or His272 with Ala abolishes the enzymatic activity of SeMac, and the Asp294Ala mutation greatly decreases the enzymatic activity. SeMac does not inhibit opsonophagocytosis of S. equi by horse PMNs but opsonophagocytosis of GAS by human PMNs. Thus, SeMac is a cysteine endopeptidase with a limited activity against horse IgG and must have other function. PMID:20556207

  5. Efficient Adjustable Reflectivity Smart Window

    Energy Technology Data Exchange (ETDEWEB)

    D. Morgan Tench

    2005-12-01

    This project addressed the key technical issues for development of an efficient smart window based on reversible electrochemical transfer of silver between a mirror electrode and a localized counter electrode. Effort to provide uniform switching over large areas focused on use of a resistive transparent electrode innerlayer to increase the interelectrode resistance. An effective edge seal was developed in collaboration with adhesive suppliers and an electrochromic device manufacturer. Work to provide a manufacturable counter electrode focused on fabricating a dot matrix electrode without photolithography by electrodeposition of Pt nuclei on inherent active sites on a transparent oxide conductor. An alternative counter electrode based on a conducting polymer and an ionic liquid electrolyte was also investigated. Work in all of these areas was successful. Sputtered large-bandgap oxide innerlayers sandwiched between conductive indium tin oxide (ITO) layers were shown to provide sufficient cross-layer resistance (>300 ohm/cm{sup 2}) without significantly affecting the electrochemical properties of the ITO overlayer. Two edge seal epoxies, one procured from an epoxy manufacturer and one provided by an electrochromic device manufacturer in finished seals, were shown to be effective barriers against oxygen intrusion up to 80 C. The optimum density of nuclei for the dot matrix counter electrode was attained without use of photolithography by electrodeposition from a commercial alkaline platinum plating bath. Silver loss issues for cells with dot matrix electrodes were successfully addressed by purifying the electrolyte and adjusting the cell cycling parameters. More than 30K cycles were demonstrated for a REM cell (30-cm square) with a dot matrix counter electrode. Larger cells (30-cm square) were successfully fabricated but could not be cycled since the nucleation layers (provided by an outside supplier) were defective so that mirror deposits could not be produced.

  6. Focal plane scanner with reciprocating spatial window

    Science.gov (United States)

    Mao, Chengye (Inventor)

    2000-01-01

    A focal plane scanner having a front objective lens, a spatial window for selectively passing a portion of the image therethrough, and a CCD array for receiving the passed portion of the image. All embodiments have a common feature whereby the spatial window and CCD array are mounted for simultaneous relative reciprocating movement with respect to the front objective lens, and the spatial window is mounted within the focal plane of the front objective. In a first embodiment, the spatial window is a slit and the CCD array is one-dimensional, and successive rows of the image in the focal plane of the front objective lens are passed to the CCD array by an image relay lens interposed between the slit and the CCD array. In a second embodiment, the spatial window is a slit, the CCD array is two-dimensional, and a prism-grating-prism optical spectrometer is interposed between the slit and the CCD array so as to cause the scanned row to be split into a plurality of spectral separations onto the CCD array. In a third embodiment, the CCD array is two-dimensional and the spatial window is a rectangular linear variable filter (LVF) window, so as to cause the scanned rows impinging on the LVF to be bandpass filtered into spectral components onto the CCD array through an image relay lens interposed between the LVF and the CCD array.

  7. AN INTRODUCTION TO WINDOWS 2000 AT CERN

    CERN Document Server

    2001-01-01

    A demonstration of the new supported Windows environment for all the CERN personal computers (PC) will be given which is based on Windows 2000. This presentation will assume little or no familiarity with the PC, or NICE, and will concentrate on the services being offered to the users of PCs at CERN. How NICE 2000 can facilitate the work of all users, eventually becoming the key access point to all activities in the laboratory will be demonstrated. Date Title Language Location Speaker Fri 1/6 10:00 Une introduction à Windows 2000 au CERN F IT Auditorium (31/3-004) Alberto Pace Tue 5/6 10:00 Une introduction à Windows 2000 au CERN F LHC Auditorium (30/7th floor) Frederic Hemmer Tue 5/6 14:00 Une introduction à Windows 2000 au CERN F SL Auditorium (864/1s floor) Michel Bornand Tue 5/6 14:00 An introduction to Windows 2000 at CERN E IT Auditorium (31/3-004) Andreas Wagner Wed 6/6 14:00 Une introduction à Windows 2000 au CERN F SL ...

  8. Malware Forensics Field Guide for Windows Systems Digital Forensics Field Guides

    CERN Document Server

    Malin, Cameron H; Aquilina, James M

    2010-01-01

    Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. *A condensed hand-held guide complete with on-the-job tasks and checklists *Specific for Windows-based systems, the largest running OS in the world

  9. Structure of the MacAB-TolC ABC-type tripartite multidrug efflux pump

    Science.gov (United States)

    Llabrés, Salomé; Neuberger, Arthur; Blaza, James N.; Bai, Xiao-chen; Okada, Ui; Murakami, Satoshi; van Veen, Hendrik W.; Zachariae, Ulrich; Scheres, Sjors H.W.; Luisi, Ben F.

    2017-01-01

    The MacA-MacB-TolC assembly of Escherichia coli is a transmembrane machine that spans the cell envelope and actively extrudes substrates, including macrolide antibiotics and polypeptide virulence factors. These transport processes are energized by the ATPase MacB, a member of the ATP-binding cassette (ABC) superfamily. We present an electron cryo-microscopy structure of the ABC-type tripartite assembly at near-atomic resolution. A hexamer of the periplasmic protein MacA bridges between a TolC trimer in the outer membrane and a MacB dimer in the inner membrane, generating a quaternary structure with a central channel for substrate translocation. A gating ring found in MacA is proposed to act as a one-way valve in substrate transport. The MacB structure features an atypical transmembrane domain (TMD) with a closely packed dimer interface and a periplasmic opening that is the likely portal for substrate entry from the periplasm, with subsequent displacement through an allosteric transport mechanism. PMID:28504659

  10. A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Chon Kim

    2011-05-01

    Full Text Available Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency.

  11. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  12. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  13. Cross-Layer Scheme to Control Contention Window for Per-Flow in Asymmetric Multi-Hop Networks

    Science.gov (United States)

    Giang, Pham Thanh; Nakagawa, Kenji

    The IEEE 802.11 MAC standard for wireless ad hoc networks adopts Binary Exponential Back-off (BEB) mechanism to resolve bandwidth contention between stations. BEB mechanism controls the bandwidth allocation for each station by choosing a back-off value from one to CW according to the uniform random distribution, where CW is the contention window size. However, in asymmetric multi-hop networks, some stations are disadvantaged in opportunity of access to the shared channel and may suffer severe throughput degradation when the traffic load is large. Then, the network performance is degraded in terms of throughput and fairness. In this paper, we propose a new cross-layer scheme aiming to solve the per-flow unfairness problem and achieve good throughput performance in IEEE 802.11 multi-hop ad hoc networks. Our cross-layer scheme collects useful information from the physical, MAC and link layers of own station. This information is used to determine the optimal Contention Window (CW) size for per-station fairness. We also use this information to adjust CW size for each flow in the station in order to achieve per-flow fairness. Performance of our cross-layer scheme is examined on various asymmetric multi-hop network topologies by using Network Simulator (NS-2).

  14. Window Shopping, Granada, 1930s”

    Directory of Open Access Journals (Sweden)

    Mae Claxton

    2010-02-01

    Full Text Available “Window Shopping, Granada, 1930s,” Photographs, p. 16, with the gracious permission of the Eudora Welty FoundationAn African American woman, dressed in her Saturday go-to-town-best, stands outside a store window, chin in hand, contemplating the contents in the window. The image is reflective and thoughtful. What is she thinking? And what lies beyond the frame of this photograph? In Mississippi in the 1930s, could she walk into this store, perhaps try on clothes or hats, and make a purchase? I...

  15. Windows 8 & Office 2010 for dummies

    CERN Document Server

    Rathbone, Andy

    2012-01-01

    Two complete e-books covering Windows and Office for one low price! This unique value-priced e-book set brings together two bestselling For Dummies books in a single e-book file. Including a comprehensive table of contents and the full text of each book, complete with cover, this e-book set gives you in-depth information on the leading PC productivity tools: Windows 8 and Office 2010. Best of all, you'll pay less than the cost of each book purchased separately. You'll get the complete text of: Windows 8 For Dummies, which covers The core component

  16. Microsoft Windows Server 2012 administration instant reference

    CERN Document Server

    Hester, Matthew

    2013-01-01

    Fast, accurate answers for common Windows Server questions Serving as a perfect companion to all Windows Server books, this reference provides you with quick and easily searchable solutions to day-to-day challenges of Microsoft's newest version of Windows Server. Using helpful design features such as thumb tabs, tables of contents, and special heading treatments, this resource boasts a smooth and seamless approach to finding information. Plus, quick-reference tables and lists provide additional on-the-spot answers. Covers such key topics as server roles and functionality, u

  17. Teach yourself visually Windows 8 tablets

    CERN Document Server

    McFedries, Paul

    2012-01-01

    A visual guide to all the features of the new Windows 8 Tablet This must-have resource features visually rich, step-by-step instructions that show you how to get the most enjoyment from your Windows 8 tablet. Learn about the exciting new Metro UI, optimized specifically for touch devices. The most popular and commonly used apps and functions are covered too, along with the basics of syncing with a network, setting up e-mail, watching videos, listening to music, and common productivity tasks. This book provides all the guidance needed to enjoy all the best the new Windows 8 tablets have to offe

  18. Implementing Boot Control for Windows Vista

    Science.gov (United States)

    Ashino, Yuki; Fujita, Keisuke; Furusawa, Maiko; Uehara, Tetsutaro; Sasaki, Ryoichi

    A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted platform module. However, Dig-Force2 cannot be used for Windows Vista systems because the hooked API cannot monitor booting programs in user accounts. This paper describes an enhanced version of Dig-Force2, which uses a TPM and a white list to provide boot control functionality for Windows Vista systems. In addition, the paper presents the results of security and performance evaluations of the boot control system.

  19. Conceptual design of proton beam window

    International Nuclear Information System (INIS)

    Teraoku, Takuji; Kaminaga, Masanori; Terada, Atsuhiko; Ishikura, Syuichi; Kinoshita, Hidetaka; Hino, Ryutaro

    2001-01-01

    In a MW-scale neutron scattering facility coupled with a high-intensity proton accelerator, a proton beam window is installed as the boundary between a high vacuum region of the proton beam transport line and a helium environment around the target assembly working as a neutron source. The window is cooled by water so as to remove high volumetric heat generated by the proton beam. A concept of the flat-type proton beam window consisting of two plates of 3 mm thick was proposed, which was found to be feasible under the proton beam power of 5 MW through thermal-hydraulic and structural strength analyses. (authors)

  20. CSS for Windows 8 app development

    CERN Document Server

    Foster, Jeremy

    2013-01-01

    CSS for Windows 8 App Development is your learning guide for CSS - the language of great Windows 8-style apps. Learn the built-in styles that make the built-in controls shine, how to define them, and how to use CSS to give your custom app assets that beautiful Modern UI style. CSS (Cascading Style Sheets) is the clear standard for styling web applications, and with HTML, CSS, and JavaScript now powering apps on Windows 8, it's the clear standard there as well. CSS is a powerful styling and layout language that greatly simplifies the selection of page elements and their visual display, layout,

  1. Window Shopping, Granada, 1930s”

    OpenAIRE

    Mae Claxton

    2010-01-01

    Window Shopping, Granada, 1930s,” Photographs, p. 16, with the gracious permission of the Eudora Welty Foundation An African American woman, dressed in her Saturday go-to-town-best, stands outside a store window, chin in hand, contemplating the contents in the window. The image is reflective and thoughtful. What is she thinking? And what lies beyond the frame of this photograph? In Mississippi in the 1930s, could she walk into this store, perhaps try on clothes or hats, and make a purchase? ...

