Sample records for detection system raids

  1. HICO and RAIDS Experiment Payload - Remote Atmospheric and Ionospheric Detection System (RAIDS)

    NASA Technical Reports Server (NTRS)

    Budzien, Scott

    2009-01-01

    The HICO and RAIDS Experiment Payload - Remote Atmospheric and Ionospheric Detection System (HREP-RAIDS) experiment will provide atmospheric scientists with a complete description of the major constituents of the thermosphere (layer of the Earth's atmosphere) and ionosphere (uppermost layer of the Earth's atmosphere), global electron density profiles at altitudes between 100 - 350 kilometers.

  2. Early Results from the RAIDS Experiment on the ISS

    NASA Astrophysics Data System (ADS)

    Budzien, S. A.; Bishop, R. L.; Stephan, A. W.; Christensen, A. B.; Hecht, J. H.; Straus, P. R.

    2009-12-01

    The Remote Atmospheric and Ionospheric Detection System (RAIDS) is a suite of three photometers, three spectrometers, and two spectrographs which span the wavelength range 55-874 nm and remotely sense the thermosphere and ionosphere by scanning and imaging the limb. RAIDS was scheduled to fly to the Japanese Experiment Module—Exposed Facility (JEM-EF) aboard the International Space Station (ISS) in September 2009. RAIDS along with a companion hyperspectral imaging experiment will serve as the first US payload on the JEM-EF. The scientific objectives of the new RAIDS experiment are to study the temperature of the lower thermosphere (100-200 km), to measure composition and chemistry of the lower thermosphere and ionosphere, and to measure the initial source of OII 83.4 nm emission. RAIDS will provide valuable data useful for exploring tidal effects in the thermosphere and ionosphere system, validating dayside ionospheric remote sensing methods, and studying local time variations in important chemical and thermal processes. Early observational results from the RAIDS experiment will be presented. The RAIDS sensor suite performs multispectral limb scanning from the open end of the HICO-RAIDS Experiment Payload aboard the ISS.

  3. Smallholder farms as stepping stone corridors for crop-raiding elephant in northern Tanzania: integration of Bayesian expert system and network simulator.

    PubMed

    Pittiglio, Claudia; Skidmore, Andrew K; van Gils, Hein A M J; McCall, Michael K; Prins, Herbert H T

    2014-03-01

    Crop-raiding elephants affect local livelihoods, undermining conservation efforts. Yet, crop-raiding patterns are poorly understood, making prediction and protection difficult. We hypothesized that raiding elephants use corridors between daytime refuges and farmland. Elephant counts, crop-raiding records, household surveys, Bayesian expert system, and least-cost path simulation were used to predict four alternative categories of daily corridors: (1) footpaths, (2) dry river beds, (3) stepping stones along scattered small farms, and (4) trajectories of shortest distance to refuges. The corridor alignments were compared in terms of their minimum cumulative resistance to elephant movement and related to crop-raiding zones quantified by a kernel density function. The "stepping stone" corridors predicted the crop-raiding patterns. Elephant presence was confirmed along these corridors, demonstrating that small farms located between refuges and contiguous farmland increase habitat connectivity for elephant. Our analysis successfully predicted elephant occurrence in farmland where daytime counts failed to detect nocturnal presence. These results have conservation management implications.

  4. HICO and RAIDS Experiment Payload - Hyperspectral Imager for the Coastal Ocean

    NASA Technical Reports Server (NTRS)

    Corson, Mike

    2009-01-01

    HICO and RAIDS Experiment Payload - Hyperspectral Imager For The Coastal Ocean (HREP-HICO) will operate a visible and near-infrared (VNIR) Maritime Hyperspectral Imaging (MHSI) system, to detect, identify and quantify coastal geophysical features from the International Space Station.

  5. ZFS on RBODs - Leveraging RAID Controllers for Metrics and Enclosure Management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stearman, D. M.

    2015-03-30

    Traditionally, the Lustre file system has relied on the ldiskfs file system with reliable RAID (Redundant Array of Independent Disks) storage underneath. As of Lustre 2.4, ZFS was added as a backend file system, with built-in software RAID, thereby removing the need of expensive RAID controllers. ZFS was designed to work with JBOD (Just a Bunch Of Disks) storage enclosures under the Solaris Operating System, which provided a rich device management system. Long time users of the Lustre file system have relied on the RAID controllers to provide metrics and enclosure monitoring and management services, with rich APIs and commandmore » line interfaces. This paper will study a hybrid approach using an advanced full featured RAID enclosure which is presented to the host as a JBOD, This RBOD (RAIDed Bunch Of Disks) allows ZFS to do the RAID protection and error correction, while the RAID controller handles management of the disks and monitors the enclosure. It was hoped that the value of the RAID controller features would offset the additional cost, and that performance would not suffer in this mode. The test results revealed that the hybrid RBOD approach did suffer reduced performance.« less

  6. Synthetic Cannabinoid and Mitragynine Exposure of Law Enforcement Agents During the Raid of an Illegal Laboratory - Nevada, 2014.

    PubMed

    Tapp, Loren; Ramsey, Jessica G; Wen, Anita; Gerona, Roy

    2017-12-01

    Synthetic cannabinoids (SCs), commonly known by the street name "Spice," are designer drugs of abuse that mimic the psychoactive effects of marijuana. Intentional SC use has resulted in multiple toxicities (1,2), but little is known about occupational SC exposure. After a federal agency's law enforcement personnel in Nevada reported irritability and feeling "high" after raiding illegal SC laboratories and processing seized SCs, a request for a health hazard evaluation was made by the agency to CDC's National Institute for Occupational Safety and Health (NIOSH) in 2014 to evaluate agents' occupational SC exposures. After making the request for a health hazard evaluation, federal agents conducted a raid of an illegal SC laboratory, with assistance from local law enforcement and Drug Enforcement Administration (DEA) personnel and with NIOSH investigators observing from a distance. After the raid, agents collected and processed material evidence. NIOSH investigators tested agents' urine for SC levels before and after the raid and measured SCs in the air and on surfaces after the raid. DEA determined that AB-PINACA (an SC compound) and mitragynine (a plant material with opium-like effects, also known as "kratom") were present in the illegal laboratory. AB-PINACA, its metabolites, and mitragynine were not detected in agents' urine before the raid; however, one or more of these substances was found in the urine of six of nine agents after the raid and processing of the SC evidence. AB-PINACA was detected in one surface wipe sample from the SC laboratory; none was detected in the air in the laboratory or in the offices of the law enforcement agency where the materials were processed after the raid. No policies were in place regarding work practices and use of personal protective equipment (PPE) during raids and evidence processing. To protect agents from SC exposures, NIOSH recommended that the agency require agents to wear a minimum level of PPE (e.g., protective gloves and disposable clothing) and undergo training in PPE and in handling and storing of contaminated evidence from SC laboratory raids. Showers and locker rooms also need to be provided so that agents can reduce contamination and prevent take-home exposure.

  7. Technology insertion of a COTS RAID server as an image buffer in the image chain of the Defense Mapping Agency's Digital Production System

    NASA Astrophysics Data System (ADS)

    Mehring, James W.; Thomas, Scott D.

