WorldWideScience

Sample records for windows mac os

  1. Windows for Intel Macs

    CERN Document Server

    Ogasawara, Todd

    2008-01-01

    Even the most devoted Mac OS X user may need to use Windows XP, or may just be curious about XP and its applications. This Short Cut is a concise guide for OS X users who need to quickly get comfortable and become productive with Windows XP basics on their Macs. It covers: Security Networking ApplicationsMac users can easily install and use Windows thanks to Boot Camp and Parallels Desktop for Mac. Boot Camp lets an Intel-based Mac install and boot Windows XP on its own hard drive partition. Parallels Desktop for Mac uses virtualization technology to run Windows XP (or other operating systems

  2. VISPA - Visual Physics Analysis on Linux, Mac OS X and Windows

    International Nuclear Information System (INIS)

    Brodski, M.; Erdmann, M.; Fischer, R.; Hinzmann, A.; Klimkovich, T.; Mueller, G.; Muenzer, T.; Steggemann, J.; Winchen, T.

    2009-01-01

    Modern physics analysis is an iterative task consisting of prototyping, executing and verifying the analysis procedure. For supporting scientists in each step of this process, we developed VISPA: a toolkit based on graphical and textual elements for visual physics analysis. Unlike many other analysis frameworks VISPA runs on Linux, Windows and Mac OS X. VISPA can be used in any experiment with serial data flow. In particular, VISPA can be connected to any high energy physics experiment. Furthermore, datatypes for the usage in astroparticle physics have recently been successfully included. An analysis on the data is performed in several steps, each represented by an individual module. While modules e.g. for file input and output are already provided, additional modules can be written by the user with C++ or the Python language. From individual modules, the analysis is designed by graphical connections representing the data flow. This modular concept assists the user in fast prototyping of the analysis and improves the reusability of written source code. The execution of the analysis can be performed directly from the GUI, or on any supported computer in batch mode. Therefore the analysis can be transported from the laptop to other machines. The recently improved GUI of VISPA is based on a plug-in mechanism. Besides components for the development and execution of physics analysis, additional plug-ins are available for the visualization of e.g. the structure of high energy physics events or the properties of cosmic rays in an astroparticle physics analysis. Furthermore plug-ins have been developed to display and edit configuration files of individual experiments from within the VISPA GUI. (author)

  3. Mac OS X Forensics

    Science.gov (United States)

    Craiger, Philip; Burke, Paul

    This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.

  4. Mac OS X Lion Server For Dummies

    CERN Document Server

    Rizzo, John

    2011-01-01

    The perfect guide to help administrators set up Apple's Mac OS X Lion Server With the overwhelming popularity of the iPhone and iPad, more Macs are appearing in corporate settings. The newest version of Mac Server is the ideal way to administer a Mac network. This friendly guide explains to both Windows and Mac administrators how to set up and configure the server, including services such as iCal Server, Podcast Producer, Wiki Server, Spotlight Server, iChat Server, File Sharing, Mail Services, and support for iPhone and iPad. It explains how to secure, administer, and troubleshoot the networ

  5. Java and Mac OS X

    CERN Document Server

    Davis, T Gene

    2010-01-01

    Learn the guidelines of integrating Java with native Mac OS X applications with this Devloper Reference book. Java is used to create nearly every type of application that exists and is one of the most required skills of employers seeking computer programmers. Java code and its libraries can be integrated with Mac OS X features, and this book shows you how to do just that. You'll learn to write Java programs on OS X and you'll even discover how to integrate them with the Cocoa APIs.: Shows how Java programs can be integrated with any Mac OS X feature, such as NSView widgets or screen savers; Re

  6. Enterprise Mac Security Mac OS X Snow Leopard Security

    CERN Document Server

    Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann

    2010-01-01

    A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s

  7. Mac OS X ja tietoturva

    OpenAIRE

    Herranen, Joni

    2011-01-01

    Tämän opinnäytetyön tavoitteena on luoda kattava kokonaiskuva Mac OS X -käyttöjärjestelmän sisäänrakennetuista tietoturvaratkaisuista ja selvittää miten tietoturvaratkaisut toteuttavat tietoturvan kolmea perustavoitetta eli luottamuksellisuutta, eheyttä ja saatavuutta. Työn kohderyhmäksi on valittu edistyneemmät tietokoneenkäyttäjät, joilla ei ole aikaisempaa Mac-kokemusta. Teoriaosuudessa syvennytään aluksi Apple-yhtiöön sekä Mac OS X -järjestelmän teknisiin ominaisuuksiin. Osuuden pääta...

  8. Mac OS X for Astronomy

    Science.gov (United States)

    Pierfederici, F.; Pirzkal, N.; Hook, R. N.

    Mac OS X is the new Unix based version of the Macintosh operating system. It combines a high performance DisplayPDF user interface with a standard BSD UNIX subsystem and provides users with simultaneous access to a broad range of applications which were not previously available on a single system such as Microsoft Office and Adobe Photoshop, as well as legacy X11-based scientific tools and packages like IRAF, SuperMongo, MIDAS, etc. The combination of a modern GUI layered on top of a familiar UNIX environment paves the way for new, more flexible and powerful astronomical tools to be developed while assuring compatibility with already existing, older programs. In this paper, we outline the strengths of the Mac OS X platform in a scientific environment, astronomy in particular, and point to the numerous astronomical software packages available for this platform; most notably the Scisoft collection which we have compiled.

  9. Mac OS X Tiger for Unix Geeks

    CERN Document Server

    Jepson, Brian

    2005-01-01

    If you're one of the many Unix developers drawn to Mac OS X for its Unix core, you'll find yourself in surprisingly unfamiliar territory. Unix and Mac OS X are kissing cousins, but there are enough pitfalls and minefields in going from one to another that even a Unix guru can stumble, and most guides to Mac OS X are written for Mac aficionados. For a Unix developer, approaching Tiger from the Mac side is a bit like learning Russian by reading the Russian side of a Russian-English dictionary. Fortunately, O'Reilly has been the Unix authority for over 25 years, and in Mac OS X Tiger for Unix Gee

  10. Mac OS X for Unix Geeks (Leopard)

    CERN Document Server

    Rothman, Ernest E; Rosen, Rich

    2009-01-01

    If you've been lured to Mac OS X because of its Unix roots, this invaluable book serves as a bridge between Apple's Darwin OS and the more traditional Unix systems. The new edition offers a complete tour of Mac OS X's Unix shell for Leopard and Tiger, and helps you find the facilities that replace or correspond to standard Unix utilities. Learn how to compile code, link to libraries, and port Unix software to Mac OS X and much more with this concise guide.

  11. Macintosh Troubleshooting Pocket Guide for Mac OS

    CERN Document Server

    Lerner, David; Corporation, Tekserve

    2009-01-01

    The Macintosh Troubleshooting Pocket Guide covers the most common user hardware and software trouble. It's not just a book for Mac OS X (although it includes tips for OS X and Jaguar), it's for anyone who owns a Mac of any type-- there are software tips going back as far as OS 6. This slim guide distills the answers to the urgent questions that Tekserve's employee's answer every week into a handy guide that fits in your back pocket or alongside your keyboard.

  12. Take control the Mac OS X lexicon

    CERN Document Server

    Zardetto, Sharon

    2009-01-01

    This ebook explains a little bit of everything; in fact, it's The Mac OS X (and then some) Lexicon because it's never just you and your Mac. It's you and your Mac and the Web, and your email, and that article you just read that threw 17 new acronyms at you or assumed that you knew all sorts of networking terms. Or it's you and your Mac and Finder features you've never touched, such as burn folders, smart folders, or proxy icons, and that mysterious Services submenu. This book is a great guide for Macintosh users everywhere who have trouble keeping up with the latest jargon, fo

  13. CO2calc: A User-Friendly Seawater Carbon Calculator for Windows, Mac OS X, and iOS (iPhone)

    Science.gov (United States)

    Robbins, L.L.; Hansen, M.E.; Kleypas, J.A.; Meylan, S.C.

    2010-01-01

    A user-friendly, stand-alone application for the calculation of carbonate system parameters was developed by the U.S. Geological Survey Florida Shelf Ecosystems Response to Climate Change Project in response to its Ocean Acidification Task. The application, by Mark Hansen and Lisa Robbins, USGS St. Petersburg, FL, Joanie Kleypas, NCAR, Boulder, CO, and Stephan Meylan, Jacobs Technology, St. Petersburg, FL, is intended as a follow-on to CO2SYS, originally developed by Lewis and Wallace (1998) and later modified for Microsoft Excel? by Denis Pierrot (Pierrot and others, 2006). Besides eliminating the need for using Microsoft Excel on the host system, CO2calc offers several improvements on CO2SYS, including: An improved graphical user interface for data entry and results Additional calculations of air-sea CO2 fluxes (for surface water calculations) The ability to tag data with sample name, comments, date, time, and latitude/longitude The ability to use the system time and date and latitude/ longitude (automatic retrieval of latitude and longitude available on iPhone? 3, 3GS, 4, and Windows? hosts with an attached National Marine Electronics Association (NMEA)-enabled GPS) The ability to process multiple files in a batch processing mode An option to save sample information, data input, and calculated results as a comma-separated value (CSV) file for use with Microsoft Excel, ArcGIS,? or other applications An option to export points with geographic coordinates as a KMZ file for viewing and editing in Google EarthTM

  14. Learn Mac OS X Snow Leopard

    CERN Document Server

    Meyers, Scott

    2009-01-01

    You're smart and savvy, but also busy. This comprehensive guide to Apple's Mac OS X 10.6, Snow Leopard, gives you everything you need to know to live a happy, productive Mac life. Learn Mac OS X Snow Leopard will have you up and connected lickity split. With a minimum of overhead and a maximum of useful information, you'll cover a lot of ground in the time it takes other books to get you plugged in. If this isn't your first experience with Mac OS X, skip right to the "What's New in Snow Leopard" sections. You may also find yourself using this book as a quick refresher course or a way

  15. Learn Office 2011 for Mac OS X

    CERN Document Server

    Hart-Davis, Guy

    2011-01-01

    Office for Mac remains the leading productivity suite for Mac, with Apple's iWork and the free OpenOffice.org trailing far behind. And now it's being updated with a cleaner interface and more compatibility with Exchange and SharePoint. Learn Office 2011 for Mac OS X offers a practical, hands-on approach to using Office 2011 applications to create and edit documents and get work done efficiently. You'll learn how to customize Office, design, create, and share documents, manipulate data in a spreadsheet, and create lively presentations. You'll also discover how to organize your email, contacts,

  16. Infecting Windows, Linux & Mac in one go

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Still love bashing on Windows as you believe it is an insecure operating system? Hold on a second! Just recently, a vulnerability has been published for Java 7.   It affects Windows/Linux PCs and Macs, Internet Explorer, Safari and Firefox. In fact, it affects all computers that have enabled the Java 7 plug-in in their browser (Java 6 and earlier is not affected). Once you visit a malicious website (and there are plenty already out in the wild), your computer is infected… That's "Game Over" for you.      And this is not the first time. For a while now, attackers have not been targeting the operating system itself, but rather aiming at vulnerabilities inherent in e.g. your Acrobat Reader, Adobe Flash or Java programmes. All these are standard plug-ins added into your favourite web browser which make your web-surfing comfortable (or impossible when you un-install them). A single compromised web-site, however, is sufficient to prob...

  17. Mac OS X Snow Leopard pocket guide

    CERN Document Server

    Seiblod, Chris

    2009-01-01

    Whether you're new to the Mac or a longtime user, this handy book is the quickest way to get up to speed on Snow Leopard. Packed with concise information in an easy-to-read format, Mac OS X Snow Leopard Pocket Guide covers what you need to know and is an ideal resource for problem-solving on the fly. This book goes right to the heart of Snow Leopard, with details on system preferences, built-in applications, and utilities. You'll also find configuration tips, keyboard shortcuts, guides for troubleshooting, lots of step-by-step instructions, and more. Learn about new features and changes s

  18. Installing Git under MacOS

    OpenAIRE

    Fitzpatrick, Benjamin

    2015-01-01

    Step by step guide to installing the version control software Git under the Macintosh Operating System MacOS X (and later). Includes a seqeunce of screenshots with hand drawn arrows ;-) These slides are part of the materials for an Introductory course on the R language and environment for statistial computing. Free and Open Source materials for this course hosted on GitHub: https://github.com/brfitzpatrick/Intro_to_R

  19. Essential Mac OS X panther server administration integrating Mac OS X server into heterogeneous networks

    CERN Document Server

    Bartosh, Michael

    2004-01-01

    If you've ever wondered how to safely manipulate Mac OS X Panther Server's many underlying configuration files or needed to explain AFP permission mapping--this book's for you. From the command line to Apple's graphical tools, the book provides insight into this powerful server software. Topics covered include installation, deployment, server management, web application services, data gathering, and more

  20. Windows- ja Mac OS X-käyttöjärjestelmien erot sekä Apple yhtiönä

    OpenAIRE

    Kallio, Rolf

    2011-01-01

    Vaikka monet meistä törmäävät Macintosh-tietokoneisiin eri yhteyksissä melkein päivittäin, liittyy niihin yhä jonkin verran myyttejä. Usein ne mielletään kalliiksi ja vain ammattikäyttöön soveltuviksi tietokoneiksi, joiden ohjelmistovalikoima on rajoittuneempi ja erilainen kuin Windows PC-tietokoneissa. Monet myös pohtivat, miten Macintosh-tietokoneella pärjää nykypäivän tietoyhteiskunnassa, jota Microsoft Windowsillaan dominoi. Applea pidetään seksikkäänä ja haluttavana brändinä. Sen suo...

  1. Mac OS X Snow Leopard Server For Dummies

    CERN Document Server

    Rizzo, John

    2009-01-01

    Making Everything Easier!. Mac OS® X Snow Leopard Server for Dummies. Learn to::;. Set up and configure a Mac network with Snow Leopard Server;. Administer, secure, and troubleshoot the network;. Incorporate a Mac subnet into a Windows Active Directory® domain;. Take advantage of Unix® power and security. John Rizzo. Want to set up and administer a network even if you don't have an IT department? Read on!. Like everything Mac, Snow Leopard Server was designed to be easy to set up and use. Still, there are so many options and features that this book will save you heaps of time and effort. It wa

  2. Mac OS X : Tiger edition the missing manual

    CERN Document Server

    Pogue, David

    2005-01-01

    You can set your watch to it: As soon as Apple comes out with another version of Mac OS X, David Pogue hits the streets with another meticulous Missing Manual to cover it with a wealth of detail. The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and Mac OS X: The Missing Manual. There are many reasons why this is the most popular computer book of all time. With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? Th

  3. MacRuby Ruby and Cocoa on OS X

    CERN Document Server

    Aimonetti, Matt

    2011-01-01

    Want to build native Mac OS X applications with a sleek, developer-friendly alternative to Objective-C? MacRuby is an ideal choice. This in-depth guide shows you how Apple's implementation of Ruby gives you access to all the features available to Objective-C programmers. You'll get clear, detailed explanations of MacRuby, including quick programming techniques such as prototyping. Perfect for programmers at any level, this book is packed with code samples and complete project examples. If you use Ruby, you can tap your skills to take advantage of Interface Builder, Cocoa libraries, the Objec

  4. Integrated, Kerberized Login on MacOS X

    Science.gov (United States)

    Hotz, Henry B.

    2006-01-01

    Context for this information. MacOS X login process and available hooks. Authorization Services configuration. Authorization Services plug-in s. Kerberos plug-in s. Other bugs and recommendations. Authorization Services Called by loginwindow, screen saver and fast user switching. It calls Directory Services, Login Hook, and Login Items (System Preferences).

  5. Learn Objective-C on the Mac for OS X and iOS

    CERN Document Server

    Knaster, Scott; Malik, Waqar

    2012-01-01

    Learn to write apps for some of today's hottest technologies, including the iPhone and iPad (using iOS), as well as the Mac (using OS X). It starts with Objective-C, the base language on which the native iOS software development kit (SDK) and the OS X are based. Learn Objective-C on the Mac: For OS X and iOS, Second Edition updates a best selling book and is an extensive, newly updated guide to Objective-C. Objective-C is a powerful, object-oriented extension of C, making this update the perfect follow-up to Dave Mark's bestselling Learn C on the Mac. Whether you're an experienced C programmer

  6. Learning Unix for Mac OS X Tiger Unlock the Power of Unix

    CERN Document Server

    Taylor, Dave

    2005-01-01

    Thoroughly revised and updated for Mac OS X Tiger, this new edition introduces Mac users to the Terminal application and shows you how to navigate the command interface, explore hundreds of Unix applications that come with the Mac, and, most importantly, how to take advantage of both the Mac and Unix interfaces. If you want to master the command-line, this gentle guide to using Unix on Mac OS X Tiger is well worth its cover price

  7. Mac OS X Snow Leopard for Power Users Advanced Capabilities and Techniques

    CERN Document Server

    Granneman, Scott

    2010-01-01

    Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques is for Mac OS X users who want to go beyond the obvious, the standard, and the easy. If want to dig deeper into Mac OS X and maximize your skills and productivity using the world's slickest and most elegant operating system, then this is the book for you. Written by Scott Granneman, an experienced teacher, developer, and consultant, Mac OS X for Power Users helps you push Mac OS X to the max, unveiling advanced techniques and options that you may have not known even existed. Create custom workflows and apps with Automa

  8. Enterprise Mac Administrator's Guide

    CERN Document Server

    Edge, Charles; Hunter, Beau

    2009-01-01

    Charles Edge, Zack Smith, and Beau Hunter provide detailed explanations of the technology required for large-scale Mac OS X deployments and show you how to integrate it with other operating systems and applications. Enterprise Mac Administrator's Guide addresses the growing size and spread of Mac OS X deployments in corporations and institutions worldwide. In some cases, this is due to the growth of traditional Mac environments, but for the most part it has to do with "switcher" campaigns, where Windows and/or Linux environments are migrating to Mac OS X. However, there is a steep cu

  9. Learn AppleScript The Comprehensive Guide to Scripting and Automation on MAC OS X

    CERN Document Server

    Rosenthal, Hanaan

    2009-01-01

    AppleScript is an English-like, easy-to-understand scripting language built into every Mac. AppleScript can automate hundreds of AppleScriptable applications, performing tasks both large and small, complex and simple. Learn AppleScript: The Comprehensive Guide to Scripting and Automation on Mac OS X, Third Edition has been completely updated for Mac OS X Snow Leopard. It's all here, with an emphasis on practical information that will help you solve any automation problem-from the most mundane repetitive tasks to highly integrated workflows of complex systems. * Friendly enough for beginners, d

  10. Learn Xcode Tools for Mac OS X and iPhone Development

    CERN Document Server

    Piper, I

    2010-01-01

    This book will give you a thorough grounding in the principal and supporting tools and technologies that make up the Xcode Developer Tools suite. Apple has provided a comprehensive collection of developer tools, and this is the first book to examine the complete Apple programming environment for both Mac OS X and iPhone. * Comprehensive coverage of all the Xcode developer tools * Additional coverage of useful third-party development tools* Not just a survey of features, but a serious examination of the complete development process for Mac OS X and iPhone applications What you'll learn* The boo

  11. Switching to the Mac The Missing Manual

    CERN Document Server

    Pogue, David

    2010-01-01

    Is Windows giving you pause? Ready to make the leap to the Mac instead? There has never been a better time to switch from Windows to Mac, and this incomparable guide will help you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac programs so you can do what you did with Windows, and learning your way around Mac OS X. Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. No viruses, worms, or spyware. No questionable firewalls, inefficien

  12. Enterprise Mac Managed Preferences

    CERN Document Server

    Marczak, Edward

    2010-01-01

    Many systems administrators on the Mac need a way to manage machine configuration after initial setup and deployment. Apple's Managed Preferences system (also known as MCX) is under-documented, often misunderstood, and sometimes outright unknown by sys admins. MCX is usually deployed in conjunction with an OS X server, but it can also be used in Windows environments or where no dedicated server exists at all. Enterprise Mac Managed Preferences is the definitive guide to Apple's Managed Client technology. With this book, you'll get the following: * An example-driven guide to Mac OS X Managed Pr

  13. The Mac'OS X command line Unix under the hood

    CERN Document Server

    McElhearn, Kirk

    2006-01-01

    The Mac command line offers a faster, easier way to accomplish many tasks. It''s also the medium for many commands that aren''t accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functionality provided by the command line. It''s also packed with information the experienced users need, including little-known shortcuts and several chapters devoted to advanced topics. This is a book to get you started, but also a book you won't soon outgrow.

  14. Concurrent Programming in Mac OS X and iOS Unleash Multicore Performance with Grand Central Dispatch

    CERN Document Server

    Nahavandipoor, Vandad

    2011-01-01

    Now that multicore processors are coming to mobile devices, wouldn't it be great to take advantage of all those cores without having to manage threads? This concise book shows you how to use Apple's Grand Central Dispatch (GCD) to simplify programming on multicore iOS devices and Mac OS X. Managing your application's resources on more than one core isn't easy, but it's vital. Apps that use only one core in a multicore environment will slow to a crawl. If you know how to program with Cocoa or Cocoa Touch, this guide will get you started with GCD right away, with many examples to help you writ

  15. Learn 2D game development with C# for iOS, Android, Windows Phone, Playstation mobile and more

    CERN Document Server

    Sung, Kelvin; Zhu, Rob; Pavleas, Jebediah

    2014-01-01

    Focuses on teaching key game programming principles and techniques rather than platform specifics, which makes it very appealing to hobbyists and game enthusiasts, and anyone who is thinking about a future career in game development. Uses the free, open source MonoGame framework to make it easy to target a wide range of platforms including Windows 8, Windows Phone, iOS, Android, MacOSX and Playstation Mobile. There are currently no books on the market covering this framework. By the end of the book, readers will have built a full working game and they'll have their own game library of build

  16. Mac Bible

    CERN Document Server

    Spivey, Dwight

    2009-01-01

    This essential guide answers all your questions on using a Macintosh computer, whether you?re unpacking your very first Mac after switching from a PC or upgrading from an older Mac. You?ll walk through all pre-installed Mac applications, including using Mac OS X, browsing the Web using Safari, downloading music from the iTunes store, troubleshooting Mac-specific problems, organizing photos in iPhoto, organizing calendars in iCal, editing digital video in iMovie, and more.

  17. Mac Programming for Absolute Beginners

    CERN Document Server

    Wang, Wallace

    2011-01-01

    Want to learn how to program on your Mac? Not sure where to begin? Best-selling author Wallace Wang will explain how to get started with Cocoa, Objective-C, and Xcode. Whether you are an experienced Windows coder moving to the Mac, or you are completely new to programming, you'll see how the basic design of a Mac OS X program works, how Objective-C differs from other languages you may have used, and how to use the Xcode development environment. Most importantly, you'll learn how to use elements of the Cocoa framework to create windows, store data, and respond to users in your own Mac programs.

  18. Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2008-12-01

    Full Text Available Varsalone, J. (Tech. Ed., Kubasiak, R.R., Morrissey, S., et al. (2009. Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit. Burlington, MA: Syngress. 551 + xix pages, ISBN: 978-1-59749-297-3, US$59.95.Reviewed by Gary C. Kessler (gary.kessler@champlain.eduAt last! A quality book about computer forensics for Apple products! Alas, I get ahead of myself.Apple's hold on the personal computer marketplace started dwindling on August 12, 1981, the day that the IBM PC was introduced. As an Apple ][+ bigot myself, I refused to touch a PC for some years. But I was also a command line bigot, so when the first Macintosh was introduced in 1983 and hermetically sealed the operating system from users, I did not go out and buy one. In fact, like many of my era, I did eventually end up on the PC side which, ironically, let me do many of the things that my trusty Apple ][+ had in earlier times -- write code, play with the hardware, and, indeed, get to a command line. And, of course, tons of application developers flocked to the PC because of its open architecture.(see PDF for full review

  19. Performance Analysis of an Optical CDMA MAC Protocol With Variable-Size Sliding Window

    Science.gov (United States)

    Mohamed, Mohamed Aly A.; Shalaby, Hossam M. H.; Abdel-Moety El-Badawy, El-Sayed

    2006-10-01

    A media access control protocol for optical code-division multiple-access packet networks with variable length data traffic is proposed. This protocol exhibits a sliding window with variable size. A model for interference-level fluctuation and an accurate analysis for channel usage are presented. Both multiple-access interference (MAI) and photodetector's shot noise are considered. Both chip-level and correlation receivers are adopted. The system performance is evaluated using a traditional average system throughput and average delay. Finally, in order to enhance the overall performance, error control codes (ECCs) are applied. The results indicate that the performance can be enhanced to reach its peak using the ECC with an optimum number of correctable errors. Furthermore, chip-level receivers are shown to give much higher performance than that of correlation receivers. Also, it has been shown that MAI is the main source of signal degradation.

  20. Mobile Device Management horizons for CERN Managed iOS and Mac Self-Service

    CERN Multimedia

    CERN. Geneva; MUSZKOWSKI, Maciek; BIPPUS, Vincent Nicolas

    2015-01-01

    Overview of the MDM (Mobile Device Mamagement) market in the context of the CERN needs and a discussion of technical capabilities of a range of MDM products, followed by a presentation of two new functionalities implemented using an MDM: Self-service Kiosk for Mac and delegated-management solution for professional tablets.

  1. CONFIGURING AND USING OPEN VPN ON WINDOWS OS

    OpenAIRE

    Ngekeh, Prisca

    2016-01-01

    Hacking is becoming a more critical issue in the world of science and technology today, hence it is necessary to add more security devices to the network to ensure the security of information. Open virtual private network (OpenVPN) is one among the many ways companies use to securely connect in different locations or a remote user connecting to a company’s network. This thesis work describes how to configure and use OpenVPN with Windows operating system. The following paragraphs discusses wha...

  2. Enterprise Mac administrators guide

    CERN Document Server

    Smith, William

    2015-01-01

    IT departments everywhere will be integrating Macs and Mac OS X into their IT infrastructure and this book will tell them how to do it. It will serve as an authoritative, useful and frequently referenced book on Mac OS X administration.

  3. Macs for dummies

    CERN Document Server

    Baig, Edward C

    2014-01-01

    Get the most out of your Mac with this comprehensive guide Macs For Dummies, 13th Edition is the ultimate guide to your Mac, fully updated to include information about the latest updates. The book walks you through troubleshooting, syncing mobile devices, integrating Windows, and more, so you can take advantage of everything Macs have to offer. Whether you're a new user, a recent convert, or you just want to get the most out of your Mac, this book puts all the information you need in one place. Discover what makes Macs superior computing machines. Learn the basics, from mastering the Dock and

  4. Core Animation für Mac OS X und iPhone Eindrucksvolle dynamische User Interfaces erstellen

    CERN Document Server

    Dudney, Bill

    2009-01-01

    Core Animation wurde mit Mac OS X 10.5 eingeführt und bietet dem Entwickler hervorragende Möglichkeiten, auf einfache Weise animierte User Interfaces für den Mac und das iPhone zu erstellen. Bill Dudney gibt Ihnen in diesem Buch eine umfassende Einführung in Core Animation. In den ersten Kapiteln liegt der Schwerpunkt auf der Nutzung der Integration von Core Animation mit dem AppKit. Der Autor beginnt mit den vertrauten Möglichkeiten aus dem AppKit sowie der Beschreibung der Möglichkeiten, die Cocoa-APIs bieten, und führt langsam die zusätzlichen APIs ein, die zum Core-Animation-Framework gehören. Es werden Ihnen u.a. die verschiedenen Animationsarten vorgestellt, die Core Animation zur Verfügung stellt, sowie die Klassen, die das Timing von Animationen regeln. In den späteren Kapiteln geht es dann hauptsächlich um die Aspekte, die mit einer rein Core-Animation-basierten Benutzerschnittstelle realisiert werden können. Der Autor erläutert Ihnen die Arbeitsweise von Layers sowie deren Geometrie un...

  5. Millisecond timing on PCs and Macs.

    Science.gov (United States)

    MacInnes, W J; Taylor, T L

    2001-05-01

    A real-time, object-oriented solution for displaying stimuli on Windows 95/98, MacOS and Linux platforms is presented. The program, written in C++, utilizes a special-purpose window class (GLWindow), OpenGL, and 32-bit graphics acceleration; it avoids display timing uncertainty by substituting the new window class for the default window code for each system. We report the outcome of tests for real-time capability across PC and Mac platforms running a variety of operating systems. The test program, which can be used as a shell for programming real-time experiments and testing specific processors, is available at http://www.cs.dal.ca/~macinnwj. We propose to provide researchers with a sense of the usefulness of our program, highlight the ability of many multitasking environments to achieve real time, as well as caution users about systems that may not achieve real time, even under optimal conditions.

  6. Mobile application platform heterogeneity: Android vs Windows phone vs iOS vs Firefox OS

    OpenAIRE

    Gronli, T-M; Hansen, J; Ghinea, G; Younas, M

    2014-01-01

    Modern smartphones have a rich spectrum of increasingly sophisticated features, opening opportunities for software-led innovation. Of the large number of platforms to develop new software on, in this paper we look closely at three platforms identified as market leaders for the smartphone market by Gartner Group in 2013 and one platform, Firefox OS, representing a new paradigm for operating systems based on web technologies. We compare the platforms in several different categories, such as sof...

  7. Windows

    DEFF Research Database (Denmark)

    Heiselberg, Per; Svidt, Kjeld; Nielsen, Peter V.

    In natural ventilation systems fresh air is often provided through opening of windows. However, the knowledge of the performance of windows is rather limited. Computation of natural ventilation air flow through windows is most commonly made using discharge coefficients, that are regarded as being...... constant. The reported results show that the discharge coefficient for a window opening cannot be regarded as a constant and that it varies considerably with the size of the opening area, the window type and the temperature difference. Therefore, the use of a constant value can lead to serious errors...

  8. Mac at Work

    CERN Document Server

    Sparks, David

    2011-01-01

    Bridge the gap between using a Mac at home and at the office. Now that you love your Mac at home, you want to use one at the office without missing a beat of productivity or professionalism. This unique guide shows you how.  You'll find best Mac business practices for handling word processing, spreadsheet and presentation creation, task and project management, and graphics. The book also explores topics such as hardware maintenance, how to synchronize with multiple computers, data backup, and communication with Windows networks.: Covers the nuts and bolts of using a Mac at work, including sync

  9. MacBook Teach Yourself VISUALLY

    CERN Document Server

    Miser, Brad

    2010-01-01

    Like the MacBook itself, Teach Yourself VISUALLY MacBook, Second Edition is designed to be visually appealing, while providing excellent functionality at the same time. By using this book, MacBook users will be empowered to do everyday tasks quickly and easily. From such basic steps as powering on or shutting down the MacBook, working on the Mac desktop with the Dashboard and its widgets to running Windows applications, Teach Yourself VISUALLY MacBook, Second Edition covers all the vital information and provides the help and support a reader needs—in many ways it's like having a Mac Genius at

  10. iMac portable genius

    CERN Document Server

    Hart-Davis, Guy

    2010-01-01

    The most up-to-date coverage on the latest iMac advice, tools, and shortcuts Cool and useful tips, full-color screenshots, and savvy advice show you how to get the most out of your iMac. Fully updated to cover the iMac's latest features and capabilities, this guide is packed with indispensible information on iLife '09 and Mac OS X Snow Leopard, and shows you how to customize your iMac in a way that it will work best for you.Explores all the bells and whistles of the iMac, including the new Magic Mouse, iLife apps such as iPhoto and iMovie, and Mac OS X Snow LeopardShows yo

  11. Desde MacBride hasta la CMSI. Diagnósticos plenos, compromisos vacíos

    Directory of Open Access Journals (Sweden)

    Dra. Concepción Travesedo de Castilla

    2006-01-01

    Full Text Available From 2003 to 2005 the World Summit for the Information Society has taken place under the auspices of the UN. Since the MacBride Report was submitted in 1980, this has been the most significant initiative undertaken at international level to confront the challenge of inequalities in the global communication system. So much in an occasion as in another, sectors requiring transformations have obtained a main victory in the area of diagnosis and definition of new paradigms, but their major failure in the refusal of the industrialized countries governments and the media private sector to assume any commitment. This rejection of the concept of Shared Responsibility has for the first time been counteracted by the international actor that supposes the organized civil society.

  12. Learn Excel 2011 for Mac

    CERN Document Server

    Hart-Davis, Guy

    2011-01-01

    Microsoft Excel 2011 for Mac OS X is a powerful application, but many of its most impressive features can be difficult to find. Learn Excel 2011 for Mac by Guy Hart-Davis is a practical, hands-on approach to learning all of the details of Excel 2011 in order to get work done efficiently on Mac OS X. From using formulas and functions to creating databases, from analyzing data to automating tasks, you'll learn everything you need to know to put this powerful application to use for a variety of tasks. What you'll learn * The secrets of the Excel for Mac interface! * How to create effective workbo

  13. CAC on a MAC: setting up a DOD Common Access Card reader on the Macintosh OS X operating system

    OpenAIRE

    Hopfner, Phil

    2006-01-01

    The Naval Postgraduate School, along with many other Department of Defense (DOD) organizations, utilizes the ActivCard USB Common Access Card (CAC) readers. The CAC readers in conjunction with the user's Smart Card enables access to DOD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DOD Public Key Infrastructure (PKI). Microsoft Windows systems utilize the ActivCard Gold middleware software to enable CAC reader functionality. This software packag...

  14. MacBook Pro portable genius

    CERN Document Server

    Gruman, Galen

    2013-01-01

    Learn the skills, tools and shortcuts you need in order to make the most of your MacBook Pro This easy-to-use, compact guide skips the fluff and gets right to the essentials so that you can maximize all the latest features of the MacBook Pro. Packed with savvy insights and tips on key tools and shortcuts, this handy book aims to help you increase your productivity and save you time and hassle. From desktop sharing and wireless networking to running Windows applications and more, this book shows you what you want to know. Includes the latest version of OS X, iCloud, FaceTime, and moreCovers al

  15. Switching to a Mac For Dummies

    CERN Document Server

    Reinhold, Arnold

    2007-01-01

    Thinking of making the switch from your PC to a Mac? Congratulations! You're in for a great, virus-free ride. And Switching to Mac For Dummies makes it smoother than you ever imagined. From buying the Mac that's right for you to transferring your files to breaking your old Windows habits and learning to do things the (much easier) Mac way, it makes the whole process practically effortless. Whether you've been using Windows XP, Vista, or even Linux, you'll find simple, straightforward ways to make your transition go smoothly. That will leave you plenty of time to get familiar with Mac'

  16. MacBook for dummies

    CERN Document Server

    Chambers , Mark L

    2014-01-01

    Make friends with your MacBook the fun and easy way! Ultra-light, ultra-fast, and ultra-powerful, the MacBook is the coolest laptop in town, and longtime Mac guru Mark L. Chambers is just the guy to help you get to know your MacBook in no time. Take a closer look at the latest features, get the lowdown on OS X, unleash your creative forces with iLife, take care of business with the iWork applications, and sync it all with iCloud with the expert advice in this bestselling MacBook guide. Whether this is your first MacBook or your first laptop, period, you''ll learn to navigate the Mac desktop, c

  17. Mac configuration management at the Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Marcus, Allan B [Los Alamos National Laboratory

    2010-01-01

    The Los Alamos National Laboratory (LANL) had a need for central configuration management of non-Windows computers. LANL has three to five thousand Macs and an equal number of Linux based systems. The primary goal was to be able to inventory all non-windows systems and patch Mc OS X systems. LANL examined a number of commercial and open source solutions and ultimately selected Puppet. This paper will discuss why we chose Puppet, how we implemented it, and some lessons we learned along the way.

  18. TeraTools: Multiparameter data acquisition software for the Windows 95/NT OS

    International Nuclear Information System (INIS)

    Piercey, R.B.

    1997-01-01

    TeraTools, a general purpose, multiparameter, data acquisition application for Windows 95NT is described. It is based on the Kmax architecture which has been used since 1986 on the Macintosh computer at numerous industrial, education, and research sites world-wide. TeraTools includes high-level support for industry-standard modular instrumentation; a built-in scripting language; drivers for commercially available interfaces; hooks for external code extensions; event file sorting and replay; and a full set of histogramming and display tools. The environment is scalable and may be applied to problems involving a few parameters or many parameters

  19. Mycobacterium avium complex (MAC isolated from AIDS patients and the criteria required for its implication in disease Complexo Mycobacterium avium (MAC isolado de pacientes com AIDS e os critérios exigidos para sua implicação em doença

    Directory of Open Access Journals (Sweden)

    David Jamil Hadad

    1995-10-01

    Treinamento AIDS e/ou Instituto de Infectologia Emilio Ribas. A doença disseminada foi diagnosticada em 29 destes, com base no isolamento do MAC a partir do sangue e/ou aspirado de medula óssea. Os outros 74 pacientes foram agrupados nas categorias altamente (5, moderadamente (26 e pouco sugestiva de doença (43 de acordo com os postulados de DAVIDSON (198910. Os diferentes critérios para valorizar o seu isolamento de espécimes estéreis e não estéreis são discutidos.