  2. Time Modeling: Salvatore Sciarrino, Windows and Beclouding

    Directory of Open Access Journals (Sweden)

    Acácio Tadeu de Camargo Piedade

    2017-08-01

    Full Text Available In this article I intend to discuss one of the figures created by the Italian composer Salvatore Sciarrino: the windowed form. After the composer's explanation of this figure, I argue that windows in composition can open inwards and outwards the musical discourse. On one side, they point to the composition's inner ambiences and constitute an internal remission. On the other, they instigate the audience to comprehend the external reference, thereby constructing intertextuality. After the outward window form, I will consider some techniques of distortion, particularly one that I call beclouding. To conclude, I will comment the question of memory and of compostition as time modeling.

  3. Windows Server 2012 ja Active Directory

    OpenAIRE

    Eteläaho, Antti

    2015-01-01

    Opinnäytetyön aiheena oli tutustua Windows Server 2012–ohjelmiston sisältämiin palveluihin sekä perehtyä tarkemmin Active Directoryn peruskäyttöön. Tavoitteena oli antaa lukijalle ymmärrys Windows Server 2012–ohjelmiston tarjoamista käyttömahdollisuuksista ja Active Directoryn käytöstä. Opinnäytetyön tietoperusta koostui virtuaaliympäristön käytöstä ja erilaisista Windows Server 2012–ohjelman palveluista. Tietoperusta kattoi esimerkiksi seuraavat käsitteet: Virtuaalisointi, Emulointi, Ohj...

  4. Prototype solid-state electrochromic window devices

    International Nuclear Information System (INIS)

    Dao, L.H.; Nguyen, M.T.

    1989-01-01

    This paper discusses electrochromic smart windows which are prospective devices for the control of light transmission in response to the variation of brightness of the environment. The fabrication of electrochromic windows based on cathodically coloring transition metal oxides and anodically coloring conducting polymers are described. The device consists of gel or glassy polymer electrolytes sandwiches by a pair of transparent conducting glass coated respectively with a thin film of WO 3 or MoO 3 prepared by electrodeposition, and with a thin film of ploy(aniline) derivatives obtained by electropolymerization or solution casting. The electrochromic properties of the five-layer smart window devices are presented

  5. McMAC: towards a MAC protocol with multi-constrained QoS provisioning for diverse traffic in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Hassan, Mohammad Mehedi; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-11-12

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS demands and introduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respective QoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMAC is also modeled analytically, and extensive simulations were performed to evaluate its performance. The results reveal that McMAC achieves the desired delay and reliability guarantee according to the requirements of a particular traffic class while achieving energy efficiency.

  6. A Study on the Distributed Antenna Based Heterogeneous Cognitive Wireless Network Synchronous MAC Protocol

    Directory of Open Access Journals (Sweden)

    Lian-Fen Huang

    2015-01-01

    Full Text Available This paper introduces distributed antennas into a cognitive radio network and presents a heterogeneous network. The best contribution of this paper is that it designs a synchronous cognitive MAC protocol (DAHCWNS-MAC protocol: distributed antenna based heterogeneous cognitive wireless network synchronous MAC protocol. The novel protocol aims at combining the advantages of cognitive radio and distributed antennas to fully utilize the licensed spectrum, broaden the communication range, and improve throughput. This paper carries out the mathematical modeling and performance simulation to demonstrate its superiority in improving the network throughput at the cost of increasing antenna hardware costs.

  7. MAC Version 3.2, MBA Version 1.3 acceptance test summary report

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) and Materials Balance (MBA) programs had the Paradox Conversion to 4.0 ATP run to check out the systems. This report describes the results of the test and provides the signoff sheets associated with the testing. The test primarily concentrated on verifying that MAC and MBA software would run properly in the Paradox 4.0 environment. Changes in the MAC and MBA programs were basically limited to superficial items needed to accommodate the enhanced method of execution

  8. Window selection for dual photopeak window scatter correction in Tc-99m imaging

    International Nuclear Information System (INIS)

    Vries, D.J. de; King, M.A.

    1994-01-01

    The width and placement of the windows for the dual photopeak window (DPW) scatter subtraction method for Tc-99m imaging is investigated in order to obtain a method that is stable on a multihead detector system for single photon emission computed tomography (SPECT) and is capable of providing a good scatter estimate for extended objects. For various window pairs, stability and noise were examined with experiments using a SPECT system, while Monte Carlo simulations were used to predict the accuracy of scatter estimates for a variety of objects and to guide the development of regression relations for various window pairs. The DPW method that resulted from this study was implemented with a symmetric 20% photopeak window composed of a 15% asymmetric photopeak window and a 5% lower window abutted at 7 keV below the peak. A power function regression was used to relate the scatter-to-total ratio to the lower window-to-total ratio at each pixel, from which an estimated scatter image was calculated. DPW demonstrated good stability, achieved by abutting the two windows away from the peak. Performance was assessed and compared with Compton window subtraction (CWS). For simulated extended objects, DPW generally produced a less biased scatter estimate than the commonly used CWS method with k = 0.5. In acquisitions of a clinical SPECT phantom, contrast recovery was comparable for both DPW and CWS; however, DPW showed greater visual contrast in clinical SPECT bone studies

  9. Windows XP Operating System Security Analysis

    National Research Council Canada - National Science Library

    Goktepe, Meftun

    2002-01-01

    .... The purpose of this research is to determine if Windows XP, when used as a workstation operating system in domain- based networks, provides adequate security policy enforcement for organizations...

  10. UV conformal window for asymptotic safety

    Science.gov (United States)

    Bond, Andrew D.; Litim, Daniel F.; Vazquez, Gustavo Medina; Steudtner, Tom

    2018-02-01

    Interacting fixed points in four-dimensional gauge theories coupled to matter are investigated using perturbation theory up to three loop order. It is shown how fixed points, scaling exponents, and anomalous dimensions are obtained as a systematic power series in a small parameter. The underlying ordering principle is explained and contrasted with conventional perturbation theory and Weyl consistency conditions. We then determine the conformal window with asymptotic safety from the complete next-to-next-to-leading order in perturbation theory. Limits for the conformal window arise due to fixed point mergers, the onset of strong coupling, or vacuum instability. A consistent picture is uncovered by comparing various levels of approximation. The theory remains perturbative in the entire conformal window, with vacuum stability dictating the tightest constraints. We also speculate about a secondary conformal window at strong coupling and estimate its lower limit. Implications for model building and cosmology are indicated.

  11. Clooten Siding & Window, Inc. Information Sheet

    Science.gov (United States)

    Clooten Siding & Window, Inc. (the Company) is located in Bismarck, North Dakota. The settlement involves renovation activities conducted at a property constructed prior to 1978, located in Bismarck, North Dakota.

  12. The Window Men, Inc. Information Sheet

    Science.gov (United States)

    The Window Men, Inc. (the Company) is located in Lynchburg, Virginia. The settlement involves renovation activities conducted at properties constructed prior to 1978, located in Lynchburg and Amherst, Virginia.

  13. Upstate Windows and Exteriors Information Sheet

    Science.gov (United States)

    Upstate Windows and Exteriors (the Company) is located in Greenville, South Carolina. The settlement involves renovation activities conducted at properties constructed prior to 1978, located in Greenville and Easley, South Carolina.

  14. Translational nanomedicine--through the therapeutic window.

    Science.gov (United States)

    Pierce, Robin L

    2015-01-01

    Translational nanomedicine occurs only through the successful integration of multiple inputs and iterative modifications. The therapeutic window plays a pivotal role in the trajectory of translational nanomedicine. Often defined in terms of the range of dosage for safe and effective therapeutic effect, a second definition of the therapeutic window refers to the often narrow temporal window in which a therapeutic effect can be obtained. Expanding the second definition to explicitly include the spatial dimension, this article explores aspects of the therapeutic spaces created by nanomedicine that shift the traditional dimensions of symptom, sign and pathology. This article analyzes three aspects of the therapeutic window in nanomedicine - temporal, spatial and manner of construction and their impact on the dimensions of modern medicine.

  15. LAMAN: Load Adaptable MAC for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Realp Marc

    2005-01-01

    Full Text Available In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN protocol is described. LAMAN is a novel decentralized multipacket MAC protocol designed following a cross-layer approach. Basically, this protocol is a hybrid CDMA-TDMA-based protocol that aims at throughput maximization in multipacket communication environments by efficiently combining contention and conflict-free protocol components. Such combination of components is used to adapt the nodes' access priority to changes on the traffic load while, at the same time, accounting for the multipacket reception (MPR capability of the receivers. A theoretical analysis of the system is developed presenting closed expressions of network throughput and packet delay. By simulations the validity of our analysis is shown and the performances of a LAMAN-based system and an Aloha-CDMA-based one are compared.

  16. Pliable Cognitive MAC for Heterogeneous Adaptive Cognitive Radio Sensor Networks.

    Science.gov (United States)

    Al-Medhwahi, Mohammed; Hashim, Fazirulhisyam; Ali, Borhanuddin Mohd; Sali, Aduwati

    2016-01-01

    The rapid expansion of wireless monitoring and surveillance applications in several domains reinforces the trend of exploiting emerging technologies such as the cognitive radio. However, these technologies have to adjust their working concepts to consider the common characteristics of conventional wireless sensor networks (WSNs). The cognitive radio sensor network (CRSN), still an immature technology, has to deal with new networks that might have different types of data, traffic patterns, or quality of service (QoS) requirements. In this paper, we design and model a new cognitive radio-based medium access control (MAC) algorithm dealing with the heterogeneous nature of the developed networks in terms of either the traffic pattern or the required QoS for the node applications. The proposed algorithm decreases the consumed power on several fronts, provides satisfactory levels of latency and spectrum utilization with efficient scheduling, and manages the radio resources for various traffic conditions. An intensive performance evaluation is conducted to study the impact of key parameters such as the channel idle time length, node density, and the number of available channels. The performance evaluation of the proposed algorithm shows a better performance than the comparable protocols. Moreover, the results manifest that the proposed algorithm is suitable for real time monitoring applications.

  17. A MAC Protocol to Support Monitoring of Underwater Spaces †

    Science.gov (United States)

    Santos, Rodrigo; Orozco, Javier; Ochoa, Sergio F.; Meseguer, Roc; Eggly, Gabriel; Pistonesi, Marcelo F.