    1995-11-01

    The Data Services Segment of the Defense Mapping Agency's Digital Production System provides a digital archive of imagery source data for use by DMA's cartographic user's. This system was developed in the mid-1980's and is currently undergoing modernization. This paper addresses the modernization of the imagery buffer function that was performed by custom hardware in the baseline system and is being replaced by a RAID Server based on commercial off the shelf (COTS) hardware. The paper briefly describes the baseline DMA image system and the modernization program, that is currently under way. Throughput benchmark measurements were made to make design configuration decisions for a commercial off the shelf (COTS) RAID Server to perform as system image buffer. The test program began with performance measurements of the RAID read and write operations between the RAID arrays and the server CPU for RAID levels 0, 5 and 0+1. Interface throughput measurements were made for the HiPPI interface between the RAID Server and the image archive and processing system as well as the client side interface between a custom interface board that provides the interface between the internal bus of the RAID Server and the Input- Output Processor (IOP) external wideband network currently in place in the DMA system to service client workstations. End to end measurements were taken from the HiPPI interface through the RAID write and read operations to the IOP output interface.

  8. Evaluation of ZFS as an efficient WLCG storage backend

    NASA Astrophysics Data System (ADS)

    Ebert, M.; Washbrook, A.

    2017-10-01

    A ZFS based software raid system was tested for performance against a hardware raid system providing storage based on the traditional Linux file systems XFS and EXT4. These tests were done for a healthy raid array as well as for a degraded raid array and during the rebuild of a raid array. It was found that ZFS performs better in almost all test scenarios. In addition, distinct features of ZFS were tested for WLCG data storage use, like compression and higher raid levels with triple redundancy information. The long term reliability was observed after converting all production storage servers at the Edinburgh WLCG Tier-2 site to ZFS, resulting in about 1.2PB of ZFS based storage at this site.

  9. Engineering the object-relation database model in O-Raid

    NASA Technical Reports Server (NTRS)

    Dewan, Prasun; Vikram, Ashish; Bhargava, Bharat

    1989-01-01

    Raid is a distributed database system based on the relational model. O-raid is an extension of the Raid system and will support complex data objects. The design of O-Raid is evolutionary and retains all features of relational data base systems and those of a general purpose object-oriented programming language. O-Raid has several novel properties. Objects, classes, and inheritance are supported together with a predicate-base relational query language. O-Raid objects are compatible with C++ objects and may be read and manipulated by a C++ program without any 'impedance mismatch'. Relations and columns within relations may themselves be treated as objects with associated variables and methods. Relations may contain heterogeneous objects, that is, objects of more than one class in a certain column, which can individually evolve by being reclassified. Special facilities are provided to reduce the data search in a relation containing complex objects.

  10. Is the bang worth the buck? A RAID performance study

    NASA Technical Reports Server (NTRS)

    Hauser, Susan E.; Berman, Lewis E.; Thoma, George R.

    1996-01-01

    Expecting a high data delivery rate as well as data protection, the Lister Hill National Center for Biomedical Communications procured a RAID system to house image files for image delivery applications. A study was undertaken to determine the configuration of the RAID system that would provide for the fastest retrieval of image files. Average retrieval times with single and with concurrent users were measured for several stripe widths and several numbers of disks for RAID levels 0, 0+1 and 5. These are compared to each other and to average retrieval times for non-RAID configurations of the same hardware. Although the study in ongoing, a few conclusions have emerged regarding the tradeoffs among the different configurations with respect to file retrieval speed and cost.

  11. Human chorionic gonadotropin radioantibodies in the radioimmunodetection of cancer and for disclosure of occult metastases.

    PubMed Central

    Goldenberg, D M; Kim, E E; DeLand, F H

    1981-01-01

    Radioimmunodetection (RaID) of tumors containing human chorionic gonadotropin (hCG; choriogonadotropin) was evaluated in 25 patients by injecting 131I-labeled goat antibody IgG against hCG and performing total-body photoscans with a gamma scintillation camera 24 and 48 hr later. All 10 testicular cancer patients with proven tumor sites had positive RaID results, whereas three cases without known tumor were negative. Four patients with hydatidiform mole and one with degenerative products of conception showed positive RaID results consistent with elevated serum hCG titers. Two putatively false-positive results were obtained in patients with lung or ovarian cancer, whereas a false-negative metastasis to the liver of a patient with lung cancer and an elevated serum hCG titer was observed. Of 14 tumor sites found by RaID in 10 testicular cancer patients, 4 were revealed by RaID prior to any other detection method used and provided a lead time to definitive diagnosis by other measures of a few days to greater than 1 yr. Although a number of patients had high serum hCG levels, even exceeding 3 microgram/ml, the xenogeneic antibody was capable of localizing in tumor. No adverse effects were noted in any of the patients studied. Thus, hCG RaID appears to be a safe and effective method of detecting and locating hCG-producing tumors and has been found to disclose occult testicular cancers. Images PMID:6278487

  12. Online performance evaluation of RAID 5 using CPU utilization

    NASA Astrophysics Data System (ADS)

    Jin, Hai; Yang, Hua; Zhang, Jiangling

    1998-09-01

    Redundant arrays of independent disks (RAID) technology is the efficient way to solve the bottleneck problem between CPU processing ability and I/O subsystem. For the system point of view, the most important metric of on line performance is the utilization of CPU. This paper first employs the way to calculate the CPU utilization of system connected with RAID level 5 using statistic average method. From the simulation results of CPU utilization of system connected with RAID level 5 subsystem can we see that using multiple disks as an array to access data in parallel is the efficient way to enhance the on-line performance of disk storage system. USing high-end disk drivers to compose the disk array is the key to enhance the on-line performance of system.

  13. Sawmill: A Logging File System for a High-Performance RAID Disk Array

    DTIC Science & Technology

    1995-01-01

    from limiting disk performance, new controller architectures connect the disks directly to the network so that data movement bypasses the file server...These developments raise two questions for file systems: how to get the best performance from a RAID, and how to use such a controller architecture ...the RAID-II storage system; this architecture provides a fast data path that moves data rapidly among the disks, high-speed controller memory, and the

  14. The Raid distributed database system

    NASA Technical Reports Server (NTRS)

    Bhargava, Bharat; Riedl, John

    1989-01-01

    Raid, a robust and adaptable distributed database system for transaction processing (TP), is described. Raid is a message-passing system, with server processes on each site to manage concurrent processing, consistent replicated copies during site failures, and atomic distributed commitment. A high-level layered communications package provides a clean location-independent interface between servers. The latest design of the package delivers messages via shared memory in a configuration with several servers linked into a single process. Raid provides the infrastructure to investigate various methods for supporting reliable distributed TP. Measurements on TP and server CPU time are presented, along with data from experiments on communications software, consistent replicated copy control during site failures, and concurrent distributed checkpointing. A software tool for evaluating the implementation of TP algorithms in an operating-system kernel is proposed.

  15. Design of redundant array of independent DVD libraries based on iSCSI

    NASA Astrophysics Data System (ADS)

    Chen, Yupeng; Pan, Longfa

    2003-04-01

    This paper presents a new approach to realize the redundant array of independent DVD libraries (RAID-LoIP) by using the iSCSI technology and traditional RAID algorithms. Our design reaches the high performance of optical storage system with following features: large storage size, highly accessing rate, random access, long distance of DVD libraries, block I/O storage, long storage life. Our RAID-LoIP system can be a good solution for broadcasting media asset storage system.