  20. 'Tagger' - a Mac OS X Interactive Graphical Application for Data Inference and Analysis of N-Dimensional Datasets in the Natural Physical Sciences.

    Science.gov (United States)

    Morse, P. E.; Reading, A. M.; Lueg, C.

    2014-12-01

    Pattern-recognition in scientific data is not only a computational problem but a human-observer problem as well. Human observation of - and interaction with - data visualization software can augment, select, interrupt and modify computational routines and facilitate processes of pattern and significant feature recognition for subsequent human analysis, machine learning, expert and artificial intelligence systems.'Tagger' is a Mac OS X interactive data visualisation tool that facilitates Human-Computer interaction for the recognition of patterns and significant structures. It is a graphical application developed using the Quartz Composer framework. 'Tagger' follows a Model-View-Controller (MVC) software architecture: the application problem domain (the model) is to facilitate novel ways of abstractly representing data to a human interlocutor, presenting these via different viewer modalities (e.g. chart representations, particle systems, parametric geometry) to the user (View) and enabling interaction with the data (Controller) via a variety of Human Interface Devices (HID). The software enables the user to create an arbitrary array of tags that may be appended to the visualised data, which are then saved into output files as forms of semantic metadata. Three fundamental problems that are not strongly supported by conventional scientific visualisation software are addressed:1] How to visually animate data over time, 2] How to rapidly deploy unconventional parametrically driven data visualisations, 3] How to construct and explore novel interaction models that capture the activity of the end-user as semantic metadata that can be used to computationally enhance subsequent interrogation. Saved tagged data files may be loaded into Tagger, so that tags may be tagged, if desired. Recursion opens up the possibility of refining or overlapping different types of tags, tagging a variety of different POIs or types of events, and of capturing different types of specialist

  1. Educación nutricional y eficacia de los servicios de salud en la disminución de la desnutrición y anemia en niños menores de tres años. Distrito de Ranracancha. Chincheros – Apurímac, 2014-2015

    OpenAIRE

    Mamani Urrutia, Victor Alfonso

    2016-01-01

    El presente estudio tiene como objetivo determinar el efecto de la educación nutricional y eficacia de los servicios de salud en la disminución de la desnutrición y anemia en niños menores de tres años del Distrito de Ranracancha. Chincheros – Apurímac, 2014-2015. El estudio conto una muestra de 203 niños, el tipo de muestreo utilizado fue aleatorio simple. Estudio es Cuasi experimental, y su diseño es Longitudinal-Comparativo porque es el mismo grupo de edad a lo largo de la ejecución del es...

  2. Windowsista Mac-maailmaan

    OpenAIRE

    Sirkiä, Noora-Maria

    2010-01-01

    Nykyään yhä useampi harkitsee erilaisista syistä käyttöjärjestelmän vaihtamista tutusta Windowsista johonkin muuhun käyttöjärjestelmään. Applen Macintosh-tietokoneiden mukana tuleva Mac OS X -käyttöjärjestelmä on hyvä vaihtoehto Windowsille. Ihmiset siirtyvät siihen mm. tietoturvaseikkojen, luotettavuuden, ohjelmiston sekä Applen koneiden ja käyttöjärjestelmän ulkomuodon takia. Microsoftin tuotteista ei myöskään tarvitse luopua kokonaan, sillä monista tutuista Microsoftin ohjelmista (esim. Mi...

  3. OS X Mavericks for dummies

    CERN Document Server

    LeVitus, Bob

    2013-01-01

    Coast through OS X Mavericks with help from Dr. Mac and For Dummies Ready to make friends with Mavericks? Then, Dr. Mac's your man. Author and longtime Mac guru, Bob "Dr. Mac" LeVitus shares his witty insights and helpful tips in this full-color update to his bestselling OS X guide. You'll learn the basics of working with the Dock, Launchpad, and Mission Control before moving on to setting up your e-mail, surfing with Safari, organizing your files, and customizing OS X Mavericks for all you need your Mac to do. Familiarizes you with OS X essentials like navigating the desktop, connecting to

  4. The effect of windowing on the performance of the CA-CFAR and OS-CFAR algorithms

    CSIR Research Space (South Africa)

    Melebari, A

    2015-10-01

    Full Text Available A major challenge in radar design is to not overflow the processor with false detections. This paper investigates the performance of Constant False Alarm Rate (CFAR) algorithms on maintaining a fixed false alarm rate when windowing is used to reduce...

  5. Mycobacterium Avium Complex (MAC)

    Science.gov (United States)

    ... sweat, and saliva red-orange (may stain contact lenses); can interfere with birth control pills. Many drug interactions. CAN MAC BE PREVENTED? The bacteria that cause MAC are very common. It is ...

  6. Teach yourself visually Mac Mini

    CERN Document Server

    Hart-Davis, Guy

    2012-01-01

    The perfect how-to guide for visual learners Apple?s Mac Mini packs a powerful punch is in a small package, including both HDMI and Thunderbolt ports plus the acclaimed OS X. But if you want to get the very most from all this power and versatility, be sure to get this practical visual guide. With full-color, step-by-step instructions as well as screenshots and illustrations on every page, it clearly shows you how to accomplish tasks rather than burying you in pages of text. Discover helpful visuals and how-tos on the OS, hardware specs, Launchpad, the App Store, multimedia capabilities (such

  7. Mac Security Bible

    CERN Document Server

    Kissell, Joe

    2010-01-01

    Your essential, no-holds-barred guide to Mac security threats and solutions. Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide.

  8. MacBook Pro Portable Genius

    CERN Document Server

    Miser, Brad

    2012-01-01

    Discover loads of tips and techniques for the newest MacBook Pro You're already ahead of the game with a MacBook Pro. Now you can get even more out the popular Apple notebook with the new edition of this handy, compact book. Crammed with savvy insights and tips on key tools and shortcuts, this book will help you increase your productivity and keep your Apple digital lifestyle on track. From desktop sharing and wireless networking to running Windows applications, this book avoids fluff, doesn't skimp on the essentials, saves you time and hassle, and shows you what you most want to know. Include

  9. Data declaration, control and record of an experiment in nuclear physics. Data acquisition system development under X Window with the system OS-9

    International Nuclear Information System (INIS)

    Michel, L.

    1990-09-01

    To compensate for the increase in data produced by experiments in nuclear physics, the development of a data storage system much more compact than the magnetic tape is most important. The first goal of this work is to establish a data storage unit built on a 8 mm video cartridge (Exabyte) at a given experimental site, the 4pi gamma multidetector array Chateau de Cristal, set up at the CNRS unit in Strasbourg. We have built on a VME crate a data acquisition system working with the real time operating system OS-9 and integrating the Exabyte unit. The system control is realized with an original graphic interface that has been developed under X-Window. This interface allows the command and monitoring of data acquisition as well as the set up of acquisition parameters. The system worked up since january 1990 [fr

  10. Situación de riesgo y salud de los adolescentes en el valle de los ríos Apurímac, Ene y Mantaro en Perú

    Directory of Open Access Journals (Sweden)

    Fabiola Yeckting Vilela

    Full Text Available Se presenta el diagnóstico de las condiciones de vida de los adolescentes varones y mujeres en la zona del valle de los ríos Apurímac, Ene y Mantaro (VRAEM, quienes atraviesan situaciones de riesgo y vulnerabilidad social y sexual debido a los altos niveles de producción de la hoja de coca y el contexto del narcotráfico, que crean la ilusión del rápido ascenso social. A partir de ello, es necesario preguntarse ¿cuáles son las condiciones de vida y situaciones de riesgo de los adolescentes en el VRAEM? y ¿cuáles son las alternativas para una mejora de su situación desde el acceso a la educación y los programas de atención de su salud? Esta situación de riesgo es el resultado de las relaciones desiguales de género, violencia sexual, deserción escolar, embarazo adolescente, consumo de alcohol y drogas, así como de la falta de oportunidades como consecuencia de la participación en la economía de la coca y el narcotráfico entre los adolescentes en el VRAEM. Finalmente, se presentan los resultados de la atención de profesionales de los centros de salud para favorecer la consejería en salud sexual y reproductiva y el acceso a los servicios de salud del Programa Vida Adolescente, como oportunidad de vincular los contenidos del currículo de educación y las metas de cumplimiento de este sector, visibilizando la necesidad de un enfoque de interculturalidad e igualdad de género en el acceso a la salud y la educación de los adolescentes.

  11. Understanding Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  12. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  13. MAC calorimeters and applications

    International Nuclear Information System (INIS)

    MAC Collaboration.

    1982-03-01

    The MAC detector at PEP features a large solid-angle electromagnetic/hadronic calorimeter system, augmented by magnetic charged-particle tracking, muon analysis and scintillator triggering. Its implementation in the context of electron-positron annihilation physics is described, with emphasis on the utilization of calorimetry

  14. Florence Jessie Mac Williams

    Indian Academy of Sciences (India)

    CPMGIKAlBGE-340/2003-05. Resonance - January 2005. Licenced to post WPP No.6 RT Nagar Postoffice. Florence Jessie Mac Williams. (1917 - 1990). Registered with Registrar of Newspapers in India vide Regn. No. 66273/96. ISSN 0971-8044. Price per copy: Rs 40.

  15. Rails on Windows

    CERN Document Server

    Hibbs, Curt

    2007-01-01

    It's no secret that the entire Ruby onRails core team uses OS X as their preferreddevelopment environment. Becauseof this, it is very easy to findauthoritative information on the webabout using Rails on OS X. But the truthis that Windows developers using Railsprobably outnumber those using otherplatforms. A Windows development environmentcan be just as productive asany other platform. This is a guide to developing with Rubyon Rails under Windows. It won't teachyou how to write Ruby on Rails web applications,but it will show you what toolsto use and how to set them up to createa complete Rail

  16. Windows 8 secrets

    CERN Document Server

    Thurrott, Paul

    2012-01-01

    Tips, tricks, treats, and secrets revealed on Windows 8 Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally recognized Windows experts and Microsoft insiders, authors Paul Thurrott and Rafael Rivera? They cut through the hype to get at useful information you'll not find anywhere else, including what role this new OS plays in a mobile and tablet world. Regardless of your level of knowledge, you'll discover little-known facts about how things work, what's new and different, and h

  17. Windows 8 tweaks

    CERN Document Server

    Sinchak, Steve

    2013-01-01

    Acres of Windows 8 tweaks from a Microsoft MVP and creator of Tweaks.com! From a Microsoft MVP, who is also the savvy creator of Tweaks.com, comes this ultimate collection of Windows 8 workarounds. Steve Sinchak takes you way beyond default system settings, deep under the hood of Windows 8, down to the hidden gems that let you customize your Windows 8 system like you wouldn't believe. From helping you customize the appearance to setting up home networking, sharing media, and squeezing every ounce of performance out of the OS, this book delivers. Get ready to rock and roll with Wind

  18. iMac pocket genius

    CERN Document Server

    Hart-Davis, Guy

    2010-01-01

    If you want to get the very most out of your iMac, put this savvy Portable Genius guide to work. Want to make the most of the new Magic Mouse and the latest iLife apps? Set up a wireless network using your iMac's AirPort card? Watch television on your iMac, or show iMac videos and movies on your television? You'll find cool and useful Genius tips, full-color screenshots, and pages of easy-to-access shortcuts and tools that will save you time and let you enjoy your iMac to the max.

  19. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    Science.gov (United States)

    Song, W.-Z.; Huang, R.; Shirazi, B.; Husent, R.L.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and frame into slots. Parent determines children's frame assigmnent based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. Firstly, given any node, at any time slot, there is at most one active sender in its neighborhood (includ ing itself). Secondly, the packet scheduling with TreelMAC is bufferless, which therefore minimizes the probability of network congestion. Thirdly, the data throughput to gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24 node test bed demonstrate that TreeMAC protocol significantly improves network throughput and energy efficiency, by comparing to the TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC[8]. ?? 2009 IEEE.

  20. Macs For Dummies, Pocket Edition

    CERN Document Server

    Baig, Edward C

    2011-01-01

    The fun and easy way to make the most of your wonderful Mac. Simply Mac-nificent — all the cool things your Mac can do! This handy guide helps you figure out the nuts and bolts of your Mac. Navigate the Mac desktop, use the Safari Web browser to surf the Internet, e-mail photos to friends and family, create and print documents, rip audio CDs, and more. The fun begins right here!. Open the book and find: How to set up and configure your Mac; Tips for getting around on the Mac desktop; Steps for setting up an e-mail account and browsing the Internet; Details about the free programs that come wit

  1. iMac for dummies

    CERN Document Server

    Chambers, Mark L

    2014-01-01

    Do it all with your iMac and this bestselling For Dummies guide! You're still a little giddy from finally scoring your new iMac, and you can't wait to get started. Even if you're already in love with your iMac, it helps to have a little guidance to really get the most out of this ultimate all-in-one computer. This updated edition of iMac For Dummies is the ideal way to learn the iMac fundamentals from setting up and personalizing your machine to importing files, making FaceTime video calls, surfing the web, using your favorite programs and apps, and everything in between. Trusted Mac guru Mark

  2. Windows Azure

    CERN Document Server

    Johnson, Bruce; Chambers, James; Garber, Danny; Malik, Jamal; Fazio, Adam

    2013-01-01

    A collection of five must-have Azure titles, from some of the biggest names in the field Available individually, but at a discounted rate for the collection, this bundle of five e-books covers key developer and IT topics of Windows Azure, including ASP.NET, mobile services, web sites, data storage, and the hybrid cloud. A host of Microsoft employees and MPVs come together to cover the biggest challenges that professionals face when working with Windows Azure. The e-books included are as follows: Windows Azure and ASP.NET MVC MigrationWindows Azure Mobile ServicesWindows Azure Web SitesWindows

  3. Mac Leod's syndrome

    International Nuclear Information System (INIS)

    Schad, M.; Danesi, C.; Ricci, R.; Galluzzi, S.; Coviello, G.

    1988-01-01

    Mac Leod's syndrome is a rarely diagnosed disease; that is why an accurate differential diagnosis is needed by means of radiological imaging. This paper is aimed at discussing the differential diagnosis, with a special emphasis on the pathogenesis of the syndrome. The phenomenon of air trapping in absence of central bronchial lesions is a typical radiographic finding. Chest X-ray is performed in both inspiration and expiration. Posterior oblique tomography at 55 grade centigrade of the effected side is also performed. Diffuse bronchiolitis obliterans in infancy or early childhood ia widely accepted pathogenetic pattern. Pulmonary hypoventilation causes vasoconstriction and underdevelopment of pulmonary vessels, that are reduced in caliber. Differential diagnosis includes all the diseases resulting in pulmonary hyperlucency, i.e. pulmonary and pleural alterations, and skeletal anomalies

  4. iMac for dummies

    CERN Document Server

    Chambers, Mark L

    2012-01-01

    The bestselling guide to the ultimate all-in-one computer—now updated and revised throughout! If you're looking for speed, performance, and power, the iMac is the ultimate all-in-one computer. From its superior performance, powerful operating system, and amazing applications, the iMac is one awesome machine, and the fun, friendly, and approachable style of iMac For Dummies is an ideal way to get started with the basics. You'll learn the fundamentals of the iMac including setting up and customizing your iMac and the software that comes with it, importing files from your old computer, send

  5. Window Stories

    DEFF Research Database (Denmark)

    Hauge, Bettina

    This research project has investigated 17 households in Germany (cities and rural areas). The main aim was to learn about the significance of the window to these people: What they think of their windows, how, when and why they use them in their everyday life, if they have a favorite window and wh...

  6. Gotcha! Macs lose their innocence

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Still believe your Mac is secure because Microsoft PCs fall prey to viruses and worms but Macs don’t? Time to wake up! This year has seen the first major compromise of Macs worldwide*. How is yours doing?   The “Flashback” Trojan is affecting Apple’s own variant of Java and compromises Macs via so-called drive-by infections, i.e. when you visit an appropriately prepared (infected!) website - and this might not necessarily be a site with questionable contents, but could well be a popular, reputable one. Security Companies worldwide have been monitoring this particular Trojan for a while and have estimated that more than half a million Macs were compromised. Connected to a few central command and control servers, the compromised Macs were then supporting the malicious activity of the bad guys! Fortunately, the security companies have now been able to take over those command and control servers and stop their destructive drive. So, Mac users, face the f...

  7. Alistair William MacDonald.

    Science.gov (United States)

    Callegari, Angus

    2018-01-06

    A devoted family man and churchgoer, Alistair MacDonald was a meticulous vet with a great sense of humour. Having served in the RAF during the Second World War, he had plenty of stories to tell. British Veterinary Association.

  8. Fiverr MacGyver

    Science.gov (United States)

    Hut, Rolf; van de Giesen, Nick; Larson, Martha

    2014-05-01

    Crowdsourcing has become popular over the past years, also for scientific endeavors. There are many Citizen Science projects and crowdfunding platforms, such as Kickstarter, that are make helpful contributions to moving environmental science forward. An interesting underused source of useful crowd-derived contributions to research is the website Fiverr.com. On this platform, thousands of people, acting as small-scale freelance contractors, offer their skills in the form of services. The platform offers a chance for people to take a hobby, skill, or pastime and make it something more by reaching out to a wider audience and by receiving a payment in return for services. As is typical of other crowdsourcing platforms, the tasks are small and usually self contained. As the name Fiverr suggests, offers start at US5 to provide a particular service. Services offered range from graphic design, to messages sung or spoken with various styles or accents, to complete apps for Android or iPhone. Skill providers on the platform can accept a range of variation of definition in the tasks, some can be described in general terms, for others it is more appropriate to provide examples. Fiverr provides a central location for those offering skills and those needing services to find each other, it makes it possible to communicate and exchange files, to make payments, and it provides support for resolving disputes. In all cases, it is important to keep expectations aligned with the nature of the platform: quality can and will vary. Ultimately, the critical contribution of Fiverr is not to replace professional services or otherwise save money, but rather to provide access to a large group of people with specialized skills who are able to make a contribution on short notice. In the context of this session, it can be considered a pool of people with MacGyver skills lying in wait of a MacGyyer task to attack. There are many ways in which Fiverr tasks, which are called 'gigs', can be useful in

  9. Proper Installation of Replacement Windows | Efficient Windows

    Science.gov (United States)

    Collaborative Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring

  10. Window Glazing Types | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  11. Window Frame Types | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  12. Performance Standards for Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  13. Benefits of Efficient Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  14. Assessing Window Replacement Options | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  15. Windows for New Construction | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  16. Window Operator Types | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  17. OS X Mountain Lion bible

    CERN Document Server

    Gruman, Galen

    2012-01-01

    The complete guide to Mac OS X, fully updated for the newest release! The Mac's solid, powerful operating system and the exploding popularity of iOS devices are fueling a strong increase in market share for Apple. Previous editions of this book have sold more than 75,000 copies, and this new edition is fully updated with all the exciting features of OS X Mountain Lion, including Game Center, Messages, and Notifications. Written by industry expert Galen Gruman, it covers all the basics and then delves deep into professional and higher-end topics, making it the one book you need to succeed with

  18. OS X Mavericks portable genius

    CERN Document Server

    Spivey, Dwight

    2013-01-01

    Plenty of tips, tricks, and shortcuts help you make the most of Apple's newest OS X OS X Mavericks is Apple's newest operating system, with great new ways to enhance your digital lifestyle. This hip, straightforward guide focuses on helping you get everything you want from your Mac. You'll discover how to customize your computer and workspace, troubleshoot and maintain OS X, and have fun browsing and manipulating images and multimedia. You'll listen to music and podcasts, discover how to work with and connect peripherals, copy music to an iPod, add a printer, sync your Mac to other devices, an

  19. Microsoft Windows Operating System Essentials

    CERN Document Server

    Carpenter, Tom

    2012-01-01

    A full-color guide to key Windows 7 administration concepts and topics Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System Essentials is an ideal resource for anyone new to computer administration and looking for a career in computers. Delving into areas such as fundamental Windows 7 administration concepts and various desktop OS topics, this full-color book addresses the skills necessary for individuals looking to break into a career in IT. Each chapter begins with a list of topi

  20. I-MAC: an incorporation MAC for wireless sensor networks

    Science.gov (United States)

    Zhao, Jumin; Li, Yikun; Li, Dengao; Lin, Xiaojie

    2017-11-01

    This paper proposes an innovative MAC protocol called I-MAC. Protocol for wireless sensor networks, which combines the advantages of collision tolerance and collision cancellation. The protocol increases the number of antenna in wireless sensor nodes. The purpose is to monitor the occurrence of packet collisions by increasing the number of antenna in real time. The built-in identity structure is used in the frame structure in order to help the sending node to identify the location of the receiving node after a data packet collision is detected. Packets can be recovered from where the conflict occurred. In this way, we can monitor the conflict for a fixed period of time. It can improve the channel utilisation through changing the transmission probability of collision nodes and solve the problem of hidden terminal through collision feedback mechanism. We have evaluated our protocol. Our results show that the throughput of I-MAC is 5 percentage points higher than that of carrier sense multiple access/collision notification. The network utilisation of I-MAC is more than 92%.

  1. Mr MacDonald's suitcase

    DEFF Research Database (Denmark)

    2017-01-01

    Undervisningsforløbet Mr. MacDonald’s suitcase beskriver læringsmålstyret undervisning i faget engelsk i 1. klasse, hvor der arbejdes med kompetenceområdet mundtlig kommunikation. Undervisningsforløbet er bygget op omkring en engelsk tøjdukke, der besøger klassen og fortæller små historier...

  2. Resources | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  3. Links | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  4. Efficient Windows Collaborative | Home

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  5. FAQ | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  6. Glossary | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  7. Cognitive MAC designs for OSA networks

    CERN Document Server

    Derakhshani, Mahsa

    2014-01-01

    This SpringerBrief presents recent advances in the cognitive MAC designs for opportunistic spectrum access (OSA) networks. It covers the basic MAC functionalities and MAC enhancements of IEEE 802.11. Later chapters discuss the existing MAC protocols for OSA and classify them based on characteristic features. The authors provide new research in adaptive carrier sensing-based MAC designs tailored for OSA, which optimize spectrum utilization and ensure a peaceful coexistence of licensed and unlicensed systems. Analytically devised via optimization and game-theoretic approaches, these adaptive M

  8. Microsoft Windows Server Administration Essentials

    CERN Document Server

    Carpenter, Tom

    2011-01-01

    The core concepts and technologies you need to administer a Windows Server OS Administering a Windows operating system (OS) can be a difficult topic to grasp, particularly if you are new to the field of IT. This full-color resource serves as an approachable introduction to understanding how to install a server, the various roles of a server, and how server performance and maintenance impacts a network. With a special focus placed on the new Microsoft Technology Associate (MTA) certificate, the straightforward, easy-to-understand tone is ideal for anyone new to computer administration looking t

  9. OS X Mountain Lion Portable Genius

    CERN Document Server

    Spivey, Dwight

    2012-01-01

    Essential tips and techniques on the Mac OS X features you use most! If you want the kind of hip, friendly help you'd get from friends on how to get the most of out of Mac OS X Mountain Lion, this is the guide you need. Jump right into the coolest new Mac OS X features like Game Center, Messages, and Notification, or get a better handle on the basic tools and shortcuts that will help keep your mountain cat purring. From customizing to using multimedia to syncing your Mac to other devices, this book saves you time and hassle, avoids fluff, and covers what you want to know most. New addition t

  10. Window shopping

    International Nuclear Information System (INIS)

    Anon.

    1987-01-01

    'A large window for surprises' was how Gordon Kane of Michigan summarized the potential of the proposed 84-kilometre US Superconducting Supercollider (SSC). With George Trilling of Berkeley unable to attend this year's High Energy Physics Conference at Vanderbilt University, Nashville, Tennessee, from 8-10 October, Kane played a dual role - looking ahead to SSC physics, and summarizing the meeting

  11. The MacNuclide nuclear data environment

    International Nuclear Information System (INIS)

    Stone, C.A.

    1992-01-01

    Advance in technology have produced intriguing tools that can be applied to problems in nuclear science. Information management in nuclear science is an example of how technology is not quickly exploited. The U.S. Department of Energy supports an extensive program to evaluate published nuclear properties and store them in an electronic data base. Much of the evaluation effort has focused on producing the journal Nuclear Data Sheets and the publication Table of Isotopes. Although the electronic data base can itself be a valuable source of information, the software used to access is was designed using decades-old technologies. The authors of this paper have developed a novel data-base management system for nuclear properties. The application is known as MacNuclide. It is a nuclear data-base environment that uses the highly interactive and intuitive windowing environmentsof desk-top computers. The environment is designed around that image of the chart of nuclides. Questions are posed to the data base by placing constraints on properties and defining collections of nuclides to be used in data-base seraches. Results are displayed either as a simple list of nuclides that meet the imposed constraints or as a color chart of nuclides

  12. Technical Report : ContikiMAC vs X-MAC performance analysis

    OpenAIRE

    Michel, Mathieu; Quoitin, Bruno

    2014-01-01

    This paper try to better understand the performance of ContikiMAC compared to X-MAC. ContikiMAC achieves a transmission by repeatedly transmitting a data packet until the reception of an ACK from the destination. While X-MAC uses a stream of small size strobes to advertise the destination of the incoming transmission. A priori, X-MAC is then less bandwidth consumptive. To better understand the efficiency of ContikiMAC, despite an intuitively more consumptive transmitting procedure, we have co...

  13. Strategic Windows

    DEFF Research Database (Denmark)

    Risberg, Annette; King, David R.; Meglio, Olimpia

    We examine the importance of speed and timing in acquisitions with a framework that identifies management considerations for three interrelated acquisition phases (selection, deal closure and integration) from an acquiring firm’s perspective. Using a process perspective, we pinpoint items within ...... acquisition phases that relate to speed. In particular, we present the idea of time-bounded strategic windows in acquisitions consistent with the notion of kairòs, where opportunities appear and must be pursued at the right time for success to occur....

  14. Window shopping

    OpenAIRE

    Oz Shy

    2013-01-01

    The terms "window shopping" and "showrooming" refer to the activity in which potential buyers visit a brick-and-mortar store to examine a product but end up either not buying it or buying the product from an online retailer. This paper analyzes potential buyers who differ in their preference for after-sale service that is not offered by online retailers. For some buyers, making a trip to the brick-and-mortar store is costly; however, going to the store to examine the product has the advantage...

  15. Web Development with the Mac

    CERN Document Server

    Vegh, Aaron

    2010-01-01

    Learn Web development the Apple way and build a business. With a focus on both coding and creative development, this in-depth guide thoroughly covers what you need to know to build winning websites for clients — from what it takes to bring a business online to how to make your site interactive to how to run a freelance web business. In between, you'll master the technical tools of the trade — such as HTML, CSS, JavaScript, PHP, and Ruby on Rails — and learn how to create beautiful interfaces using Photoshop . This book covers everything a fledgling web developer working on a Mac needs to launc

  16. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  17. Macs all-in-one for dummies

    CERN Document Server

    Hutsko, Joe

    2014-01-01

    Your all-in-one guide to unleashing your Mac's full potential It's a Mac world out there. But if you haven't read the instruction manual, you may be neglecting some of your computer's coolest features. Turn to Macs All-in-One For Dummies' jam-packed guide to access the incredible tools within your computer. With this fully updated reference, you will learn how to use Launchpad and Mission Control; protect your Mac; back up and restore data with Time Machine; sync across devices in iCloud; import, organize, and share photos; direct in iMovie; compose in GarageBand; and so much more. The possi

  18. Douglas MacArthur Upon Reflection

    National Research Council Canada - National Science Library

    Snitchler, Lowell

    1998-01-01

    .... This research recounts MacArthur's personality development from childhood, investigates his last military campaign, and, finally, applies the diagnosis of narcissistic personality disorder to the assembled data...

  19. Quicksilver Power Mac G4

    CERN Document Server

    2001-01-01

    A new generation with a reworked motherboard is launched on 2001 with however the same Graphite box. It also included a processor speed-bump, and brought the DVD-R "SuperDrive" to the mid-level model. The Quicksilver PowerMac was available in three configurations: The 733 MHz model, with 128 MB of RAM, a 40 GB hard drive, and a CD-RW drive, was 1,699 dollars, the 867 MHz configuration, with 128 MB of RAM, a 60 GB hard drive and a DVD-R drive, was 2,499 dollars, and the high-end dual-800 MHz model, with 256 MB of RAM, an 80 GB hard drive and a DVD-R drive, was 3,499 dollars. The 733 MHz model is the first personal computer to have a DVD burner, named SuperDrive at Apple. The design was updated on 2002 with 800 MHz, 933 MHz and dual 1 GHz configurations, becoming the first Mac to reach 1 GHz.

  20. Analysis of 3gpp-MAC and two-key 3gpp-MAC

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Mitchell, C.J.

    2003-01-01

    Forgery and key-recovery attacks are described on the 3gpp-MAC scheme, proposed for inclusion in the 3gpp specification. Three main classes of attack are given, all of which operate whether or not truncation is applied to the MAC value. Attacks in the first class use a large number of 'chosen MAC...

  1. George MacDonald's Estimate of Childhood

    Science.gov (United States)

    Pridmore, John

    2007-01-01

    The nineteenth-century fantasy writer George MacDonald believed that "it is better to be a child in a green field than a knight of many orders." In this paper, I shall explore the bearing of this high estimate of childhood on spiritual education. MacDonald explores the spirituality of the child in his essay "A Sketch of Individual Development" and…

  2. Office 2008 for Mac for dummies

    CERN Document Server

    LeVitus, Bob

    2013-01-01

    Office 2008 for Mac is here, with great new enhancements to all your favorite office productivity tools. Who better than "Dr. Mac, "Bob LeVitus, to show you how to load and use them all? From choosing the best version for your needs to managing your life with your online calendar, Office 2008 For Mac For Dummies covers what you need to know. It compares the Student/Teacher Edition, Standard Edition, and Professional Edition, then walks you through installing your preferred version and keeping it up to date. You'll find out all the things you can do with Word, Excel, PowerPoint, and Entourage,

  3. Antimoulting Activity of Eremanthus erythropappus (DC. MacLeisch

    Directory of Open Access Journals (Sweden)

    Danielle Barbosa

    2012-06-01

    Resumo. Os extratos e metabólitos secundários de plantas podem agir como agentes tóxicos e inibidores do da alimentação e do desenvolvimento em insetos. Neste estudo foi utilizado Oncopeltus fasciatus (Dallas (Hemiptera como modelo experimental a fim de avaliar as atividades do extrato etanólico bruto e frações obtidos das flores ou caules de Eremanthus erythropappus (DC. MacLeisch (Asteraceae, na mortalidade e sobre o desenvolvimento do inseto. A fração butanólica obtida do extrato etanólico mostrou toxidade sobre as ninfas de O. fasciatus, bem como atividade de inibição do crescimento. Os resultados sugerem que a fração butanólica de E. erythropappus possui substâncias ativas sobre a fisiologia, crescimento e desenvolvimento de insetos.

  4. MACS as a tool for international inspections

    International Nuclear Information System (INIS)

    Curtiss, J.A.; Indusi, J.P.

    1995-01-01

    The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites

  5. MACS as a tool for international inspections

    Energy Technology Data Exchange (ETDEWEB)

    Curtiss, J.A.; Indusi, J.P.

    1995-08-01

    The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites.

  6. MAC reduction of isoflurane by sufentanil.

    Science.gov (United States)

    Brunner, M D; Braithwaite, P; Jhaveri, R; McEwan, A I; Goodman, D K; Smith, L R; Glass, P S

    1994-01-01

    We have shown previously that a plasma fentanyl concentration of 1.67 ng ml-1 reduced the MAC of isoflurane by 50%. By comparing equal degrees of MAC reduction by sufentanil, we may determine the potency ratio of these opioids. Seventy-six patients were allocated randomly to receive predetermined infusions of sufentanil, and end-tidal concentrations of isoflurane in oxygen. Blood samples were obtained 10 min after the start of the infusion, and just before and after skin incision. Any purposeful movement by the patient was recorded. The MAC reduction of isoflurane produced by sufentanil was obtained using a logistic regression model. A sufentanil plasma concentration of 0.145 ng ml-1 (95% confidence limits 0.04, 0.26 ng ml-1) resulted in a 50% reduction in the MAC of isoflurane. At a plasma concentration greater than 0.5 ng ml-1, sufentanil exhibited a ceiling effect.

  7. Enhanced Sleep Mode MAC Control for EPON

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    This paper introduces sleep mode operations for EPON. New MAC control functions are proposed to schedule sleep periods. Traffic profiles are considered to optimize energy efficiency and network performances. Simulation results are analyzed in OPNET modeler.......This paper introduces sleep mode operations for EPON. New MAC control functions are proposed to schedule sleep periods. Traffic profiles are considered to optimize energy efficiency and network performances. Simulation results are analyzed in OPNET modeler....

  8. Wound Healing in Mac-1 Deficient Mice

    Science.gov (United States)

    2017-05-01

    Dentistry, University of Illinois at Chicago, Chicago, IL, USA. 2 Department of Defense Biotechnology High Performance Computing Software...study, we used a commercially available Mac-1 deficient strain to examine whether this deficit 5 extends to slightly smaller wounds and incisional...levels of Collagen I and Collagen III in wounds from the two strains of mice at any time point. Unwounded skin from both WT and Mac-1 -/- mice contained

  9. AeroMACS system characterization and demonstrations

    Science.gov (United States)

    Kerczewski, R. J.; Apaza, R. D.; Dimond, R. P.

    This The Aeronautical Mobile Airport Communications System (AeroMACS) is being developed to provide a new broadband wireless communications capability for safety critical communications in the airport surface domain, providing connectivity to aircraft and other ground vehicles as well as connections between other critical airport fixed assets. AeroMACS development has progressed from requirements definition through technology definition, prototype deployment and testing, and now into national and international standards development. The first prototype AeroMACS system has been deployed at the Cleveland Hopkins International Airport (CLE) and the adjacent NASA Glenn Research Center (GRC). During the past three years, extensive technical testing has taken place to characterize the performance of the AeroMACS prototype and provide technical support for the standards development process. The testing has characterized AeroMACS link and network performance over a variety of conditions for both fixed and mobile data transmission and has included basic system performance testing and fixed and mobile applications testing. This paper provides a summary of the AeroMACS performance testing and the status of standardization activities that the testing supports.

  10. Windows 7 A quick, hands-on introduction

    CERN Document Server

    Lee, Wei-Meng

    2009-01-01

    This compact book offers the quickest path for Windows users to get started with Microsoft's Windows 7 operating system. You get the essential information you need to upgrade or install the system and configure it to fit your activities, along with a tour of Windows 7's features and built-in applications. Microsoft has learned from the mistakes of Windows Vista, and Windows 7 shows it-this new OS is much faster and more stable. With Windows 7: Up and Running, you'll learn what's new and what's changed from XP and Vista, and get advice on ways to use this system for work, entertainment, inst

  11. Windows server cookbook for Windows server 2003 and Windows 2000

    CERN Document Server

    Allen, Robbie

    2005-01-01

    This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Microsoft's latest server. These concise, on-the-job solutions to common problems are certain to save you many hours of time searching through Microsoft documentation. Topics include files, event logs, security, DHCP, DNS, backup/restore, and more

  12. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  13. Design Guidance for New Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  14. Selection Process for New Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  15. Selection Process for Replacement Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  16. Design Guidance for Replacement Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  17. Replacement Windows for Existing Homes Homes | Efficient Windows

    Science.gov (United States)

    Collaborative Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring

  18. Proper Installation of New Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  19. Teach yourself visually OS X Mountain Lion

    CERN Document Server

    McFedries, Paul

    2012-01-01

    Get to know the new cat in the pride-Mac OS X Mountain Lion-with this VISUAL guide Apple's new Mac OS X Mountain Lion is impressive, with features and functions that will be familiar to Mac users from their iPhones and iPads. Make sure you get the most out of your new big cat with this practical guide. Using step-by-step instructions and full-color screenshots or illustrations on virtually every page-the hallmark of the practical Teach Yourself VISUALLY series-this book clearly shows you how to accomplish tasks, rather than burying you with paragraphs of text. You'll learn how to customize

  20. Provide Views | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  1. Reduced Fading | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  2. EWC Members | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  3. Visible Transmittance | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  4. Gas Fills | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  5. EWC Membership | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  6. Reducing Condensation | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  7. Improved Comfort | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  8. Financing & Incentives | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  9. Tools & Resources | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  10. Books & Publications | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  11. Design Considerations | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  12. Windows and doors

    Energy Technology Data Exchange (ETDEWEB)

    1988-01-01

    A complete manual is presented on windows and doors for the housing contractor. In order to understand the role of windows and doors in a house's energy performance, an introduction explains the house as a system of components that can have effects on each other. Further chapters explain in detail the parts of a window, window types and RSI values; window servicing and repair; window replacement; parts of a door, door types and RSI values; door service and repair, including weatherstripping; door replacement; and how to ensure quality, service, and customer satisfaction. A glossary of terms is included. 61 figs., 3 tabs.