    2016-01-01

    Underwater sensor networks are becoming an important field of research, because of their everyday increasing application scope. Examples of their application areas are environmental and pollution monitoring (mainly oil spills), oceanographic data collection, support for submarine geolocalization, ocean sampling and early tsunamis alert. The challenge of performing underwater communications is well known, provided that radio signals are useless in this medium, and a wired solution is too expensive. Therefore, the sensors in these networks transmit their information using acoustic signals that propagate well under water. This data transmission type not only brings an opportunity, but also several challenges to the implementation of these networks, e.g., in terms of energy consumption, data transmission and signal interference. In order to help advance the knowledge in the design and implementation of these networks for monitoring underwater spaces, this paper proposes a MAC protocol for acoustic communications between the nodes, based on a self-organized time division multiple access mechanism. The proposal was evaluated using simulations of a real monitoring scenario, and the obtained results are highly encouraging. PMID:27355950

  18. A MAC Protocol to Support Monitoring of Underwater Spaces

    Directory of Open Access Journals (Sweden)

    Rodrigo Santos

    2016-06-01

    Full Text Available Underwater sensor networks are becoming an important field of research, because of their everyday increasing application scope. Examples of their application areas are environmental and pollution monitoring (mainly oil spills, oceanographic data collection, support for submarine geolocalization, ocean sampling and early tsunamis alert. The challenge of performing underwater communications is well known, provided that radio signals are useless in this medium, and a wired solution is too expensive. Therefore, the sensors in these networks transmit their information using acoustic signals that propagate well under water. This data transmission type not only brings an opportunity, but also several challenges to the implementation of these networks, e.g., in terms of energy consumption, data transmission and signal interference. In order to help advance the knowledge in the design and implementation of these networks for monitoring underwater spaces, this paper proposes a MAC protocol for acoustic communications between the nodes, based on a self-organized time division multiple access mechanism. The proposal was evaluated using simulations of a real monitoring scenario, and the obtained results are highly encouraging.

  19. Bit Level Synchronized MAC Protocol for Multireader RFID Networks

    Directory of Open Access Journals (Sweden)

    Namboodiri Vinod

    2010-01-01

    Full Text Available The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency channels due to technical and regulatory limitations. The typical solution is to separate the operation of such readers across time. This sequential operation, however, results in a long delay to identify all tags. We present a bit level synchronized (BLSync MAC protocol for multi-reader RFID networks that allows multiple readers to operate simultaneously on the same frequency channel. The BLSync protocol solves the reader collision problem by allowing all readers to transmit the same query at the same time. We analyze the performance of using the BLSync protocol and demonstrate benefits of 40%–50% in terms of tag reading delay for most settings. The benefits of BLSync, first demonstrated through analysis, are then validated and quantified through simulations on realistic reader-tag layouts.

  20. Emergency Handling for MAC Protocol in Human Body Communication

    Directory of Open Access Journals (Sweden)

    Kwon Youngmi

    2011-01-01

    Full Text Available The human body communication (HBC is a technology that enables short range data communication using the human body as a medium, like an electrical wire. Thus it removes the need for a traditional antenna. HBC may be used as a type of data communication in body area network (BAN, while the devices are being in contact with body. One of important issues in BAN is an emergency alarm because it may be closely related to human life. For emergency data communication, the most critical factor is the time constraint. IEEE 802.15.6 specifies that the emergency alarm for the BAN must be notified in less than 1 sec and must provide prioritization mechanisms for emergency traffic and notification. As one type of BAN, the HBC must follow this recommendation, too. Existing emergency handling methods in BAN are based on the carrier sensing capability on radio frequencies to detect the status of channels. However, PHY protocol in HBC does not provide the carrier sensing. So the previous methods are not well suitable for HBC directly. Additionally, in the environment that the emergency rate is very low, the allocation of dedicated slot(s for emergency in each superframe is very wasteful. In this work, we proposed specific emergency handling operation for human body communication's medium access control (HBC-MAC protocol to meet the emergency requirements for BAN. We also showed the optimal number of emergency slots for the various combinations of beacon intervals and emergency rates.

  1. Modified pterional craniotomy without "MacCarty keyhole".

    Science.gov (United States)

    Moscovici, Samuel; Mizrahi, Cezar José; Margolin, Emil; Spektor, Sergey

    2016-02-01

    Pterional craniotomy is one of the most widely used approaches in neurosurgery. The MacCarty keyhole has remained the preferred means of beginning the craniotomy to achieve a low access point; however, the bone opening may result in a residual defect and an aesthetically unpleasant depression in the periorbital area. We present our modification of the traditional technique. Instead of drilling the keyhole in the frontoperiorbital area, the classical location, we perform a 5 × 15 mm strip craniectomy at the lowest accessible point in the infratemporal fossa, corresponding to the projection of the most lateral point of the sphenoid ridge. The anterior half of this opening exposes the basal frontal dura, while the posterior half brings the temporal dura into view. This modified technique was applied in 48 pterional craniotomies performed for removal of a variety of neoplasms during 2014-2015. There were no approach-related complications. Aesthetic outcomes and patient acceptance have been good; no patient developed skin depression in the periorbital area. In our experience, craniotomy for a pterional approach with the lowest possible access to the frontotemporal skull base may be performed by drilling a narrow oblong opening, without the use of any keyhole or burr hole, to create a smaller skull defect and achieve optimal aesthetic outcomes. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. Windows in Low Energy Houses. Size Matters

    Energy Technology Data Exchange (ETDEWEB)

    Persson, Mari-Louise

    2004-06-01

    A generally accepted way of building passive houses has been to have small windows facing north and a large glass facade to the south. This is to minimize losses on the north side while gaining as much solar heat as possible on the south. In spring 2001, twenty terraced houses were built outside Goeteborg partly in this way. The indoor temperature is kept at a comfortable level by passive methods, using solar gains and internal gains from household appliances and occupants. Heat losses are very low, since the building envelope is well insulated and since modern coated triple-glazed windows have been installed. The purpose of this work is to investigate how decreasing the window size facing south and increasing the window size facing north in low energy houses will influence the energy consumption and maximum power needed to keep the indoor temperature between 23 and 26 deg C. Different climates and orientations have been investigated and so have the influence of occupancy and window type. A dynamic building simulation tool, DEROB, has been used and the simulations indicate an extremely low energy demand for the houses. The results show that the size of the energy efficient windows does not have a major influence on the heating demand in winter, but is of relevant signification looking at the cooling need in summer. This indicates that instead of the traditional technique of building passive houses it is possible to enlarge the window area facing north and get better lighting conditions. To decrease the energy need for cooling, there is an optimal window size facing south that is smaller than the original size of the investigated buildings.

  3. Economic efficiency of application of solar window

    OpenAIRE

    Shapoval Stepan

    2017-01-01

    Priority and qualitatively new direction in the fuel and energy sector is renewable energy. This paper describes a feasibility study of using solar window in the system of solar heat supply. The article presents literature data about the effectiveness of the use of solar systems in other countries. The results confirm a sufficient efficiency of solar heat supply with using solar Windows. Insights based on practical experience and mathematical calculations, which are aimed at a detailed explan...

  4. Massive Neutrinos and the Higgs Mass Window

    CERN Document Server

    Casas, J A; Ibarra, Alejandro; Quirós, Mariano

    2000-01-01

    If neutrino masses are produced by a see-saw mechanism the Standard Model prediction for the Higgs mass window (defined by upper (perturbativity) and lower (stability) bounds) can be substantially affected. Actually the Higgs mass window can close completely, which settles an upper bound on the Majorana mass for the right-handed neutrinos, $M$, ranging from $10^{13}$ GeV for three generations of quasi-degenerate massive neutrinos with $m_\

  5. Cascaded Window Memoization for Medical Imaging

    OpenAIRE

    Khalvati , Farzad; Kianpour , Mehdi; Tizhoosh , Hamid ,

    2011-01-01

    Part 12: Medical Applications of ANN and Ethics of AI; International audience; Window Memoization is a performance improvement technique for image processing algorithms. It is based on removing computational redundancy in an algorithm applied to a single image, which is inherited from data redundancy in the image. The technique employs a fuzzy reuse mechanism to eliminate unnecessary computations. This paper extends the window memoization technique such that in addition to exploiting the data...

  6. High performance solar control office windows

    Energy Technology Data Exchange (ETDEWEB)

    King, W.J.

    1977-12-01

    Investigations conducted over a 9 month period on the use of ion beam sputtering methods for the fabrication of solar control windows for energy conservation are described. Principal emphasis was placed on colored, reflecting, heat rejecting, office building windows for reducing air conditioning loads and to aid in the design of energy conserving buildings. The coating techniques were developed primarily for use with conventional absorbing plate glass such as PPG solarbronze, but were also demonstrated on plastic substrates for retrofit applications. Extensive material investigations were conducted to determine the optimum obtainable characteristics, with associated weathering studies as appropriate aimed at achieving a 20 year minimum life. Conservative estimates indicate that successful commercialization of the windows developed under this program would result in energy savings of 16,000,000 barrels of oil/year by 1990 if installation were only 10 percent of new commercial building stock. These estimates are relative to existing design for energy conserving windows. Installation in a greater percentage of new stock and for retrofit applications could lead to proportionately greater energy savings. All such installations are projected as cost effective as well as energy effective. A secondary program was carried out to modify the techniques to yield thermal control windows for residential applications. These windows were designed to provide a high heat retention capability without seriously affecting their transmission of incident solar radiation, thereby enhancing the greenhouse effect. This part of the program was successful in producing a window form which could be interchanged for standard residential window material in a cost and energy effective manner. The only variation from standard stock in appearance is a very light rose or neutral gray coloring.

  7. CAC on a MAC: Setting up a DOD Common Access Card Reader on the Macintosh OS X Operating System

    National Research Council Canada - National Science Library

    Hopfner, Phil

    2006-01-01

    .... The CAC readers in conjunction with the user's Smart Card enables access to DoD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DoD Public Key Infrastructure (PKI...

  8. Functional window of the avian compass.

    Science.gov (United States)

    Poonia, Vishvendra Singh; Kondabagil, Kiran; Saha, Dipankar; Ganguly, Swaroop

    2017-05-01

    The functional window is an experimentally observed property of the avian compass that refers to its selectivity around the geomagnetic-field strength. We show that the simple radical-pair model, using biologically feasible hyperfine parameters, can qualitatively explain the salient features of the avian compass as observed in behavioral experiments: its functional window, as well as disruption of the compass action by radio-frequency fields of specific frequencies. Further, we show that adjustment of the hyperfine parameters can tune the functional window, suggesting a possible mechanism for its observed adaptation to field variation. While these lend support to the radical-pair model, we find that in its simplest form-or even with minor augmentations-it cannot quantitatively explain the observed width of the functional window. This suggests deeper generalization of the model, possibly in terms of more nuclei or more subtle environmental interaction than has been considered hitherto. Finally, we examine a possible biological purpose for the functional window; even assuming evolutionary benefit from radical-pair magnetoreception, it seems likely that the functional window could be just a corollary thereof, imparting no additional advantage.

  9. USB Storage Device Forensics for Windows 10.

    Science.gov (United States)

    Arshad, Ayesha; Iqbal, Waseem; Abbas, Haider

    2017-07-18

    Significantly increased use of USB devices due to their user-friendliness and large storage capacities poses various threats for many users/companies in terms of data theft that becomes easier due to their efficient mobility. Investigations for such data theft activities would require gathering critical digital information capable of recovering digital forensics artifacts like date, time, and device information. This research gathers three sets of registry and logs data: first, before insertion; second, during insertion; and the third, after removal of a USB device. These sets are analyzed to gather evidentiary information from Registry and Windows Event log that helps in tracking a USB device. This research furthers the prior research on earlier versions of Microsoft Windows and compares it with latest Windows 10 system. Comparison of Windows 8 and Windows 10 does not show much difference except for new subkey under USB Key in registry. However, comparison of Windows 7 with latest version indicates significant variances. © 2017 American Academy of Forensic Sciences.