  16. Hybrid RAID With Dual Control Architecture for SSD Reliability

    NASA Astrophysics Data System (ADS)

    Chatterjee, Santanu

    2010-10-01

    The Solid State Devices (SSD) which are increasingly being adopted in today's data storage Systems, have higher capacity and performance but lower reliability, which leads to more frequent rebuilds and to a higher risk. Although SSD is very energy efficient compared to Hard Disk Drives but Bit Error Rate (BER) of an SSD require expensive erase operations between successive writes. Parity based RAID (for Example RAID4,5,6)provides data integrity using parity information and supports losing of any one (RAID4, 5)or two drives(RAID6), but the parity blocks are updated more often than the data blocks due to random access pattern so SSD devices holding more parity receive more writes and consequently age faster. To address this problem, in this paper we propose a Model based System of hybrid disk array architecture in which we plan to use RAID 4(Stripping with Parity) technique and SSD drives as Data drives while any fastest Hard disk drives of same capacity can be used as dedicated parity drives. By this proposed architecture we can open the door to using commodity SSD's past their erasure limit and it can also reduce the need for expensive hardware Error Correction Code (ECC) in the devices.

  17. Design and implementation of reliability evaluation of SAS hard disk based on RAID card

    NASA Astrophysics Data System (ADS)

    Ren, Shaohua; Han, Sen

    2015-10-01

    Because of the huge advantage of RAID technology in storage, it has been widely used. However, the question associated with this technology is that the hard disk based on the RAID card can not be queried by Operating System. Therefore how to read the self-information and log data of hard disk has been a problem, while this data is necessary for reliability test of hard disk. In traditional way, this information can be read just suitable for SATA hard disk, but not for SAS hard disk. In this paper, we provide a method by using LSI RAID card's Application Program Interface, communicating with RAID card and analyzing the feedback data to solve the problem. Then we will get the necessary information to assess the SAS hard disk.

  18. Knowing your enemies: seasonal dynamics of host-social parasite recognition.

    PubMed

    D'Ettorre, Patrizia; Brunner, Elisabeth; Wenseleers, Tom; Heinze, Jürgen

    2004-12-01

    Despite its evolutionary significance, behavioural flexibility of social response has rarely been investigated in insects. We studied a host-social parasite system: the slave-making ant Polyergus rufescens and its host Formica rufibarbis. Free-living host workers from parasitized and from unparasitized areas were compared in their level of aggression against the parasite and alien conspecifics. We expected that a seasonal change would occur in the acceptance threshold of F. rufibarbis workers from a parasitized area towards the parasite, whereas F. rufibarbis workers from an unparasitized area would not show substantial changes connected with the parasite's peak in activity (raiding and colony-founding season). The results showed a significant adaptive behavioural flexibility of host species workers and are consistent with the acceptance threshold model's (Reeve 1989) prediction that recognition systems are not fixed but context-dependent. In particular, host workers from the unparasitized area were highly aggressive towards the parasite regardless of the season, whereas host workers from the parasitized area significantly increased their aggression towards the parasite during its raiding and colony-founding season. Being able to detect and possibly kill a Polyergus scout searching for host nests can be an effective strategy for a Formica colony to avoid being raided or usurped by a parasite queen.

  19. Knowing your enemies: seasonal dynamics of host social parasite recognition

    NASA Astrophysics Data System (ADS)

    D'Ettorre, Patrizia; Brunner, Elisabeth; Wenseleers, Tom; Heinze, Jürgen

    2004-12-01

    Despite its evolutionary significance, behavioural flexibility of social response has rarely been investigated in insects. We studied a host social parasite system: the slave-making ant Polyergus rufescens and its host Formica rufibarbis. Free-living host workers from parasitized and from unparasitized areas were compared in their level of aggression against the parasite and alien conspecifics. We expected that a seasonal change would occur in the acceptance threshold of F. rufibarbis workers from a parasitized area towards the parasite, whereas F. rufibarbis workers from an unparasitized area would not show substantial changes connected with the parasite’s peak in activity (raiding and colony-founding season). The results showed a significant adaptive behavioural flexibility of host species workers and are consistent with the acceptance threshold model’s (Reeve 1989) prediction that recognition systems are not fixed but context-dependent. In particular, host workers from the unparasitized area were highly aggressive towards the parasite regardless of the season, whereas host workers from the parasitized area significantly increased their aggression towards the parasite during its raiding and colony-founding season. Being able to detect and possibly kill a Polyergus scout searching for host nests can be an effective strategy for a Formica colony to avoid being raided or usurped by a parasite queen.

  20. Optimizing raid performance with cache

    NASA Technical Reports Server (NTRS)

    Bouzari, Alex

    1994-01-01

    We live in a world of increasingly complex applications and operating systems. Information is increasing at a mind-boggling rate. The consolidation of text, voice, and imaging represents an even greater challenge for our information systems. Which forced us to address three important questions: Where do we store all this information? How do we access it? And, how do we protect it against the threat of loss or damage? Introduced in the 1980s, RAID (Redundant Arrays of Independent Disks) represents a cost-effective solution to the needs of the information age. While fulfilling expectations for high storage, and reliability, RAID is sometimes subject to criticisms in the area of performance. However, there are design elements that can significantly enhance performance. They can be subdivided into two areas: (1) RAID levels or basic architecture. And, (2) enhancement schemes such as intelligent caching, support of tagged command queuing, and use of SCSI-2 Fast and Wide features.

  1. Local attitudes and perceptions toward crop-raiding by orangutans (Pongo abelii) and other nonhuman primates in northern Sumatra, Indonesia.

    PubMed

    Campbell-Smith, Gail; Simanjorang, Hubert V P; Leader-Williams, Nigel; Linkie, Matthew

    2010-09-01

    Human-wildlife conflicts, such as crop-raiding, increase as people expand their agricultural activities into wildlife habitats. Crop-raiding can reduce tolerance toward species that are already threatened, whereas potential dangers posed by conflicts with large-bodied species may also negatively influence local attitudes. Across Asia, wild pigs and primates, such as macaques, tend to be the most commonly reported crop raiders. To date, reports of crop-raiding incidents involving great apes have been less common, but incidents involving orangutans are increasingly emerging in Indonesia. To investigate the interplay of factors that might explain attitudes toward crop-raiding by orangutans (Pongo abelii), focal group discussions and semi-structured interviews were conducted among 822 farmers from 2 contrasting study areas in North Sumatra. The first study area of Batang Serangan is an agroforest system containing isolated orangutans that crop-raid. In contrast, the second area of Sidikalang comprises farmlands bordering extensive primary forest where orangutans are present but not reported to crop-raid. Farmers living in Batang Serangan thought that orangutans were dangerous, irrespective of earlier experience of crop-raiding. Farmers placed orangutans as the third most frequent and fourth most destructive crop pest, after Thomas' leaf monkey (Presbytis thomasi), wild boar (Sus scrofa), and long-tailed macaque (Macaca fascicularis). Although most (57%) farmers across both study areas were not scared of wildlife species, more than a quarter (28%) of the farmers' feared orangutans. Farmers in Batang Serangan were generally more tolerant toward crop-raiding orangutans, if they did not perceive them to present a physical threat. Most (67%) Batang Serangan farmers said that the local Forestry Department staff should handle crop-raiding orangutans, and most (81%) said that these officials did not care about such problems. Our results suggest that efforts to mitigate human-orangutan conflict may not, per se, change negative perceptions of those who live with the species, because these perceptions are often driven by fear. 2010 Wiley-Liss, Inc.