  13. Windows 10 simplified

    CERN Document Server

    McFedries, Paul

    2015-01-01

    Learn Windows 10 quickly and painlessly with this beginner's guide Windows 10 Simplified is your absolute beginner's guide to the ins and outs of Windows. Fully updated to cover Windows 10, this highly visual guide covers all the new features in addition to the basics, giving you a one-stop resource for complete Windows 10 mastery. Every page features step-by-step screen shots and plain-English instructions that walk you through everything you need to know, no matter how new you are to Windows. You'll master the basics as you learn how to navigate the user interface, work with files, create

  14. Windows 10 for dummies

    CERN Document Server

    Rathbone, Andy

    2015-01-01

    The fast and easy way to get up and running with Windows 10 Windows 10 For Dummies covers the latest version of Windows and gets you up and running with the changes and new features you'll find in this updated operating system. Packed with time-saving tips to help you get the most out of the software, this helpful Windows 10 guide shows you how to manage Windows tasks like navigating the interface with a mouse or touchscreen, connecting to the web, and troubleshooting problems and making quick fixes. Assuming no prior knowledge of the software, Windows 10 For Dummies addresses the updates to

  15. MacSelfService online tutorial

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Mac Self-Service is a functionality within the Mac Desktop Service built and maintained to empower CERN users by giving them easy access to applications and configurations through the Self-Service application. This tutorial (text attached to the event page) explains how to install Mac Self-Service and how to use it to install applications and printers. Content owner: Vincent Nicolas Bippus Presenter: Pedro Augusto de Freitas Batista Tell us what you think via e-learning.support at cern.ch More tutorials in the e-learning collection of the CERN Document Server (CDS) https://cds.cern.ch/collection/E-learning%20modules?ln=en All info about the CERN rapid e-learning project is linked from http://twiki.cern.ch/ELearning  

  16. MacBook Pro Portable Genius

    CERN Document Server

    Miser, Brad

    2011-01-01

    Tips and techniques for forward-thinking MacBook Pro users Now that you have a MacBook Pro, you need just one more accessory, your very own copy of MacBook Pro Portable Genius, Third Edition. This handy, compact book lets you in on a wealth of tips and tricks, so you get the very most out of Apple's very popular notebook. Discover the latest on the most recent release of iLife, get the skinny on the new Intel Core i7 and i5 processors in the Pro, see how to go wireless in a smart way, and much more. The book is easy to navigate, doesn't skimp on the essentials, and helps you save time and avoi

  17. A MAC Mode for Lightweight Block Ciphers

    DEFF Research Database (Denmark)

    Luykx, Atul; Preneel, Bart; Tischhauser, Elmar Wolfgang

    2016-01-01

    Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits. Such low block sizes lead...... no effect on the security bound, allowing an order of magnitude more data to be processed per key. Furthermore, LightMAC is incredibly simple, has almost no overhead over the block cipher, and is parallelizable. As a result, LightMAC not only offers compact authentication for resource-constrained platforms...

  18. Douglas MacArthur- An Administrative Biography

    OpenAIRE

    Tehan III, William J.

    2002-01-01

    For more than a half century Douglas MacArthur was a servant of the United States. He is best remembered as a general and a soldier, especially for his leadership during World War II and the Korean War. MacArthur was also the Superintendent of West Point, Chief of Staff of the U.S. Army, Generalissimo ( Commander) of the Armed Forces and Military Advisor (Minister of Defense) to the President of the Commonwealth of the Philippines, and the Supreme Commander Allied Powers and the Military Gove...

  19. Teach yourself visually OS X Mavericks

    CERN Document Server

    McFedries, Paul

    2013-01-01

    Clear, step-by-step instruction guides you through OS X Mavericks If you want to get quickly up to speed on the newest (and now cat-free) OS X operating system, OS X Mavericks, this easy-to-follow book is just the ticket. Designed for visual learners, Teach Yourself VISUALLY OS X Mavericks uses rich, full-color screenshots and illustrations to show rather than tell you how to use Mavericks. You'll learn how to customize your Mac, enjoy digital media, connect common peripherals, and get the most out of the very latest enhancements, including iBooks, Maps, iCloud, and Calendar. Shows you how t

  20. Schematic Window Methodology Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The aim of this IRAD is to produce a generic launch window analyzer (SWM) that allows for large-scale rapid analysis of a launch window and orbit design trade space....

  1. Objective-C for Absolute Beginners iPhone and Mac Programming Made Easy

    CERN Document Server

    Bennett, Gary; Fisher, Mitchell

    2010-01-01

    It seems as if everyone is writing applications for Apple's iPhone and iPad, but how do they all do it? It's best to learn Objective-C, the native language of both the iOS and Mac OS X, but where to begin? Right here, even if you've never programmed before! Objective-C for Absolute Beginners will teach you how to write software for your Mac, iPhone,or iPad using Objective-C, an elegant and powerful language with a rich set of developer tools. Using a hands-on approach, you'll learn to think in programming terms, how to use Objective-C to build program logic, and how to write your own applicati

  2. Results from the MAC Vertex chamber

    International Nuclear Information System (INIS)

    Nelson, H.N.

    1987-05-01

    The design, construction, and performance characteristics of a high precision gaseous drift chamber made of thin walled proportional tubes are described. The device achieved an average spatial resolution of 45 μm in use for physics analysis with the MAC detector. The B-lifetime result obtained with this chamber is discussed

  3. The Big Mac Standard: A statistical Illustration

    OpenAIRE

    Yukinobu Kitamura; Hiroshi Fujiki

    2004-01-01

    We demonstrate a statistical procedure for selecting the most suitable empirical model to test an economic theory, using the example of the test for purchasing power parity based on the Big Mac Index. Our results show that supporting evidence for purchasing power parity, conditional on the Balassa-Samuelson effect, depends crucially on the selection of models, sample periods and economies used for estimations.

  4. MacIntyre, Managerialism and Universities

    Science.gov (United States)

    Stolz, Steven A.

    2017-01-01

    MacIntyre's earlier work and concern with social science enquiry not only exposes its limits, but also provides an insight into how its knowledge claims have been put to ideological use. He maintains that the institutional embodiment of these ideological ideas is the bureaucratic manager who has had a negative role to play in social structures…

  5. Florence Jessie Mac Williams (1917-1990)

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Florence Jessie Mac Williams (1917-1990). Featured Scientist Volume 10 Issue 1 January 2005 pp 98-98. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/010/01/0098-0098. Resonance ...

  6. An Interview with Peter MacDonald.

    Science.gov (United States)

    American Indian Journal, 1979

    1979-01-01

    Peter MacDonald, Chairman of the Navajo Nation, the largest tribe in the United States speaks to such issues as energy development/management, oil companies, Navajo-Hopi relocation legislation, traditionalism, and the role of the Council of Energy Resource Tribes. (RTS)

  7. Lifetime tests for MAC vertex chamber

    International Nuclear Information System (INIS)

    Nelson, H.N.

    1986-07-01

    A vertex chamber for MAC was proposed to increase precision in the measurement of the B hadron and tau lepton lifetimes. Thin-walled aluminized mylar drift tubes were used for detector elements. A study of radiation hardness was conducted under the conditions of the proposed design using different gases and different operating conditions

  8. Window Selection Tool | Efficient Windows Collaborative

    Science.gov (United States)

    Louisville LA Lake Charles LA New Orleans LA Shreveport MA Boston MD Baltimore ME Portland MI Detroit MI Window Selection Tool will take you through a series of design conditions pertaining to your design and

  9. Windows® Internals

    CERN Document Server

    Russinovich, Mark E; Ionescu, Alex

    2009-01-01

    See how the core components of the Windows operating system work behind the scenes-guided by a team of internationally renowned internals experts. Fully updated for Windows Server 2008 and Windows Vista, this classic guide delivers key architectural insights on system design, debugging, performance, and support-along with hands-on experiments to experience Windows internal behavior firsthand.Delve inside Windows architecture and internals:Understand how the core system and management mechanisms work-from the object manager to services to the registryExplore internal system data structures usin

  10. Professional Windows Embedded Compact 7

    CERN Document Server

    Phung, Samuel; Joubert, Thierry; Hall, Mike

    2011-01-01

    Learn to program an array of customized devices and solutions As a compact, highly efficient, scalable operating system, Windows Embedded Compact 7 (WEC7) is one of the best options for developing a new generation of network-enabled, media-rich, and service-oriented devices. This in-depth resource takes you through the benefits and capabilities of WEC7 so that you can start using this performance development platform today. Divided into several major sections, the book begins with an introduction and then moves on to coverage of OS design, application development, advanced application developm

  11. MACS as a tool for international inspections

    International Nuclear Information System (INIS)

    Curtiss, J.A.; Indusi, J.P.

    1995-01-01

    General acceptance of the challenge provision in the Chemical Weapons Convention has the potential for influence in other arms control areas. While most applications of the challenge inspection may be straightforward, there may be instances where access to the site by inspectors may be problematic. The MACS system described in this paper was developed to respond to these situations. Inspection and verification may be difficult when a host is unwilling,for valid reasons, to permit physical access to a site. We proposed a system of remote sensors which may be used to demonstrate compliance with Chemical Weapons Convention (CWC) challenge inspections even ff the inspector is physically excluded from a sensitive site. The system is based upon alternative-means-of-access provisions of the CWC. The Defense Nuclear Agency (DNA) funded design and construction of a system prototype, designated as MACS for Managed Access by Controlled Sensing. Features of the MACS design allow growth of the prototype into a versatile device for international monitoring of production facilities and other sites. MACS consists of instrumentation and communication equipment allowing site personnel to conduct a facility tour and perform acceptable measurements, while physically excluding the inspector from the facility. MACS consists of a base station used by the inspector, and a mobile unit used within the facility and manipulated by the facility staff. The base station and the mobile unit are at sign ed by a communication system, currently realized as a fiber optic cable. The mobile unit is equipped with television cameras and remote-reading distance-measuring equipment (DME) for use in verifying locations and dimensions. Global Positioning System receivers on the mobile unit provide both precise location and dead reckoning, suitable for tracking the mobile unit's position while within a building when satellite signals are not available

  12. Mammalian Synthetic Biology: Time for Big MACs.

    Science.gov (United States)

    Martella, Andrea; Pollard, Steven M; Dai, Junbiao; Cai, Yizhi

    2016-10-21

    The enabling technologies of synthetic biology are opening up new opportunities for engineering and enhancement of mammalian cells. This will stimulate diverse applications in many life science sectors such as regenerative medicine, development of biosensing cell lines, therapeutic protein production, and generation of new synthetic genetic regulatory circuits. Harnessing the full potential of these new engineering-based approaches requires the design and assembly of large DNA constructs-potentially up to chromosome scale-and the effective delivery of these large DNA payloads to the host cell. Random integration of large transgenes, encoding therapeutic proteins or genetic circuits into host chromosomes, has several drawbacks such as risks of insertional mutagenesis, lack of control over transgene copy-number and position-specific effects; these can compromise the intended functioning of genetic circuits. The development of a system orthogonal to the endogenous genome is therefore beneficial. Mammalian artificial chromosomes (MACs) are functional, add-on chromosomal elements, which behave as normal chromosomes-being replicating and portioned to daughter cells at each cell division. They are deployed as useful gene expression vectors as they remain independent from the host genome. MACs are maintained as a single-copy and can accommodate multiple gene expression cassettes of, in theory, unlimited DNA size (MACs up to 10 megabases have been constructed). MACs therefore enabled control over ectopic gene expression and represent an excellent platform to rapidly prototype and characterize novel synthetic gene circuits without recourse to engineering the host genome. This review describes the obstacles synthetic biologists face when working with mammalian systems and how the development of improved MACs can overcome these-particularly given the spectacular advances in DNA synthesis and assembly that are fuelling this research area.

  13. Advanced energy efficient windows

    DEFF Research Database (Denmark)

    Thomsen, Kirsten Engelund

    2007-01-01

    Windows should be paid special attention as they contribute a significant part of the total heat-loss coefficient of the building. Contrary to other parts of the thermal envelope the windows are not only heat loosers, but may gain heat in the day-time. Therefore there are possibilities for large...... energy savings. In terms of energy, windows occupy a special position compared with other thermal envelope structures due to their many functions: 1) windows let daylight into the building and provide occupants with visual contact with their surroundings 2) windows protect against the outdoor climate 3......) windows transmit solar energy that may contribute to a reduction of energy consumption, but which may also lead to unpleasant overheating. In the following paragraphs the current use of windows is reviewed with an emphasis on energy, while special products like solar protection glazing and security...

  14. The periplasmic membrane proximal domain of MacA acts as a switch in stimulation of ATP hydrolysis by MacB transporter.

    Science.gov (United States)

    Modali, Sita D; Zgurskaya, Helen I

    2011-08-01

    Escherichia coli MacAB-TolC is a tripartite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation of MacB ATPase activity. Binding of MacA to MacB stabilizes the ATP-bound conformation of MacB, whereas interactions with both MacB and TolC affect the conformation of MacA. A single G353A substitution in the C-terminus of MacA inactivates MacAB-TolC function by changing the conformation of the membrane proximal domain of MacA and disrupting the proper assembly of the MacA-MacB complex. We propose that MacA acts in transport by promoting MacB transition into the closed ATP-bound conformation and in this respect, is similar to the periplasmic solute-binding proteins. © 2011 Blackwell Publishing Ltd.

  15. Windows 7 Tweaks A Comprehensive Guide on Customizing, Increasing Performance, and Securing Microsoft Windows 7

    CERN Document Server

    Sinchak, Steve

    2009-01-01

    The definitive guide to unlocking the hidden potential of the Windows 7 OS. Written by bestselling author and the creator of tweaks.com Steve Sinchak, this unique guide provides you with the ultimate collection of hidden gems that will enable you to get the most out of Windows 7. Packed with more than 400 pages of insider tips, the book delves beneath the surface to reveal little-known ways to tweak, modify, and customize Windows 7 so you can get every ounce of performance from your operating system. Regardless of your experience with tweaking your system, you'll find fascinating and fun tips

  16. MacBook All-in-One For Dummies

    CERN Document Server

    Chambers, Mark L

    2011-01-01

    Get comfortable and confident with your MacBook! Combining the fun-but-straightforward content of nine minibooks, this new edition of MacBook All-in-One For Dummies delivers helpful coverage of the rich features and essential tools you need to know to use the MacBook to its fullest potential. You'll learn an array of MacBook basics while veteran author Mark Chambers walks you through setting up your MacBook, running programs, finding files with Finder, searching with Spotlight, keeping track with Address Book, enjoying music with iTunes, creating cool multimedia projects with iLife, and more.

  17. Modeling MAC layer for powerline communications networks

    Science.gov (United States)

    Hrasnica, Halid; Haidine, Abdelfatteh

    2001-02-01

    The usage of electrical power distribution networks for voice and data transmission, called Powerline Communications, becomes nowadays more and more attractive, particularly in the telecommunication access area. The most important reasons for that are the deregulation of the telecommunication market and a fact that the access networks are still property of former monopolistic companies. In this work, first we analyze a PLC network and system structure as well as a disturbance scenario in powerline networks. After that, we define a logical structure of the powerline MAC layer and propose the reservation MAC protocols for the usage in the PLC network which provides collision free data transmission. This makes possible better network utilization and realization of QoS guarantees which can make PLC networks competitive to other access technologies.

  18. Improved b lifetime measurement from MAC

    International Nuclear Information System (INIS)

    Ford, W.T.

    1984-03-01

    Two recent publications, from the MAC and Mark II collaborations, have reported the somewhat surprising result that the lifetime of particles made up of b quarks is in the 1 to 2 picosecond range, or somewhat longer than the lifetimes of charm particles. Although the charm decays are favored transitions while those of b particles depend upon off-diagonal elements of the weak flavor mixing matrix, the smallness of the b decay rates in face of the large available phase space indicates that the off-diagonal elements are indeed very small. The possibility for complete determination of the mixing matrix was brought significantly nearer by the availability of the lifetime information; what is needed now is to reduce the uncertainty of the measurements, which was about 33% for both experiments. We describe here an extension of the b lifetime study with the MAC detector, incorporating some new data and improvements in the analysis. 12 references

  19. Mastering Windows 7 Deployment

    CERN Document Server

    Finn, Aidan; van Surksum, Kenneth

    2011-01-01

    Get professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system admi

  20. Programming Windows Azure

    CERN Document Server

    Krishnan, Sriram

    2010-01-01

    Learn the nuts and bolts of cloud computing with Windows Azure, Microsoft's new Internet services platform. Written by a key member of the product development team, this book shows you how to build, deploy, host, and manage applications using Windows Azure's programming model and essential storage services. Chapters in Programming Windows Azure are organized to reflect the platform's buffet of services. The book's first half focuses on how to write and host application code on Windows Azure, while the second half explains all of the options you have for storing and accessing data on the plat

  1. Beginning Windows 8

    CERN Document Server

    Halsey, Mike

    2012-01-01

    Windows 8 has been described by Microsoft as its 'boldest' Windows release ever. Beginning Windows 8 takes you through the new features and helps you get more out of the familiar to reveal the possibilities for this amazing new operating system. You will learn, with non-technical language used throughout, how to get up and running in the new Windows interface, minimize downtime, maximize productivity, and harness the features you never knew existed to take control of your computer and enjoy the peace of mind and excitement that comes with it. From tips and tweaks to easy-to-follow guides and d

  2. Visualization of integrin Mac-1 in vivo.

    Science.gov (United States)

    Lim, Kihong; Hyun, Young-Min; Lambert-Emo, Kris; Topham, David J; Kim, Minsoo

    2015-11-01

    β2 integrins play critical roles in migration of immune cells and in the interaction with other cells, pathogens, and the extracellular matrix. Among the β2 integrins, Mac-1 (Macrophage antigen-1), composed of CD11b and CD18, is mainly expressed in innate immune cells and plays a major role in cell migration and trafficking. In order to image Mac-1-expressing cells both in live cells and mouse, we generated a knock-in (KI) mouse strain expressing CD11b conjugated with monomeric yellow fluorescent protein (mYFP). Expression of CD11b-mYFP protein was confirmed by Western blot and silver staining of CD11b-immunoprecipitates and total cell lysates from the mouse splenocytes. Mac-1-mediated functions of the KI neutrophils were comparable with those in WT cells. The fluorescence intensity of CD11b-mYFP was sufficient to image CD11b expressing cells in live mice using intravital two-photon microscopy. In vitro, dynamic changes in the intracellular localization of CD11b molecules could be measured by epifluorescent microscopy. Finally, CD11b-expressing immune cells from tissue were easily detected by flow cytometry without anti-CD11b antibody staining. Copyright © 2015 Elsevier B.V. All rights reserved.

  3. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  4. Color Wheel Windows

    Science.gov (United States)

    Leonard, Stephanie

    2012-01-01

    In this article, the author describes a painting and drawing lesson which was inspired by the beautiful circular windows found in cathedrals and churches (also known as "rose windows"). This two-week lesson would reinforce both the concept of symmetry and students' understanding of the color wheel. (Contains 1 online resource.)

  5. Efficient Windows Collaborative

    Energy Technology Data Exchange (ETDEWEB)

    Nils Petermann

    2010-02-28

    The project goals covered both the residential and commercial windows markets and involved a range of audiences such as window manufacturers, builders, homeowners, design professionals, utilities, and public agencies. Essential goals included: (1) Creation of 'Master Toolkits' of information that integrate diverse tools, rating systems, and incentive programs, customized for key audiences such as window manufacturers, design professionals, and utility programs. (2) Delivery of education and outreach programs to multiple audiences through conference presentations, publication of articles for builders and other industry professionals, and targeted dissemination of efficient window curricula to professionals and students. (3) Design and implementation of mechanisms to encourage and track sales of more efficient products through the existing Window Products Database as an incentive for manufacturers to improve products and participate in programs such as NFRC and ENERGY STAR. (4) Development of utility incentive programs to promote more efficient residential and commercial windows. Partnership with regional and local entities on the development of programs and customized information to move the market toward the highest performing products. An overarching project goal was to ensure that different audiences adopt and use the developed information, design and promotion tools and thus increase the market penetration of energy efficient fenestration products. In particular, a crucial success criterion was to move gas and electric utilities to increase the promotion of energy efficient windows through demand side management programs as an important step toward increasing the market share of energy efficient windows.

  6. Development of high yielding Soybean variety MACS 450 by using Kalitur mutant-MACS 111

    International Nuclear Information System (INIS)

    Raut, V.M.; Taware, S.P.; Halvankar, G.B.; Varghese, Philips

    2000-01-01

    A mutant variety -MACS 111 developed by treating seeds of indigenous black seeded 'Kalitur' variety with gamma irradiation + Ethyleneimine was used in development of high yielding varieties. MACS 450 a promising high yielding variety was selected from Bragg x MACS 111 cross by pedigree selection method. This variety gave the highest average seed yield in station trials (3422 kg/ha), coordinated breeding trials (2361 kg/ha) and varieties cum plant population trial (2215 kg/ha). On the basis of its performance in these trials it was released for commercial cultivation in Southern India. On all India basis, it also recorded the highest seed yield of 4076 kg/ha and 3582 kg/ha in Front line Demonstrations conducted on the farmers' field during 1998 and 1999 respectively. (author)

  7. Visual merchandising window display

    Directory of Open Access Journals (Sweden)

    Opris (Cas. Stanila M.

    2013-12-01

    Full Text Available Window display plays a major part in the selling strategies; it does not only include the simple display of goods, nowadays it is a form of art, also having the purpose of sustaining the brand image. This article wants to reveal the tools that are essential in creating a fabulous window display. Being a window designer is not an easy job, you have to always think ahead trends, to have a sense of colour, to know how to use light to attract customers in the store after only one glance at the window. The big store window displays are theatre scenes: with expensive backgrounds, special effects and high fashion mannequins. The final role of the displays is to convince customers to enter the store and trigger the purchasing act which is the final goal of the retail activity.

  8. Detection of Spoofed MAC Addresses in 802.11 Wireless Networks

    Science.gov (United States)

    Tao, Kai; Li, Jing; Sampalli, Srinivas

    Medium Access Control (MAC) address spoofing is considered as an important first step in a hacker's attempt to launch a variety of attacks on 802.11 wireless networks. Unfortunately, MAC address spoofing is hard to detect. Most current spoofing detection systems mainly use the sequence number (SN) tracking technique, which has drawbacks. Firstly, it may lead to an increase in the number of false positives. Secondly, such techniques cannot be used in systems with wireless cards that do not follow standard 802.11 sequence number patterns. Thirdly, attackers can forge sequence numbers, thereby causing the attacks to go undetected. We present a new architecture called WISE GUARD (Wireless Security Guard) for detection of MAC address spoofing on 802.11 wireless LANs. It integrates three detection techniques - SN tracking, Operating System (OS) fingerprinting & tracking and Received Signal Strength (RSS) fingerprinting & tracking. It also includes the fingerprinting of Access Point (AP) parameters as an extension to the OS fingerprinting for detection of AP address spoofing. We have implemented WISE GUARD on a test bed using off-the-shelf wireless devices and open source drivers. Experimental results show that the new design enhances the detection effectiveness and reduces the number of false positives in comparison with current approaches.

  9. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia; Tan, Guozhen; Yu, Chao

    2017-10-09

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  10. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Caixia Song

    2017-10-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  11. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  12. GA microwave window development

    International Nuclear Information System (INIS)

    Moeller, C.P.; Kasugai, A.; Sakamoto, K.; Takahashi, K.

    1994-10-01

    The GA prototype distributed window was tested in a 32 mm diam. waveguide system at a power density suitable for a MW gyrotron, using the JAERI/Toshiba 110 GHz long pulse internal converter gyrotron in the JAERI test stand. The presence of the untilted distributed window had no adverse effect on the gyrotron operation. A pulse length of 10 times the calculated thermal equilibrium time (1/e time) of 30 msec was reached, and the window passed at least 750 pulses greater than 30 msec and 343 pulses greater than 60 msec. Beyond 100 msec, the window calorimetry reached steady state, allowing the window dissipation to be measured in a single pulse. The measured loss of 4.0% agrees both with the estimated loss, on which the stress calculations are based, and with the attenuation measured at low power in the HE 11 mode. After the end of the tests, the window was examined; no evidence of arcing air coating was found in the part of the window directly illuminated by the microwaves, although there was discoloration in a recess containing an optical diagnostic which outgassed, causing a local discharge to occur in that recess. Finally, there was no failure of the metal-sapphire joints during a total operating time of 50 seconds consisting of pulses longer than 30 msec

  13. Superiority of CT imaging reconstruction on Linux OS

    International Nuclear Information System (INIS)

    Lin Shaochun; Yan Xufeng; Wu Tengfang; Luo Xiaomei; Cai Huasong

    2010-01-01

    Objective: To compare the speed of CT reconstruction using the Linux and Windows OS. Methods: Shepp-Logan head phantom in different pixel size was projected to obtain the sinogram by using the inverse Fourier transformation, filtered back projection and Radon transformation on both Linux and Windows OS. Results: CT image reconstruction using the Linux operating system was significantly better and more efficient than Windows. Conclusion: CT image reconstruction using the Linux operating system is more efficient. (authors)

  14. One of the First Portable Macs

    CERN Multimedia

    1989-01-01

    It was one of the first portable macs released. The Portable had many new advances in mobile computing : The display was crispy clear, and looked beautiful when used in daylight ; The Portable came with a Lead-acid gel/cell battery that could run a anywhere from 6 -12 hours ; It supported to internal hard drives, and an external one. The reaction to the laptop was weak because it was slow, it had no capacity for expansion, it weighed heavily, its price was expensive. It has been stayed 1 year and half on the market.

  15. Windows 8 simplified

    CERN Document Server

    McFedries, Paul

    2012-01-01

    The easiest way for visual learners to get started with Windows 8 The popular Simplified series makes visual learning easier than ever, and with more than 360,000 copies sold, previous Windows editions are among the bestselling Visual books. This guide goes straight to the point with easy-to-follow, two-page tutorials for each task. With full-color screen shots and step-by-step directions, it gets beginners up and running on the newest version of Windows right away. Learn to work with the new interface and improved Internet Explorer, manage files, share your computer, and much more. Perfect fo

  16. Windows 95 Beslutningsguide

    DEFF Research Database (Denmark)

    Sørensen, Jens Otto

    1996-01-01

    Mange virksomheder der bruger pc'er står netop nu over for valget: Skal vi fortsætte med DOS/Windows 3.x som operativsystem, eller skal vi skifte til efterfølgeren Windows 95? Skal vi/kan vi skifte successivt, eller skal det være en "alt eller intet beslutning". Hvornår er det rigtige tidspunkt...... at skifte? Denne artikel vil forsøge at give en baggrundsviden om Windows 95, der kan hjælpe virksomhederne igennem denne beslutningsfase....

  17. The Efficient Windows Collaborative

    Energy Technology Data Exchange (ETDEWEB)

    Petermann, Nils

    2006-03-31

    The Efficient Windows Collaborative (EWC) is a coalition of manufacturers, component suppliers, government agencies, research institutions, and others who partner to expand the market for energy efficient window products. Funded through a cooperative agreement with the U.S. Department of Energy, the EWC provides education, communication and outreach in order to transform the residential window market to 70% energy efficient products by 2005. Implementation of the EWC is managed by the Alliance to Save Energy, with support from the University of Minnesota and Lawrence Berkeley National Laboratory.

  18. Windows 7 resource kit

    CERN Document Server

    Northrup, Tony; Honeycutt, Jerry; Wilson, Ed

    2009-01-01

    In-depth and comprehensive, this RESOURCE KIT delivers the information you need to administer your Windows 7 system. You get authoritative technical guidance from those who know the technology best-Microsoft Most Valuable Professionals (MVPs) and the Windows 7 product team-along with essential scripts and resources. In addition, "Direct from the Source" sidebars offer deep insights and troubleshooting tips from the Windows 7 team. Get expert guidance on how to: Use Microsoft Deployment Toolkit best practices and tools. Plan user-state migration and test application compatibility.

  19. The periplasmic membrane proximal domain of MacA acts as a switch in stimulation of ATP hydrolysis by MacB transporter

    OpenAIRE

    Modali, Sita D.; Zgurskaya, Helen I.

    2011-01-01

    Escherichia coli MacAB-TolC is a tri-partite macrolide efflux transporter driven by hydrolysis of ATP. In this complex, MacA is the periplasmic membrane fusion protein that stimulates the activity of MacB transporter and establishes the link with the outer membrane channel TolC. The molecular mechanism by which MacA stimulates MacB remains unknown. Here, we report that the periplasmic membrane proximal domain of MacA plays a critical role in functional MacA-MacB interactions and stimulation o...

  20. Turning the Big Mac Index into the Medical MAC Index | Wilson ...

    African Journals Online (AJOL)

    Objective: The purpose of this study was to create a global medical earnings index, called the Medical MAC Index, to enable a comparison of what medical specialists earn in the countries included in the study. Design: The study gathered data on the earnings of specialist anaesthetists employed in state hospitals with five ...

  1. QL-MAC : a Q-learning based MAC for wireless sensor networks

    NARCIS (Netherlands)

    Galzarano, S.; Liotta, A.; Fortino, G.; Aversa, R.; Kolodziej, J.; Zhang, J.; Amato, F.; Fortino, G.

    2013-01-01

    WSNs are becoming an increasingly attractive technology thanks to the significant benefits they can offer to a wide range of application domains. Extending the system lifetime while preserving good network performance is one of the main challenges in WSNs. In this paper, a novel MAC protocol

  2. Fpga As A Part Of Ms Windows Control Environment

    Directory of Open Access Journals (Sweden)

    Krzysztof Kołek

    2007-01-01

    Full Text Available The attention is focused on the Windows operating system (OS used as a control and measurementenvironment. Windows OS due to extensions becomes a real-time OS (RTOS.Benefits and drawbacks of typical software extensions are compared. As far as hardwaresolutions are concerned the field programmable gate arrays FPGA technology is proposed toensure fast time-critical operations. FPGA-based parallel execution and hardware implementationof the data processing algorithms significantly outperform the classical microprocessoroperating modes. Suitability of the RTOS for a particular application and FPGA hardwaremaintenance is studied.

  3. SAF for Windows

    DEFF Research Database (Denmark)

    Hansen, Timme

    2001-01-01

    SAF for Windows er et computerprogram til parametrisk konstruktion af translationsskaller. Skaloverfladernes tredimensionelle, facetterede form fremkommer ved en kombination af to todimensionelle formbestemmende kurver, som kan vælges og redigeres af brugeren. Programmet kan udfolde de genererede...

  4. A Mobile Automated Characterization System (MACS) for indoor floor characterization

    International Nuclear Information System (INIS)

    Richardson, B.S.; Haley, D.C.; Dudar, A.M.; Ward, C.R.

    1995-01-01

    The Savannah River Technology Center (SRTC) and Oak Ridge National Laboratory are developing an advanced Mobile Automated Characterization System (MACS) to characterize indoor contaminated floors. MACS is based upon Semi-Intelligent Mobile Observing Navigator (SIMON), an earlier floor characterization system developed at SRTC. MACS will feature enhanced navigation systems, operator interface, and an interface to simplify integration of additional sensors. The enhanced navigation system will provide the capability to survey large open areas much more accurately than is now possible with SIMON, which is better suited for hallways and corridors that provide the means for recalibrating position and heading. MACS operator interface is designed to facilitate MACS's use as a tool for health physicists, thus eliminating the need for additional training in the robot's control language. Initial implementation of MACS will use radiation detectors. Additional sensors, such as PCB sensors currently being developed, will be integrated on MACS in the future. Initial use of MACS will be focused toward obtaining comparative results with manual methods. Surveys will be conducted both manually and with MACS to compare relative costs and data quality. While clear cost benefits anticipated, data quality benefits should be even more significant

  5. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  6. Delineating the conformal window

    DEFF Research Database (Denmark)

    Frandsen, Mads Toudal; Pickup, Thomas; Teper, Michael

    2011-01-01

    We identify and characterise the conformal window in gauge theories relevant for beyond the standard model building, e.g. Technicolour, using the criteria of metric confinement and causal analytic couplings, which are known to be consistent with the phase diagram of supersymmetric QCD from Seiberg...... duality. Using these criteria we find perturbation theory to be consistent throughout the predicted conformal window for several of these gauge theories and we discuss recent lattice results in the light of our findings....

  7. Thin Film & Deposition Systems (Windows)

    Data.gov (United States)

    Federal Laboratory Consortium — Coating Lab: Contains chambers for growing thin film window coatings. Plasma Applications Coating Lab: Contains chambers for growing thin film window coatings. Solar...

  8. A Unified NET-MAC-PHY Cross-layer Framework for Performance Evaluation of Multi-hop Ad hoc WLANs

    Directory of Open Access Journals (Sweden)

    Rachid El-Azouzi

    2014-09-01

    Full Text Available Most of the existing works have been evaluated the performance of 802.11 multihop networks by considering the MAC layer or network layer separately. Knowing the nature of the multi-hop ad hoc networks, many factors in different layers are crucial for study the performance of MANET. In this paper we present a new analytic model for evaluating average end-to-end throughput in IEEE 802.11e multihop wireless networks. In particular, we investigate an intricate interaction among PHY, MAC and Network layers. For instance, we incorporate carrier sense threshold, transmission power, contention window size, retransmissions retry limit, multi rates, routing protocols and network topology together. We build a general cross-layered framework to represent multi-hop ad hoc networks with asymmetric topology and asymmetric traffic. We develop an analytical model to predict throughput of each connection as well as stability of forwarding queues at intermediate nodes in saturated networks. To the best of our knowledge, it seems that our work is the first wherein general topology and asymmetric parameters setup are considered in PHY/MAC/Network layers. Performance of such a system is also evaluated through simulation. We show that performance measures of the MAC layer are affected by the traffic intensity of flows to be forwarded. More precisely, attempt rate and collision probability are dependent on traffic flows, topology and routing.

  9. High performance sapphire windows

    Science.gov (United States)

    Bates, Stephen C.; Liou, Larry

    1993-02-01

    High-quality, wide-aperture optical access is usually required for the advanced laser diagnostics that can now make a wide variety of non-intrusive measurements of combustion processes. Specially processed and mounted sapphire windows are proposed to provide this optical access to extreme environment. Through surface treatments and proper thermal stress design, single crystal sapphire can be a mechanically equivalent replacement for high strength steel. A prototype sapphire window and mounting system have been developed in a successful NASA SBIR Phase 1 project. A large and reliable increase in sapphire design strength (as much as 10x) has been achieved, and the initial specifications necessary for these gains have been defined. Failure testing of small windows has conclusively demonstrated the increased sapphire strength, indicating that a nearly flawless surface polish is the primary cause of strengthening, while an unusual mounting arrangement also significantly contributes to a larger effective strength. Phase 2 work will complete specification and demonstration of these windows, and will fabricate a set for use at NASA. The enhanced capabilities of these high performance sapphire windows will lead to many diagnostic capabilities not previously possible, as well as new applications for sapphire.

  10. Users of the main smartphone operating systems (iOS, Android) differ only little in personality.

    Science.gov (United States)

    Götz, Friedrich M; Stieger, Stefan; Reips, Ulf-Dietrich

    2017-01-01

    The increasingly widespread use of mobile phone applications (apps) as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081) and a German-speaking sample (Study 2; N = 2,438). As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five). Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows). In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1), ηp2 = .005 to .036 (Study 2), respectively) and may reflect differences in sociodemographic composition, rather than operating system of smartphone users.