  10. Window Size Impact in Human Activity Recognition

    Directory of Open Access Journals (Sweden)

    Oresti Banos

    2014-04-01

    Full Text Available Signal segmentation is a crucial stage in the activity recognition process; however, this has been rarely and vaguely characterized so far. Windowing approaches are normally used for segmentation, but no clear consensus exists on which window size should be preferably employed. In fact, most designs normally rely on figures used in previous works, but with no strict studies that support them. Intuitively, decreasing the window size allows for a faster activity detection, as well as reduced resources and energy needs. On the contrary, large data windows are normally considered for the recognition of complex activities. In this work, we present an extensive study to fairly characterize the windowing procedure, to determine its impact within the activity recognition process and to help clarify some of the habitual assumptions made during the recognition system design. To that end, some of the most widely used activity recognition procedures are evaluated for a wide range of window sizes and activities. From the evaluation, the interval 1–2 s proves to provide the best trade-off between recognition speed and accuracy. The study, specifically intended for on-body activity recognition systems, further provides designers with a set of guidelines devised to facilitate the system definition and configuration according to the particular application requirements and target activities.

  11. AN INTRODUCTION TO WINDOWS 2000 AT CERN

    CERN Multimedia

    2001-01-01

    A demonstration of the new supported Windows environment for all the CERN personal computers (PC) will be given which is based on Windows 2000. This presentation will assume little or no familiarity with the PC, or NICE, and will concentrate on the services being offered to the users of PCs at CERN. How NICE 2000 can facilitate the work of all users, eventually becoming the key access point to all activities in the laboratory will be demonstrated. Information: http://winservices.web.cern.ch/winservices/Seminars/Tutorials/ Date Title Language Location Speaker Fri 1/6 10:00 Une introduction à Windows 2000 au CERN F IT Auditorium (31/3-004) Alberto Pace Tue 5/6 10:00 Une introduction à Windows 2000 au CERN F LHC Auditorium (30/7th floor) Frederic Hemmer Tue 5/6 14:00 Une introduction à Windows 2000 au CERN F SL Auditorium (864/1s floor) Michel Bornand Tue 5/6 14:00 An introduction to Windows 2000 at CERN E IT Auditorium (31/3-004) Andreas Wagner ...

  12. 78 FR 26711 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Liquidity...

    Science.gov (United States)

    2013-05-08

    ... liquidity are ``Cash,'' ``Contingency Funding Plan,'' ``Liquidity Maturity Management Plan,'' and... management rule became effective, it ``commenced an evaluation and rebalancing of its investment portfolio in... Funding and Fiscal Affairs; Farmer Mac Liquidity Management ACTION: Proposed rule; reopening of comment...

  13. Four new species of Adicella MacLachlan (Trichoptera: Leptoceridae: Triaenodini) from Sabah, East Malaysia

    NARCIS (Netherlands)

    Huisman, J.; Andersen, T.

    1997-01-01

    Four new species of Adicella MacLachlan, 1877, A. anakpanah spec, nov., A. bavanga spec, nov., A. danumensis spec, nov., and A. gada spec, nov., from Sabah (Borneo), East Malaysia, are described and figured.

  14. Water Entry Onto the MAC 200 Immersion Suit During Simulated Parachute Jump and Drag Trials

    National Research Council Canada - National Science Library

    Ducharme, Michel

    1998-01-01

    The MAC 200 immersion suit newly developed by Mustang Survival (Richmond, B.C.) has recently been considered a potential replacement suit for the constant wear dry immersion suit currently used by Canadian Forces aircrew...

  15. Detection and Prevention of MAC Layer Misbehavior for ad hoc Networks

    National Research Council Canada - National Science Library

    Cardenas, Alvaro A; Radosavac, Svetlana; Baras, John S

    2004-01-01

    ...) attacks targeting the MAC layer. In this study we assess the performance of the CSMA/CA scheme and investigate its efficiency with regard to security and information assurance in mobile ad hoc wireless networks...

  16. Evaluation of video transmission of MAC protocols in wireless sensor network

    Science.gov (United States)

    Maulidin, Mahmuddin, M.; Kamaruddin, L. M.; Elsaikh, Mohamed

    2016-08-01

    Wireless Sensor Network (WSN) is a wireless network which consists of sensor nodes scattered in a particular area which are used to monitor physical or environment condition. Each node in WSN is also scattered in sensor field, so an appropriate scheme of MAC protocol should have to develop communication link for data transferring. Video transmission is one of the important applications for the future that can be transmitted with low aspect in side of cost and also power consumption. In this paper, comparison of five different MAC WSN protocol for video transmission namely IEEE 802.11 standard, IEEE 802.15.4 standard, CSMA/CA, Berkeley-MAC, and Lightweight-MAC protocol are studied. Simulation experiment has been conducted in OMNeT++ with INET network simulator software to evaluate the performance. Obtained results indicate that IEEE 802.11 works better than other protocol in term of packet delivery, throughput, and latency.

  17. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  18. Analysis of an Adaptive P-Persistent MAC Scheme for WLAN Providing Delay Fairness

    Science.gov (United States)

    Yen, Chih-Ming; Chang, Chung-Ju; Chen, Yih-Shen; Huang, Ching Yao

    The paper proposes and analyzes an adaptive p-persistent-based (APP) medium access control (MAC) scheme for IEEE 802.11 WLAN. The APP MAC scheme intends to support delay fairness for every station in each access, denoting small delay variance. It differentiates permission probabilities of transmission for stations which are incurred with various packet delays. This permission probability is designed as a function of the numbers of retransmissions and re-backoffs so that stations with larger packet delay are endowed with higher permission probability. Also, the scheme is analyzed by a Markov-chain analysis, where the collision probability, the system throughput, and the average delay are successfully obtained. Numerical results show that the proposed APP MAC scheme can attain lower mean delay and higher mean throughput. In the mean time, simulation results are given to justify the validity of the analysis, and also show that the APP MAC scheme can achieve more delay fairness than conventional algorithms.

  19. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  20. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  1. Designing for Windows 8 fundamentals of great design in Windows Store apps

    CERN Document Server

    Schooley, Brent

    2013-01-01

    Designing for Windows 8 is a fast-paced, 150-page primer on the key design concepts you need to create successful Windows 8 apps. This book will help you design a user interface that is both delightful and effective, feels 'right' to your users, and encapsulates a great Windows 8 experience. In this book, you will: Meet the building blocks of solid Windows 8 UI design in a well-designed sample app. Learn how to incorporate key design elements into your apps, such as the app bar, charms and subtle animations from the animation library. Find out how to deliver the core experience that your users

  2. Development of ITER diagnostic window assemblies

    International Nuclear Information System (INIS)

    Maquet, Ph.; Walker, C.I.; Barnsley, R.; Bertalot, L.; Encheva, A.; Pitcher, C.S.; Reichle, R.; Vayakis, G.; Veshchev, E.; Udintsev, V.S.; Walsh, M.J.; Watts, C.; Patel, K.M.; Giacomin, T.; Hughes, Shaun; Taylor, Neill; Pearce, Robert; Okayama, Katsumi

    2013-01-01

    Highlights: • The concepts chosen for ITER Diagnostic Windows are given. • The description of the main components of the window assemblies is presented. • An overview of the R and D related to the window assemblies is given. • The process for their development is briefly explained. -- Abstract: Most of ITER's diagnostics will be provided with viewing lines (optical, microwave, spectroscopic) for the monitoring of key characteristics of the plasma or for the achievement of physical measurements inside the vacuum vessel. For many of them the nature of the physical signal transmitted through the viewing lines requires the implementation of window assemblies incorporating either Glass/Ceramic or Beryllium window. The main requirements of the Diagnostic Window Assemblies are the transmission of the signals without attenuation or disturbances, the containment of vacuum, the confinement of in-vessel radioactive materials. Although they are generally not in direct viewing of the plasma, they are exposed to severe environmental conditions in normal and accidental conditions. The concept chosen for ITER Diagnostic Window Assemblies is based on a system of two windows with a monitored interspace, largely inspired from previous large machine solutions. Such a system is able to satisfy the transmission and vacuum requirements. Although this capability has previously proven a high reliability level, ITER conditions, which are more stringent, impose the requirement for improvement of existing designs and even the development of novel solutions, in particular to assure the radioactive material confinement function, which must be met in all circumstances including all off-normal conditions. Moreover the qualification of these concepts shall meet the nuclear safety requirements, although non metallic and beryllium components are not covered by existing codes and standards. This paper presents designs of window assemblies for different diagnostics. It gives an update of the

  3. Toxicité du macérât de Carica papaya L. contre Coptotermes ...

    African Journals Online (AJOL)

    Par des tests biologiques, cette étude a examiné, au laboratoire, les effets du macérât de graines de C. papaya sur la toxicité, la survie, l'alimentation et la tâche de construction de galeries des ouvriers du termite souterrain Formosan, Coptotermes formosanus. Dans les bio-essais, le macérât non fermenté de graines et ...

  4. A Cognitive CSMA-based Multichannel MAC Protocol for Cognitive Radio Networks

    OpenAIRE

    Huang, Po-Yao; Chen, Kwang-Cheng; Chiou, Sheng-Lun

    2009-01-01

    Multichannel media access control (MAC) protocols have been widely considered for future mobile ad hoc networks and various wireless data networks. However, ALOHA-based protocols have been extensively studied in current researches for their simplicities both in design and analysis. To cope with co-existing multiple systems under the cognitive radio (CR) paradigm, we introduce the cognition capability and CSMA into multichannel MAC protocol, along with learning functionality of CR and a multic...

  5. Analisa Kinerja Protokol Sensor Media Access Control (S-MAC) Pada Jaringan Sensor Nirkabel

    OpenAIRE

    Abdillah, Kusuma; Wirawan, Wirawan

    2013-01-01

    Jaringan sensor nirkabel digunakan untuk memantau suatu kondisi lingkungan seperti daerah rawan bencana. Konsumsi energi merupakan hal utama yang harus diperhatikan karena sangat susah untuk mengganti baterai dalam kondisi lingkungan yang jauh dari jangkauan manusia. Untuk topologi sepuluh hop dengan interval pengiriman satu detik, protokol s-mac adaptif listening mempunyai nilai throughput 66,33% lebih kecil dibanding protokol s-mac tanpa periode tidur, dan protokol tanpa adaptif listening m...

  6. Environmental Assessment of Installation Development at MacDill Air Force Base, Florida

    Science.gov (United States)

    2013-04-18

    Species Potentially Occurring On or Near MacDill AFB Common Name Scientific Name Federal Status State Status Notes Amphibians/ Reptiles American...species (e.g., birds) would be expected to recover faster than more sedentary species (e.g., reptiles ); however, wildlife species in the proposed project...HABS III 5 NOAA 1941 NRHP Eligible as part of MacDill Field Historic District and individually, 1993 HABS 6 Joint Intelligence Center 1953 Not

  7. A Critique of MacIntyrean Morality From a Kantian Perspective

    OpenAIRE

    Krishna Mani Pathak

    2014-01-01

    This article is a critical examination of MacIntyre’s notion of morality in reference to Kant’s deontological moral theory. The examination shows that MacIntyre (a) criticizes Kant’s moral theory to defend virtue ethics or neo-Aristotelian ethics with a weak notion of morality; (b) favors the idea of local morality, which does not leave any room for moral assessment and reciprocity in an intercultural domain; and (c) f...