  2. Rapid Access Ice Drill: A New Tool for Exploration of the Deep Antarctic Ice Sheets and Subglacial Geology

    NASA Astrophysics Data System (ADS)

    Goodge, J. W.; Severinghaus, J. P.

    2014-12-01

    The Rapid Access Ice Drill (RAID) will penetrate the Antarctic ice sheets in order to core through deep ice, the glacial bed, and into bedrock below. This new technology will provide a critical first look at the interface between major ice caps and their subglacial geology. Currently in construction, RAID is a mobile drilling system capable of making several long boreholes in a single field season in Antarctica. RAID is interdisciplinary and will allow access to polar paleoclimate records in ice >1 Ma, direct observation at the base of the ice sheets, and recovery of rock cores from the ice-covered East Antarctic craton. RAID uses a diamond rock-coring system as in mineral exploration. Threaded drill-pipe with hardened metal bits will cut through ice using reverse circulation of Estisol for pressure-compensation, maintenance of temperature, and removal of ice cuttings. Near the bottom of the ice sheet, a wireline bottom-hole assembly will enable diamond coring of ice, the glacial bed, and bedrock below. Once complete, boreholes will be kept open with fluid, capped, and made available for future down-hole measurement of thermal gradient, heat flow, ice chronology, and ice deformation. RAID will also sample for extremophile microorganisms. RAID is designed to penetrate up to 3,300 meters of ice and take sample cores in less than 200 hours. This rapid performance will allow completion of a borehole in about 10 days before moving to the next drilling site. RAID is unique because it can provide fast borehole access through thick ice; take short ice cores for paleoclimate study; sample the glacial bed to determine ice-flow conditions; take cores of subglacial bedrock for age dating and crustal history; and create boreholes for use as an observatory in the ice sheets. Together, the rapid drilling capability and mobility of the drilling system, along with ice-penetrating imaging methods, will provide a unique 3D picture of the interior Antarctic ice sheets.

  3. Evaluating 6 ricin field detection assays.

    PubMed

    Slotved, Hans-Christian; Sparding, Nadja; Tanassi, Julia Tanas; Steenhard, Nina R; Heegaard, Niels H H

    2014-01-01

    This study presents data showing the performance of 6 commercial detection assays against ricin around concentrations specified as detection limits by the producers. A 2-fold dilution series of 20 ng/ml ricin was prepared and used for testing the lateral-flow kits: BADD, Pro Strips™, ENVI, RAID DX, Ricin BioThreat Alert, and IMASS™ device. Three of the 6 tested field assays (IMASS™ device, ENVI assay, and the BioThreat Alert assay) were able to detect ricin, although differences in the measured detection limits compared to the official detection limits and false-negative results were observed. We were not able to get the BADD, Pro Strips™, and RAID assays to function in our laboratory. We conclude that when purchasing a field responder assay, there is large variation in the specificity of the assays, and a number of in-house tests must be performed to ensure functionality.

  4. Crop Damage by Primates: Quantifying the Key Parameters of Crop-Raiding Events

    PubMed Central

    Wallace, Graham E.; Hill, Catherine M.

    2012-01-01

    Human-wildlife conflict often arises from crop-raiding, and insights regarding which aspects of raiding events determine crop loss are essential when developing and evaluating deterrents. However, because accounts of crop-raiding behaviour are frequently indirect, these parameters are rarely quantified or explicitly linked to crop damage. Using systematic observations of the behaviour of non-human primates on farms in western Uganda, this research identifies number of individuals raiding and duration of raid as the primary parameters determining crop loss. Secondary factors include distance travelled onto farm, age composition of the raiding group, and whether raids are in series. Regression models accounted for greater proportions of variation in crop loss when increasingly crop and species specific. Parameter values varied across primate species, probably reflecting differences in raiding tactics or perceptions of risk, and thereby providing indices of how comfortable primates are on-farm. Median raiding-group sizes were markedly smaller than the typical sizes of social groups. The research suggests that key parameters of raiding events can be used to measure the behavioural impacts of deterrents to raiding. Furthermore, farmers will benefit most from methods that discourage raiding by multiple individuals, reduce the size of raiding groups, or decrease the amount of time primates are on-farm. This study demonstrates the importance of directly relating crop loss to the parameters of raiding events, using systematic observations of the behaviour of multiple primate species. PMID:23056378

  5. Improvement in HPC performance through HIPPI RAID storage

    NASA Technical Reports Server (NTRS)

    Homan, Blake

    1993-01-01

    In 1986, RAID (redundant array of inexpensive (or independent) disks) technology was introduced as a viable solution to the I/O bottleneck. A number of different RAID levels were defined in 1987 by the Computer Science Division (EECS) University of California, Berkeley, each with specific advantages and disadvantages. With multiple RAID options available, taking advantage of RAID technology required matching particular RAID levels with specific applications. It was not possible to use one RAID device to address all applications. Maximum Strategy's Gen 4 Storage Server addresses this issue with a new capability called programmable RAID level partitioning. This capability enables users to have multiple RAID levels coexist on the same disks, thereby providing the versatility necessary for multiple concurrent applications.

  6. Formation of raiding parties for intergroup violence is mediated by social network structure

    PubMed Central

    Glowacki, Luke; Isakov, Alexander; Wrangham, Richard W.; McDermott, Rose; Fowler, James H.; Christakis, Nicholas A.

    2016-01-01

    Intergroup violence is common among humans worldwide. To assess how within-group social dynamics contribute to risky, between-group conflict, we conducted a 3-y longitudinal study of the formation of raiding parties among the Nyangatom, a group of East African nomadic pastoralists currently engaged in small-scale warfare. We also mapped the social network structure of potential male raiders. Here, we show that the initiation of raids depends on the presence of specific leaders who tend to participate in many raids, to have more friends, and to occupy more central positions in the network. However, despite the different structural position of raid leaders, raid participants are recruited from the whole population, not just from the direct friends of leaders. An individual’s decision to participate in a raid is strongly associated with the individual’s social network position in relation to other participants. Moreover, nonleaders have a larger total impact on raid participation than leaders, despite leaders’ greater connectivity. Thus, we find that leaders matter more for raid initiation than participant mobilization. Social networks may play a role in supporting risky collective action, amplify the emergence of raiding parties, and hence facilitate intergroup violence in small-scale societies. PMID:27790996

  7. Wide-area-distributed storage system for a multimedia database

    NASA Astrophysics Data System (ADS)

    Ueno, Masahiro; Kinoshita, Shigechika; Kuriki, Makato; Murata, Setsuko; Iwatsu, Shigetaro

    1998-12-01

    We have developed a wide-area-distribution storage system for multimedia databases, which minimizes the possibility of simultaneous failure of multiple disks in the event of a major disaster. It features a RAID system, whose member disks are spatially distributed over a wide area. Each node has a device, which includes the controller of the RAID and the controller of the member disks controlled by other nodes. The devices in the node are connected to a computer, using fiber optic cables and communicate using fiber-channel technology. Any computer at a node can utilize multiple devices connected by optical fibers as a single 'virtual disk.' The advantage of this system structure is that devices and fiber optic cables are shared by the computers. In this report, we first described our proposed system, and a prototype was used for testing. We then discussed its performance; i.e., how to read and write throughputs are affected by data-access delay, the RAID level, and queuing.