  11. Steven MacCall: Winner of LJ's 2010 Teaching Award

    Science.gov (United States)

    Berry, John N., III

    2010-01-01

    This article profiles Steven L. MacCall, winner of "Library Journal's" 2010 Teaching Award. An associate professor at the School of Library and Information Studies (SLIS) at the University of Alabama, Tuscaloosa, MacCall was nominated by Kathie Popadin, known as "Kpop" to the members of her cohort in the online MLIS program at SLIS. Sixteen of…

  12. Paradox applications integration ATP's for MAC and mass balance programs

    International Nuclear Information System (INIS)

    Russell, V.K.; Mullaney, J.E.

    1994-01-01

    The K Basins Materials Accounting (MAC) and Material Balance (MBA) database system were set up to run under one common applications program. This Acceptance Test Plan (ATP) describes how the code was to be tested to verify its correctness. The scope of the tests is minimal, since both MAC and MBA have already been tested in detail as stand-alone programs

  13. Lifetime tests for MAC vertex chamber

    International Nuclear Information System (INIS)

    Nelson, H.

    1986-01-01

    A vertex chamber for MAC was proposed in fall 1983 to increase precision in the measurement of the B hadron and tau lepton lifetimes. The chamber had to be placed within the existing central drift chamber, making access for repairs difficult and costly. Therefore for detector elements thin-walled aluminized mylar drift tubes (straws) were used because of their simplicity and robustness. The diameter of the drift tubes was 6.9 mm. The radial extent of the proposed chamber was from 3 cm to 10 cm, the inner wall of the central drift. It was clear that radiation levels, from synchrotron x-rays and overfocussed electrons, were potentially high. Since the drift distance is short in the straws, it was desirable to operate them at the highest possible gas gain, to achieve the best spatial resolution. There was a likelihood of drawing large currents in the chamber and thus causing radiation damage. Therefore a study of radiation hardness under the conditions of their proposed design was undertaken. In tests, argon-hydrocarbon mixtures consistently became unusable at ∼0.05 C/cm collected charge, due to anode buildup. Argon-CO 2 mixtures, while underquenched, were operational to 0.25 C/cm, at which point loss of cathode material became intolerable. Argon-xenon-CO 2 proved to be quenched as well as argon-hydrocarbons, but was limited by cathode damage. The MAC vertex chamber has operated at a distance of 4.6 cm from the e + e - interaction point at PEP for two years and has shown no aging effects

  14. PaleoMac: A Macintosh™ application for treating paleomagnetic data and making plate reconstructions

    Science.gov (United States)

    Cogné, J. P.

    2003-01-01

    This brief note provides an overview of a new Macintosh™ application, PaleoMac, (MacOS 8.0 or later, 15Mb RAM required) which permits rapid processing of paleomagnetic data, from the demagnetization data acquired in the laboratory, to the treatment of paleomagnetic poles, plate reconstructions, finite rotation computations on a sphere, and characterization of relative plate motions. Capabilities of PaleoMac include (1) high interactivity between the user and data displayed on screen which provides a fast and easy way to handle, add and remove data or contours, perform computations on subsets of points, change projections, sizes, etc.; (2) performance of all standard principal component analysis and statistical processing on a sphere [, 1953] etc.); (3) output of high quality plots, compatible with graphic programs such as Adobe Illustrator, and output of numerical results as ASCII files. Beyond its usefulness in treating paleomagnetic data, its ability to handle plate motion computations should be of large interest to the Earth science community.

  15. Adaptive Liquid Crystal Windows

    Energy Technology Data Exchange (ETDEWEB)

    Taheri, Bahman; Bodnar, Volodymyr

    2011-12-31

    Energy consumption by private and commercial sectors in the U.S. has steadily grown over the last decade. The uncertainty in future availability of imported oil, on which the energy consumption relies strongly, resulted in a dramatic increase in the cost of energy. About 20% of this consumption are used to heat and cool houses and commercial buildings. To reduce dependence on the foreign oil and cut down emission of greenhouse gases, it is necessary to eliminate losses and reduce total energy consumption by buildings. To achieve this goal it is necessary to redefine the role of the conventional windows. At a minimum, windows should stop being a source for energy loss. Ideally, windows should become a source of energy, providing net gain to reduce energy used to heat and cool homes. It is possible to have a net energy gain from a window if its light transmission can be dynamically altered, ideally electronically without the need of operator assistance, providing optimal control of the solar gain that varies with season and climate in the U.S. In addition, the window must not require power from the building for operation. Resolution of this problem is a societal challenge and of national interest and will have a broad global impact. For this purpose, the year-round, allclimate window solution to provide an electronically variable solar heat gain coefficient (SHGC) with a wide dynamic range is needed. AlphaMicron, Inc. (AMI) developed and manufactured 1ft × 1ft prototype panels for the world’s first auto-adjusting Adaptive Liquid Crystal Windows (ALCWs) that can operate from sunlight without the need for external power source and demonstrate an electronically adjustable SHGC. This novel windows are based on AlphaMicron’s patented e-Tint® technology, a guesthost liquid crystal system implemented on flexible, optically clear plastic films. This technology is suitable both for OEM and aftermarket (retro-fitting) lamination to new and existing windows. Low level of

  16. Windows 8.1 bible

    CERN Document Server

    Boyce, Jim; Tidrow, Rob

    2014-01-01

    Windows 8.1 coverage that goes above and beyond all competitors? Serving as an evolutionary update to Windows 8, Windows 8.1 provides critical changes to parts of Windows 8, such as greater customization of the interface and boot operations, return of a 'start button' that reveals apps, greater integration between the two interfaces, and updates to apps. Weighing in at nearly 1000 pages, Windows 8.1 Bible provides deeper Windows insight than any other book on the market. It's valuable for both professionals needing a guide to the nooks and crannies of Windows and regular users wanting a wide

  17. Windows Azure Platform

    CERN Document Server

    Redkar, Tejaswi

    2010-01-01

    The Azure Services Platform is a brand-new cloud-computing technology from Microsoft. It is composed of four core components-Windows Azure, .NET Services, SQL Services, and Live Services-each with a unique role in the functioning of your cloud service. It is the goal of this book to show you how to use these components, both separately and together, to build flawless cloud services. At its heart Windows Azure Platform is a down-to-earth, code-centric book. This book aims to show you precisely how the components are employed and to demonstrate the techniques and best practices you need to know

  18. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  19. Microsoft Windows networking essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

  20. Control de torrentes en la cuenca hidrográfica del río Rímac

    OpenAIRE

    Ministerio de Agricultura. Dirección General de Aguas, Suelos e Irrigaciones

    1983-01-01

    Determina los principales factores (naturales o antrópicos) que influyen en la presencia de fenómenos geodinámicos en las principales microcuencas torrenciales del río Rímac. Además, resalta el impacto multisectorial de los daños ocasionados por los fenómenos de avalancha ("huaycos") y formula alternativas de control de las microcuencas torrenciales mediante el estudio sistemático de dos áreas representativas.

  1. GENETIC FINGERPRINTING OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS ISOLATED FROM HOSPITAL PATIENTS AND THE ENVIRONMENT

    Science.gov (United States)

    A particularly pathogenic group of mycobacteria belong to the Mycobacterium avium complex (MAC), which includes M. avium and M. intracellulare. MAC organisms cause disease in children, the elderly, and immuno-compromised individuals. A critical step in preventing MAC infections...

  2. Exploring Shop Window Displays

    Science.gov (United States)

    Christopoulou, Martha

    2011-01-01

    Using visual resources from everyday life in art lessons can enrich students' knowledge about the creation of visual images, artifacts, and sites, and develop their critical understanding about the cultural impact of these images and their effects on people's lives. Through examining an exhibition in the windows of Selfridges department store in…

  3. Windows and lighting program

    Energy Technology Data Exchange (ETDEWEB)

    1990-06-01

    More than 30% of all energy use in buildings is attributable to two sources: windows and lighting. Together they account for annual consumer energy expenditures of more than $50 billion. Each affects not only energy use by other major building systems, but also comfort and productivity -- factors that influence building economics far more than does direct energy consumption alone. Windows play a unique role in the building envelope, physically separating the conditioned space from the world outside without sacrificing vital visual contact. Throughout the indoor environment, lighting systems facilitate a variety of tasks associated with a wide range of visual requirements while defining the luminous qualities of the indoor environment. Windows and lighting are thus essential components of any comprehensive building science program. Despite important achievements in reducing building energy consumption over the past decade, significant additional savings are still possible. These will come from two complementary strategies: (1) improve building designs so that they effectively apply existing technologies and extend the market penetration of these technologies; and (2) develop advanced technologies that increase the savings potential of each application. Both the Windows and Daylighting Group and the Lighting System Research Group have made substantial contributions in each of these areas, and continue to do so through the ongoing research summarized here. 23 refs., 16 figs.

  4. Lower HVAC Costs | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  5. Increased Light & View | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  6. Condensation Resistance (CR) | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  7. Fact Sheets & Publications | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  8. State Fact Sheets | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  9. State Code Guides | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  10. Low Conductance Spacers | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  11. National Fenestration Rating Council (NFRC) | Efficient Windows

    Science.gov (United States)

    Collaborative Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring

  12. Energy & Cost Savings | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  13. Provide Natural Light | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  14. Provide Fresh Air | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  15. Air Leakage (AL) | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  16. Increased NMDA receptor inhibition at an increased Sevoflurane MAC

    Directory of Open Access Journals (Sweden)

    Brosnan Robert J

    2012-06-01

    Full Text Available Abstract Background Sevoflurane potently enhances glycine receptor currents and more modestly decreases NMDA receptor currents, each of which may contribute to immobility. This modest NMDA receptor antagonism by sevoflurane at a minimum alveolar concentration (MAC could be reciprocally related to large potentiation of other inhibitory ion channels. If so, then reduced glycine receptor potency should increase NMDA receptor antagonism by sevoflurane at MAC. Methods Indwelling lumbar subarachnoid catheters were surgically placed in 14 anesthetized rats. Rats were anesthetized with sevoflurane the next day, and a pre-infusion sevoflurane MAC was measured in duplicate using a tail clamp method. Artificial CSF (aCSF containing either 0 or 4 mg/mL strychnine was then infused intrathecally at 4 μL/min, and the post-infusion baseline sevoflurane MAC was measured. Finally, aCSF containing strychnine (either 0 or 4 mg/mL plus 0.4 mg/mL dizocilpine (MK-801 was administered intrathecally at 4 μL/min, and the post-dizocilpine sevoflurane MAC was measured. Results Pre-infusion sevoflurane MAC was 2.26%. Intrathecal aCSF alone did not affect MAC, but intrathecal strychnine significantly increased sevoflurane requirement. Addition of dizocilpine significantly decreased MAC in all rats, but this decrease was two times larger in rats without intrathecal strychnine compared to rats with intrathecal strychnine, a statistically significant (P  Conclusions Glycine receptor antagonism increases NMDA receptor antagonism by sevoflurane at MAC. The magnitude of anesthetic effects on a given ion channel may therefore depend on the magnitude of its effects on other receptors that modulate neuronal excitability.

  17. iMac G3 Blueberry 350MHz

    CERN Multimedia

    2000-01-01

    The iMac G3 is an all-in-one personal computer, encompassing both the monitor and the computer in one package. It allowed to revitalize the Apple brand that was in decline and close to financial ruin. Originally released in striking bondi blue and later a range of other translucent plastic envelopes in bright colors. The iMac comes with a keyboard and mouse matching the color of the case. The iMac G3 was sold from 1998 to 2003 and has been updated many times.

  18. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  19. Thermal bridges of modern windows

    DEFF Research Database (Denmark)

    Hansen, Ernst Jan de Place; Møller, Eva B.; Nielsen, Anker

    2013-01-01

    if the window has an U-factor of 1 W/(m2·K) or lower. This paper describes the development of modern, energy efficient Danish windows with reduced thermal bridges. It focuses on materials, geometry, and sealing of window panes based on a literature review. Examples of modern windows are presented. Experience...... been an important driver for the development of new window solutions in Denmark, increasing the inner-surface temperature at the sealing of window panes. However, it will not stop complaints fromconsumers, as this temperature is calculated under standardized conditions. Increasing requirements...

  20. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    International Nuclear Information System (INIS)

    Zacharias, Sven; Newe, Thomas

    2011-01-01

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  1. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    Energy Technology Data Exchange (ETDEWEB)

    Zacharias, Sven; Newe, Thomas, E-mail: Sven.Zacharias@ul.ie [University of Limerick (Ireland)

    2011-08-17

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  2. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    Science.gov (United States)

    Zacharias, Sven; Newe, Thomas

    2011-08-01

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  3. Occupants' window opening behaviour

    DEFF Research Database (Denmark)

    Fabi, Valentina; Andersen, Rune Korsholm; Corgnati, Stefano

    2012-01-01

    Energy consumption in buildings is influenced by several factors related to the building properties and the building controls, some of them highly connected to the behaviour of their occupants.In this paper, a definition of items referring to occupant behaviour related to the building control...... systems is proposed, based on studies presented in literature and a general process leading to the effects on energy consumptions is identified.Existing studies on the topic of window opening behaviour are highlighted and a theoretical framework to deal with occupants' interactions with building controls......, aimed at improving or maintaining the preferred indoor environmental conditions, is elaborated. This approach is used to look into the drivers for the actions taken by the occupants (windows opening and closing) and to investigate the existing models in literature of these actions for both residential...

  4. MAC mini acceptance test procedure, software Version 3.0

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) programs had some major improvements made to it to organize the main-tables by Location, Canister, and Material. This ATP describes how the code was to be tested to verify its correctness

  5. Mechatronical Aided Concept (MAC) in Intelligent Transport Vehicles Design

    OpenAIRE

    Pavel Pavlasek

    2003-01-01

    This article deals with the principles of synergy effect of mechatronical aided concept (MAC) to the design of intelligent transport vehicles products applying CA technologies and virtual reality design methods. Also includes presentation of intelligent railway vehicle development.

  6. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  7. Nora Tully MacAlvay--Her Life in the Theatre.

    Science.gov (United States)

    Webb, Dorothy

    1996-01-01

    Recounts the life and times of a pioneer children's theater playwright and fiction author, Nora Tully MacAlvay (1900-86). Points out that her interest in children's theater and children's literature was lifelong and intense. (PA)

  8. MacMillan Pier Transportation Center Feasibility Study.

    Science.gov (United States)

    2006-06-01

    The MacMillan Pier Transportation Center Feasibility Study examines two potential sites (landside and waterside) for a transportation center that provides a range of tourist and traveler information. It would serve as a gateway for Provincetown and t...

  9. After MacIntyre : Kaasaegsest vooruseetikast / Meego Remmel

    Index Scriptorium Estoniae

    Remmel, Meego

    2006-01-01

    Alasdair MacIntyre panus 20. sajandi eetikasse. Tema käsitlus vooruseetikast ja vooruseetilisest perspektiivist, mida on võimalik näha komplekselt, vaadeldes voorust, praktikat, narratiivi ja traditsiooni mõisteid

  10. Big Mac arvestab raha ostujõudu / Harli Uljas

    Index Scriptorium Estoniae

    Uljas, Harli

    2005-01-01

    The Economist võrdleb maailma valuutade suhestamiseks Big Mac'i burgeri hindu 120 riigis, kuna see meetod võimaldab saada ülevaate riikide elanikkonna tegelikust ostujõust. Tabel: Hamburgeri standard

  11. Aeronautical Mobile Airport Communications System (AeroMACS)

    Science.gov (United States)

    Budinger, James M.; Hall, Edward

    2011-01-01

    To help increase the capacity and efficiency of the nation s airports, a secure wideband wireless communications system is proposed for use on the airport surface. This paper provides an overview of the research and development process for the Aeronautical Mobile Airport Communications System (AeroMACS). AeroMACS is based on a specific commercial profile of the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standard known as Wireless Worldwide Interoperability for Microwave Access or WiMAX (WiMax Forum). The paper includes background on the need for global interoperability in air/ground data communications, describes potential AeroMACS applications, addresses allocated frequency spectrum constraints, summarizes the international standardization process, and provides findings and recommendations from the world s first AeroMACS prototype implemented in Cleveland, Ohio, USA.

  12. Review of World of Money CD-ROM for PC/Mac [CD-ROM

    Directory of Open Access Journals (Sweden)

    Philip de Jersey

    1998-12-01

    Full Text Available Following on from the impressive development of the new HSBC Money Gallery in 1997, the British Museum has launched into the world of electronic publishing with the World of Money, an "interactive exploration of money worldwide from ancient times to the present day". Intended for ages ten to adult, the CD promises "a mine of information about the use, form, history and importance of money around the globe", and "fun and information for all the family". Reviewing in a Mac-unfriendly environment, I have been able to run the CD only on a PC. On a 166Mhz MMX with 32Mb RAM and a 12x CD it runs impressively quickly, with no more than two or three seconds of the "loading new page" display when switching between different parts of the program. Minimum requirements are listed as a 486 with 8Mb RAM, 40Mb free hard disk space, Windows 3.11 or Windows 95, 4x CD drive, 1Mb 256 colours graphics card, 16-bit Sound Blaster compatible sound card, and a VGA monitor. Minimum requirements for the Mac are listed as System 7, 603e processor, 16Mb RAM, 40MB free hard disk space, 6x CD drive, 1Mb video card and Apple monitor or Multisync with adaptor. The CD opens with an image of the British Museum portico, through which we are taken into the foyer, complete with the sound effects of massed ranks of tourists. We have four options available on a lectern, or by turning left, right or going upstairs: History of Money, Information Centre, Activities, and Options. Clicking on a large question mark brings up the Help screens (Figure 1.

  13. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  14. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  15. Windows Home Server users guide

    CERN Document Server

    Edney, Andrew

    2008-01-01

    Windows Home Server brings the idea of centralized storage, backup and computer management out of the enterprise and into the home. Windows Home Server is built for people with multiple computers at home and helps to synchronize them, keep them updated, stream media between them, and back them up centrally. Built on a similar foundation as the Microsoft server operating products, it's essentially Small Business Server for the home.This book details how to install, configure, and use Windows Home Server and explains how to connect to and manage different clients such as Windows XP, Windows Vist

  16. Teach yourself visually Windows 10

    CERN Document Server

    McFedries, Paul

    2015-01-01

    Learn Windows 10 visually with step-by-step instructions Teach Yourself VISUALLY Windows 10 is the visual learner's guide to the latest Windows upgrade. Completely updated to cover all the latest features, this book walks you step-by-step through over 150 essential Windows tasks. Using full color screen shots and clear instruction, you'll learn your way around the interface, set up user accounts, play media files, download photos from your camera, go online, set up email, and much more. You'll even learn how to customize Windows 10 to suit the way you work best, troubleshoot and repair common

  17. Windows Terminal Servers Orchestration

    Science.gov (United States)

    Bukowiec, Sebastian; Gaspar, Ricardo; Smith, Tim

    2017-10-01

    Windows Terminal Servers provide application gateways for various parts of the CERN accelerator complex, used by hundreds of CERN users every day. The combination of new tools such as Puppet, HAProxy and Microsoft System Center suite enable automation of provisioning workflows to provide a terminal server infrastructure that can scale up and down in an automated manner. The orchestration does not only reduce the time and effort necessary to deploy new instances, but also facilitates operations such as patching, analysis and recreation of compromised nodes as well as catering for workload peaks.

  18. Invariant sets for Windows

    CERN Document Server

    Morozov, Albert D; Dragunov, Timothy N; Malysheva, Olga V

    1999-01-01

    This book deals with the visualization and exploration of invariant sets (fractals, strange attractors, resonance structures, patterns etc.) for various kinds of nonlinear dynamical systems. The authors have created a special Windows 95 application called WInSet, which allows one to visualize the invariant sets. A WInSet installation disk is enclosed with the book.The book consists of two parts. Part I contains a description of WInSet and a list of the built-in invariant sets which can be plotted using the program. This part is intended for a wide audience with interests ranging from dynamical

  19. Windows Azure Platform

    CERN Document Server

    Redkar, Tejaswi

    2011-01-01

    The Windows Azure Platform has rapidly established itself as one of the most sophisticated cloud computing platforms available. With Microsoft working to continually update their product and keep it at the cutting edge, the future looks bright - if you have the skills to harness it. In particular, new features such as remote desktop access, dynamic content caching and secure content delivery using SSL make the latest version of Azure a more powerful solution than ever before. It's widely agreed that cloud computing has produced a paradigm shift in traditional architectural concepts by providin

  20. Windows Azure web sites

    CERN Document Server

    Chambers, James

    2013-01-01

    A no-nonsense guide to maintaining websites in Windows Azure If you're looking for a straightforward, practical guide to get Azure websites up and running, then this is the book for you. This to-the-point guide provides you with the tools you need to move and maintain a website in the cloud. You'll discover the features that most affect developers and learn how they can be leveraged to work to your advantage. Accompanying projects enhance your learning experience and help you to walk away with a thorough understanding of Azure's supported technologies, site deployment, and manageme

  1. Handbook on Windows and Energy

    DEFF Research Database (Denmark)

    Thomsen, Kirsten Engelund; Schultz, Jørgen Munthe; Svendsen, Sv Aa Højgaard

    The handbook on windows and energy is a general description of windows with the main focus put on the energy performance. Common window products are described by commonly used nomenclature, description of frame and sash conctructions and description of commonly used glazing types.The energy...... transmission through windows is described in detail including radiation, convection and conduction as well as solar transmittance of window glazing. The most used terms related to characterization of window energy performance are defined and calculation methods according to international standards...... flow and detailed calculation of light and solar transmittance is given.Different measurement techniques for characterization of window heat loss coefficient and total solar energy transmittance is described and references to interantional standards are given.Finally, the handbook includes...

  2. Windows with improved energy performances

    DEFF Research Database (Denmark)

    Laustsen, Jacob Birck; Svendsen, Svend

    2003-01-01

    Heat loss through windows represents a considerable part of the total heat loss from houses. However, apart from providing daylight access and view, windows offer a unique potential for solar gain to be exploited during the heating season. Until now valuation of the energy performance of windows...... has primary focused on the heat loss coefficient, U-value. However, as the U-value, especially for the glazing part, has improved considerably during the last years, the total solar energy transmittance, g-value, has become equally important to the total energy performance of windows. Improved energy...... resulted in a window with a positive net energy gain (in short the Net Gain Window), which means that it contributes to the space heating of the building. All improvements are based on existing technology and manufacturing methods. The results from this work show that the energy performances of windows can...

  3. Plan maestro del proyecto de restauración del río Rímac: informe final

    OpenAIRE

    Autoridad Nacional del Agua; K-water. Korea Water Resources Corporation; Yooshin Engineering; Pyunghwa Engineering Consultants

    2015-01-01

    Presenta un documento elaborado en el marco de cooperación entre Corea del Sur y el Perú, en el cual se proponen diversas medidas y planes para recuperar el río Rímac utilizando como modelo las experiencias de la República de Corea en proyectos de recuperación de ríos y otras prácticas de gestión de los recursos hídricos. Este Plan Maestro para la recuperación del río Rímac tiene componentes sobre el mejoramiento de la calidad de agua, el desarrollo de los recursos hídricos de la zona y el me...

  4. Windows on the axion

    International Nuclear Information System (INIS)

    Turner, M.S.

    1989-04-01

    Peccei-Quinn symmetry with attendant axion is a most compelling, and perhaps the most minimal, extension of the standard model, as it provides a very elegant solution to the nagging strong CP-problem associated with the Θ vacuum structure of QCD. However, particle physics gives little guidance as to the axion mass; a priori, the plausible values span the range: 10/sup /minus/12/ eV /approx lt/ m/sub a/ /approx lt/ 10 6 eV, some 18 orders-of-magnitude. Axions have a host of interesting astrophysical and cosmological effects, including, modifying the evolution of stars of all types (our sun, red giants, white dwarfs, and neutron stars), contributing significantly to the mass density of the Universe today, and producing detectable line radiation through the decays of relic axions. Consideration of these effects has probed 14 orders-of-magnitude in axion mass, and has left open only two windows for further exploration: 10/sup /minus/6/ eV /approx lt/ m/sub a/ /approx lt/ 10/sup /minus/3/ eV and 1 eV /approx lt/ m/sub a/ /approx lt/ 5 eV (hadronic axions only). Both these windows are accessible to experiment, and a variety of very interesting experiments, all of which involve ''heavenly axions,'' are being planned or are underway. 58 refs., 6 figs., 1 tab

  5. WINDOW-CLEANING

    CERN Multimedia

    Environmental Section / ST-TFM

    2001-01-01

    The two-month window-cleaning session on the Meyrin, Prévessin and LEP sites will soon begin. The cleaning contractors will work from Monday to Saturday, every week from 4.00 a.m. to 8.00 p.m. The work will be organised so as to disturb users as little as possible. In any event, a work notice will be left in each office 24 hours beforehand. To prevent any damage to documents or items which could occur despite the precautions taken, please clear completely the window-sills and the area immediately around them. If, however, for valid reasons, the work cannot be done on the scheduled day, please inform the Environmental Section by telephoning: 73753 / 74233 / 72242 If you are going to be absent during this two-month period, we should be grateful if you would clear the above mentioned areas before your departure. REMINDER To allow more thorough cleaning of the entrance doors to buildings and also facilitate the weekly work of the cleaning contractors, we ask you to make use of the notice boards at the...

  6. Working with Windows 7 at CERN (EN)

    CERN Multimedia

    CERN. Geneva

    2010-01-01

    Overview of new concepts and user interface changes in Windows 7 as compared with older versions of Windows: XP or Vista. Availability of Windows 7 at CERN and its integration with CERN Windows infrastructure will be discussed.

  7. Victor Bérard et la Macédoine

    Directory of Open Access Journals (Sweden)

    Ivan Savev

    2011-01-01

    Full Text Available Un helléniste convaincu, Victor Bérard, en vient, au début du XXe siècle à soutenir l’existence de « Macédoniens » et le slogan « la Macédoine aux Macédoniens”.Le Congrès de Berlin en 1878 avait laissé la Macédoine aux mains des Ottomans. La Grèce, la Serbie et la Bulgarie, parvenues à ses limites et prévoyant le retrait futur des Ottomans peaufinent les arguments linguistiques et historiques qui justifieront leurs revendications territoriales. Victor Bérard, un helléniste respecté et bon connaisseur de la région sud balkanique, effectue des enquêtes en Macédoine en 1896 et 1903 qu’il publie à Paris.Cette étude montre comment, dans le contexte de la propagande nationaliste des prétendants à la possession de la Macédoine, Victor Bérard en vient progressivement à affirmer qu’il existe une population autochtone, les Macédoniens. Il soutient leur programme pour la constitution d’une fédération ou confédération avec le slogan « la Macédoine aux Macédoniens » ce qui fait toute l’actualité de ses ouvrages.In 1878, the Congress of Berlin had left Macedonia in the hands of the Ottomans. Greece, Serbia and Bulgaria had reached its limits. Anticipating the Ottoman retreat, they polish language and historical arguments that will justify their territorial claims. Victor Bérard, a respected Hellenist and a good expert of the southern Balkans, is doing researches in Macedonia in 1896 and 1903. These will be later published in Paris.This study shows how, in the context of the nationalist propaganda build-up made by the candidates for the possession of Macedonia, Victor Bérard comes progressively to assert the existence of a native population: the Macedonians. He supports their program for the forming of a federation or confederation which slogan would be “Macedonia to Macedonians”. This makes his works very topical.

  8. Design and FPGA implementation for MAC layer of Ethernet PON

    Science.gov (United States)

    Zhu, Zengxi; Lin, Rujian; Chen, Jian; Ye, Jiajun; Chen, Xinqiao

    2004-04-01

    Ethernet passive optical network (EPON), which represents the convergence of low-cost, high-bandwidth and supporting multiple services, appears to be one of the best candidates for the next-generation access network. The work of standardizing EPON as a solution for access network is still underway in the IEEE802.3ah Ethernet in the first mile (EFM) task force. The final release is expected in 2004. Up to now, there has been no standard application specific integrated circuit (ASIC) chip available which fulfills the functions of media access control (MAC) layer of EPON. The MAC layer in EPON system has many functions, such as point-to-point emulation (P2PE), Ethernet MAC functionality, multi-point control protocol (MPCP), network operation, administration and maintenance (OAM) and link security. To implement those functions mentioned above, an embedded real-time operating system (RTOS) and a flexible programmable logic device (PLD) with an embedded processor are used. The software and hardware functions in MAC layer are realized through programming embedded microprocessor and field programmable gate array(FPGA). Finally, some experimental results are given in this paper. The method stated here can provide a valuable reference for developing EPON MAC layer ASIC.

  9. Alterações de linguagem em pacientes idosos portadores de demência avaliados com a Bateria MAC Language alterations in elderly patients with dementia assessed with the MAC Battery

    Directory of Open Access Journals (Sweden)

    Cristine Koehler

    2012-03-01

    Full Text Available OBJETIVO: Identificar as alterações de linguagem em um grupo de pacientes idosos portadores de demência nas tarefas de evocação lexical livre, com critério ortográfico e com critério semântico, interpretação de metáforas e discurso narrativo da Bateria Montreal de Avaliação da Comunicação - Bateria MAC, bem como, verificar a frequência de déficits. MÉTODOS: Participaram do estudo 13 pacientes com demência de grau leve a moderada, atendidos no Setor de Neurologia do Ambulatório de Distúrbios do Movimento e Demências do Hospital Santa Clara da Irmandade Santa Casa de Misericórdia de Porto Alegre (ISCMPA. O instrumento neuropsicológico de avaliação foi a Bateria MAC e a aplicação das tarefas seguiu a seguinte ordem: evocação lexical livre, evocação lexical com critério ortográfico, evocação lexical com critério semântico, interpretação de metáforas e discurso narrativo. RESULTADOS: O grupo de pacientes com demência apresentou desempenho deficitário em todas as tarefas da Bateria MAC que foram avaliadas, com diferença significativa. Além disso, os participantes apresentaram maior frequência de déficits, em ordem decrescente, nas tarefas de reconto parcial do discurso narrativo (informações essenciais e presentes, seguidas pelas tarefas de evocação lexical com critério ortográfico e com critério semântico, e reconto integral do discurso narrativo. Pelo menos dois pacientes apresentaram alterações de desempenho em alguma das cinco tarefas realizadas da Bateria MAC. CONCLUSÃO: A avaliação de linguagem através da Bateria MAC permitiu a verificação de alterações do processamento linguístico em idosos com demência, o que caracteriza que tal instrumento também é aplicável para esta população clínica.PURPOSE: To identify language deficits in a group of elderly patients with dementia in tasks of free lexical retrieval, lexical retrieval with orthographic and semantic criteria

  10. Window observers for linear systems

    Directory of Open Access Journals (Sweden)

    Utkin Vadim

    2000-01-01

    Full Text Available Given a linear system x ˙ = A x + B u with output y = C x and a window function ω ( t , i.e., ∀ t , ω ( t ∈ {0,1 }, and assuming that the window function is Lebesgue measurable, we refer to the following observer, x ˆ = A x + B u + ω ( t L C ( x − x ˆ as a window observer. The stability issue is treated in this paper. It is proven that for linear time-invariant systems, the window observer can be stabilized by an appropriate design under a very mild condition on the window functions, albeit for linear time-varying system, some regularity of the window functions is required to achieve observer designs with the asymptotic stability. The corresponding design methods are developed. An example is included to illustrate the possible applications

  11. Dolphin natures, human virtues: MacIntyre and ethical naturalism.

    Science.gov (United States)

    Glackin, Shane Nicholas

    2008-09-01

    Can biological facts explain human morality? Aristotelian 'virtue' ethics has traditionally assumed so. In recent years Alasdair MacIntyre has reintroduced a form of Aristotle's 'metaphysical biology' into his ethics. He argues that the ethological study of dependence and rationality in other species--dolphins in particular--sheds light on how those same traits in the typical lives of humans give rise to the moral virtues. However, some goal-oriented dolphin behaviour appears both dependent and rational in the precise manner which impresses MacIntyre, yet anything but ethically 'virtuous'. More damningly, dolphin ethologists consistently refuse to evaluate such behaviour in the manner MacIntyre claims is appropriate to moral judgement. In light of this, I argue that virtues--insofar as they name a biological or ethological category--do not name a morally significant one.

  12. Office for iPad and Mac for dummies

    CERN Document Server

    Weverka, Peter

    2015-01-01

    The easy way to work with Office on your iPad or Mac Are you a Mac user who isn't accustomed to working with Microsoft Office? Consider this friendly guide your go-to reference! Written in plain English and packed with easy-to-follow, step-by-step instructions, Office for iPad and Mac For Dummies walks you through every facet of Office, from installing the software and opening files to working with Word, Excel, PowerPoint, and Outlook-and beyond. Plus, you'll discover how to manage files, share content and collaborate online through social media, and find help when you need it. Two things a

  13. Performance analysis and improvement of WPAN MAC for home networks.

    Science.gov (United States)

    Mehta, Saurabh; Kwak, Kyung Sup

    2010-01-01

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking.

  14. Performance Analysis and Improvement of WPAN MAC for Home Networks

    Directory of Open Access Journals (Sweden)

    Saurabh Mehta

    2010-03-01

    Full Text Available The wireless personal area network (WPAN is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3 MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking.

  15. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  16. Windows 7 the definitive guide

    CERN Document Server

    Stanek, William R

    2010-01-01

    This book provides everything you need to manage and maintain Windows 7. You'll learn all of the features and enhancements in complete detail, along with specifics for configuring the operating system to put you in full control. Bestselling author and Windows expert William Stanek doesn't just show you the steps you need to follow, he also tells you how features work, why they work, and how you can customize them to meet your needs. Learn how to squeeze every bit of power out of Windows 7 to take full advantage of its features and programs. Set up, customize, and tune Windows 7-Optimize its

  17. Windows 7 The Missing Manual

    CERN Document Server

    Pogue, David

    2010-01-01

    In early reviews, geeks raved about Windows 7. But if you're an ordinary mortal, learning what this new system is all about will be challenging. Fear not: David Pogue's Windows 7: The Missing Manual comes to the rescue. Like its predecessors, this book illuminates its subject with reader-friendly insight, plenty of wit, and hardnosed objectivity for beginners as well as veteran PC users. Windows 7 fixes many of Vista's most painful shortcomings. It's speedier, has fewer intrusive and nagging screens, and is more compatible with peripherals. Plus, Windows 7 introduces a slew of new features,

  18. Beginning Windows 8.1

    CERN Document Server

    Halsey, Mike

    2013-01-01

    Windows 8 has been described by Microsoft as its 'boldest' Windows release ever and the 8.1 update enhances the paradigm further. Beginning Windows 8.1 takes you through the new features and helps you get more out of the familiar to reveal the fullest possibilities for this amazing new operating system. You will learn, with non-technical language used throughout, how to get up and running in the new Windows interface, minimize downtime, maximize productivity, and harness the features you never knew existed to take control of your computer and enjoy the peace of mind and excitement that comes w

  19. Live histograms in moving windows

    International Nuclear Information System (INIS)

    Zhil'tsov, V.E.

    1989-01-01

    Application of computer graphics for specific hardware testing is discussed. The hardware is position sensitive detector (multiwire proportional chamber) which is used in high energy physics experiments, and real-out electronics for it. Testing program is described (XPERT), which utilises multi-window user interface. Data are represented as histograms in windows. The windows on the screen may be moved, reordered, their sizes may be changed. Histograms may be put to any window, and hardcopy may be made. Some program internals are discussed. The computer environment is quite simple: MS-DOS IBM PC/XT, 256 KB RAM, CGA, 5.25'' FD, Epson MX. 4 refs.; 7 figs

  20. SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid.

    Science.gov (United States)

    Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin

    2016-03-31

    The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid.

  1. Vehicle Health Management Communications Requirements for AeroMACS

    Science.gov (United States)

    Kerczewski, Robert J.; Clements, Donna J.; Apaza, Rafael D.

    2012-01-01

    As the development of standards for the aeronautical mobile airport communications system (AeroMACS) progresses, the process of identifying and quantifying appropriate uses for the system is progressing. In addition to defining important elements of AeroMACS standards, indentifying the systems uses impacts AeroMACS bandwidth requirements. Although an initial 59 MHz spectrum allocation for AeroMACS was established in 2007, the allocation may be inadequate; studies have indicated that 100 MHz or more of spectrum may be required to support airport surface communications. Hence additional spectrum allocations have been proposed. Vehicle health management (VHM) systems, which can produce large volumes of vehicle health data, were not considered in the original bandwidth requirements analyses, and are therefore of interest in supporting proposals for additional AeroMACS spectrum. VHM systems are an emerging development in air vehicle safety, and preliminary estimates of the amount of data that will be produced and transmitted off an aircraft, both in flight and on the ground, have been prepared based on estimates of data produced by on-board vehicle health sensors and initial concepts of data processing approaches. This allowed an initial estimate of VHM data transmission requirements for the airport surface. More recently, vehicle-level systems designed to process and analyze VHM data and draw conclusions on the current state of vehicle health have been undergoing testing and evaluation. These systems make use of vehicle system data that is mostly different from VHM data considered previously for airport surface transmission, and produce processed system outputs that will be also need to be archived, thus generating additional data load for AeroMACS. This paper provides an analysis of airport surface data transmission requirements resulting from the vehicle level reasoning systems, within the context of overall VHM data requirements.