  8. Precipitate produced by Serratia marcescens on MacConkey agar: useful diagnostic test.

    Science.gov (United States)

    Black, W A

    1978-11-01

    The production of a precipitate by Serratia marcescens on Oxoid MacConkey agar has proven useful as a laboratory diagnostic test. This phenomenon is specific for Serratia within the Enterobacteriaceae, although precipitate production is also given by Acinetobacter anitratus and some Pseudomonas, Alcaligenes, and Aeromonas species. Precipitate production seems to be specific for certain batches of MacConkey agar, and is probably related to a specific property of some batches of bile salts.

  9. Enumeration of Klebsiella spp. in cold water by using MacConkey-inositol-potassium tellurite medium.

    OpenAIRE

    Dutka, B J; Jones, K; Bailey, H

    1987-01-01

    MacConkey-inositol-potassium tellurite agar was field tested for its ability to selectively enumerate Klebsiella species from the waters of the Saint John River Basin, which include fresh and marine waters. Water temperature varied from 1 to 6 degrees C during the survey period. Results of the study indicated that 77% of the typical colonies on MacConkey-inositol-potassium tellurite medium were Klebsiella species, but the total Klebsiella population enumerated was greatly underestimated.

  10. Enumeration of Klebsiella spp. in cold water by using MacConkey-inositol-potassium tellurite medium.

    Science.gov (United States)

    Dutka, B J; Jones, K; Bailey, H

    1987-07-01

    MacConkey-inositol-potassium tellurite agar was field tested for its ability to selectively enumerate Klebsiella species from the waters of the Saint John River Basin, which include fresh and marine waters. Water temperature varied from 1 to 6 degrees C during the survey period. Results of the study indicated that 77% of the typical colonies on MacConkey-inositol-potassium tellurite medium were Klebsiella species, but the total Klebsiella population enumerated was greatly underestimated.

  11. MAC Version 3.3, MBA Version 1.3 acceptance test summary report

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) and Materials Balance (MBA) programs had the Paradox Code Cleanup ATP run to check out the systems. This report describes the results of the test and provides the signoff sheets associated with the testing. The Acceptance Test results indicate that the MAC and MBA systems are ready for operation using the cleaned up code. The final codes were removed to the production space on the customer server on April 15th

  12. Trumpen i os alle

    DEFF Research Database (Denmark)

    Kurrild-Klitgaard, Peter

    2016-01-01

    »Vi ved alle hver især, hvad vi synes, der er godt for os selv og vore familier – så hvorfor skulle vi ikke også vide, hvad der er bedst for andre?«......»Vi ved alle hver især, hvad vi synes, der er godt for os selv og vore familier – så hvorfor skulle vi ikke også vide, hvad der er bedst for andre?«...

  13. Functional Implications of an Intermeshing Cogwheel-like Interaction between TolC and MacA in the Action of Macrolide-specific Efflux Pump MacAB-TolC*

    Science.gov (United States)

    Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul

    2011-01-01

    Macrolide-specific efflux pump MacAB-TolC has been identified in diverse Gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel. PMID:21325274

  14. Functional implications of an intermeshing cogwheel-like interaction between TolC and MacA in the action of macrolide-specific efflux pump MacAB-TolC.

    Science.gov (United States)

    Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul

    2011-04-15

    Macrolide-specific efflux pump MacAB-TolC has been identified in diverse gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel.

  15. X-Windows Socket Widget Class

    Science.gov (United States)

    Barry, Matthew R.

    2006-01-01

    The X-Windows Socket Widget Class ("Class" is used here in the object-oriented-programming sense of the word) was devised to simplify the task of implementing network connections for graphical-user-interface (GUI) computer programs. UNIX Transmission Control Protocol/Internet Protocol (TCP/IP) socket programming libraries require many method calls to configure, operate, and destroy sockets. Most X Windows GUI programs use widget sets or toolkits to facilitate management of complex objects. The widget standards facilitate construction of toolkits and application programs. The X-Windows Socket Widget Class encapsulates UNIX TCP/IP socket-management tasks within the framework of an X Windows widget. Using the widget framework, X Windows GUI programs can treat one or more network socket instances in the same manner as that of other graphical widgets, making it easier to program sockets. Wrapping ISP socket programming libraries inside a widget framework enables a programmer to treat a network interface as though it were a GUI.

  16. Rugged sensor window materials for harsh environments

    Science.gov (United States)

    Bayya, Shyam; Villalobos, Guillermo; Kim, Woohong; Sanghera, Jasbinger; Hunt, Michael; Aggarwal, Ishwar D.

    2014-09-01

    There are several military or commercial systems operating in very harsh environments that require rugged windows. On some of these systems, windows become the single point of failure. These applications include sensor or imaging systems, high-energy laser weapons systems, submarine photonic masts, IR countermeasures and missiles. Based on the sea or land or air based platforms the window or dome on these systems must withstand wave slap, underwater or ground based explosions, or survive flight through heavy rain and sand storms while maintaining good optical transmission in the desired wavelength range. Some of these applications still use softer ZnS or fused silica windows because of lack of availability of rugged materials in shapes or sizes required. Sapphire, ALON and spinel are very rugged materials with significantly higher strengths compared to ZnS and fused silica. There have been recent developments in spinel, ALON and sapphire materials to fabricate in large sizes and conformal shapes. We have been developing spinel ceramics for several of these applications. We are also developing β-SiC as a transparent window material as it has higher hardness, strength, and toughness than sapphire, ALON and spinel. This paper gives a summary of our recent findings.

  17. Consensus statement on round window vibroplasty.

    Science.gov (United States)

    Beltrame, Achille M; Todt, Ingo; Sprinzl, Georg; Profant, Milan; Schwab, Burkhard

    2014-10-01

    This study aimed to review current knowledge regarding implantation of the Vibrant Soundbridge floating mass transducer (FMT) at the round window (round window vibroplasty) as well as to form a consensus on steps for a reliable, stable surgical procedure. Review of the literature and experimental observations by the authors. Round window (RW) vibroplasty has been established as a reliable procedure that produces good and stable results for patients with conductive or mixed hearing loss. The experience gained over the past few years of the authors' more than 200 implantations has led to consensus on several key points: (1) a wide and bloodless access to the middle ear with facial nerve monitoring, (2) the careful and correct identification and exposure of the round window membrane, (3) a good setup for efficient energy transition of the FMT, namely, perpendicular placement of the FMT with no contact to bone and the placement of cartilage behind the FMT to create a preloaded "spring" function, and (4) 4 points of FMT fixation: a rim of the round window bony overhang left intact both anterior and posterior to the FMT, conductor link stabilization, and cartilage behind the FMT. In addition, the FMT should be covered with soft tissue. © The Author(s) 2014.

  18. THERM 5 / WINDOW 5 NFRC simulation manual

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Robin; Kohler, Christian; Arasteh, Dariush; Carmody, John; Huizenga, Charlie; Curcija, Dragan

    2003-06-01

    This document, the ''THERM 5/WINDOW 5 NFRC Simulation Manual', discusses how to use the THERM and WINDOW programs to model products for NFRC certified simulations and assumes that the user is already familiar with those programs. In order to learn how to use these programs, it is necessary to become familiar with the material in both the ''THERM User's Manual'' and the ''WINDOW User's Manual''. In general, this manual references the User's Manuals rather than repeating the information. If there is a conflict between either of the User Manual and this ''THERM 5/''WINDOW 5 NFRC Simulation Manual'', the ''THERM 5/WINDOW 5 NFRC Simulation Manual'' takes precedence. In addition, if this manual is in conflict with any NFRC standards, the standards take precedence. For example, if samples in this manual do not follow the current taping and testing NFRC standards, the standards not the samples in this manual, take precedence.

  19. Huachipa-Jicamarca: cronología y desarrollo sociopolítico en el Rímac

    Directory of Open Access Journals (Sweden)

    1997-01-01

    aspectos relacionados. El primero, describe la cronología alfarera para Huachipa proponiéndose una secuencia cultural que se inicia en el Formativo Medio (circa 1000 A.C. y concluye en el Formativo Tardío (circa 100 A.C., con la modalidad alfarera “Blanco Sobre Rojo”. Según esta secuencia, las secciones baja y media del Rímac estuvieron culturalmente relacionadas, pues las aldeas y los templos compartieron patrones alfareros similares. Además, es destacable la ocurrencia de un componente estilístico llamado Huachipa-Jicamarca C que revela vínculos con las tradiciones culturales de Topará (Chincha y Ocucaje (Ica, probable-mente hacia los 200-100 A.C. Estos vínculos sugieren que las relaciones entre la costa central e Ica no fueron necesariamente esporádicas. El segundo aspecto que se examina es el sistema de asentamiento y la caracterización sociopolítica del Rímac medio y bajo durante este período. Se propone que en esta etapa se consolidan la vida aldeana y la construcción de edificios públicos producto de organizaciones sociopolíticas similares a las Jefaturas o Señoríos, cuyo rasgo más notable es la existencia de una compleja estructura social religiosa. Por otro lado, la existencia de un templo en “U” (San Antonio, aledaño al asentamiento doméstico de Huachipa, sugiere que aldea y templo fueron parte de un sistema de asentamiento políticamente integrado. HUACHIPA-JICAMARCA: CHRONOLOGY AND SOCIOPOLITICAL DEVELOPMENT IN THE RIMAC RIVER VALLEY. This article examines the Formative Period (circa 1700-100 B.C. in the Rímac River Valley based on a stratigraphic sample excavated in the site of Huachipa. Our contribution is divided into two related aspects. The first describes the pottery sequence arranged for the Huachipa area. This cultural sequence begins in the Middle Formative (circa 1000 B.C. and ends in the Late Formative phases (circa 100 B.C., with the pottery style “White on Red”. According to this sequence, the lower and middle parts of

  20. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2012-11-01

    Full Text Available The emergence of heterogeneous applications with diverse requirements forresource-constrained Wireless Body Area Networks (WBANs poses significant challengesfor provisioning Quality of Service (QoS with multi-constraints (delay and reliability whilepreserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes inWBANs. McMAC classifies traffic based on their multi-constrained QoS demands andintroduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respectiveQoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMACis also modeled analytically, and extensive simulations were performed to evaluate itsperformance. The results reveal that McMAC achieves the desired delay and reliabilityguarantee according to the requirements of a particular traffic class while achieving energyefficiency.

  1. The Moving Window Technique: A Window into Developmental Changes in Attention during Facial Emotion Recognition

    Science.gov (United States)

    Birmingham, Elina; Meixner, Tamara; Iarocci, Grace; Kanan, Christopher; Smilek, Daniel; Tanaka, James W.