  8. Laboratory and semi-field evaluations of two (transfluthrin) spatial repellent devices against Aedes aegypti (L.) (Diptera: Culicidae).

    PubMed

    McPhatter, Lee P; Mischler, Paula D; Webb, Meiling Z; Chauhan, Kamal; Lindroth, Erica J; Richardson, Alec G; Debboun, Mustapha

    2017-01-01

    Two transfluthrin-based spatial repellent products (Raid Dual Action Insect Repellent and Home Freshener and Raid Shield (currently not commercially available), SC Johnson, Racine WI) were evaluated for spatial repellent effects against female Aedes aegypti (L.) mosquitoes under laboratory (wind tunnel) and semi-field (outdoor enclosure) conditions. The placement of either product in the wind tunnel significantly reduced host-seeking behaviors. The mean baseline (control) landing counts for the Raid Dual Action and Raid Shield were reduced by 95% and 74% respectively. Mean probing counts for the Raid Dual Action were reduced by 95%, while the probing counts for the Raid Shield were decreased by 69%. Baseline blood-feeding success was significantly reduced for both treatments: Raid Dual Action (100%) and Raid Shield (96%). Semi-field evaluations were conducted in outdoor enclosures at the Navy Entomology Center of Excellence, Jacksonville, Florida. A moderate reduction in mosquito entry into military style tents resulted when either product was placed near the tent opening. The Raid Shield reduced mosquito entry into tents by 88%, while the Dual Action decreased entry by 66%.

  9. Raiding parties of male spider monkeys: insights into human warfare?

    PubMed

    Aureli, Filippo; Schaffner, Colleen M; Verpooten, Jan; Slater, Kathryn; Ramos-Fernandez, Gabriel

    2006-12-01

    Raids into neighboring territories may occur for different reasons, including the increase of foraging and mating opportunities directly or indirectly through the killing of neighboring rivals. Lethal raids have been mainly observed in humans and chimpanzees, with raiding males being reported to search purposefully for neighbors. Here we report on the first cases ever witnessed of raiding parties of male spider monkeys, a species expected to show such a behavioral tendency, given its similarity with humans and chimpanzees in critical socio-ecological characteristics, such as fission-fusion social dynamics and male-male bonding. Despite the high degree of arboreality of spider monkeys, all seven witnessed raids involved the males progressing single file on the ground in unusual silence. This is remarkably similar to the behavior of chimpanzees. The circumstances around the raids suggest that factors such as reduced mating opportunities, number of males relative to that in the neighboring community, and the strength of bonds among males could play a role in the timing of such actions. The raids did not appear to be aimed at finding food, whereas there is some indication that they may directly or indirectly increase reproductive opportunities. Although no killing was observed, we cannot exclude the possibility that spider monkey raids may be aimed at harming rivals if a vulnerable individual were encountered. The similarity of spider monkey raids with those of chimpanzees and humans supports the notion that lethal raiding is a convergent response to similar socio-ecological conditions. 2006 Wiley-Liss, Inc.

  10. RAId_DbS: Peptide Identification using Database Searches with Realistic Statistics

    PubMed Central

    Alves, Gelio; Ogurtsov, Aleksey Y; Yu, Yi-Kuo

    2007-01-01

    Background The key to mass-spectrometry-based proteomics is peptide identification. A major challenge in peptide identification is to obtain realistic E-values when assigning statistical significance to candidate peptides. Results Using a simple scoring scheme, we propose a database search method with theoretically characterized statistics. Taking into account possible skewness in the random variable distribution and the effect of finite sampling, we provide a theoretical derivation for the tail of the score distribution. For every experimental spectrum examined, we collect the scores of peptides in the database, and find good agreement between the collected score statistics and our theoretical distribution. Using Student's t-tests, we quantify the degree of agreement between the theoretical distribution and the score statistics collected. The T-tests may be used to measure the reliability of reported statistics. When combined with reported P-value for a peptide hit using a score distribution model, this new measure prevents exaggerated statistics. Another feature of RAId_DbS is its capability of detecting multiple co-eluted peptides. The peptide identification performance and statistical accuracy of RAId_DbS are assessed and compared with several other search tools. The executables and data related to RAId_DbS are freely available upon request. PMID:17961253

  11. Mechanistic understanding of human-wildlife conflict through a novel application of dynamic occupancy models.

    PubMed

    Goswami, Varun R; Medhi, Kamal; Nichols, James D; Oli, Madan K

    2015-08-01

    Crop and livestock depredation by wildlife is a primary driver of human-wildlife conflict, a problem that threatens the coexistence of people and wildlife globally. Understanding mechanisms that underlie depredation patterns holds the key to mitigating conflicts across time and space. However, most studies do not consider imperfect detection and reporting of conflicts, which may lead to incorrect inference regarding its spatiotemporal drivers. We applied dynamic occupancy models to elephant crop depredation data from India between 2005 and 2011 to estimate crop depredation occurrence and model its underlying dynamics as a function of spatiotemporal covariates while accounting for imperfect detection of conflicts. The probability of detecting conflicts was consistently <1.0 and was negatively influenced by distance to roads and elevation gradient, averaging 0.08-0.56 across primary periods (distinct agricultural seasons within each year). The probability of crop depredation occurrence ranged from 0.29 (SE 0.09) to 0.96 (SE 0.04). The probability that sites raided by elephants in primary period t would not be raided in primary period t + 1 varied with elevation gradient in different seasons and was influenced negatively by mean rainfall and village density and positively by distance to forests. Negative effects of rainfall variation and distance to forests best explained variation in the probability that sites not raided by elephants in primary period t would be raided in primary period t + 1. With our novel application of occupancy models, we teased apart the spatiotemporal drivers of conflicts from factors that influence how they are observed, thereby allowing more reliable inference on mechanisms underlying observed conflict patterns. We found that factors associated with increased crop accessibility and availability (e.g., distance to forests and rainfall patterns) were key drivers of elephant crop depredation dynamics. Such an understanding is essential for rigorous prediction of future conflicts, a critical requirement for effective conflict management in the context of increasing human-wildlife interactions. © 2015 Society for Conservation Biology.