  2. Mini-mac - escala de ajustamento mental para o câncer: estrutura fatorial Mini-mac - the mental adjustment to cancer scale: factorial structure

    Directory of Open Access Journals (Sweden)

    Rita de Cássia Gandini

    2008-03-01

    Full Text Available Trata-se de estudo da estrutura fatorial da escala Mini-MAC, que mede o ajustamento mental dos pacientes ao câncer. Após análise semântica, a escala foi aplicada em 283 pacientes de um hospital universitário com diferentes tipos e estádios da doença que possuíam idade média de 54 anos. Confirmada a fatorabilidade da amostra (KMO = 0,88, os dados foram submetidos à análise dos componentes principais, rotação oblíqua, dada a interdependência entre os fatores. Foram mantidos sete fatores com valores próprios maiores que 1,0. Apenas dois fatores possuíam índices de fidedignidade satisfatórios ("Preocupação Ansiógena" com "Alpha de Cronbach" de 0,87 e "Desamparo/Desesperança" com "Alpha" de 0,74, reunindo 13 itens com cargas fatoriais maiores ou iguais a 0,40 e explicavam 30% da variância total. Os resultados revelaram a boa qualidade psicométrica do instrumento. As diferenças entre a estrutura fatorial do instrumento original e a deste estudo podem ser atribuídas às diferenças culturais e educacionais entre as amostras.Se trata de estudio de la estructura factorial de la escala Mini-MAC, que mide el ajuste mental de los pacientes al cáncer. Tras el análisis semántico, la escala fue aplicada en 283 pacientes de un hospital universitario con distintos tipos y estadios de la enfermedad - pacientes esos, que poseían edad media de 54 años. Confirmada la factorabilidad de la muestra (KMO = 0,88, los datos fueron sometidos al análisis de los componentes principales, rotación oblicua, dada a la interdependencia entre los factores. Fueron mantenidos siete factores con valores propios mayores que 1,0. Sólo dos factores poseían índices de fidedignidad satisfactorios ("Preocupación Ansiogénica" con "Alpha de Cronbach" de 0,87 y "Desamparo/Desesperanza" con "Alpha" de 0,74, reuniendo 13 ítemes con cargas factoriales mayores o iguales a 0,40 y explicaban 30% de la varianza total. Los resultados revelaron la buena calidad

  3. Mapping of MAC Address with Moving WiFi Scanner

    Directory of Open Access Journals (Sweden)

    Arief Hidayat

    2017-10-01

    Full Text Available Recently, Wifi is one of the most useful technologies that can be used for detecting and counting MAC Address. This paper described using of WiFi scanner which carried out seven times circulated the bus. The method used WiFi and GPS are to counting MAC address as raw data from the pedestrian smartphone, bus passenger or WiFi devices near from the bus as long as the bus going around the route. There are seven processes to make map WiFi data.

  4. MacVEE - the intimate Macintosh-VME system

    International Nuclear Information System (INIS)

    Taylor, B.G.

    1986-01-01

    The marriage of a mass-produced personal computer with the versatile VMEbus and CAMAC systems creates a cost-effective solution to many laboratory small system requirements. This paper describes MacVEE (Microcomputer Applied to the Control of VME Electronic Equipment), a novel system in which an Apple Macintosh computer is equipped with a special interface which allows it direct memory-mapped access to single or multiple VME and CAMAC crates interconnected by a ribbon cable bus. The bus is driven by an electronics plinth called MacPlinth, which attaches to the computer and becomes an integral part of it. (Auth.)

  5. MacIntyre's Moral Theory and Moral Relativism

    OpenAIRE

    Ali Abedi Renani

    2017-01-01

    In this paper, I seek to explain the similarity and disparity between MacIntyre’s moral theory and moral relativism. I will argue that MacIntyre’s moral theory can escape the charge of moral relativism because both his earlier social and his later metaphysical approaches appeal to some criteria, the human telos or universal human qualities respectively. The notion of telos is wider than the notion of function which is defined in social contexts. If there is a context-transcending notion of te...

  6. Windows forensic analysis toolkit advanced analysis techniques for Windows 7

    CERN Document Server

    Carvey, Harlan

    2012-01-01

    Now in its third edition, Harlan Carvey has updated "Windows Forensic Analysis Toolkit" to cover Windows 7 systems. The primary focus of this edition is on analyzing Windows 7 systems and on processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. The author presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. New to this edition, the companion and toolkit materials are now hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements "Windows Forensic Analysis Toolkit, 2nd Edition", (ISBN: 9781597494229), which focuses primarily on XP. It includes complete coverage and examples on Windows 7 systems. It contains Lessons from the Field, Case Studies, and War Stories. It features companion online material, including electronic printable checklists, cheat sheets, free custom tools, ...

  7. Learning Windows Azure Mobile Services for Windows 8 and Windows Phone 8

    CERN Document Server

    Webber-Cross, Geoff

    2014-01-01

    This book is based around a case study game which was written for the book. This means that the chapters progress in a logical way and build upon lessons learned as we go. Real-world examples are provided for each topic that are practical and not given out-of-context so they can be applied directly to other applications.If you are a developer who wishes to build Windows 8 and Phone 8 applications and integrate them with Windows Azure Mobile Services, this book is for you. Basic C# and JavaScript skills are advantageous, as well as some knowledge of building Windows 8 or Windows Phone 8 applica

  8. MacMS: A Mass Spectrometer Simulator: Abstract of Issue 9906M

    Science.gov (United States)

    Bigger, Stephen W.; Craig, Robert A.

    1999-10-01

    MacMS is a program for Mac-OS compatible computers that simulates a magnetic sector mass spectrometer (1-4) designed to operate in the mass-to-charge (m/z) ratio range of 1-200 amu. MacMS has two operational modules. The first module (see Figure 1) is called the "Path" module and enables the user to quantitatively examine the trajectory of an ion of given m/z ratio in the electric and magnetic fields of the simulated "instrument". By systematically measuring a series of trajectories of different ions under different electric and magnetic field conditions, the user can determine how the resolution of the "instrument" is affected by these experimentally variable parameters. The user can thus choose suitable instrumental conditions for scanning a given m/z ratio range with good separation between the peaks. The second module (see Figure 2) is called as the "Spectrometer" module and enables the user to record, under any chosen instrumental conditions, the mass spectrum of (i) the instrumental background, (ii) neon, (iii) methane, or (iv) the parent ion of carbon tetrachloride. Both voltage scanning and magnetic scanning are possible (5). A hard copy of any mass spectrum that has been recorded can also be obtained. MacMS can read ASCII data files containing mass spectral information of compounds other than those that are "built-in" to the simulator. The appropriate format for creating such data files is described in the program documentation. There are a number of instructional exercises that can be conducted using the mass spectral information contained within the simulator. These are included in the program documentation. For example, the intensities of the 20Ne+, 21Ne+, and 22Ne+ species can be determined from hard copies of mass spectra of neon that are obtained under different instrumental sensitivities. The relative abundances of the three isotopes of neon can thus be calculated and compared with the literature values (6). The simulator also includes adjustable

  9. Rootkit pro MS Windows

    OpenAIRE

    Trutman, Michal

    2012-01-01

    Tato bakalářská práce se zabývá metodami útoků na operační systém MS Windows a přibližuje techniky skrývání výpočetních prostředků používané existujícími rootkity. Práce je rozdělena na teoretickou a praktickou část. První část pojednává o klasifikaci rootkitů, představuje strukturu jádra systému a následně popisuje jednotlivé techniky napadení operačního systému. V praktické části je prezentována implementace a testování vlastního rootkitu. This bachelor's thesis deals with methods of att...

  10. Destiny's Earth Observation Window

    Science.gov (United States)

    2002-01-01

    Astronaut Michael J. Bloomfield, STS-110 mission commander, looks through the Earth observation window in the Destiny laboratory aboard the International Space Station (ISS). The STS-110 mission prepared the ISS for future spacewalks by installing and outfitting the S0 (S-zero) truss and the Mobile Transporter. The 43-foot-long S0 Truss, weighing in at 27,000 pounds, was the first of 9 segments that will make up the Station's external framework that will eventually stretch 356 feet (109 meters), or approximately the length of a football field. This central truss segment also includes a flatcar called the Mobile Transporter and rails that will become the first 'space railroad,' which will allow the Station's robotic arm to travel up and down the finished truss for future assembly and maintenance. The completed truss structure will hold solar arrays and radiators to provide power and cooling for additional international research laboratories from Japan and Europe that will be attached to the Station. Milestones of the STS-110 mission included the first time the ISS robotic arm was used to maneuver spacewalkers around the Station and marked the first time all spacewalks were based out of the Station's Quest Airlock. It was also the first Shuttle to use three Block II Main Engines. The Space Shuttle Orbiter Atlantis, STS-110 mission, was launched April 8, 2002 and returned to Earth April 19, 2002.

  11. Window prototypes during the project

    DEFF Research Database (Denmark)

    Schultz, Jørgen Munthe

    1996-01-01

    The conditions for the PASSYS test and the results of the measurements on one of the aerogel window prototypes are described.......The conditions for the PASSYS test and the results of the measurements on one of the aerogel window prototypes are described....

  12. Improved Windows for Cold Climates

    DEFF Research Database (Denmark)

    Laustsen, Jacob Birck; Svendsen, Svend

    2005-01-01

    considerably by reducing the frame width, which results in a larger transparent area causing a larger solar gain but still main-taining a low thermal transmittance. Using three layers of glass with large gaps, using very slim frame profiles, and omitting the edge constructions that normally causes thermal...... windows with improved energy performance. Traditionally evaluation of the energy performance of windows has focused on the thermal transmittance, but as windows differ from the rest of the building envelope by allowing solar energy to enter the building, the total solar energy transmittance is equally...... important. In the heating season in cold climates the solar gain through windows can be utilized for space heating which results in a corresponding reduction in the energy production that is often based on fossil fuels. A suitable quantity for evaluating the energy performance of windows in a simple...

  13. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  14. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  15. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  16. Traffic Adaptive MAC Protocols in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Farhan Masud

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable by nature is referred to as high-load traffic. This paper offers a thematic review of traffic adaptive Medium Access Control (MAC protocols in WBANs. First, we have categorized them based on their goals, methods, and metrics of evaluation. The Zigbee standard IEEE 802.15.4 and the baseline MAC IEEE 802.15.6 are also reviewed in terms of traffic adaptive approaches. Furthermore, a comparative analysis of the protocols is made and their performances are analyzed in terms of delay, packet delivery ratio (PDR, and energy consumption. The literature shows that no review work has been done on traffic adaptive MAC protocols in WBANs. This review work, therefore, could add enhancement to traffic adaptive MAC protocols and will stimulate a better way of solving the traffic adaptivity problem.

  17. God, Sport Philosophy, Kinesiology: A MacIntyrean Examination

    Science.gov (United States)

    Twietmeyer, Gregg

    2015-01-01

    Sport philosophy is in crisis. This subdiscipline of kinesiology garners little to no respect and few tenure track lines in kinesiology departments. Why is this the case? Why isn't philosophy held in greater esteem? Is it possible that philosopher Alasdair MacIntyre's (2009) diagnosis found in "God, Philosophy, Universities" could…

  18. Florence Jessie MacWilliams (1917-1990)

    Indian Academy of Sciences (India)

    famous mathematician Oscar Zariski, well known for his work in algebraic geometry, at. Johns Hopkins University, following him to Harvard University to study with him for a year. There was a break in her studies for many years following her marriage in 1941 to. W al ter Mac Williams, an engineer, and the birth and raising of ...

  19. Evaluation of the MacDonald scabbler for highway use.

    Science.gov (United States)

    1975-01-01

    The MacDonald Scabbler is a small, hand held machine suitable for use in cleaning and roughening concrete surfaces, It weighs 308 pounds (140 kg), has 11 cutting heads, and, as a power source, requires a compressor capable of delivering 365 cubic foo...

  20. Increasing the permeability of Escherichia coli using MAC13243

    DEFF Research Database (Denmark)

    Muheim, Claudio; Götzke, Hansjörg; Eriksson, Anna U.

    2017-01-01

    molecules that make the outer membrane of Escherichia coli more permeable. We identified MAC13243, an inhibitor of the periplasmic chaperone LolA that traffics lipoproteins from the inner to the outer membrane. We observed that cells were (1) more permeable to the fluorescent probe 1-N...

  1. Mechatronical Aided Concept (MAC in Intelligent Transport Vehicles Design

    Directory of Open Access Journals (Sweden)

    Pavel Pavlasek

    2003-01-01

    Full Text Available This article deals with the principles of synergy effect of mechatronical aided concept (MAC to the design of intelligent transport vehicles products applying CA technologies and virtual reality design methods. Also includes presentation of intelligent railway vehicle development.

  2. MAC mini acceptance test procedures, software Version 3.3

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) programs had some improvements made to it to to change slightly the access authorized users had to the modification of critical data. This ATP describes how the code was to be tested to verify its correctness

  3. Users of the main smartphone operating systems (iOS, Android differ only little in personality.

    Directory of Open Access Journals (Sweden)

    Friedrich M Götz

    Full Text Available The increasingly widespread use of mobile phone applications (apps as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081 and a German-speaking sample (Study 2; N = 2,438. As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five. Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows. In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1, ηp2 = .005 to .036 (Study 2, respectively and may reflect differences in sociodemographic composition, rather than operating system of smartphone users.

  4. Users of the main smartphone operating systems (iOS, Android) differ only little in personality

    Science.gov (United States)

    Stieger, Stefan; Reips, Ulf-Dietrich

    2017-01-01

    The increasingly widespread use of mobile phone applications (apps) as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081) and a German-speaking sample (Study 2; N = 2,438). As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five). Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows). In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1), ηp2 = .005 to .036 (Study 2), respectively) and may reflect differences in sociodemographic composition, rather than operating system of smartphone users. PMID:28467473

  5. Tokamak physics experiment: Diagnostic windows study

    International Nuclear Information System (INIS)

    Merrigan, M.; Wurden, G.A.

    1995-11-01

    We detail the study of diagnostic windows and window thermal stress remediation in the long-pulse, high-power Tokamak Physics Experiment (TPX) operation. The operating environment of the TPX diagnostic windows is reviewed, thermal loads on the windows estimated, and cooling requirements for the windows considered. Applicable window-cooling technology from other fields is reviewed and its application to the TPX windows considered. Methods for TPX window thermal conditioning are recommended, with some discussion of potential implementation problems provided. Recommendations for further research and development work to ensure performance of windows in the TPX system are presented

  6. TR-MAC: an energy-efficient MAC protocol for wireless sensor networks exploiting noise-based transmitted reference modulation

    NARCIS (Netherlands)

    Morshed, S.; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Energy-constrained behavior of sensor nodes is one of the most important criteria for successful deployment of wireless sensor net- works. The medium access control (MAC) protocol determines the time a sensor node transceiver spends listening or transmitting, and hence the energy consumption of the

  7. Transparent solar cell window module

    Energy Technology Data Exchange (ETDEWEB)

    Chau, Joseph Lik Hang; Chen, Ruei-Tang; Hwang, Gan-Lin; Tsai, Ping-Yuan [Nanopowder and Thin Film Technology Center, ITRI South, Industrial Technology Research Institute, Tainan County 709 (China); Lin, Chien-Chu [I-Lai Acrylic Corporation, Tainan City (China)

    2010-03-15

    A transparent solar cell window module based on the integration of traditional silicon solar cells and organic-inorganic nanocomposite material was designed and fabricated. The transparent solar cell window module was composed of a nanocomposite light-guide plate and traditional silicon solar cells. The preparation of the nanocomposite light-guide plate is easy without modification of the traditional casting process, the nanoparticles sol can be added directly to the polymethyl methacrylate (PMMA) monomer syrup during the process. The solar energy collected by this window can be used to power up small household electrical appliances. (author)

  8. Big Book of Windows Hacks

    CERN Document Server

    Gralla, Preston

    2008-01-01

    Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB key, or hack the "unhackable" screensavers, you'll find quick and ingenious ways to bend these recalcitrant operating systems to your will. The Big Book of Windows Hacks focuses on Vista, the new bad boy on Microsoft's block, with hacks and workarounds that

  9. Production management of window handles

    Directory of Open Access Journals (Sweden)

    Manuela Ingaldi

    2014-12-01

    Full Text Available In the chapter a company involved in the production of aluminum window and door handles was presented. The main customers of the company are primarily companies which produce PCV joinery and wholesalers supplying these companies. One chosen product from the research company - a single-arm pin-lift window handle - was described and its production process depicted technologically. The chapter also includes SWOT analysis conducted in the research company and the value stream of the single-arm pin-lift window handle.

  10. Windows 8 visual quick tips

    CERN Document Server

    McFedries, Paul

    2012-01-01

    Easy-in, easy-out format covers all the bells and whistles of Windows 8 If you want to learn how to work smarter and faster in Microsoft's Windows 8 operating system, this easy-to-use, compact guide delivers the goods. Designed for visual learners, it features short explanations and full-color screen shots on almost every page, and it's packed with timesaving tips and helpful productivity tricks. From enhancing performance and managing digital content to setting up security and much more, this handy guide will help you get more out of Windows 8. Uses full-color screen shots and short, step-by-

  11. Windows Phone 7 Made Simple

    CERN Document Server

    Trautschold, Martin

    2011-01-01

    With Windows Phone 7, Microsoft has created a completely new smartphone operating system that focuses on allowing users to be productive with their smartphone in new ways, while offering seamless integration and use of Microsoft Office Mobile as well as other productivity apps available in the Microsoft App Store. Windows Phone 7 Made Simple offers a clear, visual, step-by-step approach to using your Windows Phone 7 smartphone, no matter what the manufacturer. Author Jon Westfall is an expert in mobile devices, recognized by Microsoft as a "Most Valuable Professional" with experience

  12. Holography through optically active windows

    Science.gov (United States)

    Decker, A. J.

    1979-01-01

    By using two orthogonally polarized reference beams, holograms can be recorded through stressed windows and the reconstructed virtual image will show no stress pattern. As shown analytically, the stress-pattern-free hologram is recordable for any polarization state of the object illumination. Hence, the more efficient nondepolarizing diffuser can be used in performing holography through stressed windows if two reference beams are used. Results are presented for a pair of machined polysulfone windows intended for use in a holographic flow-visualization setup in a single-stage-compressor test rig.

  13. Grab Windows training opportunities; check CERN Windows roadmap!

    CERN Multimedia

    IT Department

    2011-01-01

    CERN Operating Systems and Information Services group (IT-OIS) actively monitors market trends to check how new software products correspond to CERN needs. In the Windows world, Windows 7 has been a big hit, with over 1500 Windows 7 PCs within less than a year since its support was introduced at CERN. No wonder: Windows XP is nearly 10 years old and is steadily approaching the end of its life-cycle. At CERN, support for Windows XP will stop at the end of December 2012. Compared to Vista, Windows 7 has the same basic hardware requirements, but offers higher performance, so the decision to upgrade is rather straightforward. CERN support for Vista will end in June 2011. In the world of Microsoft Office, version 2007 offers better integration with the central services than the older version 2003. Progressive upgrade from 2003 to 2007 is planned to finish in September 2011, but users are encouraged to pro-actively upgrade at their convenience. Please note that Office 2007 brings an important change in the area of ...

  14. Library Signage: Applications for the Apple Macintosh and MacPaint.

    Science.gov (United States)

    Diskin, Jill A.; FitzGerald, Patricia

    1984-01-01

    Describes specific applications of the Macintosh computer at Carnegie-Mellon University Libraries, where MacPaint was used as a flexible, easy to use, and powerful tool to produce informational, instructional, and promotional signage. Profiles of system hardware and software, an evaluation of the computer program MacPaint, and MacPaint signage…

  15. Design of an autonomous decentralized MAC protocol for wireless sensor networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Dal Pont, L.; Havinga, Paul J.M.

    In this document the design of a MAC protocol for wireless sensor networks is discussed. The autonomous decentralized TDMA based MAC protocol minimizes power consumtion by efficiency implementing unicast/omnicast, scheduled rendezvous times and wakeup calls. The MAC protocol is an ongoing research

  16. Teaching a Classic for All Ages: Fairy Tales and Stories of George MacDonald.

    Science.gov (United States)

    Sadler, Glenn Edward

    1995-01-01

    Discusses the life and writings of George MacDonald (1824-1905). Suggests that the most striking feature of MacDonald's children's books is his sensitivity toward spiritual values and the power of change within the lives of his characters. Appends a list of questions to stimulate student response to MacDonald's writings. (RS)

  17. Peliohjelmointi Windows Phone 8:lle

    OpenAIRE

    Bäckström, Toni

    2014-01-01

    Tässä insinöörityössä tutustutaan Windows Phone 8 -mobiilikäyttöjärjestelmään peliohjelmoijan näkökulmasta. Työn tavoitteena oli erityisesti esitellä Microsoftin itse kehittämiä XNA- ja DirectX-peliohjelmointikirjastoja teoriassa ja käytännössä. Työn aluksi käydään läpi hieman Windows Phonen historiaa ja yleisesti kehittämistä Windows Phone 8:lle. Tämän jälkeen luodaan katsaus Windows Phone 8:aan pelialustana. Työn suurin osuus on XNA:n ja DirectX:n esittely teoriassa; kummastakin men...

  18. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad; Hassan, Mohammad; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-01-01

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC, a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS de...

  19. A window on urban sustainability

    International Nuclear Information System (INIS)

    Stigt, Rien van; Driessen, Peter P.J.; Spit, Tejo J.M.

    2013-01-01

    Sustainable urban development requires the integration of environmental interests in urban planning. Although various methods of environmental assessment have been developed, plan outcomes are often disappointing due to the complex nature of decision-making in urban planning, which takes place in multiple arenas within multiple policy networks involving diverse stakeholders. We argue that the concept of ‘decision windows’ can structure this seemingly chaotic chain of interrelated decisions. First, explicitly considering the dynamics of the decision-making process, we further conceptualized decision windows as moments in an intricate web of substantively connected deliberative processes where issues are reframed within a decision-making arena, and interests may be linked within and across arenas. Adopting this perspective in two case studies, we then explored how decision windows arise, which factors determine their effectiveness and how their occurrence can be influenced so as to arrive at more sustainable solutions. We conclude that the integration of environmental interests in urban planning is highly dependent on the ability of the professionals involved to recognize and manipulate decision windows. Finally, we explore how decision windows may be opened. -- Highlights: • Decision-making about sustainable urban development occurs in networks. • The concept of ‘decision windows’ was further elaborated. • Decision windows help understand how environmental interests enter decision-making. • Decision windows can, to some extent, be influenced

  20. A window on urban sustainability

    Energy Technology Data Exchange (ETDEWEB)

    Stigt, Rien van, E-mail: rien.vanstigt@hu.nl [Research Center for Technology and Innovation, Utrecht University of Applied Sciences, P.O. Box 182, 3500 AD Utrecht (Netherlands); Driessen, Peter P.J., E-mail: p.driessen@uu.nl [Copernicus Institute of Sustainable Development, Faculty of Geosciences, Utrecht University, P.O. Box 80.115, 3508 TC Utrecht (Netherlands); Spit, Tejo J.M., E-mail: T.J.M.Spit@uu.nl [Department of Human Geography and Spatial Planning, Faculty of Geosciences, Utrecht University, P.O. Box 80.115, 3508 TC Utrecht (Netherlands)

    2013-09-15

    Sustainable urban development requires the integration of environmental interests in urban planning. Although various methods of environmental assessment have been developed, plan outcomes are often disappointing due to the complex nature of decision-making in urban planning, which takes place in multiple arenas within multiple policy networks involving diverse stakeholders. We argue that the concept of ‘decision windows’ can structure this seemingly chaotic chain of interrelated decisions. First, explicitly considering the dynamics of the decision-making process, we further conceptualized decision windows as moments in an intricate web of substantively connected deliberative processes where issues are reframed within a decision-making arena, and interests may be linked within and across arenas. Adopting this perspective in two case studies, we then explored how decision windows arise, which factors determine their effectiveness and how their occurrence can be influenced so as to arrive at more sustainable solutions. We conclude that the integration of environmental interests in urban planning is highly dependent on the ability of the professionals involved to recognize and manipulate decision windows. Finally, we explore how decision windows may be opened. -- Highlights: • Decision-making about sustainable urban development occurs in networks. • The concept of ‘decision windows’ was further elaborated. • Decision windows help understand how environmental interests enter decision-making. • Decision windows can, to some extent, be influenced.

  1. Una lectura interpretativa de Tras la virtud, de Alasdair MacIntyre - An Interpretive Reading of After Virtue, by Alasdair MacIntyre

    Directory of Open Access Journals (Sweden)

    Fernando Fernández-Llebrez

    2010-12-01

    Full Text Available This article centers on the thought of Alasdair MacIntyre, whose most prominente work, After Virtue, is considered a classic of political science. In contrast with other reviews, this article will examine After Virtue within the broader context of MacIntyre’s thinking and publications. An overview of MacIntyre’s literary corpus and the evolution of his thinking will shed light on the volume examined and trace certain ideas that are characteristic of this Scottish political philosopher. Matters that remained unsettled in After Virtue have become over time more defined in MacIntyre’s thinking, such as the influence exerted upon him by Thomas Aquinas.

  2. Mastering Microsoft Windows Server 2008 R2

    CERN Document Server

    Minasi, Mark; Finn, Aidan

    2010-01-01

    The one book you absolutely need to get up and running with Windows Server 2008 R2. One of the world's leading Windows authorities and top-selling author Mark Minasi explores every nook and cranny of the latest version of Microsoft's flagship network operating system, Windows Server 2008 R2, giving you the most in-depth coverage in any book on the market.: Focuses on Windows Windows Server 2008 R2, the newest version of Microsoft's Windows' server line of operating system, and the ideal server for new Windows 7 clients; Author Mark Minasi is one of the world's leading Windows authorities and h

  3. Dynamic Contention Window Control Scheme in IEEE 802.11e EDCA-Based Wireless LANs

    Science.gov (United States)

    Abeysekera, B. A. Hirantha Sithira; Matsuda, Takahiro; Takine, Tetsuya

    In the IEEE 802.11 MAC protocol, access points (APs) are given the same priority as wireless terminals in terms of acquiring the wireless link, even though they aggregate several downlink flows. This feature leads to a serious throughput degradation of downlink flows, compared with uplink flows. In this paper, we propose a dynamic contention window control scheme for the IEEE 802.11e EDCA-based wireless LANs, in order to achieve fairness between uplink and downlink TCP flows while guaranteeing QoS requirements for real-time traffic. The proposed scheme first determines the minimum contention window size in the best-effort access category at APs, based on the number of TCP flows. It then determines the minimum and maximum contention window sizes in higher priority access categories, such as voice and video, so as to guarantee QoS requirements for these real-time traffic. Note that the proposed scheme does not require any modification to the MAC protocol at wireless terminals. Through simulation experiments, we show the effectiveness of the proposed scheme.

  4. Affordability of cataract surgery using the Big Mac prices

    OpenAIRE

    Van C. Lansingh; Marissa J. Carter; Kristen A. Eckert; Kevin L. Winthrop; João M. Furtado; Serge Resnikoff

    2015-01-01

    Purpose: One barrier to cataract surgery is its high price in some countries. This study aims to understand to what extent the price of cataract surgery is over- or undervalued and whether it varies in relation to GDP using The Economist newspaper Big Mac Index (BMcI) methodology, which measures the purchasing power parity between different currencies. Methods: Peer-reviewed articles containing information on cataract surgery prices were searched from 1993 to June 2012 in databases. Ophtha...

  5. ITER management advisory committee (MAC) meeting in Naka

    International Nuclear Information System (INIS)

    Yoshikawa, M.

    2000-01-01

    The ITER Management Advisory Committee (MAC) Meeting was held on 28 June 2000 in Moskow, Russia. The main topics were the consideration of the report by the director on the ITER EDA status, the review of the work program, the review of the joint fund, the review of a schedule of ITER meetings and initial discussion and consideration on the disposition of R and D hardware and facilities and other dispositions relating to the termination of the EDA

  6. Detomidine reduces isoflurane anesthetic requirement (MAC) in horses.

    Science.gov (United States)

    Steffey, Eugene P; Pascoe, Peter J

    2002-10-01

    To quantitate the dose- and time-related magnitude of the anesthetic sparing effect of, and selected physiological responses to detomidine during isoflurane anesthesia in horses. Randomized cross-over study. Three, healthy, young adult horses weighing 485 ± 14 kg. Horses were anesthetized on two occasions to determine the minimum alveolar concentration (MAC) of isoflurane in O 2 and then to measure the anesthetic sparing effect (time-related MAC reduction) following IV detomidine (0.03 and 0.06 mg kg -1 ). Selected common measures of cardiopulmonary function, blood glucose and urinary output were also recorded. Isoflurane MAC was 1.44 ± 0.07% (mean ± SEM). This was reduced by 42.8 ± 5.4% and 44.8 ± 3.0% at 83 ± 23 and 125 ± 36 minutes, respectively, following 0.03 and 0.06 mg kg -1 , detomidine. The MAC reduction was detomidine dose- and time-dependent. There was a tendency for mild cardiovascular and respiratory depression, especially following the higher detomidine dose. Detomidine increased both blood glucose and urine flow; the magnitude of these changes was time- and dose-dependent CONCLUSIONS: Detomidine reduces anesthetic requirement for isoflurane and increases blood glucose concentration and urine flow in horses. These changes were dose- and time-related. The results imply potent anesthetic sparing actions by detomidine. The detomidine-related increased urine flow should be considered in designing anesthetic protocols for individual horses. Copyright © 2002 Association of Veterinary Anaesthetists and American College of Veterinary Anesthesia and Analgesia. Published by Elsevier Ltd. All rights reserved.

  7. Performance of MAC protocols in beaconing Mobile Adhoc Multibroadcast Networks

    OpenAIRE

    Rico García, Cristina; Lehner, Andreas; Robertson, Patrick; Strang, Thomas

    2010-01-01

    The investigation of infrastructureless safety applications in dierent transportation systems is a hot research topic. The nodes in thevnetwork are designed to advertise to the rest of the nodes informationabout the current traffic situation by means of short beacon messages containing speed, direction, positions and other relevant safety information. The scheduling should be organized by the MAC layer so that the transmitted messages arrive successfully as soon as possible at the recei...

  8. LHC@home online tutorial for Mac users - recording

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    A step-by-step online tutorial about LHC@home for Mac users by Alexandre Racine. It contains detailed instructions on how-to-join this volunteer computing project.  There are 3 screen capture videos with the real installation process accelerated attached to the event page. This 5' video is linked from http://lhcathome.web.cern.ch/join-us Also from the CDS e-learning category.

  9. MacWilliams Identity for M-Spotty Weight Enumerator

    Science.gov (United States)

    Suzuki, Kazuyoshi; Fujiwara, Eiji

    M-spotty byte error control codes are very effective for correcting/detecting errors in semiconductor memory systems that employ recent high-density RAM chips with wide I/O data (e.g., 8, 16, or 32bits). In this case, the width of the I/O data is one byte. A spotty byte error is defined as random t-bit errors within a byte of length b bits, where 1 le t ≤ b. Then, an error is called an m-spotty byte error if at least one spotty byte error is present in a byte. M-spotty byte error control codes are characterized by the m-spotty distance, which includes the Hamming distance as a special case for t =1 or t = b. The MacWilliams identity provides the relationship between the weight distribution of a code and that of its dual code. The present paper presents the MacWilliams identity for the m-spotty weight enumerator of m-spotty byte error control codes. In addition, the present paper clarifies that the indicated identity includes the MacWilliams identity for the Hamming weight enumerator as a special case.

  10. Mafai e Scipione: a Scuola Romana di Pittura no MAC-USP

    Directory of Open Access Journals (Sweden)

    Benjamim Saviani

    2012-01-01

    Full Text Available Estudo crítico sobre obras de dois pintores italianos, Mario Mafai e Gino Bonichi (dito Scipione, pertencentes à Scuola Romana di Pittura, presentes no Museu de Arte Contemporânea da Universidade de São Paulo (MAC-USP: Rapaz e Natureza-morta (Mafai e Oceano Indiano (Scipione integram o primeiro acervo do atual museu, e são advindas da antiga coleção do Museu de Arte Moderna de São Paulo (MAM-SP, formada por Ciccillo Matarazzo. Além de estudo iconográfico das obras em si, vem adjunto um estudo sobre sua relação com os acervos de arte moderna paulistanos, em formação em meados do século XX, de forte relação com a arte moderna italiana e os projetos político-culturais de ítalo-descendentes presentes em São Paulo, traço marcante do cenário cultural da cidade.

  11. With Unix under the hood, the Mac has a toehold in the geophysical sector

    Energy Technology Data Exchange (ETDEWEB)

    Roche, P.

    2004-05-01

    A new lease on life in the geophysical sector is predicted for Apple Computer as result of the company's decision first to convert to the Unix System, and then to develop a new operating system called OS X (O-S-Ten) which runs under a version of Unix called Free BSD. While Apple shows no indication of interest to market its hardware and software to the oil industry, at least one oil company, Houston-based Seitel Inc., is using Apple products for its high performance computing and technical desktop applications, such as storing its onshore and offshore 3-D seismic data on Apple's Xserve RAID rack storage system. In another application, Virginia Polytechnic Institute built a supercomputer using 1,100 64-bit G5 Power Macs. The result is the third fastest super-computer in the world, running at a blazing 10.28 teraflops, or 10.28 trillion calculations per second. By all accounts, it is well suited to oilpatch tasks such as seismic data processing and running large-scale simulations such as fluid flow through porous media. Seitel is also interested in Apple's 64-bit G5 computers to run its seismic data processing operations which require large amounts of computing power. While Apple's hardware and software appear to be well adopted to perform oilpatch tasks, proliferation of use of Apple products by oilpatch companies is hindered by the almost complete absence of oilpatch software. Parallel Geoscience Corporation which had long been interested in creating Mac-based software for geoscience applications, is in the process of filling that gap by refocusing its attention on an O-S-Ten version of its Seismic Precessing Workshop{sup T}M{sup (}SPW). How long it will take to make the conversion will depend on customer demand. 2 figs.

  12. Switchable Materials for Smart Windows.

    Science.gov (United States)

    Wang, Yang; Runnerstrom, Evan L; Milliron, Delia J

    2016-06-07

    This article reviews the basic principles of and recent developments in electrochromic, photochromic, and thermochromic materials for applications in smart windows. Compared with current static windows, smart windows can dynamically modulate the transmittance of solar irradiation based on weather conditions and personal preferences, thus simultaneously improving building energy efficiency and indoor human comfort. Although some smart windows are commercially available, their widespread implementation has not yet been realized. Recent advances in nanostructured materials provide new opportunities for next-generation smart window technology owing to their unique structure-property relations. Nanomaterials can provide enhanced coloration efficiency, faster switching kinetics, and longer lifetime. In addition, their compatibility with solution processing enables low-cost and high-throughput fabrication. This review also discusses the importance of dual-band modulation of visible and near-infrared (NIR) light, as nearly 50% of solar energy lies in the NIR region. Some latest results show that solution-processable nanostructured systems can selectively modulate the NIR light without affecting the visible transmittance, thus reducing energy consumption by air conditioning, heating, and artificial lighting.

  13. Travailler avec Windows 7 au CERN (FR)

    CERN Multimedia

    CERN. Geneva

    2010-01-01

    Vue d'ensemble des nouveaux concepts et des changements dans l'interface utilisateur survenus dans Windows 7 depuis les versions antérieures de Windows (XP ou Vista). La mise à disposition de Windows 7 au CERN et son intégration dans l’infrastructure de Windows au CERN seront présentées.

  14. Music@Microsoft.Windows: Composing Ambience

    Science.gov (United States)

    Rickert, Thomas

    2010-01-01

    It is well known, of course, that all Windows versions except for 3.1 have a brief (four to six second) piece of music indicating that Windows is booted and ready for use. While the music may indicate Windows has booted, it bears no immediately discernable relation to the various uses we might actually put Windows to--working, gaming,…

  15. Windows Server 2012 R2 administrator cookbook

    CERN Document Server

    Krause, Jordan

    2015-01-01

    This book is intended for system administrators and IT professionals with experience in Windows Server 2008 or Windows Server 2012 environments who are looking to acquire the skills and knowledge necessary to manage and maintain the core infrastructure required for a Windows Server 2012 and Windows Server 2012 R2 environment.