    2013-01-01

    The strategies children employ to selectively attend to different parts of the face may reflect important developmental changes in facial emotion recognition. Using the Moving Window Technique (MWT), children aged 5-12 years and adults ("N" = 129) explored faces with a mouse-controlled window in an emotion recognition task. An…

  2. 46 CFR 127.440 - Operability of window coverings.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Operability of window coverings. 127.440 Section 127.440... ARRANGEMENTS Construction of Windows, Visibility, and Operability of Coverings § 127.440 Operability of window coverings. Any covering or protection placed over a window or porthole that could be used as a means of...

  3. 30 CFR 18.30 - Windows and lenses.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Windows and lenses. 18.30 Section 18.30 Mineral... § 18.30 Windows and lenses. (a) MSHA may waive testing of materials for windows or lenses except headlight lenses. When tested, material for windows or lenses shall meet the test requirements prescribed in...

  4. Teach yourself visually Windows 8.1

    CERN Document Server

    McFedries, Paul

    2013-01-01

    A practical guide for visual learners eager to get started with Windows 8.1 If you learn more quickly when you can see how things are done, this Visual guide is the easiest way to get up and running on Windows 8.1. It covers more than 150 essential Windows tasks, using full-color screen shots and step-by-step instructions to show you just what to do. Learn your way around the interface and how to install programs, set up user accounts, play music and other media files, download photos from your digital camera, go online, set up and secure an e-mail account, and much more.The tried-and-true f

  5. Performance of the Analog Moving Window Detector

    DEFF Research Database (Denmark)

    Hansen, V. Gregers

    1970-01-01

    A type of analog integrating moving window detector for use with a scanning pulse radar is examined. A performance analysis is carried out, which takes into account both the radiation pattern of the antenna and the dynamic character of the detection process due to the angular scanning of the ante......A type of analog integrating moving window detector for use with a scanning pulse radar is examined. A performance analysis is carried out, which takes into account both the radiation pattern of the antenna and the dynamic character of the detection process due to the angular scanning....... Finally the influence on detection performance of the width used for the moving window is investigated....

  6. Integral window hermetic fiber optic components

    Energy Technology Data Exchange (ETDEWEB)

    Dalton, R.D.; Kramer, D.P.; Massey, R.T.; Waker, D.A.

    1994-12-31

    In the fabrication of igniters, actuators, detonators, and other pyrotechnic devices to be activated by a laser beam, an integral optical glass window is formed by placing a preform in the structural member of the device and then melting the glass and sealing it in place by heating at a temperature between the ceramming temperature of the glass and the melting point of the metal, followed by rapid furnace cooling to avoid devitrification. No other sealing material is needed to achieve hermeticity. A preferred embodiment of this type of device is fabricated by allowing the molten glass to flow further and form a plano-convex lens integral with and at the bottom of the window. The lens functions to decrease the beam divergence caused by refraction of the laser light passing through the window when the device is fired by means of a laser beam.

  7. Optical distortion coefficients of laser windows

    International Nuclear Information System (INIS)

    Klein, C.A.

    1989-01-01

    This paper addresses the problem of describing and evaluating thermal lensing phenomena that occur as a result of the absorption of laser light in solid windows. The aberration-function expansion method is applied for deriving the two optical distortion coefficients χ + and χ - that characterize the degradation in light intensity at the Gaussian focus of an initially diffraction-limited laser beam passing through a weakly absorbing stress-birefringent window. In a pulsed mode of operation, the concept of an effective optical distortion coefficient. χ eff, which properly combines the coefficients χ + and χ - in terms of potential impact on focal irradiances, then leads to the definition of a figure of merit for distortion. The theory and the calculations presented in this papers provide simple analytical tools for predicting the optical performance of a window-material candidate in a specific system's environment

  8. Study on the application of low energy U-window

    International Nuclear Information System (INIS)

    Li Binghai; Liu Shikai; Chen Guosheng

    2012-01-01

    For using the low energy U-window information, based on the theory and experiment, the advantage of identifying the subtle anomaly that the low energy U-window information has given is discussed, the method of drawing the low energy U-window information is stated; a method of calibration and obtaining the calibration parameters was developed which was applied to Dongsheng region. The result indicated that the anomaly of low energy U-window information upon known field is more easy identified by comparing with the standard three windows U-window information, which proved the practicability of the method of low energy U-windows information. (authors)

  9. PV window - Development and demonstrations. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Haugaard, P.

    2011-05-15

    Using the results from the EU project RenewTransnet, which focused on the development of a pane with integrated solar cells, the goal of this project is to develop these principles into a window solution. This window solution is targeted to Danish building tradition and architecture. It is expected that an elegant PV-window solution for both new and retrofit buildings is developed during this project, and which appearance can be customized to each building. Based on results from a related projects carried out by Gaia Solar, the window solution will have the potential of being approximately 30% cheaper than similar products on the market. In this project this price reduction is the objective of the development of a window solution. The project team has succeeded in developing a 2-layer PV-window with glass / glass lamination with EVA as foil, which is 35% cheaper than similar products on the market. Since the price for the frame-profile does not differ significantly at market level, the price comparison is made on the basis of the developed PV-pane. The objective of 30 % price reduction in relation to similar products on the market is met. A special production process to the making glass/glass lamination with EVA as foil has been developed, in which a frame is put around the module which intends both to remove the unwanted tension along the edges, and to prevent the significant spillage of EVA from the module under pressure and prevent the invasive bubbles along the edge of module. Since the developed production method for making glass/glass modules with EVA is simple, a further cost reduction will primarily be in a reduction of the price of the cell. The project process has resulted in the development of a product, which due to continuous restrictions in the building regulations, will be very attractive in future buildings. (LN)

  10. Mastering Microsoft Windows Small Business Server 2008

    CERN Document Server

    Johnson, Steven

    2010-01-01

    A complete, winning approach to the number one small business solution. Do you have 75 or fewer users or devices on your small-business network? Find out how to integrate everything you need for your mini-enterprise with Microsoft's new Windows Server 2008 Small Business Server, a custom collection of server and management technologies designed to help small operations run smoothly without a giant IT department. This comprehensive guide shows you how to master all SBS components as well as handle integration with other Microsoft technologies.: Focuses on Windows Server 2008 Small Business Serv

  11. Thin Cryogenic X-ray Windows

    CERN Document Server

    Niinikoski, T O; Davenport, M; Elias, N; Aune, S; Franz, J

    2009-01-01

    We describe the construction and tests of cryogenic X-ray windows of 47 mm diameter made of 15 ìm thick polypropylene foil glued on a UHV flange and supported with a strongback mesh machined by electro-erosion. These hermetic windows of the solar axion telescope of the CAST experiment at CERN withstand the static and dynamic pressures of the buffer gas that are normally below 130 mbar, but may reach 1.2 bar when the magnet quenches. They were tested at 60 K up to 3.5 bar static pressure without permanent deformation.

  12. Design considerations for the SINQ target window

    International Nuclear Information System (INIS)

    Dubs, M.; Ulrich, J.

    1991-01-01

    Since the proton-beam enters the SINQ liquid lead-bismuth target from below, a special window design is needed at attain safe operation for at least one year. The present design consist of a double-walled water cooled entrance-window and a third wall cooled by lead-bismuth. The intermediate volume contains circulating helium in order to detect any leaks in the 2nd or 3rd wall at an early stage. Several investigations have been made in the fields of radiation-damage, thermohydraulics and stress analysis. (author)

  13. Economic efficiency of application of solar window

    Science.gov (United States)

    Shapoval, Stepan

    2017-12-01

    Priority and qualitatively new direction in the fuel and energy sector is renewable energy. This paper describes a feasibility study of using solar window in the system of solar heat supply. The article presents literature data about the effectiveness of the use of solar systems in other countries. The results confirm a sufficient efficiency of solar heat supply with using solar Windows. Insights based on practical experience and mathematical calculations, which are aimed at a detailed explanation of economic efficiency of the proposed construction.

  14. Windows Server® 2008 Inside Out

    CERN Document Server

    Stanek, William R

    2009-01-01

    Learn how to conquer Windows Server 2008-from the inside out! Designed for system administrators, this definitive resource features hundreds of timesaving solutions, expert insights, troubleshooting tips, and workarounds for administering Windows Server 2008-all in concise, fast-answer format. You will learn how to perform upgrades and migrations, automate deployments, implement security features, manage software updates and patches, administer users and accounts, manage Active Directory® directory services, and more. With INSIDE OUT, you'll discover the best and fastest ways to perform core a

  15. Tests of executive functioning predict scores on the MacAndrew Alcoholism Scale.

    Science.gov (United States)

    Deckel, A W

    1999-02-01

    1. Previous work reported that tests of executive functioning (EF) predict the risk of alcoholism in subject populations selected for a "high density" of a family history of alcoholism and/or the presence of sociopathic traits. The current experiment examined the ability of EF tests to predict the risk of alcoholism, as measured by the MacAndrew Alcoholism Scale (MAC), in outpatient subjects referred to a general neuropsychological testing service. 2. Sixty-eight male and female subjects referred for neuropsychological testing were assessed for their past drinking histories and administered the Wisconsin Card Sorting Test, the Wechsler Adult Intelligence Scale-Revised, the Trails (Part B) Test, and the MAC. Principal Components analysis (PCA) reduced the number of EF tests to two measures, including one that loaded on the WCST, and one that loaded on the Similarities, Picture Arrangement, and Trails tests. Multiple hierarchical regression first removed the variance from demographic variables, alcohol consumption, and verbal (i.e., Vocabulary) and non-verbal (i.e., Block Design) IQ, and then entered the executive functioning factors into the prediction of the MAC. 3. Seventy-six percent of the subjects were classified as either light, infrequent, or non-drinkers on the Quantity-Frequency-Variability scale. The factor derived from the WCST on PCA significantly added to the prediction of risk on the MAC (p = .0063), as did scores on Block Design (p = .033). Relatively more impaired scores on the WCST factor and Block Design were predictive of higher scores on the MAC. The other factors were not associated with MAC scores. 4. These results support the hypothesis that decrements in EF are associated with risk factors for alcoholism, even in populations where the density of alcoholic behaviors are not unusually high. When taken in conjunction with other findings, these results implicate EF test scores, and prefrontal brain functioning, in the neurobiology of the risk for

  16. Glauber e os signos

    OpenAIRE

    Silva, Alexandre Rocha da; Araujo, André Corrêa da Silva de

    2012-01-01

    Este artigo busca identificar, na obra de Glauber Rocha, elementos ainda em dispersão de um projeto de teoria semiótica do Terceiro Mundo. Para isso, foram selecionados três tipos de signos que podem caracterizar os termos dessa semiótica: os signos do cinema, do transe e da revolução. Sob a influência de Peirce e de Deleuze acerca da semiótica e do cinema, a obra de Glauber pode ser pensada como um projeto cujo propósito principal é o de engendrar novos processos de significação que tenham a...

  17. Os concursos no Facebook

    OpenAIRE

    Simões, Sara Raquel Branco

    2016-01-01

    Nota: 14 valores Com o surgimento da Internet, todas as estratégias e conteúdo das marcas necessitam de ter em conta a aplicabilidade no mundo digital, sendo imperativo conseguir captar a atenção de todos os potenciais destinatários das iniciativas de marketing. Assim, atualmente o marketing não se pratica apenas offline, sendo o social media um verdadeiro impulsionador das relações entre as marcas e os seus clientes e seguidores. Por outro lado, o Facebook é a rede social m...