  12. Imaging of colorectal carcinoma with radiolabeled antibodies.

    PubMed

    Goldenberg, D M; Goldenberg, H; Sharkey, R M; Lee, R E; Higgenbotham-Ford, E; Horowitz, J A; Hall, T C; Pinsky, C M; Hansen, H J

    1989-10-01

    Colorectal cancer has been the tumor type most frequently studied with radiolabeled antibodies. Among the various antibodies, a majority of patients with colorectal cancer have received xenogeneic polyclonal or monoclonal antibodies against carcino-embryonic antigen. This review summarizes the current status of colorectal cancer imaging with radiolabeled antibodies, ie, radioimmunodetection (RAID), and examines the published studies involving carcinoembryonic antigen (CEA) antibodies and 17-1A, 19-9, and B72.3, and other monoclonal antibodies. In order to better address the issue of the current and future clinical usefulness of this emerging technology, particular attention is given to the protocols, methods, and results of the published studies. Despite differences in study parameters, antibodies and forms, labels, administration routes and doses, and scanning instruments and methods, it has been found that (1) almost no adverse reactions have been evident; (2) antibody fragments are preferred over whole immunoglobulin G reagents because they achieve higher tumor-to-background ratios earlier, thus reducing or precluding the need for dual-isotope subtraction methods or long delays before imaging; (3) use of antibody fragments, including the monovalent Fab' form, permits imaging with short-lived radionuclides of excellent photon properties, such as 123I and 99mTc; (4) circulating antigens against which the imaging antibody is directed can complex with the injected antibody, but such complexes have not prevented successful RAID; (5) patients with high serum titers of the appropriate antigen target usually have higher rates of positive RAID; (6) patients who are seronegative for the tumor antigen being studied can have positive RAID findings, which can represent the detection of occult lesions; (7) single photon emission computed tomography appears to provide better image resolution than planar scanning; (8) regardless of the sensitivity reported in any particular study, almost all investigators have observed the disclosure of occult neoplasms by RAID; and (9) RAID, a more functional test of usually high specificity, can complement other radiological methods, such as computed tomography scans, which are limited to structural information.

  13. The raw disk i/o performance of compaq storage works RAID arrays under tru64 unix

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uselton, A C

    2000-10-19

    We report on the raw disk i/o performance of a set of Compaq StorageWorks RAID arrays connected to our cluster of Compaq ES40 computers via Fibre Channel. The best cumulative peak sustained data rate is l17MB/s per node for reads and 77MB/s per node for writes. This value occurs for a configuration in which a node has two Fibre Channel interfaces to a switch, which in turn has two connections to each of two Compaq StorageWorks RAID arrays. Each RAID array has two HSG80 RAID controllers controlling (together) two 5+p RAID chains. A 10% more space efficient arrangement using amore » single 1l+p RAID chain in place of the two 5+P chains is 25% slower for reads and 40% slower for writes.« less

  14. Interfacing a high performance disk array file server to a Gigabit LAN

    NASA Technical Reports Server (NTRS)

    Seshan, Srinivasan; Katz, Randy H.

    1993-01-01

    Our previous prototype, RAID-1, identified several bottlenecks in typical file server architectures. The most important bottleneck was the lack of a high-bandwidth path between disk, memory, and the network. Workstation servers, such as the Sun-4/280, have very slow access to peripherals on busses far from the CPU. For the RAID-2 system, we addressed this problem by designing a crossbar interconnect, Xbus board, that provides a 40MB/s path between disk, memory, and the network interfaces. However, this interconnect does not provide the system CPU with low latency access to control the various interfaces. To provide a high data rate to clients on the network, we were forced to carefully and efficiently design the network software. A block diagram of the system hardware architecture is given. In the following subsections, we describe pieces of the RAID-2 file server hardware that had a significant impact on the design of the network interface.

  15. Norwegian version of the rating anxiety in dementia scale (RAID-N): a validity and reliability study.

    PubMed

    Goyal, Alka R; Bergh, Sverre; Engedal, Knut; Kirkevold, Marit; Kirkevold, Øyvind

    2017-12-01

    Dementia-specific anxiety scales in the Norwegian language are lacking; the aim of this study was to investigate the validity and inter-rater reliability of a Norwegian version of the Rating Anxiety in Dementia (RAID-N) scale. The validity of the RAID-N was tested in a sample of 101 patients with dementia from seven Norwegian nursing homes. One psychogeriatrician (n = 50) or a physician with long experience with nursing home patients (n = 51) 'blind' to the RAID-N score diagnosed anxiety according to DSM-5 criteria of generalised anxiety disorder (GAD). A receiver operating characteristic (ROC) analysis assessed the best cut-off point for the RAID-N, and the area under the curve (AUC) was calculated. Inter-rater reliability was tested in a subgroup of 53 patients by intraclass correlation (ICC) and Cohen's kappa. Twenty-eight of 101 (27.7%) met the GAD criteria. The mean RAID-N score for patients with GAD was 16.1 (SD 6.3) and without GAD, 8.8 (SD 6.5) (p < 0.001). A cut-off score of ≥12 on the RAID-N gave a sensitivity of 82.1%, specificity of 70.0%, and 73.3% accuracy in identifying clinically significant GAD in patients with dementia. Inter-rater reliability on overall RAID-N items was good (ICC = 0.82), Cohen's kappa was 0.58 for total RAID-N score, with satisfactory internal consistency (Cronbach's alpha = 0.81). The RAID-N has fairly good validity and inter-rater reliability, and could be useful to assess GAD in patients with dementia. Further studies should investigate the optimal RAID-N cut-off score in different settings.

  16. Feasibility study of determining axial stress in ferromagnetic bars using reciprocal amplitude of initial differential susceptibility obtained from static magnetization by permanent magnets

    NASA Astrophysics Data System (ADS)

    Deng, Dongge; Wu, Xinjun

    2018-03-01

    An electromagnetic method for determining axial stress in ferromagnetic bars is proposed. In this method, the tested bar is under the static magnetization provided by permanent magnets. The tested bar do not have to be magnetized up to the technical saturation because reciprocal amplitude of initial differential susceptibility (RAIDS) is adopted as the feature parameter. RAIDS is calculated from the radial magnetic flux density Br Lo = 0.5 at the Lift-off Lo = 0.5 mm, radial magnetic flux density Br Lo = 1 at the Lift-off Lo = 1 mm and axial magnetic flux density Bz Lo = 1 at the Lift-off Lo = 1 mm from the surface of the tested bar. Firstly, the theoretical derivation of RAIDS is carried out according to Gauss' law for magnetism, Ampere's Law and the Rayleigh relation in Rayleigh region. Secondly, the experimental system is set up for a 2-meter length and 20 mm diameter steel bar. Thirdly, an experiment is carried out on the steel bar to analyze the relationship between the obtained RAIDS and the axial stress. Experimental results show that the obtained RAIDS decreases almost linearly with the increment of the axial stress inside the steel bar in the initial elastic region. The proposed method has the potential to determine tensile axial stress in the slender cylindrical ferromagnetic bar.

  17. Validity of the rheumatoid arthritis impact of disease (RAID) score and definition of cut-off points for disease activity states in a population-based European cohort of patients with rheumatoid arthritis.