  16. MacA, a periplasmic membrane fusion protein of the macrolide transporter MacAB-TolC, binds lipopolysaccharide core specifically and with high affinity.

    Science.gov (United States)

    Lu, Shuo; Zgurskaya, Helen I

    2013-11-01

    The Escherichia coli MacAB-TolC transporter has been implicated in efflux of macrolide antibiotics and secretion of enterotoxin STII. In this study, we found that purified MacA, a periplasmic membrane fusion protein, contains one tightly bound rough core lipopolysaccharide (R-LPS) molecule per MacA molecule. R-LPS was bound specifically to MacA protein with affinity exceeding that of polymyxin B. Sequence analyses showed that MacA contains two high-density clusters of positively charged amino acid residues located in the cytoplasmic N-terminal domain and the periplasmic C-terminal domain. Substitutions in the C-terminal cluster reducing the positive-charge density completely abolished binding of R-LPS. At the same time, these substitutions significantly reduced the functionality of MacA in the protection of E. coli against macrolides in vivo and in the in vitro MacB ATPase stimulation assays. Taken together, our results suggest that R-LPS or a similar glycolipid is a physiological substrate of MacAB-TolC.

  17. Windows with improved energy performance

    DEFF Research Database (Denmark)

    Noyé, Peter Anders; Laustsen, Jacob Birck; Svendsen, Svend

    2002-01-01

    According to the Danish energy protocol, Energy 21, one of the goals with highest priority is to reduce the CO2-emission. Energy consumption for domestic heating is a major contributor to the CO2-emission; hence one of the primary efforts to reach the goal is by saving energy in the households...... performances. During the last 20 years the U-value of the glazing part of windows has been improved considerably, but the frame part has not followed the same development with respect to energy performance. Therefore an increasingly large part of the total heat loss through windows is relating to the frame...... part, for which reason, as far as energy efficiency and total economy are concerned, it has become more interesting to further develop frame structures. Traditionally, the energy performance of windows has primarily been characterised by the heat loss coefficient, U-value. However as the heat loss has...

  18. Oscillatory integration windows in neurons

    Science.gov (United States)

    Gupta, Nitin; Singh, Swikriti Saran; Stopfer, Mark

    2016-01-01

    Oscillatory synchrony among neurons occurs in many species and brain areas, and has been proposed to help neural circuits process information. One hypothesis states that oscillatory input creates cyclic integration windows: specific times in each oscillatory cycle when postsynaptic neurons become especially responsive to inputs. With paired local field potential (LFP) and intracellular recordings and controlled stimulus manipulations we directly test this idea in the locust olfactory system. We find that inputs arriving in Kenyon cells (KCs) sum most effectively in a preferred window of the oscillation cycle. With a computational model, we show that the non-uniform structure of noise in the membrane potential helps mediate this process. Further experiments performed in vivo demonstrate that integration windows can form in the absence of inhibition and at a broad range of oscillation frequencies. Our results reveal how a fundamental coincidence-detection mechanism in a neural circuit functions to decode temporally organized spiking. PMID:27976720

  19. Teach yourself visually Windows 8

    CERN Document Server

    McFedries, Paul

    2012-01-01

    A practical guide for visual learners eager to get started with Windows 8 If you learn more quickly when you can see how things are done, this Visual guide is the easiest way to get up and running on Windows 8. It covers more than 150 essential Windows tasks, using full-color screen shots and step-by-step instructions to show you just what to do. Learn your way around the interface and how to install programs, set up user accounts, play music and other media files, download photos from your digital camera, go online, set up and secure an e-mail account, and much more. The tried-and-true format

  20. Windows 7 is supported at CERN

    CERN Multimedia

    IT Department

    2010-01-01

    The new version of the Windows operating system - Windows 7 - is now officially supported at CERN. Windows 7 32-bit is now the default operating system for the new computers at CERN. What’s new in Windows 7 Users of Windows XP will find many new features and options. Users of Windows Vista will feel very familiar with one major difference: higher performance and better responsiveness of the operating system. Other enhancements include: refined Aero desktop that makes it easier to navigate between your different application windows; new snapping windows that allows user to resize a window simply by dragging it to the edge of the screen and “pin” that allows grouping and arranging often accessed applications on the taskbar. Windows 7 introduces the new concept of libraries – containers for user files that have links to different local or network folders. By default, users can see four libraries: Documents, Music, Pictures and Videos. These libraries point to the cor...

  1. *New* CRITICAL Windows Security patch

    CERN Multimedia

    2003-01-01

    On 10 September 2003, Microsoft issued a new CRITICAL security patch, MS03-039. It must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security hole and patch for MS03-039 (which also includes MS03-026) are at: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp

  2. *New*: CRITICAL Windows Security patch

    CERN Multimedia

    2003-01-01

    On 10 September 2003, Microsoft issued a new CRITICAL security patch, MS03-039. It must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security hole and patch for MS03-039 (which also includes MS03-026) are at: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp

  3. Windows Vista Administrator's Pocket Guide

    CERN Document Server

    Stanek, William R

    2007-01-01

    Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of Windows Vista. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You'll get the precise information you need to solve problems and get the job done-whether you're at your desk or in the field! Get fast facts to: Install and configure Windows Vista-and optimize the user workspaceMaintain operating system components, hardware devices, and driversCreate user and group accounts-and control rights and permissionsAdminister group policy se

  4. What's New in Windows Vista?

    CERN Document Server

    Culp, Brian

    2006-01-01

    Get ready for a quick blast through this significant change to Windows! This guide will give you a quick look at many of the most significant new features in Vista, Microsoft's first revision of Windows in nearly six years. Starting with the changes to the interface, introducing Aero, and showing you some visuals, we then move on to the completely revamped search options. The new task scheduler and printing gadgets, are next with some cool new changes. Probably the most significant changes, however, come in the area of security and this guide takes a look at them from user priveleges, to

  5. An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh

    OpenAIRE

    Gregory H. Carlton

    2008-01-01

    The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budget constraints that limit their access to computer hardware. Currently, Macintosh computer systems a...

  6. Exceptional and Spinorial Conformal Windows

    DEFF Research Database (Denmark)

    Mojaza, Matin; Pica, Claudio; Ryttov, Thomas

    2012-01-01

    We study the conformal window of gauge theories containing fermionic matter fields, where the gauge group is any of the exceptional groups with the fermions transforming according to the fundamental and adjoint representations and the orthogonal groups where the fermions transform according...

  7. TMAC: Timestamp-Ordered MAC Protocol for Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2011-05-01

    Wireless Mesh Networks (WMNs) have emerged to meet a need for a self-organized and self-configured multi-hop wireless network infrastructure. Low cost infrastructure and ease of deployment have made WMNs an attractive technology for last mile access. However, 802.11 based WMNs are subject to serious fairness issues. With backlogged TCP traffic, nodes which are two or more hops away from the gateway are subject to starvation, while the one-hop away node saturates the channel with its own local traffic. We study the interactions of TCP and IEEE 802.11 MAC in WMNs to aid us in understanding and overcoming the unfairness problem. We propose a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically derive the throughput. Based on the developed model, we propose a distributed MAC protocol called Timestamp-ordered MAC (TMAC), aiming to alleviate the unfairness problem in WMNs via a manipulative per-node scheduling mechanism which takes advantage of the age of each packet as a priority metric. Simulation is conducted to validate our model and to illustrate the fairness characteristics of TMAC. Our results show that TMAC achieves excellent resource allocation fairness while maintaining above 90% of maximum link capacity in parking lot and large grid topologies. Our work illuminates the factors affecting TCP fairness in WMNs. Our theoretical and empirical findings can be used in future research to develop more fairness-aware protocols for WMNs.

  8. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    Science.gov (United States)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  9. An Optimized Virtual Scheme for Reducing Collisions in MAC Layer

    OpenAIRE

    M. Sivakumar; S. Saravanan

    2015-01-01

    The main function of Medium Access Control (MAC) is to share the channel efficiently between all nodes. In the real-time scenario, there will be certain amount of wastage in bandwidth due to back-off periods. More bandwidth will be wasted in idle state if the back-off period is very high and collision may occur if the back-off period is small. So, an optimization is needed for this problem. The main objective of the work is to reduce delay due to back-off period thereby reducing collision and...

  10. MAC/FAC: A Model of Similarity-Based Retrieval

    Science.gov (United States)

    1994-10-01

    Grapes (0.28) 327 Sour Grapes, analog The Taming of the Shrew (0.22), Merry Wives 251 (0.18), S[11 stories], Sour Grapes (-0.19) Sour Grapes, literal... The Institute for the 0 1 Learning Sciences Northwestern University CD• 00 MAC/FAC: A MODEL OF SIMILARITY-BASED RETRIEVAL Kenneth D. Forbus Dedre...Gentner Keith Law Technical Report #59 • October 1994 94-35188 wit Establisthed in 1989 with the support of Andersen Consulting Form Approved REPORT

  11. ETEEM- Extended Traffic Aware Energy Efficient MAC Scheme for WSNs

    OpenAIRE

    Younas Khan; Sheeraz Ahmed; Fakhri Alam Khan; Imran Ahmad; Saqib Shahid Rahim; M. Irfan Khattak

    2016-01-01

    Idle listening issue arises when a sensor node listens to medium despite the absence of data which results in consumption of energy. ETEEM is a variant of Traffic Aware Energy Efficient MAC protocol (TEEM) which focuses on energy optimization due to reduced idle listening time and much lesser overhead on energy sources. It uses a novel scheme for using idle listening time of sensor nodes. The nodes are only active for small amount of time and most of the time, will be in sleep mode when no da...

  12. Planeamiento Estratégico para Rímac Seguros

    OpenAIRE

    Alvitez Muñoz, Julio César; Esquivel Porras, César Augusto; Slocovich Salcedo, Erick Rodolfo

    2005-01-01

    El presente trabajo desarrolla una propuesta de valor en el ámbito del mercado de seguros de vida para ser implementada en Rímac Seguros, permitiendo asegurar a la empresa la sostenibilidad de su liderazgo a través del incremento de su participación en el mercado y la fidelización de sus clientes. Las condiciones en las que se desarrolla la industria de seguros en el mundo y en el Perú en particular, como la séptima en volumen de primas a nivel latinoamericano ofrece un mercado reducido ba...

  13. Solar Heat Gain Coefficient (SHGC) | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  14. U-Factor (U-value) | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  15. An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh

    Directory of Open Access Journals (Sweden)

    Gregory H. Carlton

    2008-09-01

    Full Text Available The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budget constraints that limit their access to computer hardware. Currently, Macintosh computer systems are marketed with the ability to accommodate these three common operating system environments, including Windows XP in native and virtual environments. We performed a series of experiments to measure the functionality and performance of the two most commonly used Windows-based computer forensics applications on a Macintosh running Windows XP in native mode and in two virtual environments relative to a similarly configured Dell personal computer. The research results are directly beneficial to practitioners, and the process illustrates affective pedagogy whereby students were engaged in applied research.

  16. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  17. A Fair Cooperative MAC Protocol in IEEE 802.11 WLAN

    Directory of Open Access Journals (Sweden)

    Seyed Davoud Mousavi

    2018-05-01

    Full Text Available Cooperative communication techniques have recently enabled wireless technologies to overcome their challenges. The main objective of these techniques is to improve resource allocation. In this paper, we propose a new protocol in medium access control (MAC of the IEEE 802.11 standard. In our new protocol, which is called Fair Cooperative MAC (FC-MAC, every relay node participates in cooperation proportionally to its provided cooperation gain. This technique improves network resource allocation by exploiting the potential capacity of all relay candidates. Simulation results demonstrate that the FC-MAC protocol presents better performance in terms of throughput, fairness, and network lifetime.

  18. Learning Microsoft Excel 2011 for Mac video training DVD

    CERN Document Server

    Vaccaro, Guy

    2011-01-01

    In this video tutorial for Microsoft Excel 2011 For Mac, expert author Guy Vaccaro teaches you to effectively utilize the features and functions of Excel through project based learning. You will complete various projects, and along they way learn to leverage the power of the most important features Excel 2011 has to offer the Mac user. Starting your training course with the creation of a spreadsheet to record and monitor sales data, you will learn the basics of what you can do with a spreadsheet. You will then move on to creating a Profit and Loss report, learning formulas along the way. Moving to score sheets for a sports day, you will discover conditional based formatting, lookups, and more. You then create a functional expense claim form, advancing your Excel expertise. Moving on to a sales contact management sheet, you will discover how you can manipulate text, and even create mail merges from Excel. Finally, you will utilize all your knowledge thus far to create a sales report, including charts, pivot ta...

  19. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  20. Is Kyoto Fatally Flawed? An Analysis with MacGEM

    International Nuclear Information System (INIS)

    Eyckmans, J.; Van Regemorter, D.; Van Steenberghe, V.

    2002-06-01

    In this paper we present some numerical simulations with the MacGEM model to evaluate the consequences of the recent Marrakesh agreements and the defection of the USA for the Kyoto Protocol. MacGEM is a global marginal abatement cost model for carbon emissions from fossil fuel use based on the GEM-E3-World general equilibrium. Nonparticipation of the USA causes the equilibrium carbon price in Annex B countries to fall by approximately 50% since an important share of permit demand falls out. Carbon sinks enhancement activities enable Parties to fulfil their reduction commitment at lower compliance costs and cause the equilibrium permit price to decrease by 40%. Finally, it is shown that the former Soviet Union and central European countries have substantial monopoly power in the Kyoto carbon permit market. We conclude that the recent accords have eroded completely the Kyoto Protocol's emission targets but that they have the merit to have saved the international climate change negotiation framework

  1. Computer Security: Mac security – nothing for old versions

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    A fundamental pillar of computer security is the regular maintenance of your code, operating system and application software – or, in computer lingo: patching, patching, patching.   Only software which is up-to-date should be free from any known vulnerabilities and thus provide you with a basic level of computer security. Neglecting regular updates is putting your computer at risk – and consequently your account, your password, your data, your photos, your videos and your money. Therefore, prompt and automatic patching is paramount. But the Microsofts, Googles and Apples of this world do not always help… Software vendors handle their update policy in different ways. While Android is a disaster – not because of Google, but due to the slow adaptation of many smartphone vendors (see “Android’s Armageddon”) – Microsoft provides updates for their Windows 7, Windows 8 and Windows 10 operating systems through their &ldq...

  2. C-MAC compared with direct laryngoscopy for intubation in patients with cervical spine immobilization: A manikin trial.

    Science.gov (United States)

    Smereka, Jacek; Ladny, Jerzy R; Naylor, Amanda; Ruetzler, Kurt; Szarpak, Lukasz

    2017-08-01

    The aim of this study was to compare C-MAC videolaryngoscopy with direct laryngoscopy for intubation in simulated cervical spine immobilization conditions. The study was designed as a prospective randomized crossover manikin trial. 70 paramedics with immobilization (Scenario A); manual inline cervical immobilization (Scenario B); cervical immobilization using cervical extraction collar (Scenario C). Scenario A: Nearly all participants performed successful intubations with both MAC and C-MAC on the first attempt (95.7% MAC vs. 100% C-MAC), with similar intubation times (16.5s MAC vs. 18s C-MAC). Scenario B: The results with C-MAC were significantly better than those with MAC (pimmobilization. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. *NEW* CRITICAL Windows Security patches

    CERN Multimedia

    2003-01-01

    On 3 October and 10 September 2003, Microsoft issued new CRITICAL security patches MS03-040 and MS03-039. They must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security holes and patches are at: MS03-039: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp MS03-040: http://cern.ch/it-div/news/hotfix-MS03-040.asp http://www.microsoft.com/technet/security/bulletin/MS03-040.asp

  4. Migration towards Windows 2000/XP

    International Nuclear Information System (INIS)

    Gal, J.

    2004-01-01

    The article deals with interesting technical solutions used in the project 'Migration towards Windows 2000/XP', which was introduced by the company AITEN, Plc for companies SE Plc, SEPS Plc and TEKO, Plc in the period 2002 and 2003. The contents of the project was migration of about 100 servers and more than 4 000 PC to the Windows 2000 and XP environs. The result of the project is a unified and documented system in the field of file, print and small application servers and PC. It has enabled to increase the system reliability and availability, to decrease the total costs for administration and operation and to establish the steady environs for users of the applications. (author)

  5. Electrochromic Windows: Advanced Processing Technology

    Energy Technology Data Exchange (ETDEWEB)

    SAGE Electrochromics, Inc

    2006-12-13

    This project addresses the development of advanced fabrication capabilities for energy saving electrochromic (EC) windows. SAGE EC windows consist of an inorganic stack of thin films deposited onto a glass substrate. The window tint can be reversibly changed by the application of a low power dc voltage. This property can be used to modulate the amount of light and heat entering buildings (or vehicles) through the glazings. By judicious management of this so-called solar heat gain, it is possible to derive significant energy savings due to reductions in heating lighting, and air conditioning (HVAC). Several areas of SAGE’s production were targeted during this project to allow significant improvements to processing throughput, yield and overall quality of the processing, in an effort to reduce the cost and thereby improve the market penetration. First, the overall thin film process was optimized to allow a more robust set of operating points to be used, thereby maximizing the yield due to the thin film deposition themselves. Other significant efforts aimed at improving yield were relating to implementing new procedures and processes for the manufacturing process, to improve the quality of the substrate preparation, and the quality of the IGU fabrication. Furthermore, methods for reworking defective devices were developed, to enable devices which would otherwise be scrapped to be made into useful product. This involved the in-house development of some customized equipment. Finally, the improvements made during this project were validated to ensure that they did not impact the exceptional durability of the SageGlass® products. Given conservative estimates for cost and market penetration, energy savings due to EC windows in residences in the US are calculated to be of the order 0.026 quad (0.026×1015BTU/yr) by the year 2017.

  6. Linear gate with prescaled window

    Energy Technology Data Exchange (ETDEWEB)

    Koch, J; Bissem, H H; Krause, H; Scobel, W [Hamburg Univ. (Germany, F.R.). 1. Inst. fuer Experimentalphysik

    1978-07-15

    An electronic circuit is described that combines the features of a linear gate, a single channel analyzer and a prescaler. It allows selection of a pulse height region between two adjustable thresholds and scales the intensity of the spectrum within this window down by a factor 2sup(N) (0<=N<=9), whereas the complementary part of the spectrum is transmitted without being affected.

  7. Microsoft Windows Intune 20 Quickstart Administration

    CERN Document Server

    Overton, David

    2012-01-01

    This book is a concise and practical tutorial that shows you how to plan, set up and maintain Windows Intune and manage a group of PCs. If you are an administrator or partner who wants to plan, set up and maintain Windows Intune and manage a group of PCs then this book is for you . You should have a basic understanding of Windows administration, however, knowledge of Windows Intune would not be required.

  8. Accuracy of the MacArthur competence assessment tool for clinical research (MacCAT-CR) for measuring children's competence to consent to clinical research.

    Science.gov (United States)

    Hein, Irma M; Troost, Pieter W; Lindeboom, Robert; Benninga, Marc A; Zwaan, C Michel; van Goudoever, Johannes B; Lindauer, Ramón J L

    2014-12-01

    An objective assessment of children's competence to consent to research participation is currently not possible. Age limits for asking children's consent vary considerably between countries, and, to our knowledge, the correlation between competence and children's age has never been systematically investigated. To test a standardized competence assessment instrument for children by modifying the MacArthur Competence Assessment Tool for Clinical Research (MacCAT-CR), to investigate its reliability and validity, and to examine the correlation of its assessment with age and estimate cutoff ages. This prospective study included children and adolescents aged 6 to 18 years in the inpatient and outpatient departments of allergology, gastroenterology, oncology, ophthalmology, and pulmonology from January 1, 2012, through January 1, 2014. Participants were eligible for clinical research studies, including observational studies and randomized clinical trials. Competence judgments by experts aware of the 4 relevant criteria-understanding, appreciation, reasoning, and choice-were used to establish the reference standard. The index test was the MacCAT-CR, which used a semistructured interview format. Interrater reliability, validity, and dimensionality of the MacCAT-CR and estimated cutoff ages for competence. Of 209 eligible patients, we included 161 (mean age, 10.6 years; 47.2% male). Good reproducibility of MacCAT-CR total and subscale scores was observed (intraclass correlation coefficient range, 0.68-0.92). We confirmed unidimensionality of the MacCAT-CR. By the reference standard, we judged 54 children (33.5%) to be incompetent; by the MacCAT-CR, 61 children (37.9%). Criterion-related validity of MacCAT-CR scores was supported by high overall accuracy in correctly classifying children as competent against the reference standard (area under the receiver operating characteristics curve, 0.78). Age was a good predictor of competence on the MacCAT-CR (area under the receiver

  9. Travailler avec Windows 7 au CERN

    CERN Multimedia

    CERN. Geneva

    2011-01-01

    Vue d'ensemble des nouveaux concepts et des changements dans l'interface utilisateur survenus dans Windows 7 depuis les versions antérieures de Windows (XP ou Vista). Le plan de migration à Windows 7 sera aussi débattu.

  10. Travailler avec Windows 7 au CERN

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Vue d'ensemble des nouveaux concepts et des changements dans l'interface utilisateur survenus dans Windows 7 depuis les versions antérieures de Windows (XP ou Vista). Le plan de migration à Windows 7 sera aussi débattu.

  11. The Virtues of Scientific Practice: MacIntyre,

    Science.gov (United States)

    Hicks, Daniel J; Stapleford, Thomas A

    2016-09-01

    “Practice” has become a ubiquitous term in the history of science, and yet historians have not always reflected on its philosophical import and in particular on its potential connections with ethics. This essay draws on the work of the virtue ethicist Alasdair MacIntyre to develop a theory of “communal practices” and explore how such an approach can inform the history of science, including allegations about the corruption of science by wealth or power, consideration of scientific ethics or “moral economies,” the role of values in science, the ethical distinctiveness (or not) of scientific vocations, and the relationship between history of science and the practice of science itself.

  12. Rocket measurements of electron density irregularities during MAC/SINE

    Science.gov (United States)

    Ulwick, J. C.

    1989-01-01

    Four Super Arcas rockets were launched at the Andoya Rocket Range, Norway, as part of the MAC/SINE campaign to measure electron density irregularities with high spatial resolution in the cold summer polar mesosphere. They were launched as part of two salvos: the turbulent/gravity wave salvo (3 rockets) and the EISCAT/SOUSY radar salvo (one rocket). In both salvos meteorological rockets, measuring temperature and winds, were also launched and the SOUSY radar, located near the launch site, measured mesospheric turbulence. Electron density irregularities and strong gradients were measured by the rocket probes in the region of most intense backscatter observed by the radar. The electron density profiles (8 to 4 on ascent and 4 on descent) show very different characteristics in the peak scattering region and show marked spatial and temporal variability. These data are intercompared and discussed.

  13. MACS low-background doubly focusing neutron monochromator

    CERN Document Server

    Smee, S A; Scharfstein, G A; Qiu, Y; Brand, P C; Anand, D K; Broholm, C L

    2002-01-01

    A novel doubly focusing neutron monochromator has been developed as part of the Multi-Analyzer Crystal Spectrometer (MACS) at the NIST Center for Neutron Research. The instrument utilizes a unique vertical focusing element that enables active vertical and horizontal focusing with a large, 357-crystal (1428 cm sup 2), array. The design significantly reduces the amount of structural material in the beam path as compared to similar instruments. Optical measurements verify the excellent focal performance of the device. Analytical and Monte Carlo simulations predict that, when mounted at the NIST cold-neutron source, the device should produce a monochromatic beam (DELTA E=0.2 meV) with flux phi>10 sup 8 n/cm sup 2 s. (orig.)

  14. On PHY and MAC Performance in Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Higgins Henry

    2009-01-01

    Full Text Available Abstract This paper presents an empirical investigation on the performance of body implant communication using radio frequency (RF technology. In body implant communication, the electrical properties of the body influence the signal propagation in several ways. We use a Perspex body model (30 cm diameter, 80 cm height and 0.5 cm thickness filled with a liquid that mimics the electrical properties of the basic body tissues. This model is used to observe the effects of body tissue on the RF communication. We observe best performance at 3cm depth inside the liquid. We further present a simulation study of several low-power MAC protocols for an on-body sensor network and discuss the derived results. Also, the traditional preamble-based TMDA protocol is extended towards a beacon-based TDMA protocol in order to avoid preamble collision and to ensure low-power communication.

  15. On PHY and MAC Performance in Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sana Ullah

    2009-01-01

    Full Text Available This paper presents an empirical investigation on the performance of body implant communication using radio frequency (RF technology. In body implant communication, the electrical properties of the body influence the signal propagation in several ways. We use a Perspex body model (30 cm diameter, 80 cm height and 0.5 cm thickness filled with a liquid that mimics the electrical properties of the basic body tissues. This model is used to observe the effects of body tissue on the RF communication. We observe best performance at 3cm depth inside the liquid. We further present a simulation study of several low-power MAC protocols for an on-body sensor network and discuss the derived results. Also, the traditional preamble-based TMDA protocol is extended towards a beacon-based TDMA protocol in order to avoid preamble collision and to ensure low-power communication.

  16. 76 FR 71797 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Investments and...

    Science.gov (United States)

    2011-11-18

    ... diligence procedures that are required for investments, but we do not intend to change the fundamental... Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Investments and Liquidity... Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Investments and Liquidity Management AGENCY...

  17. A MacWilliams Identity for Convolutional Codes: The General Case

    OpenAIRE

    Gluesing-Luerssen, Heide; Schneider, Gert

    2008-01-01

    A MacWilliams Identity for convolutional codes will be established. It makes use of the weight adjacency matrices of the code and its dual, based on state space realizations (the controller canonical form) of the codes in question. The MacWilliams Identity applies to various notions of duality appearing in the literature on convolutional coding theory.

  18. A MacWilliams Identity for Convolutional Codes : The General Case

    NARCIS (Netherlands)

    Gluesing-Luerssen, Heide; Schneider, Gert

    A MacWilliams Identity for convolutional codes will be established. It makes use of the weight adjacency matrices of the code and its dual, based on state space realizations (the controller canonical form) of the codes in question. The MacWilliams Identity applies to various notions of duality

  19. Poincaré-MacMillan Equations of Motion for a Nonlinear Nonholonomic Dynamical System

    Science.gov (United States)

    Amjad, Hussain; Syed Tauseef, Mohyud-Din; Ahmet, Yildirim

    2012-03-01

    MacMillan's equations are extended to Poincaré's formalism, and MacMillan's equations for nonlinear nonholonomic systems are obtained in terms of Poincaré parameters. The equivalence of the results obtained here with other forms of equations of motion is demonstrated. An illustrative example of the theory is provided as well.

  20. Public Relations as "Practice": Applying the Theory of Alasdair MacIntyre.

    Science.gov (United States)

    Leeper, Roy V.; Leeper, Kathie A.

    2001-01-01

    Considers how public relation's search for a unifying theory may be fulfilled through application of Alasdair MacIntyre's concept of a "practice," a very specific and value-laden concept. Explores what it would mean to be a public relations practice in MacIntyre's concept of the term and argues that such an approach to public relations…

  1. 78 FR 5320 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Capital Planning

    Science.gov (United States)

    2013-01-25

    ... the business planning period a required discussion of how factors might impact Farmer Mac's current... discussion of any expected changes to Farmer Mac's business plan that are likely to have a material impact on... conditions that cause increases in delinquency rates caused by any variety of factors (e.g., widespread...

  2. Geochemistry and petrography of the MacAlpine Hills lunar meteorites

    Science.gov (United States)

    Lindstrom, Marilyn M.; Mckay, David S.; Wentworth, Susan J.; Martinez, Rene R.; Mittlefehldt, David W.; Wang, Ming-Sheng; Lipschutz, Michael E.

    1991-01-01

    MacAlpine Hills 88104 and 88105, anorthositic lunar meteorites recovered form the same area in Antartica, are characterized. Petrographic studies show that MAC88104/5 is a polymict breccia dominated by impact melt clasts. It is better classified as a fragmental breccia than a regolith breccia. The bulk composition is ferroan and highly aluminous (Al2O3-28 percent).

  3. Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert

    2015-01-01

    Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The

  4. THE EFFECT OF TEMPERATURE ON THE GROWTH OF MYCOBACTERIUM AVIUM COMPLEX (MAC) ORGANISMS

    Science.gov (United States)

    MAC organisms are able to grow, persist, and colonize in water distribution systems and may amplify in hospital hot water systems. This study examined the response of MAC organisms (M. avium, M. intracellulare, and MX) to a range of temperatures commonly associated with drinking...

  5. Scheduled MAC in Beacon Overlay Networks for Underwater Localization and Time-Synchronization

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Meratnia, Nirvana; Havinga, Paul J.M.

    2011-01-01

    In this article we introduce a MAC protocol designed for underwater localization and time-synchronisation. The MAC protocol assumes a network of static reference nodes and allows blind nodes to be localized by listening-only to the beacon messages. Such a system is known to be very scalable. We show

  6. ScreenOS Cookbook

    CERN Document Server

    Brunner, Stefan; Delcourt, David

    2008-01-01

    In the only book that completely covers ScreenOS, six key members of Juniper Network's ScreenOS development team help you troubleshoot secure networks using ScreenOS firewall appliances. Over 200 recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track. The easy-to-follow format enables you to find the topic and specific recipe you need right away.

  7. Rigid thin windows for vacuum applications

    Science.gov (United States)

    Meyer, Glenn Allyn; Ciarlo, Dino R.; Myers, Booth Richard; Chen, Hao-Lin; Wakalopulos, George

    1999-01-01

    A thin window that stands off atmospheric pressure is fabricated using photolithographic and wet chemical etching techniques and comprises at least two layers: an etch stop layer and a protective barrier layer. The window structure also comprises a series of support ribs running the width of the window. The windows are typically made of boron-doped silicon and silicon nitride and are useful in instruments such as electron beam guns and x-ray detectors. In an electron beam gun, the window does not impede the electrons and has demonstrated outstanding gun performance and survivability during the gun tube manufacturing process.

  8. Purged window apparatus utilizing heated purge gas

    Science.gov (United States)

    Ballard, Evan O.

    1984-01-01

    A purged window apparatus utilizing tangentially injected heated purge gases in the vicinity of electromagnetic radiation transmitting windows, and a tapered external mounting tube to accelerate these gases to provide a vortex flow on the window surface and a turbulent flow throughout the mounting tube. Use of this apparatus prevents backstreaming of gases under investigation which are flowing past the mouth of the mounting tube which would otherwise deposit on the windows. Lengthy spectroscopic investigations and analyses can thereby be performed without the necessity of interrupting the procedures in order to clean or replace contaminated windows.

  9. Identifying The Purchasing Power Parity of Indonesia Rupiah (IDR based on BIG MAC Index

    Directory of Open Access Journals (Sweden)

    Tongam Sihol Nababan

    2016-12-01

    Full Text Available The aim of this study is to identify : (1 profile of exchange rate and purchasing power parity of IDR against US $ based on Big Mac Index compared to the exchange rate of other countries, and (2 the position of the Big Mac Affordability of  Indonesia compared to other ASEAN countries. The results showed that based on Big Mac index during the period April 1998 up to January 2015, IDR exchange rate tends to be undervalued against the USA dollar. The cause of the currency tends to be in a position of undervalued due to the components of non-tradable have not been included in Big Mac index. The index of Big Mac Affordability indicates that there is a great disparity of income between Singapore and five other ASEAN countries. The purchasing power of the real income of the people in Singapore is nearly five times the real income of the people in Indonesia.

  10. Impact of MAC Delay on AUV Localization: Underwater Localization Based on Hyperbolic Frequency Modulation Signal.

    Science.gov (United States)

    Kim, Sungryul; Yoo, Younghwan

    2018-01-26

    Medium Access Control (MAC) delay which occurs between the anchor node's transmissions is one of the error sources in underwater localization. In particular, in AUV localization, the MAC delay significantly degrades the ranging accuracy. The Cramer-Rao Low Bound (CRLB) definition theoretically proves that the MAC delay significantly degrades the localization performance. This paper proposes underwater localization combined with multiple access technology to decouple the localization performance from the MAC delay. Towards this goal, we adopt hyperbolic frequency modulation (HFM) signal that provides multiplexing based on its good property, high-temporal correlation. Owing to the multiplexing ability of the HFM signal, the anchor nodes can transmit packets without MAC delay, i.e., simultaneous transmission is possible. In addition, the simulation results show that the simultaneous transmission is not an optional communication scheme, but essential for the localization of mobile object in underwater.

  11. Interference Analysis Status and Plans for Aeronautical Mobile Airport Communications System (AeroMACS)

    Science.gov (United States)

    Kerczewski, Robert J.; Wilson, Jeffrey D.

    2010-01-01

    Interference issues related to the operation of an aeronautical mobile airport communications system (AeroMACS) in the C-Band (specifically 5091-5150 MHz) is being investigated. The issue of primary interest is co-channel interference from AeroMACS into mobile-satellite system (MSS) feeder uplinks. The effort is focusing on establishing practical limits on AeroMACS transmissions from airports so that the threshold of interference into MSS is not exceeded. The analyses are being performed with the software package Visualyse Professional, developed by Transfinite Systems Limited. Results with omni-directional antennas and plans to extend the models to represent AeroMACS more accurately will be presented. These models should enable realistic analyses of emerging AeroMACS designs to be developed from NASA Test Bed, RTCA 223, and European results.

  12. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  13. Comparison of Os-Os and Re-Os dating results of molybdenites

    International Nuclear Information System (INIS)

    Xie Zhi; Sun Weidong; Chen Jiangfeng

    2002-01-01

    Two molybdenite samples from the Middle-Low Reaches of the Yangtze River were dated by both Os-Os and Re-Os methods. Os-Os and Re-Os dating give identical age results for the two samples. An experiment of step distillation of Os-Os method suggests that no isotopic fractionation is observed between fractions obtained by the experiment. The results prove that the Os-Os method can avoid the problems in the Re-Os method, simplify the experimental procedure, give creditable age data, and have unique advantage that no quantitative extracting of Os is required

  14. Computer Security: Bye, Bye, Windows XP security... Welcome infections!

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Rest in peace, Windows XP. Since your birth on 25 October 2001, you have struggled hard to survive this harsh Internet world. You fell prey to “Melissa”, “Sasser” and “Conficker”, and brought CERN its last large-scale infection with “Blaster” in 2004.    After being upgraded to “SP2”, you discovered software development lifecycles, regular “Patch Tuesdays” and a local firewall that rejected everything by default. In the end, you outlived your weird brother “Vista” and survived as the ugly duckling cousin to the beautiful Mr. Mac. But all your ups and downs are over now. On 8 April 2014, you were given your very last security updates. These life-sustaining measures will be stopped now. Game over. From now on, you are a zombie: presumed dead, but still kept running by your master/owner/user. They might not even understand that you now pose a risk ...

  15. Functional characterization of the copper transcription factor AfMac1 from Aspergillus fumigatus.

    Science.gov (United States)

    Park, Yong-Sung; Kim, Tae-Hyoung; Yun, Cheol-Won

    2017-07-03

    Although copper functions as a cofactor in many physiological processes, copper overload leads to harmful effects in living cells. Thus, copper homeostasis is tightly regulated. However, detailed copper metabolic pathways have not yet been identified in filamentous fungi. In this report, we investigated the copper transcription factor AfMac1 ( A spergillus f umigatus Mac1 homolog) and identified its regulatory mechanism in A. fumigatus AfMac1 has domains homologous to the DNA-binding and copper-binding domains of Mac1 from Saccharomyces cerevisiae , and AfMac1 efficiently complemented Mac1 in S. cerevisiae Expression of Afmac1 resulted in CTR1 up-regulation, and mutation of the DNA-binding domain of Afmac1 failed to activate CTR1 expression in S. cerevisiae The Afmac1 deletion strain of A. fumigatus failed to grow in copper-limited media, and its growth was restored by introducing ctrC We found that AfMac1 specifically bound to the promoter region of ctrC based on EMSA. The AfMac1-binding motif 5'-TGTGCTCA-3' was identified from the promoter region of ctrC , and the addition of mutant ctrC lacking the AfMac1-binding motif failed to up-regulate ctrC in A. fumigatus Furthermore, deletion of Afmac1 significantly reduced strain virulence and activated conidial killing activity by neutrophils and macrophages. Taken together, these results suggest that AfMac1 is a copper transcription factor that regulates cellular copper homeostasis in A. fumigatus . © 2017 The Author(s); published by Portland Press Limited on behalf of the Biochemical Society.