  18. Compare of Energy Efficiency of Windows in Aalborg and Chongqing

    DEFF Research Database (Denmark)

    Lin, Zhenguo; Heiselberg, Per; Yao, Runming

    2007-01-01

    Focus on window's energy efficiency, this paper compared the difference of windows in Aalborg and Chongqing. The author analysed the designing process, the thermal insulation performances, the sun shading devices and the ventilation of windows in Aalborg and Chongqing respectively. Furthermore......, the author explored the reasons for window problems in Chongqing, found out the main barriers to overcome and measures to take for solving the problem. Deeper analysis should be made before the energy efficient windows of Aalborg used in Chongqing....

  19. Use phase signals to promote lifetime extension for Windows PCs.

    Science.gov (United States)

    Hickey, Stewart; Fitzpatrick, Colin; O'Connell, Maurice; Johnson, Michael

    2009-04-01

    This paper proposes a signaling methodology for personal computers. Signaling may be viewed as an ecodesign strategy that can positively influence the consumer to consumer (C2C) market process. A number of parameters are identified that can provide the basis for signal implementation. These include operating time, operating temperature, operating voltage, power cycle counts, hard disk drive (HDD) self-monitoring, and reporting technology (SMART) attributes and operating system (OS) event information. All these parameters are currently attainable or derivable via embedded technologies in modern desktop systems. A case study detailing a technical implementation of how the development of signals can be achieved in personal computers that incorporate Microsoft Windows operating systems is presented. Collation of lifetime temperature data from a system processor is demonstrated as a possible means of characterizing a usage profile for a desktop system. In addition, event log data is utilized for devising signals indicative of OS quality. The provision of lifetime usage data in the form of intuitive signals indicative of both hardware and software quality can in conjunction with consumer education facilitate an optimal remarketing strategy for used systems. This implementation requires no additional hardware.

  20. De como os alunos entendem os textos

    Directory of Open Access Journals (Sweden)

    Peronard Th, Marianne

    1991-01-01

    Full Text Available Nosso interesse na compreensão do texto escrito apresenta uma tendência pedagógica. Tal perspectiva guiou a seleção de nossa estrutura teórica, os limites de nosso trabalho experimental e a natureza dos instrumentos que usamos, tanto durante a avaliação das habilidades de compreensão dos alunos como durante as aplicações instrucionais. Nosso foco tem se localizado na compreensão inferencial, a qual medimos pedindo aos estudantes que verbalizassem as inferências necessárias para conbstruir uma interpretação coerente. Para garantir uma sanidade ecológica, temos nos mantido o mais próximo possível de uma situação escolar, um fato que, em resumo, parece ter sido autodestruidor. Nossos resultados mostram fracas habilidades de compreensão por parte dos sujeitos (aproximadamente 2600 alunos. Suas respostas manifestam pouco raciocínio inferencial e suas estratégias, baixa adaptação à estrutura ou conteúdo do texto. De fato a estratégia mais comum parece ser a que nós chamamos de "estratégia lexical restrita", que é mais uma "estratégia de resposta" do que uma estratégia de compreensão

  1. Olonitola, O.S.

    African Journals Online (AJOL)

    Olonitola, O.S.. Vol 9, No 1 (2016) - Articles Evaluation of phytochemical and antibacterial properties of Terminalia avicennioides crude extract against selected bacteria from diarrhoeic patients. Abstract PDF · Vol 9, No 2 (2016) - Articles Determination of aflatoxin contamination in cassava flour sold in selected markets in ...

  2. Lad os slagte Udkantsdanmark

    DEFF Research Database (Denmark)

    Høst, Jeppe Engset

    2015-01-01

    En ny journalistisk genre har ramt os. Det er udkantsgotikken. Med dramatiske historier om forfald, armod og affolkning, fortælles der vidt og bredt om landsbydød og masseflugt fra udkanten. Historierne har masser af saftige ord, er rige på associationer, og vinklingen rummer dødskampen, som...

  3. Vi producerer os ihjel

    DEFF Research Database (Denmark)

    Steenbuch, Johannes Aakjær

    2013-01-01

    En ny arbejdsetik har sneget sig ind i kongeriget. Det lugter lidt af ”produktivisme”, hvor alt måles i effektivitet og i evnen til at fremme produktivitet, for produktivitet i sig selv er godt. Men hvor kommer denne mærkelige etik egentlig fra? Dagens kronikør giver os med udgangspunkt i Bibelen...

  4. Windows XP ends its life at CERN – register for Windows 7 training!

    CERN Multimedia

    Michał Kwiatek (IT-OIS)

    2012-01-01

    Windows XP has been around for over 10 years and it is now time to move on. At CERN, general support for Windows XP will end in December 2012, and before this date users are requested to schedule a migration to the next version of WindowsWindows 7.   Windows 7 is already well established at CERN – it is used by a large majority of users. In fact, there was a considerable user demand even before its official release in October 2009 and its adoption has been smooth. Users praise Windows 7 for its improved stability and a clear advantage on laptops is a much more efficient implementation of offline files. The migration to Windows 7 involves a reinstallation of the operating system. Files stored in user home folders on DFS will be immediately available after the reinstallation. Applications will be upgraded to more recent versions and in certain cases, an application may even be replaced by another application providing the same functionality. Microsoft Office suite is a good ...

  5. Outside-In Signal Transmission by Conformational Changes in Integrin Mac-11

    Science.gov (United States)

    Lefort, Craig T.; Hyun, Young-Min; Schultz, Joanne B.; Law, Foon-Yee; Waugh, Richard E.; Knauf, Philip A.; Kim, Minsoo

    2010-01-01

    Intracellular signals associated with or triggered by integrin ligation can control cell survival, differentiation, proliferation, and migration. Despite accumulating evidence that conformational changes regulate integrin affinity to its ligands, how integrin structure regulates signal transmission from the outside to the inside of the cell remains elusive. Using fluorescence resonance energy transfer, we addressed whether conformational changes in integrin Mac-1 are sufficient to transmit outside-in signals in human neutrophils. Mac-1 conformational activation induced by ligand occupancy or activating Ab binding, but not integrin clustering, triggered similar patterns of intracellular protein tyrosine phosphorylation, including Akt phosphorylation, and inhibited spontaneous neutrophil apoptosis, indicating that global conformational changes are critical for Mac-1-dependent outside-in signal transduction. In neutrophils and myeloid K562 cells, ligand ICAM-1 or activating Ab binding promoted switchblade-like extension of the Mac-1 extracellular domain and separation of the αM and β2 subunit cytoplasmic tails, two structural hallmarks of integrin activation. These data suggest the primacy of global conformational changes in the generation of Mac-1 outside-in signals. PMID:19864611

  6. MAP, MAC, and vortex-rings configurations in the Weinberg-Salam model

    Science.gov (United States)

    Teh, Rosy; Ng, Ban-Loong; Wong, Khai-Ming

    2015-11-01

    We report on the presence of new axially symmetric monopoles, antimonopoles and vortex-rings solutions of the SU(2)×U(1) Weinberg-Salam model of electromagnetic and weak interactions. When the ϕ-winding number n = 1, and 2, the configurations are monopole-antimonopole pair (MAP) and monopole-antimonopole chain (MAC) with poles of alternating sign magnetic charge arranged along the z-axis. Vortex-rings start to appear from the MAP and MAC configurations when the winding number n = 3. The MAP configurations possess zero net magnetic charge whereas the MAC configurations possess net magnetic charge of 4 πn / e. In the MAP configurations, the monopole-antimonopole pair is bounded by the Z0 field flux string and there is an electromagnetic current loop encircling it. The monopole and antimonopole possess magnetic charges ± 4πn/e sin2θW respectively. In the MAC configurations there is no string connecting the monopole and the adjacent antimonopole and they possess magnetic charges ± 4 πn/e respectively. The MAC configurations possess infinite total energy and zero magnetic dipole moment whereas the MAP configurations which are actually sphalerons possess finite total energy and magnetic dipole moment. The configurations were investigated for varying values of Higgs self-coupling constant 0 ≤ λ ≤ 40 at Weinberg angle θW = π/4.

  7. Geospatial Multi-Agency Coordination (GeoMAC) wildland fire perimeters, 2008

    Science.gov (United States)

    Walters, Sandra P.; Schneider, Norma J.; Guthrie, John D.

    2011-01-01

    The Geospatial Multi-Agency Coordination (GeoMAC) has been collecting and storing data on wildland fire perimeters since August 2000. The dataset presented via this U.S. Geological Survey Data Series product contains the GeoMAC wildland fire perimeter data for the calendar year 2008, which are based upon input from incident intelligence sources, Global Positioning System (GPS) data, and infrared (IR) imagery. Wildland fire perimeter data are obtained from the incidents, evaluated for completeness and accuracy, and processed to reflect consistent field names and attributes. After a quality check, the perimeters are loaded to GeoMAC databases, which support the GeoMAC Web application for access by wildland fire managers and the public. The wildland fire perimeters are viewed through the Web application. The data are subsequently archived according to year and state and are made available for downloading through the Internet in shapefile and Keyhole Markup Language (KML) format. These wildland fire perimeter data are also retained for historical, planning, and research purposes. The datasets that pertain to this report can be found on the Rocky Mountain Geographic Science Center HTTP site at http://rmgsc.cr.usgs.gov/outgoing/GeoMAC/historic_fire_data/. The links are also provided on the sidebar.

  8. Imaging features of Mycobacterium avium-intracellulare complex (MAC) in children with AIDS

    Energy Technology Data Exchange (ETDEWEB)

    Pursner, M. [State University of New York, Health Science Center at Brooklyn, New York, NY (United States); Haller, J.O. [Beth Israel Medical Center, Department of Radiology, New York, NY (United States); Berdon, W.E. [Babies Hospital, Department of Radiology, New York, NY (United States)

    2000-06-01

    Purpose. The purpose of this paper was to review the imaging features of Mycobacterium avium-intracellulare complex (MAC) in 16 pediatric patients with human immunodeficiency virus (HIV). Materials and methods. We reviewed the pertinent clinical records of 16 children diagnosed with MAC between January 1990 and June 1998. These 16 cases were blood- or biopsy-proven to have MAC infection. Their plain films, abdominal, and chest CT scans were then reviewed and the findings were analyzed with reference to the few reported cases of children with MAC. Results. Abdominal findings: all but one had retroperitoneal adenopathy, mesenteric adenopathy or both. Ten patients had hepatomegaly, while nine patients were found to have splenomegaly. Four patients had nonspecific thickened gallbladder wall, while intestinal wall thickening and thickened stomach folds were identified in six of ten patients. Necrotic, fluid-filled nodes were also found. Chest findings included mediastinal adenopathy, cystic/cavitary lesions and bronchiectasis. One patient developed a fistula between the mediastinal lymph nodes, esophagus, and bronchial tree. Conclusion. Pediatric patients with HIV who develop MAC infection may present with massive lymph-node enlargement. This can occur not only in mesenteric and retroperitoneal nodes but also in hilar and posterior mediastinal nodes as well. As in MTB infection, these nodes can break down with development of fistulous tracts to both esophagus and adjacent lung. The major differential diagnostic consideration besides MTB is lymphoma. (orig.)