    PubMed

    Salaffi, Fausto; Di Carlo, Marco; Vojinovic, Jelena; Tincani, Angela; Sulli, Alberto; Soldano, Stefano; Andreoli, Laura; Dall'Ara, Francesca; Ionescu, Ruxandra; Simić Pašalić, Katarina; Balčune, Ineta; Ferraz-Amaro, Iván; Tlustochowicz, Malgorzata; Butrimienė, Irena; Punceviciene, Egle; Toroptsova, Natalia; Grazio, Simeon; Morović-Vergles, Jadranka; Masaryk, Pavol; Otsa, Kati; Bernardes, Miguel; Boyadzhieva, Vladimira; Cutolo, Maurizio

    2018-05-01

    To assess the validity of the rheumatoid arthritis impact of disease (RAID) for measuring disease activity of rheumatoid arthritis (RA) and to determine cut-off values for defining the disease activity states. A total of 622 RA patients from an European database have been included. Cross-validation was based on assessment of convergent and discriminant validity. Optimal cut-offs were determined against external criteria by calculating the respective 25th and 75th percentiles mean values of RAID. External criteria included definitions for remission (REM), low disease activity (LDA), moderate disease activity (MDA) and high disease activity (HDA), cut-offs of the 28-joint disease activity score-C-reactive protein (DAS28-CRP) score. The RAID showed a moderate degree of correlation with respect to DAS28-CRP (rho=0.417; P<0.0001). The receiver operating characteristic (ROC) curves to discriminate the ability of RAID to distinguish patients with active and non-active disease was very good with an area under the curve (AUC) of 0.847 (95% confidence interval [CI]: 0.816 to 0.878; P<0.0001). Based on the distributions of RAID in the different disease activity groups, we propose the following cut-off values for REM: RAID ≤3; for LDA: RAID >3 and ≤4; for MDA: RAID >4 and ≤6; for HDA: RAID >6. Mean RAID differed significantly between patients classified as REM, LDA, MDA or HDA (P=0.001). The cut-offs revealed good measurement characteristics in cross-validation analysis, had great discriminatory performance in distinguishing patients with different levels of disease activity and are suited for widespread use in everyday practice application and research. Copyright © 2017 Société française de rhumatologie. Published by Elsevier SAS. All rights reserved.

  18. Wild Chimpanzees on the Edge: Nocturnal Activities in Croplands

    PubMed Central

    Krief, Sabrina; Cibot, Marie; Bortolamiol, Sarah; Seguya, Andrew; Krief, Jean-Michel; Masi, Shelly

    2014-01-01

    In a rapidly changing landscape highly impacted by anthropogenic activities, the great apes are facing new challenges to coexist with humans. For chimpanzee communities inhabiting encroached territories, not bordered by rival conspecifics but by human agricultural fields, such boundaries are risky areas. To investigate the hypothesis that they use specific strategies for incursions out of the forest into maize fields to prevent the risk of detection by humans guarding their field, we carried out video recordings of chimpanzees at the edge of the forest bordered by a maize plantation in Kibale National Park, Uganda. Contrary to our expectations, large parties are engaged in crop-raids, including vulnerable individuals such as females with clinging infants. More surprisingly chimpanzees were crop-raiding during the night. They also stayed longer in the maize field and presented few signs of vigilance and anxiety during these nocturnal crop-raids. While nocturnal activities of chimpanzees have been reported during full moon periods, this is the first record of frequent and repeated nocturnal activities after twilight, in darkness. Habitat destruction may have promoted behavioural adjustments such as nocturnal exploitation of open croplands. PMID:25338066

  19. A graphical user interface for RAId, a knowledge integrated proteomics analysis suite with accurate statistics.

    PubMed

    Joyce, Brendan; Lee, Danny; Rubio, Alex; Ogurtsov, Aleksey; Alves, Gelio; Yu, Yi-Kuo

    2018-03-15

    RAId is a software package that has been actively developed for the past 10 years for computationally and visually analyzing MS/MS data. Founded on rigorous statistical methods, RAId's core program computes accurate E-values for peptides and proteins identified during database searches. Making this robust tool readily accessible for the proteomics community by developing a graphical user interface (GUI) is our main goal here. We have constructed a graphical user interface to facilitate the use of RAId on users' local machines. Written in Java, RAId_GUI not only makes easy executions of RAId but also provides tools for data/spectra visualization, MS-product analysis, molecular isotopic distribution analysis, and graphing the retrieval versus the proportion of false discoveries. The results viewer displays and allows the users to download the analyses results. Both the knowledge-integrated organismal databases and the code package (containing source code, the graphical user interface, and a user manual) are available for download at https://www.ncbi.nlm.nih.gov/CBBresearch/Yu/downloads/raid.html .

  20. Exploring the effects of spatial autocorrelation when identifying key drivers of wildlife crop-raiding.

    PubMed

    Songhurst, Anna; Coulson, Tim

    2014-03-01

    Few universal trends in spatial patterns of wildlife crop-raiding have been found. Variations in wildlife ecology and movements, and human spatial use have been identified as causes of this apparent unpredictability. However, varying spatial patterns of spatial autocorrelation (SA) in human-wildlife conflict (HWC) data could also contribute. We explicitly explore the effects of SA on wildlife crop-raiding data in order to facilitate the design of future HWC studies. We conducted a comparative survey of raided and nonraided fields to determine key drivers of crop-raiding. Data were subsampled at different spatial scales to select independent raiding data points. The model derived from all data was fitted to subsample data sets. Model parameters from these models were compared to determine the effect of SA. Most methods used to account for SA in data attempt to correct for the change in P-values; yet, by subsampling data at broader spatial scales, we identified changes in regression estimates. We consequently advocate reporting both model parameters across a range of spatial scales to help biological interpretation. Patterns of SA vary spatially in our crop-raiding data. Spatial distribution of fields should therefore be considered when choosing the spatial scale for analyses of HWC studies. Robust key drivers of elephant crop-raiding included raiding history of a field and distance of field to a main elephant pathway. Understanding spatial patterns and determining reliable socio-ecological drivers of wildlife crop-raiding is paramount for designing mitigation and land-use planning strategies to reduce HWC. Spatial patterns of HWC are complex, determined by multiple factors acting at more than one scale; therefore, studies need to be designed with an understanding of the effects of SA. Our methods are accessible to a variety of practitioners to assess the effects of SA, thereby improving the reliability of conservation management actions.

  1. RAID: a comprehensive resource for human RNA-associated (RNA–RNA/RNA–protein) interaction

    PubMed Central

    Zhang, Xiaomeng; Wu, Deng; Chen, Liqun; Li, Xiang; Yang, Jinxurong; Fan, Dandan; Dong, Tingting; Liu, Mingyue; Tan, Puwen; Xu, Jintian; Yi, Ying; Wang, Yuting; Zou, Hua; Hu, Yongfei; Fan, Kaili; Kang, Juanjuan; Huang, Yan; Miao, Zhengqiang; Bi, Miaoman; Jin, Nana; Li, Kongning; Li, Xia; Xu, Jianzhen; Wang, Dong

    2014-01-01

    Transcriptomic analyses have revealed an unexpected complexity in the eukaryote transcriptome, which includes not only protein-coding transcripts but also an expanding catalog of noncoding RNAs (ncRNAs). Diverse coding and noncoding RNAs (ncRNAs) perform functions through interaction with each other in various cellular processes. In this project, we have developed RAID (http://www.rna-society.org/raid), an RNA-associated (RNA–RNA/RNA–protein) interaction database. RAID intends to provide the scientific community with all-in-one resources for efficient browsing and extraction of the RNA-associated interactions in human. This version of RAID contains more than 6100 RNA-associated interactions obtained by manually reviewing more than 2100 published papers, including 4493 RNA–RNA interactions and 1619 RNA–protein interactions. Each entry contains detailed information on an RNA-associated interaction, including RAID ID, RNA/protein symbol, RNA/protein categories, validated method, expressing tissue, literature references (Pubmed IDs), and detailed functional description. Users can query, browse, analyze, and manipulate RNA-associated (RNA–RNA/RNA–protein) interaction. RAID provides a comprehensive resource of human RNA-associated (RNA–RNA/RNA–protein) interaction network. Furthermore, this resource will help in uncovering the generic organizing principles of cellular function network. PMID:24803509