  16. Image annotation under X Windows

    Science.gov (United States)

    Pothier, Steven

    1991-08-01

    A mechanism for attaching graphic and overlay annotation to multiple bits/pixel imagery while providing levels of performance approaching that of native mode graphics systems is presented. This mechanism isolates programming complexity from the application programmer through software encapsulation under the X Window System. It ensures display accuracy throughout operations on the imagery and annotation including zooms, pans, and modifications of the annotation. Trade-offs that affect speed of display, consumption of memory, and system functionality are explored. The use of resource files to tune the display system is discussed. The mechanism makes use of an abstraction consisting of four parts; a graphics overlay, a dithered overlay, an image overly, and a physical display window. Data structures are maintained that retain the distinction between the four parts so that they can be modified independently, providing system flexibility. A unique technique for associating user color preferences with annotation is introduced. An interface that allows interactive modification of the mapping between image value and color is discussed. A procedure that provides for the colorization of imagery on 8-bit display systems using pixel dithering is explained. Finally, the application of annotation mechanisms to various applications is discussed.

  17. The plant-window system

    International Nuclear Information System (INIS)

    Wood, R.T.; Mullens, J.A.; Naser, J.A.

    1995-01-01

    Power plant data, and the information that can be derived from it, provide the link to the plant through which the operations, maintenance and engineering staff understand and manage plant performance. The increasing use of computer technology in the U.S. nuclear power industry has greatly expanded the capability to obtain, analyze, and present data about the plant to station personnel. However, it is necessary to transform the vast quantity of available data into clear, concise, and coherent information that can be readily accessed and used throughout the plant. This need can be met by an integrated computer workstation environment that provides the necessary information and software applications, in a manner that can be easily understood and used, to the proper users throughout the plant. As part of a Cooperative Research and Development Agreement with the Electric Power Research Institute, the Oak Ridge National Laboratory has developed functional requirements for a Plant-Wide Integrated Environment Distributed On Workstations (Plant-Window) System. The Plant-Window System (PWS) can serve the needs of operations, engineering, and maintenance personnel at nuclear power stations by providing integrated data and software applications (e.g., monitoring, analysis, diagnosis, and control applications) within a common environment. The PWS requirements identify functional capabilities and provide guidelines for standardized hardware, software, and display interfaces to define a flexible computer environment that permits a tailored implementation of workstation capabilities and facilitates future upgrades

  18. MS Windows domēna darbstaciju migrācija no MS Windows XP uz Windows Vista.

    OpenAIRE

    Tetere, Agate

    2009-01-01

    Kvalifikācijas darbā izpētīju darbstaciju migrācijas no Windows XP uz Windows Vista plusus un mīnusus. Darba gaitā tika veikti sekojoši uzdevumi: 1.Veikta Windows XP un Windows Vista darbstaciju instalācija, iestatījumu konfigurēšana un tika pārbaudīta sistēmas darbība 2.Veikta Windows Server 2003 un Windows Server 2008 instalācija, iestatījumu konfigurēšana un tika pārbaudīta sistēmas darbība 3.Izstrādāts migrācijas modelis 4.Veikta migrācijas optimizēšana 5.Veikta datu migrāc...

  19. Antibiotic Resistance Mediated by the MacB ABC Transporter Family: A Structural and Functional Perspective

    Directory of Open Access Journals (Sweden)

    Nicholas P. Greene

    2018-05-01

    Full Text Available The MacB ABC transporter forms a tripartite efflux pump with the MacA adaptor protein and TolC outer membrane exit duct to expel antibiotics and export virulence factors from Gram-negative bacteria. Here, we review recent structural and functional data on MacB and its homologs. MacB has a fold that is distinct from other structurally characterized ABC transporters and uses a unique molecular mechanism termed mechanotransmission. Unlike other bacterial ABC transporters, MacB does not transport substrates across the inner membrane in which it is based, but instead couples cytoplasmic ATP hydrolysis with transmembrane conformational changes that are used to perform work in the extra-cytoplasmic space. In the MacAB-TolC tripartite pump, mechanotransmission drives efflux of antibiotics and export of a protein toxin from the periplasmic space via the TolC exit duct. Homologous tripartite systems from pathogenic bacteria similarly export protein-like signaling molecules, virulence factors and siderophores. In addition, many MacB-like ABC transporters do not form tripartite pumps, but instead operate in diverse cellular processes including antibiotic sensing, cell division and lipoprotein trafficking.

  20. Antibiotic Resistance Mediated by the MacB ABC Transporter Family: A Structural and Functional Perspective

    Science.gov (United States)

    Greene, Nicholas P.; Kaplan, Elise; Crow, Allister; Koronakis, Vassilis

    2018-01-01

    The MacB ABC transporter forms a tripartite efflux pump with the MacA adaptor protein and TolC outer membrane exit duct to expel antibiotics and export virulence factors from Gram-negative bacteria. Here, we review recent structural and functional data on MacB and its homologs. MacB has a fold that is distinct from other structurally characterized ABC transporters and uses a unique molecular mechanism termed mechanotransmission. Unlike other bacterial ABC transporters, MacB does not transport substrates across the inner membrane in which it is based, but instead couples cytoplasmic ATP hydrolysis with transmembrane conformational changes that are used to perform work in the extra-cytoplasmic space. In the MacAB-TolC tripartite pump, mechanotransmission drives efflux of antibiotics and export of a protein toxin from the periplasmic space via the TolC exit duct. Homologous tripartite systems from pathogenic bacteria similarly export protein-like signaling molecules, virulence factors and siderophores. In addition, many MacB-like ABC transporters do not form tripartite pumps, but instead operate in diverse cellular processes including antibiotic sensing, cell division and lipoprotein trafficking. PMID:29892271

  1. A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Chon Kim

    2011-05-01

    Full Text Available Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency.

  2. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  3. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  4. Advanced OS deployment system

    OpenAIRE

    Galiano Molina, Sebastián

    2007-01-01

    The main project’s objective is to design and build an OS deployment system taking advantage of the Linux OS and the Open Source community developments. This means to use existing technologies that modularize the system. With this philosophy in mind, the number of developed code lines within the project is keeping as small as possible. As REMBO, the OS deployment system to develop has to be transparent to the user. This means a system with a friendly user interface and no te...

  5. Firefox OS Overview

    OpenAIRE

    JANCZUKOWICZ , Ewa

    2013-01-01

    Firefox OS is an operating system for mobile devices such as smartphones and tablets. It is developed by Mozilla but it aims to be free from any proprietary technology. It lets users run applications developed entirely using web technologies, like HTML5, JavaScript, CSS. It is not directly competing with iOS. It has some common target markets with Android. For now Firefox OS targets specific type of clients - people that don't have smartphones yet. Available devices are low-end and as a resul...

  6. Instant Windows PowerShell

    CERN Document Server

    Menon, Vinith

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical, hands-on tutorial approach that explores the concepts of PowerShell in a friendly manner, taking an adhoc approach to each topic.If you are an administrator who is new to PowerShell or are looking to get a good grounding in these new features, this book is ideal for you. It's assumed that you will have some experience in PowerShell and Windows Server, as well being familiar with the PowerShell command-line.

  7. Editorial - Opening windows onto data

    Directory of Open Access Journals (Sweden)

    Judith Winters

    2012-05-01

    Full Text Available One of Internet Archaeology's strengths and 'unique selling points' not yet replicated by (many other e-journals, is that data is integrated into articles rather than being 'supplementary' or offered for download. The aim has always been for the narrative to be a wave driving readers towards the underlying data. Opening windows onto the data from within the text is one of the things I think the journal does best and is a feature used throughout Emma Durham's article 'Depicting the gods: metal figurines in Roman Britain'. Archaeological data does not speak for itself. It needs a narrative. It needs context. But by intermeshing data with interpretation, readers can dip into the data and start to explore it while reading the article, allowing a more immediate understanding of the bigger picture.

  8. McMAC: towards a MAC protocol with multi-constrained QoS provisioning for diverse traffic in Wireless Body Area Networks.

    Science.gov (United States)

    Monowar, Muhammad Mostafa; Hassan, Mohammad Mehedi; Bajaber, Fuad; Al-Hussein, Musaed; Alamri, Atif

    2012-11-12

    The emergence of heterogeneous applications with diverse requirements for resource-constrained Wireless Body Area Networks (WBANs) poses significant challenges for provisioning Quality of Service (QoS) with multi-constraints (delay and reliability) while preserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes in WBANs. McMAC classifies traffic based on their multi-constrained QoS demands and introduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respective QoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMAC is also modeled analytically, and extensive simulations were performed to evaluate its performance. The results reveal that McMAC achieves the desired delay and reliability guarantee according to the requirements of a particular traffic class while achieving energy efficiency.

  9. Windows VPN Set Up | High-Performance Computing | NREL

    Science.gov (United States)

    Windows VPN Set Up Windows VPN Set Up To set up Windows for HPC VPN, here are the steps: Download your version of Windows. Note: We only support the the Endian Connect software when connecting to the a VPN connection to the HPC systems. Windows Version Connect App Windows 10

  10. Hybrid window layer for photovoltaic cells

    Science.gov (United States)

    Deng, Xunming

    2010-02-23

    A novel photovoltaic solar cell and method of making the same are disclosed. The solar cell includes: at least one absorber layer which could either be a lightly doped layer or an undoped layer, and at least a doped window-layers which comprise at least two sub-window-layers. The first sub-window-layer, which is next to the absorber-layer, is deposited to form desirable junction with the absorber-layer. The second sub-window-layer, which is next to the first sub-window-layer, but not in direct contact with the absorber-layer, is deposited in order to have transmission higher than the first-sub-window-layer.

  11. CAC on a MAC: Setting up a DOD Common Access Card Reader on the Macintosh OS X Operating System

    National Research Council Canada - National Science Library

    Hopfner, Phil

    2006-01-01

    .... The CAC readers in conjunction with the user's Smart Card enables access to DoD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DoD Public Key Infrastructure (PKI...

  12. MAC Version 3.2, MBA Version 1.3 acceptance test summary report

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) and Materials Balance (MBA) programs had the Paradox Conversion to 4.0 ATP run to check out the systems. This report describes the results of the test and provides the signoff sheets associated with the testing. The test primarily concentrated on verifying that MAC and MBA software would run properly in the Paradox 4.0 environment. Changes in the MAC and MBA programs were basically limited to superficial items needed to accommodate the enhanced method of execution

  13. Are hamburgers harmless? : the Big Mac Index in the twenty-first century

    OpenAIRE

    Soo, Kwok Tong

    2016-01-01

    We make use of The Economist’s Big Mac Index (BMI) to investigate the Law of One Price (LOP) and whether the BMI can be used to predict future exchange rate and price changes. Deviations from Big Mac parity decay quickly, in approximately 1 year. The BMI is a better predictor of relative price changes than of exchange rate changes, and performs best when predicting a depreciation of a currency relative to the US dollar. Convergence to Big Mac parity occurs more rapidly for currencies with som...

  14. Identifying The Purchasing Power Parity of Indonesia Rupiah (IDR) based on BIG MAC Index

    OpenAIRE

    Tongam Sihol Nababan

    2016-01-01

    The aim of this study is to identify : (1) profile of exchange rate and purchasing power parity of IDR against US $ based on Big Mac Index compared to the exchange rate of other countries, and (2) the position of the Big Mac Affordability of Indonesia compared to other ASEAN countries. The results showed that based on Big Mac index during the period April 1998 up to January 2015, IDR exchange rate tends to be undervalued against the USA dollar. The cause of the currency tends to be in a posi...

  15. Analysis of surface contaminants on beryllium windows

    International Nuclear Information System (INIS)

    Gmur, N.F.

    1986-12-01

    It is known that various crystalline and liquid compounds form on the downstream surfaces of beryllium windows exposed to air. It is also known that the integrity of such windows may be compromised resulting in leaks through the window. The purpose of this report is to document the occurrences described as they pertain to the NSLS and to analyze, where possible, the various substances formed

  16. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Science.gov (United States)

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  17. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Omar Elizarraras

    2014-01-01

    Full Text Available The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15% compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  18. Emergency Handling for MAC Protocol in Human Body Communication

    Directory of Open Access Journals (Sweden)

    Kwon Youngmi

    2011-01-01

    Full Text Available The human body communication (HBC is a technology that enables short range data communication using the human body as a medium, like an electrical wire. Thus it removes the need for a traditional antenna. HBC may be used as a type of data communication in body area network (BAN, while the devices are being in contact with body. One of important issues in BAN is an emergency alarm because it may be closely related to human life. For emergency data communication, the most critical factor is the time constraint. IEEE 802.15.6 specifies that the emergency alarm for the BAN must be notified in less than 1 sec and must provide prioritization mechanisms for emergency traffic and notification. As one type of BAN, the HBC must follow this recommendation, too. Existing emergency handling methods in BAN are based on the carrier sensing capability on radio frequencies to detect the status of channels. However, PHY protocol in HBC does not provide the carrier sensing. So the previous methods are not well suitable for HBC directly. Additionally, in the environment that the emergency rate is very low, the allocation of dedicated slot(s for emergency in each superframe is very wasteful. In this work, we proposed specific emergency handling operation for human body communication's medium access control (HBC-MAC protocol to meet the emergency requirements for BAN. We also showed the optimal number of emergency slots for the various combinations of beacon intervals and emergency rates.

  19. Bit Level Synchronized MAC Protocol for Multireader RFID Networks

    Directory of Open Access Journals (Sweden)

    Namboodiri Vinod

    2010-01-01

    Full Text Available The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency channels due to technical and regulatory limitations. The typical solution is to separate the operation of such readers across time. This sequential operation, however, results in a long delay to identify all tags. We present a bit level synchronized (BLSync MAC protocol for multi-reader RFID networks that allows multiple readers to operate simultaneously on the same frequency channel. The BLSync protocol solves the reader collision problem by allowing all readers to transmit the same query at the same time. We analyze the performance of using the BLSync protocol and demonstrate benefits of 40%–50% in terms of tag reading delay for most settings. The benefits of BLSync, first demonstrated through analysis, are then validated and quantified through simulations on realistic reader-tag layouts.

  20. LAMAN: Load Adaptable MAC for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Realp Marc

    2005-01-01

    Full Text Available In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN protocol is described. LAMAN is a novel decentralized multipacket MAC protocol designed following a cross-layer approach. Basically, this protocol is a hybrid CDMA-TDMA-based protocol that aims at throughput maximization in multipacket communication environments by efficiently combining contention and conflict-free protocol components. Such combination of components is used to adapt the nodes' access priority to changes on the traffic load while, at the same time, accounting for the multipacket reception (MPR capability of the receivers. A theoretical analysis of the system is developed presenting closed expressions of network throughput and packet delay. By simulations the validity of our analysis is shown and the performances of a LAMAN-based system and an Aloha-CDMA-based one are compared.

  1. High-dose therapy and autologous transplantation for lymphoma: the Peter MacCallum Cancer institute experience

    International Nuclear Information System (INIS)

    Dowling, A.J.; Prince, H.M.; Wolf, M.; Januszewicz, H.; Seymour, J.F.; Gates, P.; Wirth, A.; Juneja, S.; Smith, J.G.

    2001-01-01

    High-dose therapy (HDT) with autologous bone marrow or blood cell transplantation for the treatment of lymphoma commenced at Peter MacCallum Cancer Institute in 1986. To examine the patient characteristics and outcomes of patients with non-Hodgkin's lymphoma (NHL) and Hodgkin's disease (HD) treated with HDT and autologous transplantation at our Institute in the first 10 years of the service (1986-95). A retrospective analysis was performed examining patient characteristics, prior chemotherapy regimens, pretransplant disease status, HDT regimen, source of stem cells, time for haematopoietic recovery, complications of transplantation, response rates, overall survival (OS) and progression-free survival (PFS). Sixty-seven patients with NHL were treated with an estimated 5-year OS rate of 44% (95% confidence interval (CI) 32-56%) and PFS rate of 34% (95% CI 21-44%). Factors independently predictive of an unfavourable PFS on multivariate analyses were presence of constitutional symptoms at transplant (P < 0.002) and chemotherapy-resistant disease at transplant (P= 0.02). Twenty-three patients with HD were treated with a 5-year predicted OS rate of 74% (95% CI 56-92%) and PFS rate of 57% (95% CI 36-77%).There was no difference in PFS for HD patients who relapsed either within 12 months of completion of front-line therapy or after this time (P =0.5). The transplant-related mortality for the entire cohort was 17%, with a progressive decrease over time. HDT with autologous transplantation achieves durable PFS and OS in patients with lymphoma. Improved patient selection, therapy modifications according to prognostic factors and ongoing improvements in supportive care should improve outcomes further

  2. Windows PowerShell 20 Bible

    CERN Document Server

    Lee, Thomas; Schill, Mark E; Tanasovski, Tome

    2011-01-01

    Here's the complete guide to Windows PowerShell 2.0 for administrators and developers Windows PowerShell is Microsoft's next-generation scripting and automation language. This comprehensive volume provides the background that IT administrators and developers need in order to start using PowerShell automation in exciting new ways. It explains what PowerShell is, how to use the language, and specific ways to apply PowerShell in various technologies. Windows PowerShell is Microsoft's standard automation tool and something that every Windows administrator will eventually have to understand; this b

  3. Scott Brothers Windows and Doors Information Sheet

    Science.gov (United States)

    Scott Brothers Windows and Doors (the Company) is located in Bridgeville, Pennsylvania. The settlement involves renovation activities conducted at property constructed prior to 1978, located in Pittsburgh, Pennsylvania.

  4. Mastering Windows Server 2008 Networking Foundations

    CERN Document Server

    Minasi, Mark; Mueller, John Paul

    2011-01-01

    Find in-depth coverage of general networking concepts and basic instruction on Windows Server 2008 installation and management including active directory, DNS, Windows storage, and TCP/IP and IPv4 networking basics in Mastering Windows Server 2008 Networking Foundations. One of three new books by best-selling author Mark Minasi, this guide explains what servers do, how basic networking works (IP basics and DNS/WINS basics), and the fundamentals of the under-the-hood technologies that support staff must understand. Learn how to install Windows Server 2008 and build a simple network, security co

  5. Windows 7 Annoyances Tips, Secrets, and Solutions

    CERN Document Server

    Karp, David

    2010-01-01

    Windows 7 may be faster and more stable than Vista, but it's a far cry from problem-free. David A. Karp comes to the rescue with the latest in his popular Windows Annoyances series. This thorough guide gives you the tools you need to fix the troublesome parts of this operating system, plus the solutions, hacks, and timesaving tips to make the most of your PC. Streamline Windows Explorer, improve the Search tool, eliminate the Green Ribbon of Death, and tame User Account Control promptsExplore powerful Registry tips and tools, and use them to customize every aspect of Windows and solve its sho

  6. Aerodynamic window for a laser fusion device

    International Nuclear Information System (INIS)

    Masuda, Wataru

    1983-01-01

    Since the window of a laser system absorbs a part of the laser energy, the output power is determined by the characteristics of the window. The use of an aerodynamic window has been studied. The required characteristics are to keep the large pressure difference. An equation of motion of a vortex was presented and analyzed. The operation power of the system was studied. A multi-stage aerodynamic window was proposed to reduce the power. When the jet flow of 0.3 of the Mach number is used, the operation power will be several Megawatt, and the length of an optical path will be about 100 m. (Kato, T.)

  7. Windows 8.1 for dummies

    CERN Document Server

    Rathbone, Andy

    2013-01-01

    The bestselling book on Windows, now updated for the new 8.1 features Microsoft has fine-tuned Windows 8 with some important new features, and veteran author Andy Rathbone explains every one in this all-new edition of a long-time bestseller. Whether you're using Windows for the first time, upgrading from an older version, or just moving from Windows 8 to 8.1, here's what you need to know. Learn about the dual interfaces, the new Start button, how to customize the interface and boot operations, and how to work with programs and files, use the web and social media, manage music and photos, and

  8. Microsoft Windows 7 Administration Instant Reference

    CERN Document Server

    Panek, William

    2010-01-01

    An on-the-spot reference for Windows 7 administrators. Hundreds of thousands of IT administrators, network administrators, and IT support technicians work daily with Windows 7. This well-organized, portable reference covers every facet of Windows 7, providing no-nonsense instruction that is readily accessible when you need it. Designed for busy administrators, it features thumb tabs and chapter outlines to make answers easy to find.: Windows 7 administrative and support personnel need quick answers to situations they confront each day; this Instant Reference is designed to provide information,

  9. Modelling window opening behaviour in Danish dwellings

    DEFF Research Database (Denmark)

    Andersen, Rune Vinther; Olesen, Bjarne W.; Toftum, Jørn

    2011-01-01

    In this paper we present and analyse data from two studies of window opening behaviour in residential buildings in Denmark. Based on measurements of indoor environment, weather and window opening behaviour in 15 dwellings, we propose a model that will predict window opening behaviour. The data...... showed that other factors than thermal effects impact the behaviour of the occupants. Some of these factors were included in the model. We present data from repeated questionnaire surveys that show that occupants tend to adjust heating setpoints, adjust clothing and operate windows when feeling thermally...

  10. The Nicest way to migrate your Windows computer ( The Windows 2000 Migration Task Force)

    CERN Document Server

    2001-01-01

    With Windows 2000, CERN users will discover a more stable and reliable working environment and will have access to all the latest applications. The Windows 2000 Migration Task Force - a representative from each division.

  11. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  12. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  13. A new architecture and MAC protocol for fully flexible hybrid WDM/TDM PON

    NARCIS (Netherlands)

    Das, G.; Lannoo, B.; Jung, H.D.; Koonen, A.M.J.; Colle, D.; Pickavet, M.; Demeester, P.

    2009-01-01

    In this paper we propose a novel architecture and MAC protocol for a scalable, cost effective WDM / TDM PON providing fully flexible dynamic bandwidth allocation for upstream and downstream data transmission.

  14. Evaluation of video transmission of MAC protocols in wireless sensor network

    Science.gov (United States)

    Maulidin, Mahmuddin, M.; Kamaruddin, L. M.; Elsaikh, Mohamed

    2016-08-01

    Wireless Sensor Network (WSN) is a wireless network which consists of sensor nodes scattered in a particular area which are used to monitor physical or environment condition. Each node in WSN is also scattered in sensor field, so an appropriate scheme of MAC protocol should have to develop communication link for data transferring. Video transmission is one of the important applications for the future that can be transmitted with low aspect in side of cost and also power consumption. In this paper, comparison of five different MAC WSN protocol for video transmission namely IEEE 802.11 standard, IEEE 802.15.4 standard, CSMA/CA, Berkeley-MAC, and Lightweight-MAC protocol are studied. Simulation experiment has been conducted in OMNeT++ with INET network simulator software to evaluate the performance. Obtained results indicate that IEEE 802.11 works better than other protocol in term of packet delivery, throughput, and latency.

  15. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  16. Analysis of an Adaptive P-Persistent MAC Scheme for WLAN Providing Delay Fairness

    Science.gov (United States)

    Yen, Chih-Ming; Chang, Chung-Ju; Chen, Yih-Shen; Huang, Ching Yao

    The paper proposes and analyzes an adaptive p-persistent-based (APP) medium access control (MAC) scheme for IEEE 802.11 WLAN. The APP MAC scheme intends to support delay fairness for every station in each access, denoting small delay variance. It differentiates permission probabilities of transmission for stations which are incurred with various packet delays. This permission probability is designed as a function of the numbers of retransmissions and re-backoffs so that stations with larger packet delay are endowed with higher permission probability. Also, the scheme is analyzed by a Markov-chain analysis, where the collision probability, the system throughput, and the average delay are successfully obtained. Numerical results show that the proposed APP MAC scheme can attain lower mean delay and higher mean throughput. In the mean time, simulation results are given to justify the validity of the analysis, and also show that the APP MAC scheme can achieve more delay fairness than conventional algorithms.

  17. 78 FR 26711 - Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Farmer Mac Liquidity...

    Science.gov (United States)

    2013-05-08

    ... Funding and Fiscal Affairs; Farmer Mac Liquidity Management ACTION: Proposed rule; reopening of comment... proposed rule that would amend its liquidity management regulations for the Federal Agricultural Mortgage... comment on the proposed liquidity regulations. [[Page 26712

  18. A Critique of MacIntyrean Morality From a Kantian Perspective

    OpenAIRE

    Krishna Mani Pathak

    2014-01-01

    This article is a critical examination of MacIntyre’s notion of morality in reference to Kant’s deontological moral theory. The examination shows that MacIntyre (a) criticizes Kant’s moral theory to defend virtue ethics or neo-Aristotelian ethics with a weak notion of morality; (b) favors the idea of local morality, which does not leave any room for moral assessment and reciprocity in an intercultural domain; and (c) f...

  19. Strategy, Operational Art and MacArthur in the Southwest Pacific 1944

    Science.gov (United States)

    2016-05-26

    Guinea Campaign.11 It studies the campaign exclusively from the February 1944 through October 1944. The choice in dates argues that the campaign...the Pacific. King continued to maintain that MacArthur’s line of operation in SWPA, toward the Philippines to the exclusion of the central Pacific...with Nimitz allowed MacArthur the rare luxury of aircraft carriers providing a protective bubble over both the Morotai and Palaus operations. Escort

  20. Are Rural Costs of Living Lower? Evidence from a Big Mac Index Approach

    OpenAIRE

    Scott Loveridge; Dusan Paredes

    2015-01-01

    Rural leaders can point to low housing costs as a reason that their area should be competitive for business attraction. To what extent do rural housing costs offset transportation and other locational disadvantages in costs structures? The US lacks information to systematically answer the question. We adapt a strategy employed by The Economist in exploring purchasing power parity: the Big Mac Index. We gather information on Big Mac prices with a random sample of restaurants across the contigu...

  1. Profile of a leader. Alena Jean MacMaster: administrator, educator, professional activist and community advocate.

    Science.gov (United States)

    Gautreau, G; Winans, P

    1999-01-01

    This paper profiles Alena Jean MacMaster, an extraordinary nurse leader, activist, visionary and humanitarian from New Brunswick. Her determination and drive were instrumental in fostering the development and progression of health care, nursing education and nursing services at the local, provincial, federal and international levels. "First, loyalty to the institution in which you serve. The patient is the most important person in the entire institution," was Miss MacMaster's guiding principle throughout her career.

  2. MAC Version 3.3, MBA Version 1.3 acceptance test summary report

    International Nuclear Information System (INIS)

    Russell, V.K.

    1994-01-01

    The K Basins Materials Accounting (MAC) and Materials Balance (MBA) programs had the Paradox Code Cleanup ATP run to check out the systems. This report describes the results of the test and provides the signoff sheets associated with the testing. The Acceptance Test results indicate that the MAC and MBA systems are ready for operation using the cleaned up code. The final codes were removed to the production space on the customer server on April 15th

  3. Android is the new Windows

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Do you recall the early virus attacks in the early 2000s? “Blaster”, “I love you” and “Slammer” were attacking the pretty much unprotected Microsoft Windows operating system.   While Microsoft has been hit hard in the past, they have tried to improve and are now on a par with other software vendors. Today, they can even be happy that Android is taking over the baton - at least on mobile platforms. According to the Sophos 2013 Security Threat Report “Android [is] today’s the biggest target” and Android devices in Australia and the U.S. experienced even more malware attacks, whether successful or unsuccessful, than PCs during the past three months. The Kaspersky security company recently added that 99% of all mobile threats target Android. Lucky you if you use an iPhone, or a good old Nokia with no Internet connectivity at all. But why is that? It is partly down to the same fac...

  4. Humeral windows in revision total elbow arthroplasty.

    Science.gov (United States)

    Peach, Chris A; Salama, Amir; Stanley, David

    2016-04-01

    The use of cortical windows for revision elbow arthroplasty has not previously been widely reported. Their use aids safe revision of a well fixed humeral prosthesis and can be used in the setting of dislocation, periprosthetic fracture or aseptic loosening of the ulnar component. We describe our technique and results of cortical windows in the distal humerus for revision elbow arthroplasty surgery.

  5. What are windows on language evolution?

    NARCIS (Netherlands)

    Botha, Rudolf

    2008-01-01

    This chapter offers an elucidation of the idea that certain phenomena provide windows on language evolution. Non-metaphorically, such windows are shown to be conceptual constructs used for making inferences about aspects of language evolution from data or assumptions about properties of

  6. Thermal Bridge Effects in Window Grooves

    DEFF Research Database (Denmark)

    Rose, Jørgen

    1997-01-01

    In this report thermal bridge effects in window grooves are analyzed. The analysis is performed using different thicknesses of the window groove insulation, to evaluate what the optimal solution is.All analysis in the report is performed using both 2- and 3-dimensional numerical analysis....

  7. Automatic Water Sensor Window Opening System

    KAUST Repository

    Percher, Michael

    2013-01-01

    A system can automatically open at least one window of a vehicle when the vehicle is being submerged in water. The system can include a water collector and a water sensor, and when the water sensor detects water in the water collector, at least one window of the vehicle opens.

  8. Measure Guideline: Window Repair, Rehabilitation, and Replacement

    Energy Technology Data Exchange (ETDEWEB)

    Baker, P.

    2012-12-01

    This measure guideline provides information and guidance on rehabilitating, retrofitting, and replacing existing window assemblies in residential construction. The intent is to provide information regarding means and methods to improve the energy and comfort performance of existing wood window assemblies in a way that takes into consideration component durability, in-service operation, and long term performance of the strategies.

  9. On the inverse windowed Fourier transform

    OpenAIRE

    Rebollo Neira, Laura; Fernández Rubio, Juan Antonio

    1999-01-01

    The inversion problem concerning the windowed Fourier transform is considered. It is shown that, out of the infinite solutions that the problem admits, the windowed Fourier transform is the "optimal" solution according to a maximum-entropy selection criterion. Peer Reviewed

  10. Automatic Water Sensor Window Opening System

    KAUST Repository

    Percher, Michael

    2013-12-05

    A system can automatically open at least one window of a vehicle when the vehicle is being submerged in water. The system can include a water collector and a water sensor, and when the water sensor detects water in the water collector, at least one window of the vehicle opens.

  11. A Full-Duplex MAC Tailored for 5G Wireless Networks

    Directory of Open Access Journals (Sweden)

    Lucas de Melo Guimarães

    2018-01-01

    Full Text Available The increasing demands for high-data rate traffic stimulated the development of the fifth-generation (5G mobile networks. The envisioned 5G network is expected to meet its challenge by devising means to further improve spectrum usage. Many alternatives to enhance spectrum usage are being researched, such as massive MIMO, operation in mmWave frequency, cognitive radio, and the employment of full-duplex antennas. Efficient utilization of the potential of any of these technologies faces a set of challenges related to medium access control (MAC schemes. This work focuses on MAC schemes tailored for full-duplex antennas, since they are expected to play a major role in the foreseeable 5G networks. In this context, this paper presents a MAC layer technique to improve total transmission time when full-duplex antennas are employed. Several evaluations in different scenarios are conducted to assess the proposed MAC scheme. Numerical results show that the proposed scheme provides gains up to 156% when compared to a state-of-the-art full-duplex antenna MAC protocol. Compared to traditional half-duplex antenna MAC protocols, the proposed scheme yields gain up to 412%.

  12. Energy Gaining Windows for Residental Buildings

    DEFF Research Database (Denmark)

    Kragh, Jesper; Laustsen, Jacob Birck; Svendsen, Svend

    2008-01-01

    This paper presents some of the research done during the last 8 years at the Technical University of Denmark developing improved low-energy window solutions. The focus has been on maximizing the net energy gain of windows for residential buildings. The net energy gain of windows is the solar gain...... minus the heat loss integrated over the heating season. It is assumed that in northern cold climates all of the solar gain during the heating season can be utilized for space heating. Problems with overheating in the summer period must be solved with overhang or moveable solar shading devices. Two...... and longer durability of the window. The glazing in these fiber reinforced polyester windows is both unsealed and sealed triple glazing units. To increase the net energy gain slim frame profiles have been developed to increase the glazing area and thereby the solar gain. The challenge when developing slim...

  13. Mastering Windows Server 2012 R2

    CERN Document Server

    Minasi, Mark; Booth, Christian; Butler, Robert; McCabe, John; Panek, Robert; Rice, Michael; Roth, Stefan

    2013-01-01

    Check out the new Hyper-V, find new and easier ways to remotely connect back into the office, or learn all about Storage Spaces-these are just a few of the features in Windows Server 2012 R2 that are explained in this updated edition from Windows authority Mark Minasi and a team of Windows Server experts led by Kevin Greene. This book gets you up to speed on all of the new features and functions of Windows Server, and includes real-world scenarios to put them in perspective. If you're a system administrator upgrading to, migrating to, or managing Windows Server 2012 R2, find what you need to

  14. Compact UHV valve with field replaceable windows

    International Nuclear Information System (INIS)

    Johnson, E.D.; Freeman, J.; Powell, F.

    1991-01-01

    There are many applications in synchrotron radiation research where window valves can be usefully employed. Examples include gas cells for monochromator calibration, filters for high order light rejection, and as vacuum isolation elements between machine and experimental vacua. Often these devices are fairly expensive, and have only fixed (ie non-removable) windows. The development of a new type of seal technology by VAT for their series 01 valves provides a gate surface which is free from obstructions due to internal mechanical elements. This feature allows a threaded recess to be machined into the gate to receive a removable window frame which can carry standard size Luxel thin film windows. The combination of these features results in a DN 40 (2.75in. conflat flange) valve which provides a clear aperture of 21mm diameter for the window material. 8 refs., 2 figs

  15. Windows 8 app projects XAML and C#

    CERN Document Server

    Vermeir, Nico

    2013-01-01

    Become a leading Windows 8 app developer by using Windows 8 App Projects - XAML and C# Edition to learn techniques, tools, and ideas to create successful, 5-star apps. Windows 8 App Projects - XAML and C# Edition shows you the nuts and bolts of the Windows 8 development ecosystem. Then, through a series of example driven chapters, you'll discover how to leverage the platform's unique features. With each project, you'll be one step closer to building full-featured, responsive, and well designed apps that feel like they're a part of the operating system. Windows 8 App Projects - XAML and C# Edit

  16. Functional Implications of an Intermeshing Cogwheel-like Interaction between TolC and MacA in the Action of Macrolide-specific Efflux Pump MacAB-TolC*

    Science.gov (United States)

    Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul

    2011-01-01

    Macrolide-specific efflux pump MacAB-TolC has been identified in diverse Gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel. PMID:21325274

  17. Functional implications of an intermeshing cogwheel-like interaction between TolC and MacA in the action of macrolide-specific efflux pump MacAB-TolC.

    Science.gov (United States)

    Xu, Yongbin; Song, Saemee; Moeller, Arne; Kim, Nahee; Piao, Shunfu; Sim, Se-Hoon; Kang, Mooseok; Yu, Wookyung; Cho, Hyun-Soo; Chang, Iksoo; Lee, Kangseok; Ha, Nam-Chul

    2011-04-15

    Macrolide-specific efflux pump MacAB-TolC has been identified in diverse gram-negative bacteria including Escherichia coli. The inner membrane transporter MacB requires the outer membrane factor TolC and the periplasmic adaptor protein MacA to form a functional tripartite complex. In this study, we used a chimeric protein containing the tip region of the TolC α-barrel to investigate the role of the TolC α-barrel tip region with regard to its interaction with MacA. The chimeric protein formed a stable complex with MacA, and the complex formation was abolished by substitution at the functionally essential residues located at the MacA α-helical tip region. Electron microscopic study delineated that this complex was made by tip-to-tip interaction between the tip regions of the α-barrels of TolC and MacA, which correlated well with the TolC and MacA complex calculated by molecular dynamics. Taken together, our results demonstrate that the MacA hexamer interacts with TolC in a tip-to-tip manner, and implies the manner by which MacA induces opening of the TolC channel.

  18. Malware Forensics Field Guide for Windows Systems Digital Forensics Field Guides

    CERN Document Server

    Malin, Cameron H; Aquilina, James M

    2010-01-01

    Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. *A condensed hand-held guide complete with on-the-job tasks and checklists *Specific for Windows-based systems, the largest running OS in the world

  19. McMAC: Towards a MAC Protocol with Multi-Constrained QoS Provisioning for Diverse Traffic in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Mostafa Monowar

    2012-11-01

    Full Text Available The emergence of heterogeneous applications with diverse requirements forresource-constrained Wireless Body Area Networks (WBANs poses significant challengesfor provisioning Quality of Service (QoS with multi-constraints (delay and reliability whilepreserving energy efficiency. To address such challenges, this paper proposes McMAC,a MAC protocol with multi-constrained QoS provisioning for diverse traffic classes inWBANs. McMAC classifies traffic based on their multi-constrained QoS demands andintroduces a novel superframe structure based on the "transmit-whenever-appropriate"principle, which allows diverse periods for diverse traffic classes according to their respectiveQoS requirements. Furthermore, a novel emergency packet handling mechanism is proposedto ensure packet delivery with the least possible delay and the highest reliability. McMACis also modeled analytically, and extensive simulations were performed to evaluate itsperformance. The results reveal that McMAC achieves the desired delay and reliabilityguarantee according to the requirements of a particular traffic class while achieving energyefficiency.