  9. Capturing coping with symptoms in people with a diagnosis of schizophrenia: introducing the MACS-24.

    Science.gov (United States)

    Bak, Maarten; Delespaul, Philippe; Krabbendam, Lydia; Huistra, Karola; Walraven, Wil; van Os, Jim

    2009-01-01

    In order to assess coping with psychotic symptoms, the Maastricht Assessment of Coping Strategies (MACS), 24 symptom version, was developed as a refinement of the previous MACS-13. Associations between type of coping and the experienced level of control over psychotic symptoms were examined using MACS-24.MACS-24 was administered to 32 individuals with a diagnosis of schizophrenia. For each of 24 symptoms, experience of distress, type of coping and the resulting degree of perceived control were assessed. Coping types were reduced to two contrasting coping factors: symptomatic coping and non-symptomatic coping (combining active problem solving, passive illness behaviour, active problem avoiding, and passive problem avoiding).Mean level of distress and perceived control (range: 1-7) were, respectively, 4.2 [standard deviation (SD) = 1.9] and 4.2 (SD = 1.9). The association between distress and perceived control was negative [beta = -0.28; 95% confidence interval (95%CI) = -0.41 to -0.15]. Type of coping interacted with perceived control (p = 0.005), in that symptomatic coping was negatively associated with perceived control [odds ratio (OR) over seven levels = 0.82, 95%CI = 0.71-0.94], whereas for non-symptomatic coping a positive association was apparent (OR over seven levels = 1.10, 95% CI = 1.03-1.19).Previous contrasts between symptomatic and non-symptomatic coping were replicated using MACS-24, suggesting clinical validity and utility.

  10. Eliminating the Heart from the Curcumin Molecule: Monocarbonyl Curcumin Mimics (MACs

    Directory of Open Access Journals (Sweden)

    Dinesh Shetty

    2014-12-01

    Full Text Available Curcumin is a natural product with several thousand years of heritage. Its traditional Asian application to human ailments has been subjected in recent decades to worldwide pharmacological, biochemical and clinical investigations. Curcumin’s Achilles heel lies in its poor aqueous solubility and rapid degradation at pH ~ 7.4. Researchers have sought to unlock curcumin’s assets by chemical manipulation. One class of molecules under scrutiny are the monocarbonyl analogs of curcumin (MACs. A thousand plus such agents have been created and tested primarily against cancer and inflammation. The outcome is clear. In vitro, MACs furnish a 10–20 fold potency gain vs. curcumin for numerous cancer cell lines and cellular proteins. Similarly, MACs have successfully demonstrated better pharmacokinetic (PK profiles in mice and greater tumor regression in cancer xenografts in vivo than curcumin. The compounds reveal limited toxicity as measured by murine weight gain and histopathological assessment. To our knowledge, MAC members have not yet been monitored in larger animals or humans. However, Phase 1 clinical trials are certainly on the horizon. The present review focuses on the large and evolving body of work in cancer and inflammation, but also covers MAC structural diversity and early discovery for treatment of bacteria, tuberculosis, Alzheimer’s disease and malaria.

  11. Crystallization and preliminary X-ray crystallographic analysis of MacA from Actinobacillus actinomycetemcomitans

    International Nuclear Information System (INIS)

    Piao, Shunfu; Xu, Yongbin; Ha, Nam-Chul

    2008-01-01

    A periplasmic membrane-fusion protein MacA from Actinobacillus actinomycetemcomitans, an essential component of the multidrug efflux pump in Gram-negative bacteria, was crystallized. Periplasmic membrane-fusion proteins (MFPs) are an essential component of the multidrug efflux pump in Gram-negative bacteria. They play a crucial role in bridging the outer membrane porin TolC and two distinct types of inner membrane transporters. The MFP MacA bridges the inner membrane ABC-type multidrug transporter MacB and the outer membrane porin TolC. MacA from the pathogenic bacterium Actinobacillus actinomycetemcomitans was expressed in Escherichia coli B834 (DE3) and the recombinant protein was purified using Ni–NTA affinity, Q anion-exchange and gel-filtration chromatography. The purified MacA protein was crystallized using the vapour-diffusion method. A MAD diffraction data set was collected to a resolution of 3.0 Å at 100 K. The crystal belongs to space group P622, with unit-cell parameters a = b = 109.2, c = 255.4 Å, α = β = 90, γ = 120°, and contains one molecule in the asymmetric unit

  12. Crystallization and preliminary X-ray crystallographic analysis of MacA from Actinobacillus actinomycetemcomitans

    Energy Technology Data Exchange (ETDEWEB)

    Piao, Shunfu; Xu, Yongbin; Ha, Nam-Chul, E-mail: hnc@pusan.ac.kr [College of Pharmacy and Research Institute for Drug Development, Pusan National University, Jangjeon-dong, Geumjeong-gu, Busan 609-735 (Korea, Republic of)

    2008-05-01

    A periplasmic membrane-fusion protein MacA from Actinobacillus actinomycetemcomitans, an essential component of the multidrug efflux pump in Gram-negative bacteria, was crystallized. Periplasmic membrane-fusion proteins (MFPs) are an essential component of the multidrug efflux pump in Gram-negative bacteria. They play a crucial role in bridging the outer membrane porin TolC and two distinct types of inner membrane transporters. The MFP MacA bridges the inner membrane ABC-type multidrug transporter MacB and the outer membrane porin TolC. MacA from the pathogenic bacterium Actinobacillus actinomycetemcomitans was expressed in Escherichia coli B834 (DE3) and the recombinant protein was purified using Ni–NTA affinity, Q anion-exchange and gel-filtration chromatography. The purified MacA protein was crystallized using the vapour-diffusion method. A MAD diffraction data set was collected to a resolution of 3.0 Å at 100 K. The crystal belongs to space group P622, with unit-cell parameters a = b = 109.2, c = 255.4 Å, α = β = 90, γ = 120°, and contains one molecule in the asymmetric unit.

  13. A Study on Energy Efficient MAC Protocol of Wireless Sensor Network for Ubiquitous Agriculture

    Science.gov (United States)

    Lee, Ho-Chul; Lee, Ji-Woong; Hwang, Jeong-Hwan; Yoe, Hyun

    Various technologies are used in the agricultural sites now. Especially, the recent application of sensor network related technology is quite notable. Considering the efficiency of MAC protocol of WSN is being researched in various aspects, it is believed that a research on how to apply the MAC protocol to agriculture would be also required. This research is based on the sensor node developed by Sunchon University ITRC. Once the sensor nodes are effectively located in the farm, they operate for a long time and they are rarely relocated once installed. The concentration of multiple sensor nodes in a narrow area is another characteristic the sensor node. The purpose of this research is to select a sensor network MAC protocol, which would be most proper to agricultural site with good energy efficiency and excellent transmission delay performance. The applicable protocols such as S-MAC and X-MAC were set up for the installation environment. They were compared and a methodology to select the most optimum protocol to agricultural site is suggested.

  14. Efficient MAC Protocol for Hybrid Wireless Network with Heterogeneous Sensor Nodes

    Directory of Open Access Journals (Sweden)

    Md. Nasre Alam

    2016-01-01

    Full Text Available Although several Directional Medium Access Control (DMAC protocols have been designed for use with homogeneous networks, it can take a substantial amount of time to change sensor nodes that are equipped with an omnidirectional antenna for sensor nodes with a directional antenna. Thus, we require a novel MAC protocol for use with an intermediate wireless network that consists of heterogeneous sensor nodes equipped with either an omnidirectional antenna or a directional antenna. The MAC protocols that have been designed for use in homogeneous networks are not suitable for use in a hybrid network due to deaf, hidden, and exposed nodes. Therefore, we propose a MAC protocol that exploits the characteristics of a directional antenna and can also work efficiently with omnidirectional nodes in a hybrid network. In order to address the deaf, hidden, and exposed node problems, we define RTS/CTS for the neighbor (RTSN/CTSN and Neighbor Information (NIP packets. The performance of the proposed MAC protocol is evaluated through a numerical analysis using a Markov model. In addition, the analytical results of the MAC protocol are verified through an OPNET simulation.

  15. Windows 8: What Educators Need to Know

    Science.gov (United States)

    Vedder, Richard G.

    2012-01-01

    In October 2012, Microsoft will release the commercial version of its next operating system, presently called "Windows 8." This version represents a significant departure from the past. Microsoft wants this operating system to meet user needs regardless of physical platform (e.g., desktop, notebook, tablet, mobile phone). As part of this mission,…

  16. Schools Facing the Expiration of Windows XP

    Science.gov (United States)

    Cavanagh, Sean

    2013-01-01

    Microsoft's plans to end support for Windows XP, believed to be the dominant computer operating system in K-12 education, could pose big technological and financial challenges for districts nationwide--issues that many school systems have yet to confront. The giant software company has made it clear for years that it plans to stop supporting XP…

  17. Performance Evaluation of Vinyl Replacement Windows.

    Science.gov (United States)

    1980-07-15

    Grids, Nikolaev Branch of Odessa Div., Engineering Inst., UKR SSR, 1979. Grandjean, E., The Ergonomics of the Hone, Halsted Pr., New York, 1974. Griffin...Richard H.; Marshall, Stephen J., Infrared Thermography of Buildings: Qualitative Analysis of Window Infiltration Loss, Federal Office Building, Burlington

  18. Window materials for high power gyrotron

    Energy Technology Data Exchange (ETDEWEB)

    Afsar, M.N.; Chi, H. [Tufts Univ., Medford, MA (United States)

    1994-07-01

    The room temperature application of sapphire as window material at higher frequencies is not feasible since its absorption coefficient increases almost linearly with increasing frequency in the millimeter wavelength region. At cryogenic temperature the absorption coefficient value decreases only by a few factors (factor of 2 to 3) in the 90-200 GHz region. The earlier reported temperature squared dependence (decrease) in the absorption coefficient or the loss tangent value is totally absent in the broad band continuous wave data the authors are reporting here (at 6.5 K, 35K, 77K and 300K) and one they reported at conferences earlier. These results are verified by another technique. The authors utilize their precision millimeter wave dispersive Fourier transform spectroscopic techniques at room temperature and at cryogenic temperatures. The extra high resistivity single crystal compensated silicon is no doubt the lowest loss material available at room temperature in the entire millimeter wavelength region. At higher millimeter wave frequencies an extra high resistivity silicon window or a window made with extra high resistivity silicon coated with diamond film would certainly make a better candidate in the future. A single free standing synthetic diamond window seems to have higher absorption coefficient values at millimeter wavelength region at this time although it is claimed that it possesses good mechanical strength and higher thermal conductivity characteristics. It certainly does not rule out the use of diamond film on a single crystal high resistivity silicon to improve its mechanical strength and thermal conductivity.

  19. New Window into the Human Body

    Science.gov (United States)

    1985-01-01

    Michael Vannier, MD, a former NASA engineer, recognized the similarity between NASA's computerized image processing technology and nuclear magnetic resonance. With technical assistance from Kennedy Space Center, he developed a computer program for Mallinckrodt Institute of Radiology enabling Nuclear Magnetic Resonance (NMR) to scan body tissue for earlier diagnoses. Dr. Vannier feels that "satellite imaging" has opened a new window into the human body.

  20. Windows Phone 8 application development essentials

    CERN Document Server

    Szostak, Tomasz

    2013-01-01

    A mini-tutorial full of code examples and strategies to give you plenty of options when building your own applications for Windows Phone 8.This book is ideal if you are a developers who wants to get into mobile development. Some C# background may be useful for a complete understanding.