  20. Huachipa-Jicamarca: cronología y desarrollo sociopolítico en el Rímac

    Directory of Open Access Journals (Sweden)

    1997-01-01

    aspectos relacionados. El primero, describe la cronología alfarera para Huachipa proponiéndose una secuencia cultural que se inicia en el Formativo Medio (circa 1000 A.C. y concluye en el Formativo Tardío (circa 100 A.C., con la modalidad alfarera “Blanco Sobre Rojo”. Según esta secuencia, las secciones baja y media del Rímac estuvieron culturalmente relacionadas, pues las aldeas y los templos compartieron patrones alfareros similares. Además, es destacable la ocurrencia de un componente estilístico llamado Huachipa-Jicamarca C que revela vínculos con las tradiciones culturales de Topará (Chincha y Ocucaje (Ica, probable-mente hacia los 200-100 A.C. Estos vínculos sugieren que las relaciones entre la costa central e Ica no fueron necesariamente esporádicas. El segundo aspecto que se examina es el sistema de asentamiento y la caracterización sociopolítica del Rímac medio y bajo durante este período. Se propone que en esta etapa se consolidan la vida aldeana y la construcción de edificios públicos producto de organizaciones sociopolíticas similares a las Jefaturas o Señoríos, cuyo rasgo más notable es la existencia de una compleja estructura social religiosa. Por otro lado, la existencia de un templo en “U” (San Antonio, aledaño al asentamiento doméstico de Huachipa, sugiere que aldea y templo fueron parte de un sistema de asentamiento políticamente integrado. HUACHIPA-JICAMARCA: CHRONOLOGY AND SOCIOPOLITICAL DEVELOPMENT IN THE RIMAC RIVER VALLEY. This article examines the Formative Period (circa 1700-100 B.C. in the Rímac River Valley based on a stratigraphic sample excavated in the site of Huachipa. Our contribution is divided into two related aspects. The first describes the pottery sequence arranged for the Huachipa area. This cultural sequence begins in the Middle Formative (circa 1000 B.C. and ends in the Late Formative phases (circa 100 B.C., with the pottery style “White on Red”. According to this sequence, the lower and middle parts of

  1. Cross-Layer Scheme to Control Contention Window for Per-Flow in Asymmetric Multi-Hop Networks

    Science.gov (United States)

    Giang, Pham Thanh; Nakagawa, Kenji

    The IEEE 802.11 MAC standard for wireless ad hoc networks adopts Binary Exponential Back-off (BEB) mechanism to resolve bandwidth contention between stations. BEB mechanism controls the bandwidth allocation for each station by choosing a back-off value from one to CW according to the uniform random distribution, where CW is the contention window size. However, in asymmetric multi-hop networks, some stations are disadvantaged in opportunity of access to the shared channel and may suffer severe throughput degradation when the traffic load is large. Then, the network performance is degraded in terms of throughput and fairness. In this paper, we propose a new cross-layer scheme aiming to solve the per-flow unfairness problem and achieve good throughput performance in IEEE 802.11 multi-hop ad hoc networks. Our cross-layer scheme collects useful information from the physical, MAC and link layers of own station. This information is used to determine the optimal Contention Window (CW) size for per-station fairness. We also use this information to adjust CW size for each flow in the station in order to achieve per-flow fairness. Performance of our cross-layer scheme is examined on various asymmetric multi-hop network topologies by using Network Simulator (NS-2).

  2. De como os alunos entendem os textos

    Directory of Open Access Journals (Sweden)

    Peronard Th, Marianne

    1991-01-01

    Full Text Available Nosso interesse na compreensão do texto escrito apresenta uma tendência pedagógica. Tal perspectiva guiou a seleção de nossa estrutura teórica, os limites de nosso trabalho experimental e a natureza dos instrumentos que usamos, tanto durante a avaliação das habilidades de compreensão dos alunos como durante as aplicações instrucionais. Nosso foco tem se localizado na compreensão inferencial, a qual medimos pedindo aos estudantes que verbalizassem as inferências necessárias para conbstruir uma interpretação coerente. Para garantir uma sanidade ecológica, temos nos mantido o mais próximo possível de uma situação escolar, um fato que, em resumo, parece ter sido autodestruidor. Nossos resultados mostram fracas habilidades de compreensão por parte dos sujeitos (aproximadamente 2600 alunos. Suas respostas manifestam pouco raciocínio inferencial e suas estratégias, baixa adaptação à estrutura ou conteúdo do texto. De fato a estratégia mais comum parece ser a que nós chamamos de "estratégia lexical restrita", que é mais uma "estratégia de resposta" do que uma estratégia de compreensão

  3. OS Friendly Microprocessor Architecture

    Science.gov (United States)

    2017-04-01

    NOTES Patrick La Fratta is now affiliated with Micron Technology, Inc., Boise, Idaho. 14. ABSTRACT We present an introduction to the patented ...Operating System Friendly Microprocessor Architecture (OSFA). The software framework to support the hardware-level security features is currently patent ...Army is assignee. OS Friendly Microprocessor Architecture. United States Patent 9122610. 2015 Sep. 2. Jungwirth P, inventor; US Army is assignee

  4. Os Trigonum Syndrome

    Science.gov (United States)

    ... other conditions, such as an Achilles tendon injury, ankle sprain or talus fracture. Diagnosis of os trigonum syndrome begins with questions from the doctor about the development of symptoms. After the foot and ankle are examined, x-rays or other imaging tests ...

  5. Focal plane scanner with reciprocating spatial window

    Science.gov (United States)

    Mao, Chengye (Inventor)

    2000-01-01

    A focal plane scanner having a front objective lens, a spatial window for selectively passing a portion of the image therethrough, and a CCD array for receiving the passed portion of the image. All embodiments have a common feature whereby the spatial window and CCD array are mounted for simultaneous relative reciprocating movement with respect to the front objective lens, and the spatial window is mounted within the focal plane of the front objective. In a first embodiment, the spatial window is a slit and the CCD array is one-dimensional, and successive rows of the image in the focal plane of the front objective lens are passed to the CCD array by an image relay lens interposed between the slit and the CCD array. In a second embodiment, the spatial window is a slit, the CCD array is two-dimensional, and a prism-grating-prism optical spectrometer is interposed between the slit and the CCD array so as to cause the scanned row to be split into a plurality of spectral separations onto the CCD array. In a third embodiment, the CCD array is two-dimensional and the spatial window is a rectangular linear variable filter (LVF) window, so as to cause the scanned rows impinging on the LVF to be bandpass filtered into spectral components onto the CCD array through an image relay lens interposed between the LVF and the CCD array.

  6. AN INTRODUCTION TO WINDOWS 2000 AT CERN

    CERN Document Server

    2001-01-01

    A demonstration of the new supported Windows environment for all the CERN personal computers (PC) will be given which is based on Windows 2000. This presentation will assume little or no familiarity with the PC, or NICE, and will concentrate on the services being offered to the users of PCs at CERN. How NICE 2000 can facilitate the work of all users, eventually becoming the key access point to all activities in the laboratory will be demonstrated. Date Title Language Location Speaker Fri 1/6 10:00 Une introduction à Windows 2000 au CERN F IT Auditorium (31/3-004) Alberto Pace Tue 5/6 10:00 Une introduction à Windows 2000 au CERN F LHC Auditorium (30/7th floor) Frederic Hemmer Tue 5/6 14:00 Une introduction à Windows 2000 au CERN F SL Auditorium (864/1s floor) Michel Bornand Tue 5/6 14:00 An introduction to Windows 2000 at CERN E IT Auditorium (31/3-004) Andreas Wagner Wed 6/6 14:00 Une introduction à Windows 2000 au CERN F SL ...

  7. MacDonald Dam reconstruction : using roller-compacted concrete

    Energy Technology Data Exchange (ETDEWEB)

    O' Neil, E. [AMEC Earth and Environmental Ltd., Sydney, NS (Canada)

    2007-04-01

    Located in Nova Scotia, the MacDonald Dam was commissioned in 1928. The dam consists of a 122 metre-long, 16 metre-high concrete structure comprised of an intake structure, stoplog openings, and a 34 metre-long free-overflow spillway. A 488 metre-long power canal was added as an upgrade in the 1950s. This paper provided details of the roller-compact concrete (RCC) used in the dam's recent rehabilitation following a dam failure analysis in 2003 by Nova Scotia Power Inc. RCC was chosen to help keep the dam's construction project on schedule. The layout and cross-section of the spillway was selected with consideration given to the RCC placing operation. A lift thickness of 0.20 m was selected. A formed ogee crest consisting of conventional reinforced concrete was constructed on top of the RCC. The downstream steps of the spillway were also covered with cast-in-place concrete. A low level sluice was designed to resist the weight of the wet RCC. The design compressive strength of the RCC was 20 MPa. The forms used to support the cast-in-place facing concrete on the upstream face of the dam were constructed full height and were braced back to the downstream face of the existing concrete structure prior to the start of RCC placement. Formwork inserts were placed in the facing concrete as construction progressed. Crack inducers were pre-placed on the forms. Aggregates from a local source were transported to a pug mill as the RCC construction progressed. The RCC was spread into 0.20 m lifts using a small bull-dozer, and the facing concrete was vibrated into the lift below. RCC lifts were compacted using a 9 tonne vibratory drum roller. The RCC placing operation was completed over a period of 10 days. Following the completion of the RCC portion of the dam, the remainder of the cast-in-place concrete was completed. It was concluded that the RCC provided a durable, low-maintenance structure that was completed at a lower price and in a shorter time-frame than

  8. Teach yourself visually Windows 8 tablets

    CERN Document Server

    McFedries, Paul

    2012-01-01

    A visual guide to all the features of the new Windows 8 Tablet This must-have resource features visually rich, step-by-step instructions that show you how to get the most enjoyment from your Windows 8 tablet. Learn about the exciting new Metro UI, optimized specifically for touch devices. The most popular and commonly used apps and functions are covered too, along with the basics of syncing with a network, setting up e-mail, watching videos, listening to music, and common productivity tasks. This book provides all the guidance needed to enjoy all the best the new Windows 8 tablets have to offe

  9. Window Shopping, Granada, 1930s”

    Directory of Open Access Journals (Sweden)

    Mae Claxton

    2010-02-01

    Full Text Available “Window Shopping, Granada, 1930s,” Photographs, p. 16, with the gracious permission of the Eudora Welty FoundationAn African American woman, dressed in her Saturday go-to-town-best, stands outside a store window, chin in hand, contemplating the contents in the window. The image is reflective and thoughtful. What is she thinking? And what lies beyond the frame of this photograph? In Mississippi in the 1930s, could she walk into this store, perhaps try on clothes or hats, and make a purchase? I...

  10. Conceptual design of proton beam window

    International Nuclear Information System (INIS)

    Teraoku, Takuji; Kaminaga, Masanori; Terada, Atsuhiko; Ishikura, Syuichi; Kinoshita, Hidetaka; Hino, Ryutaro

    2001-01-01

    In a MW-scale neutron scattering facility coupled with a high-intensity proton accelerator, a proton beam window is installed as the boundary between a high vacuum region of the proton beam transport line and a helium environment around the target assembly working as a neutron source. The window is cooled by water so as to remove high volumetric heat generated by the proton beam. A concept of the flat-type proton beam window consisting of two plates of 3 mm thick was proposed, which was found to be feasible under the proton beam power of 5 MW through thermal-hydraulic and structural strength analyses. (authors)

  11. CSS for Windows 8 app development

    CERN Document Server

    Foster, Jeremy

    2013-01-01

    CSS for Windows 8 App Development is your learning guide for CSS - the language of great Windows 8-style apps. Learn the built-in styles that make the built-in controls shine, how to define them, and how to use CSS to give your custom app assets that beautiful Modern UI style. CSS (Cascading Style Sheets) is the clear standard for styling web applications, and with HTML, CSS, and JavaScript now powering apps on Windows 8, it's the clear standard there as well. CSS is a powerful styling and layout language that greatly simplifies the selection of page elements and their visual display, layout,

  12. Managing customer arrivals with time windows

    DEFF Research Database (Denmark)

    Chen, Gang; Jiang, Liping

    2016-01-01

    Due to increasing container traffic and mega-ships, many seaports face challenges of huge amounts of truck arrivals and congestion problem at terminal gates, which affect port efficiency and generate serious air pollution. To solve this congestion problem, we propose a solution of managing truck...... arrivals with time windows based on the truck-vessel service relationship, specifically trucks delivering containers for the same vessel share one common time window. Time windows can be optimized with different strategies. In this paper, we first propose a framework for installing this solution...

  13. Windows 8 & Office 2010 for dummies

    CERN Document Server

    Rathbone, Andy

    2012-01-01

    Two complete e-books covering Windows and Office for one low price! This unique value-priced e-book set brings together two bestselling For Dummies books in a single e-book file. Including a comprehensive table of contents and the full text of each book, complete with cover, this e-book set gives you in-depth information on the leading PC productivity tools: Windows 8 and Office 2010. Best of all, you'll pay less than the cost of each book purchased separately. You'll get the complete text of: Windows 8 For Dummies, which covers The core component

  14. A Memristor Model with Piecewise Window Function

    Directory of Open Access Journals (Sweden)

    J. Yu

    2013-12-01

    Full Text Available In this paper, we present a memristor model with piecewise window function, which is continuously differentiable and consists of three nonlinear pieces. By introducing two parameters, the shape of this window function can be flexibly adjusted to model different types of memristors. Using this model, one can easily obtain an expression of memristance depending on charge, from which the numerical value of memristance can be readily calculated for any given charge, and eliminate the error occurring in the simulation of some existing window function models.

  15. Prototype solid-state electrochromic window devices

    International Nuclear Information System (INIS)

    Dao, L.H.; Nguyen, M.T.

    1989-01-01

    This paper discusses electrochromic smart windows which are prospective devices for the control of light transmission in response to the variation of brightness of the environment. The fabrication of electrochromic windows based on cathodically coloring transition metal oxides and anodically coloring conducting polymers are described. The device consists of gel or glassy polymer electrolytes sandwiches by a pair of transparent conducting glass coated respectively with a thin film of WO 3 or MoO 3 prepared by electrodeposition, and with a thin film of ploy(aniline) derivatives obtained by electropolymerization or solution casting. The electrochromic properties of the five-layer smart window devices are presented

  16. Microsoft Windows Server 2012 administration instant reference

    CERN Document Server

    Hester, Matthew

    2013-01-01

    Fast, accurate answers for common Windows Server questions Serving as a perfect companion to all Windows Server books, this reference provides you with quick and easily searchable solutions to day-to-day challenges of Microsoft's newest version of Windows Server. Using helpful design features such as thumb tabs, tables of contents, and special heading treatments, this resource boasts a smooth and seamless approach to finding information. Plus, quick-reference tables and lists provide additional on-the-spot answers. Covers such key topics as server roles and functionality, u

  17. Time Modeling: Salvatore Sciarrino, Windows and Beclouding

    Directory of Open Access Journals (Sweden)

    Acácio Tadeu de Camargo Piedade

    2017-08-01

    Full Text Available In this article I intend to discuss one of the figures created by the Italian composer Salvatore Sciarrino: the windowed form. After the composer's explanation of this figure, I argue that windows in composition can open inwards and outwards the musical discourse. On one side, they point to the composition's inner ambiences and constitute an internal remission. On the other, they instigate the audience to comprehend the external reference, thereby constructing intertextuality. After the outward window form, I will consider some techniques of distortion, particularly one that I call beclouding. To conclude, I will comment the question of memory and of compostition as time modeling.

  18. MacDUST - a powder diffraction package developed for the ''ADONE'' high resolution diffraction station

    International Nuclear Information System (INIS)

    Burattini, E.; Cappuccio, G.; Maistrelli, P.; Simeoni, S.

    1993-01-01

    A High Resolution Powder Diffraction Station (PO.DI.STA.) was installed at the beginning of 1991 on the ADONE-Wiggler magnet beam line. The station and the first powder diffraction spectra, collected with synchrotron radiation, were presented at the EPDIC-1 Conference. More details can also be found in. For this station, a very sophisticated software package ''MacDUST'' has been developed on an Apple Macintosh computer, using the Microsoft QuickBASIC compiler. It allows very easy and comfortable operations by means of a graphical user interface environment, typical of the Macintosh system. The package consists of five major programs. The main program, MacDIFF, performs all the graphic operations on the experimental data, including zooming, overlapping, cursor scanning and editing of patterns, control of output operations to printers and HPGL plotters. It also includes several analysis routines for data smoothing, a first derivative peak search algorithm, two background subtraction routines and two profile fitting programs: one based on the simplex method and the other on the Marquardt modification of a least-square algorithm. MacPDF and MacRIC are both dedicated to phase identification. The first program is an archive manager for searching, displaying and printing phase records; MacRIC is a graphic aided search-match program based on the Hanawalt algorithm. Mac3-DIM is a plot program, useful, e.g., for representing kinetics three dimensionally. MacRIET is a Macintosh version of the well known Rietveld refinement program. This version, besides conventional structure refinements, also allows the determination of micro structural parameters, i.e. micro strain and crystallite size. The program can also be used to simulate a pattern, once the structure of the compound is known. Taking advantage of the very intuitive Macintosh graphic user interface, through dialog and alert boxes, the program allows straightforward introduction and modification of the structure

  19. Window selection for dual photopeak window scatter correction in Tc-99m imaging

    International Nuclear Information System (INIS)

    Vries, D.J. de; King, M.A.

    1994-01-01

    The width and placement of the windows for the dual photopeak window (DPW) scatter subtraction method for Tc-99m imaging is investigated in order to obtain a method that is stable on a multihead detector system for single photon emission computed tomography (SPECT) and is capable of providing a good scatter estimate for extended objects. For various window pairs, stability and noise were examined with experiments using a SPECT system, while Monte Carlo simulations were used to predict the accuracy of scatter estimates for a variety of objects and to guide the development of regression relations for various window pairs. The DPW method that resulted from this study was implemented with a symmetric 20% photopeak window composed of a 15% asymmetric photopeak window and a 5% lower window abutted at 7 keV below the peak. A power function regression was used to relate the scatter-to-total ratio to the lower window-to-total ratio at each pixel, from which an estimated scatter image was calculated. DPW demonstrated good stability, achieved by abutting the two windows away from the peak. Performance was assessed and compared with Compton window subtraction (CWS). For simulated extended objects, DPW generally produced a less biased scatter estimate than the commonly used CWS method with k = 0.5. In acquisitions of a clinical SPECT phantom, contrast recovery was comparable for both DPW and CWS; however, DPW showed greater visual contrast in clinical SPECT bone studies

  20. An energy-efficient MAC protocol using dynamic queue management for delay-tolerant mobile sensor networks.

    Science.gov (United States)

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  1. Upstate Windows and Exteriors Information Sheet

    Science.gov (United States)

    Upstate Windows and Exteriors (the Company) is located in Greenville, South Carolina. The settlement involves renovation activities conducted at properties constructed prior to 1978, located in Greenville and Easley, South Carolina.

  2. UV conformal window for asymptotic safety

    Science.gov (United States)

    Bond, Andrew D.; Litim, Daniel F.; Vazquez, Gustavo Medina; Steudtner, Tom

    2018-02-01

    Interacting fixed points in four-dimensional gauge theories coupled to matter are investigated using perturbation theory up to three loop order. It is shown how fixed points, scaling exponents, and anomalous dimensions are obtained as a systematic power series in a small parameter. The underlying ordering principle is explained and contrasted with conventional perturbation theory and Weyl consistency conditions. We then determine the conformal window with asymptotic safety from the complete next-to-next-to-leading order in perturbation theory. Limits for the conformal window arise due to fixed point mergers, the onset of strong coupling, or vacuum instability. A consistent picture is uncovered by comparing various levels of approximation. The theory remains perturbative in the entire conformal window, with vacuum stability dictating the tightest constraints. We also speculate about a secondary conformal window at strong coupling and estimate its lower limit. Implications for model building and cosmology are indicated.

  3. Microsoft Windows 2000 Router Configuration Guide

    National Research Council Canada - National Science Library

    Richburg, Florence

    2001-01-01

    The purpose of this guide is to provide technical guidance to network administrators of small to medium size networks in the configuration and integration of Microsoft Windows 2000 Server Router features...

  4. Microsoft Windows 2000 Network Architecture Guide

    National Research Council Canada - National Science Library

    Bartock, Paul

    2000-01-01

    The purpose of this guide is to inform the reader about the services that are available in the Microsoft Windows 2000 environment and how to integrate these services into their network architecture...

  5. Windows XP Operating System Security Analysis

    National Research Council Canada - National Science Library

    Goktepe, Meftun

    2002-01-01

    .... The purpose of this research is to determine if Windows XP, when used as a workstation operating system in domain- based networks, provides adequate security policy enforcement for organizations...

  6. Characteristics of Air Flow through Windows

    DEFF Research Database (Denmark)

    Heiselberg, Per; Dam, Henrik; Sørensen, Lars C.

    This paper describes the first results of a series of laboratory investigations that is performed to characterise three different window types. The results show the air flow conditions for different ventilation strategies and temperature differences. For one of the windows values of the discharge...... coefficient are shown for both isothermal and non-isothermal flow conditions and the thermal comfort conditions are evaluated by measurements of velocity and temperature levels in the air flow in the occupied zone.......This paper describes the first results of a series of laboratory investigations that is performed to characterise three different window types. The results show the air flow conditions for different ventilation strategies and temperature differences. For one of the windows values of the discharge...

  7. Translational nanomedicine--through the therapeutic window.

    Science.gov (United States)

    Pierce, Robin L

    2015-01-01

    Translational nanomedicine occurs only through the successful integration of multiple inputs and iterative modifications. The therapeutic window plays a pivotal role in the trajectory of translational nanomedicine. Often defined in terms of the range of dosage for safe and effective therapeutic effect, a second definition of the therapeutic window refers to the often narrow temporal window in which a therapeutic effect can be obtained. Expanding the second definition to explicitly include the spatial dimension, this article explores aspects of the therapeutic spaces created by nanomedicine that shift the traditional dimensions of symptom, sign and pathology. This article analyzes three aspects of the therapeutic window in nanomedicine - temporal, spatial and manner of construction and their impact on the dimensions of modern medicine.

  8. Microsoft Windows Server 2003: Security Enhancements and New Features

    National Research Council Canada - National Science Library

    Montehermoso, Ronald

    2004-01-01

    .... Windows NT and Windows 2000 were known to have numerous security vulnerabilities; hence Microsoft focused on improving security by making Windows Server 2003 secure by design, secure by default, secure in deployment...

  9. Cascaded Window Memoization for Medical Imaging

    OpenAIRE

    Khalvati , Farzad; Kianpour , Mehdi; Tizhoosh , Hamid ,

    2011-01-01

    Part 12: Medical Applications of ANN and Ethics of AI; International audience; Window Memoization is a performance improvement technique for image processing algorithms. It is based on removing computational redundancy in an algorithm applied to a single image, which is inherited from data redundancy in the image. The technique employs a fuzzy reuse mechanism to eliminate unnecessary computations. This paper extends the window memoization technique such that in addition to exploiting the data...

  10. Windows in Low Energy Houses. Size Matters

    Energy Technology Data Exchange (ETDEWEB)

    Persson, Mari-Louise

    2004-06-01

    A generally accepted way of building passive houses has been to have small windows facing north and a large glass facade to the south. This is to minimize losses on the north side while gaining as much solar heat as possible on the south. In spring 2001, twenty terraced houses were built outside Goeteborg partly in this way. The indoor temperature is kept at a comfortable level by passive methods, using solar gains and internal gains from household appliances and occupants. Heat losses are very low, since the building envelope is well insulated and since modern coated triple-glazed windows have been installed. The purpose of this work is to investigate how decreasing the window size facing south and increasing the window size facing north in low energy houses will influence the energy consumption and maximum power needed to keep the indoor temperature between 23 and 26 deg C. Different climates and orientations have been investigated and so have the influence of occupancy and window type. A dynamic building simulation tool, DEROB, has been used and the simulations indicate an extremely low energy demand for the houses. The results show that the size of the energy efficient windows does not have a major influence on the heating demand in winter, but is of relevant signification looking at the cooling need in summer. This indicates that instead of the traditional technique of building passive houses it is possible to enlarge the window area facing north and get better lighting conditions. To decrease the energy need for cooling, there is an optimal window size facing south that is smaller than the original size of the investigated buildings.

  11. Outside-In Signal Transmission by Conformational Changes in Integrin Mac-11

    Science.gov (United States)

    Lefort, Craig T.; Hyun, Young-Min; Schultz, Joanne B.; Law, Foon-Yee; Waugh, Richard E.; Knauf, Philip A.; Kim, Minsoo

    2010-01-01

    Intracellular signals associated with or triggered by integrin ligation can control cell survival, differentiation, proliferation, and migration. Despite accumulating evidence that conformational changes regulate integrin affinity to its ligands, how integrin structure regulates signal transmission from the outside to the inside of the cell remains elusive. Using fluorescence resonance energy transfer, we addressed whether conformational changes in integrin Mac-1 are sufficient to transmit outside-in signals in human neutrophils. Mac-1 conformational activation induced by ligand occupancy or activating Ab binding, but not integrin clustering, triggered similar patterns of intracellular protein tyrosine phosphorylation, including Akt phosphorylation, and inhibited spontaneous neutrophil apoptosis, indicating that global conformational changes are critical for Mac-1-dependent outside-in signal transduction. In neutrophils and myeloid K562 cells, ligand ICAM-1 or activating Ab binding promoted switchblade-like extension of the Mac-1 extracellular domain and separation of the αM and β2 subunit cytoplasmic tails, two structural hallmarks of integrin activation. These data suggest the primacy of global conformational changes in the generation of Mac-1 outside-in signals. PMID:19864611

  12. Eliminating the Heart from the Curcumin Molecule: Monocarbonyl Curcumin Mimics (MACs)

    Science.gov (United States)

    Shetty, Dinesh; Kim, Yong Joon; Shim, Hyunsuk; Snyder, James P.

    2015-01-01

    Curcumin is a natural product with several thousand years of heritage. Its traditional Asian application to human ailments has been subjected in recent decades to worldwide pharmacological, biochemical and clinical investigations. Curcumin’s Achilles heel lies in its poor aqueous solubility and rapid degradation at pH ~ 7.4. Researchers have sought to unlock curcumin’s assets by chemical manipulation. One class of molecules under scrutiny are the monocarbonyl analogs of curcumin (MACs). A thousand plus such agents have been created and tested primarily against cancer and inflammation. The outcome is clear. In vitro, MACs furnish a 10–20 fold potency gain vs. curcumin for numerous cancer cell lines and cellular proteins. Similarly, MACs have successfully demonstrated better pharmacokinetic (PK) profiles in mice and greater tumor regression in cancer xenografts in vivo than curcumin. The compounds reveal limited toxicity as measured by murine weight gain and histopathological assessment. To our knowledge, MAC members have not yet been monitored in larger animals or humans. However, Phase 1 clinical trials are certainly on the horizon. The present review focuses on the large and evolving body of work in cancer and inflammation, but also covers MAC structural diversity and early discovery for treatment of bacteria, tuberculosis, Alzheimer’s disease and malaria. PMID:25547726

  13. Crystallization and preliminary X-ray crystallographic analysis of MacA from Actinobacillus actinomycetemcomitans

    International Nuclear Information System (INIS)

    Piao, Shunfu; Xu, Yongbin; Ha, Nam-Chul

    2008-01-01

    A periplasmic membrane-fusion protein MacA from Actinobacillus actinomycetemcomitans, an essential component of the multidrug efflux pump in Gram-negative bacteria, was crystallized. Periplasmic membrane-fusion proteins (MFPs) are an essential component of the multidrug efflux pump in Gram-negative bacteria. They play a crucial role in bridging the outer membrane porin TolC and two distinct types of inner membrane transporters. The MFP MacA bridges the inner membrane ABC-type multidrug transporter MacB and the outer membrane porin TolC. MacA from the pathogenic bacterium Actinobacillus actinomycetemcomitans was expressed in Escherichia coli B834 (DE3) and the recombinant protein was purified using Ni–NTA affinity, Q anion-exchange and gel-filtration chromatography. The purified MacA protein was crystallized using the vapour-diffusion method. A MAD diffraction data set was collected to a resolution of 3.0 Å at 100 K. The crystal belongs to space group P622, with unit-cell parameters a = b = 109.2, c = 255.4 Å, α = β = 90, γ = 120°, and contains one molecule in the asymmetric unit

  14. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.

    Science.gov (United States)

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-10-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.

  15. Efficient MAC Protocol for Hybrid Wireless Network with Heterogeneous Sensor Nodes

    Directory of Open Access Journals (Sweden)

    Md. Nasre Alam

    2016-01-01

    Full Text Available Although several Directional Medium Access Control (DMAC protocols have been designed for use with homogeneous networks, it can take a substantial amount of time to change sensor nodes that are equipped with an omnidirectional antenna for sensor nodes with a directional antenna. Thus, we require a novel MAC protocol for use with an intermediate wireless network that consists of heterogeneous sensor nodes equipped with either an omnidirectional antenna or a directional antenna. The MAC protocols that have been designed for use in homogeneous networks are not suitable for use in a hybrid network due to deaf, hidden, and exposed nodes. Therefore, we propose a MAC protocol that exploits the characteristics of a directional antenna and can also work efficiently with omnidirectional nodes in a hybrid network. In order to address the deaf, hidden, and exposed node problems, we define RTS/CTS for the neighbor (RTSN/CTSN and Neighbor Information (NIP packets. The performance of the proposed MAC protocol is evaluated through a numerical analysis using a Markov model. In addition, the analytical results of the MAC protocol are verified through an OPNET simulation.

  16. Eliminating the Heart from the Curcumin Molecule: Monocarbonyl Curcumin Mimics (MACs

    Directory of Open Access Journals (Sweden)

    Dinesh Shetty

    2014-12-01

    Full Text Available Curcumin is a natural product with several thousand years of heritage. Its traditional Asian application to human ailments has been subjected in recent decades to worldwide pharmacological, biochemical and clinical investigations. Curcumin’s Achilles heel lies in its poor aqueous solubility and rapid degradation at pH ~ 7.4. Researchers have sought to unlock curcumin’s assets by chemical manipulation. One class of molecules under scrutiny are the monocarbonyl analogs of curcumin (MACs. A thousand plus such agents have been created and tested primarily against cancer and inflammation. The outcome is clear. In vitro, MACs furnish a 10–20 fold potency gain vs. curcumin for numerous cancer cell lines and cellular proteins. Similarly, MACs have successfully demonstrated better pharmacokinetic (PK profiles in mice and greater tumor regression in cancer xenografts in vivo than curcumin. The compounds reveal limited toxicity as measured by murine weight gain and histopathological assessment. To our knowledge, MAC members have not yet been monitored in larger animals or humans. However, Phase 1 clinical trials are certainly on the horizon. The present review focuses on the large and evolving body of work in cancer and inflammation, but also covers MAC structural diversity and early discovery for treatment of bacteria, tuberculosis, Alzheimer’s disease and malaria.

  17. Crystallization and preliminary X-ray crystallographic analysis of MacA from Actinobacillus actinomycetemcomitans

    Energy Technology Data Exchange (ETDEWEB)

    Piao, Shunfu; Xu, Yongbin; Ha, Nam-Chul, E-mail: hnc@pusan.ac.kr [College of Pharmacy and Research Institute for Drug Development, Pusan National University, Jangjeon-dong, Geumjeong-gu, Busan 609-735 (Korea, Republic of)

    2008-05-01

    A periplasmic membrane-fusion protein MacA from Actinobacillus actinomycetemcomitans, an essential component of the multidrug efflux pump in Gram-negative bacteria, was crystallized. Periplasmic membrane-fusion proteins (MFPs) are an essential component of the multidrug efflux pump in Gram-negative bacteria. They play a crucial role in bridging the outer membrane porin TolC and two distinct types of inner membrane transporters. The MFP MacA bridges the inner membrane ABC-type multidrug transporter MacB and the outer membrane porin TolC. MacA from the pathogenic bacterium Actinobacillus actinomycetemcomitans was expressed in Escherichia coli B834 (DE3) and the recombinant protein was purified using Ni–NTA affinity, Q anion-exchange and gel-filtration chromatography. The purified MacA protein was crystallized using the vapour-diffusion method. A MAD diffraction data set was collected to a resolution of 3.0 Å at 100 K. The crystal belongs to space group P622, with unit-cell parameters a = b = 109.2, c = 255.4 Å, α = β = 90, γ = 120°, and contains one molecule in the asymmetric unit.

  18. MAP, MAC, and vortex-rings configurations in the Weinberg-Salam model

    Science.gov (United States)

    Teh, Rosy; Ng, Ban-Loong; Wong, Khai-Ming

    2015-11-01

    We report on the presence of new axially symmetric monopoles, antimonopoles and vortex-rings solutions of the SU(2)×U(1) Weinberg-Salam model of electromagnetic and weak interactions. When the ϕ-winding number n = 1, and 2, the configurations are monopole-antimonopole pair (MAP) and monopole-antimonopole chain (MAC) with poles of alternating sign magnetic charge arranged along the z-axis. Vortex-rings start to appear from the MAP and MAC configurations when the winding number n = 3. The MAP configurations possess zero net magnetic charge whereas the MAC configurations possess net magnetic charge of 4 πn / e. In the MAP configurations, the monopole-antimonopole pair is bounded by the Z0 field flux string and there is an electromagnetic current loop encircling it. The monopole and antimonopole possess magnetic charges ± 4πn/e sin2θW respectively. In the MAC configurations there is no string connecting the monopole and the adjacent antimonopole and they possess magnetic charges ± 4 πn/e respectively. The MAC configurations possess infinite total energy and zero magnetic dipole moment whereas the MAP configurations which are actually sphalerons possess finite total energy and magnetic dipole moment. The configurations were investigated for varying values of Higgs self-coupling constant 0 ≤ λ ≤ 40 at Weinberg angle θW = π/4.

  19. USB Storage Device Forensics for Windows 10.

    Science.gov (United States)

    Arshad, Ayesha; Iqbal, Waseem; Abbas, Haider

    2018-05-01

    Significantly increased use of USB devices due to their user-friendliness and large storage capacities poses various threats for many users/companies in terms of data theft that becomes easier due to their efficient mobility. Investigations for such data theft activities would require gathering critical digital information capable of recovering digital forensics artifacts like date, time, and device information. This research gathers three sets of registry and logs data: first, before insertion; second, during insertion; and the third, after removal of a USB device. These sets are analyzed to gather evidentiary information from Registry and Windows Event log that helps in tracking a USB device. This research furthers the prior research on earlier versions of Microsoft Windows and compares it with latest Windows 10 system. Comparison of Windows 8 and Windows 10 does not show much difference except for new subkey under USB Key in registry. However, comparison of Windows 7 with latest version indicates significant variances. © 2017 American Academy of Forensic Sciences.

  20. AN INTRODUCTION TO WINDOWS 2000 AT CERN

    CERN Multimedia

    2001-01-01

    A demonstration of the new supported Windows environment for all the CERN personal computers (PC) will be given which is based on Windows 2000. This presentation will assume little or no familiarity with the PC, or NICE, and will concentrate on the services being offered to the users of PCs at CERN. How NICE 2000 can facilitate the work of all users, eventually becoming the key access point to all activities in the laboratory will be demonstrated. Information: http://winservices.web.cern.ch/winservices/Seminars/Tutorials/ Date Title Language Location Speaker Fri 1/6 10:00 Une introduction à Windows 2000 au CERN F IT Auditorium (31/3-004) Alberto Pace Tue 5/6 10:00 Une introduction à Windows 2000 au CERN F LHC Auditorium (30/7th floor) Frederic Hemmer Tue 5/6 14:00 Une introduction à Windows 2000 au CERN F SL Auditorium (864/1s floor) Michel Bornand Tue 5/6 14:00 An introduction to Windows 2000 at CERN E IT Auditorium (31/3-004) Andreas Wagner ...