  2. Patriot War and the Fenian Raids: Case Studies in Border Security on the U.S. Canada Border in the Nineteenth Century

    DTIC Science & Technology

    2017-06-09

    THE PATRIOT WAR AND THE FENIAN RAIDS: CASE STUDIES IN BORDER SECURITY ON THE U.S.-CANADA BORDER IN THE NINETEENTH CENTURY...3. DATES COVERED (From - To) AUG 2016 – JUN 2017 4. TITLE AND SUBTITLE The Patriot War and the Fenian Raids: Case Studies in Border Security on ...nineteenth century. The Patriot War and Fenian Raids are examined as case studies on the same border occurring roughly thirty years apart. The

  3. Robotics EP Payloads

    NASA Image and Video Library

    2009-09-24

    ISS020-E-041981 (24 Sept. 2009) --- The exterior of the Japanese Kibo complex of the International Space Station and the station's Canadarm2 (bottom) are featured in this image photographed by an Expedition 20 crew member on the station. European Space Agency astronaut Frank De Winne and NASA astronaut Nicole Stott, both Expedition 20 flight engineers, used the controls of the Japanese Experiment Module Robotic Manipulator System (JEM-RMS) in Kibo to grapple and transfer two Japanese payloads from the Exposed Pallet to their Exposed Facility locations -- first HICO/Hyperspectral Imager for the Coastal Ocean & RAIDS/Remote Atmospheric and Ionospheric Detection System (HREP), then Superconducting Submillimeter-wave Limb-emission Sounder (SMILES).

  4. Saying goodbye to optical storage technology.

    PubMed

    McLendon, Kelly; Babbitt, Cliff

    2002-08-01

    The days of using optical disk based mass storage devices for high volume applications like health care document imaging are coming to an end. The price/performance curve for redundant magnetic disks, known as RAID, is now more positive than for optical disks. All types of application systems, across many sectors of the marketplace are using these newer magnetic technologies, including insurance, banking, aerospace, as well as health care. The main components of these new storage technologies are RAID and SAN. SAN refers to storage area network, which is a complex mechanism of switches and connections that allow multiple systems to store huge amounts of data securely and safely.

  5. RAID: a comprehensive resource for human RNA-associated (RNA-RNA/RNA-protein) interaction.

    PubMed

    Zhang, Xiaomeng; Wu, Deng; Chen, Liqun; Li, Xiang; Yang, Jinxurong; Fan, Dandan; Dong, Tingting; Liu, Mingyue; Tan, Puwen; Xu, Jintian; Yi, Ying; Wang, Yuting; Zou, Hua; Hu, Yongfei; Fan, Kaili; Kang, Juanjuan; Huang, Yan; Miao, Zhengqiang; Bi, Miaoman; Jin, Nana; Li, Kongning; Li, Xia; Xu, Jianzhen; Wang, Dong

    2014-07-01

    Transcriptomic analyses have revealed an unexpected complexity in the eukaryote transcriptome, which includes not only protein-coding transcripts but also an expanding catalog of noncoding RNAs (ncRNAs). Diverse coding and noncoding RNAs (ncRNAs) perform functions through interaction with each other in various cellular processes. In this project, we have developed RAID (http://www.rna-society.org/raid), an RNA-associated (RNA-RNA/RNA-protein) interaction database. RAID intends to provide the scientific community with all-in-one resources for efficient browsing and extraction of the RNA-associated interactions in human. This version of RAID contains more than 6100 RNA-associated interactions obtained by manually reviewing more than 2100 published papers, including 4493 RNA-RNA interactions and 1619 RNA-protein interactions. Each entry contains detailed information on an RNA-associated interaction, including RAID ID, RNA/protein symbol, RNA/protein categories, validated method, expressing tissue, literature references (Pubmed IDs), and detailed functional description. Users can query, browse, analyze, and manipulate RNA-associated (RNA-RNA/RNA-protein) interaction. RAID provides a comprehensive resource of human RNA-associated (RNA-RNA/RNA-protein) interaction network. Furthermore, this resource will help in uncovering the generic organizing principles of cellular function network. © 2014 Zhang et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.

  6. Performance of asynchronous transfer mode (ATM) local area and wide area networks for medical imaging transmission in clinical environment.

    PubMed

    Huang, H K; Wong, A W; Zhu, X

    1997-01-01

    Asynchronous transfer mode (ATM) technology emerges as a leading candidate for medical image transmission in both local area network (LAN) and wide area network (WAN) applications. This paper describes the performance of an ATM LAN and WAN network at the University of California, San Francisco. The measurements were obtained using an intensive care unit (ICU) server connecting to four image workstations (WS) at four different locations of a hospital-integrated picture archiving and communication system (HI-PACS) in a daily regular clinical environment. Four types of performance were evaluated: magnetic disk-to-disk, disk-to-redundant array of inexpensive disks (RAID), RAID-to-memory, and memory-to-memory. Results demonstrate that the transmission rate between two workstations can reach 5-6 Mbytes/s from RAID-to-memory, and 8-10 Mbytes/s from memory-to-memory. When the server has to send images to all four workstations simultaneously, the transmission rate to each WS is about 4 Mbytes/s. Both situations are adequate for radiologic image communications for picture archiving and communication systems (PACS) and teleradiology applications.

  7. The Future of Raiding: Lessons in Raiding Tactics from the Indian Wars and Law Enforcement

    DTIC Science & Technology

    2009-06-01

    the national government, but continued through the 1840s. Only when raiders affected the rich southern states of Durango , Zacatecas, and San Luis...bondage in native camps.”67 In September 1843, a Comanche raiding party attacked a ranch in the northern Mexican territory of Durango . The

  8. Multi-terabyte EIDE disk arrays running Linux RAID5

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sanders, D.A.; Cremaldi, L.M.; Eschenburg, V.

    2004-11-01

    High-energy physics experiments are currently recording large amounts of data and in a few years will be recording prodigious quantities of data. New methods must be developed to handle this data and make analysis at universities possible. Grid Computing is one method; however, the data must be cached at the various Grid nodes. We examine some storage techniques that exploit recent developments in commodity hardware. Disk arrays using RAID level 5 (RAID-5) include both parity and striping. The striping improves access speed. The parity protects data in the event of a single disk failure, but not in the case ofmore » multiple disk failures. We report on tests of dual-processor Linux Software RAID-5 arrays and Hardware RAID-5 arrays using a 12-disk 3ware controller, in conjunction with 250 and 300 GB disks, for use in offline high-energy physics data analysis. The price of IDE disks is now less than $1/GB. These RAID-5 disk arrays can be scaled to sizes affordable to small institutions and used when fast random access at low cost is important.« less

  9. The Influence of Life History Milestones and Association Networks on Crop-Raiding Behavior in Male African Elephants

    PubMed Central

    Chiyo, Patrick I.; Moss, Cynthia J.; Alberts, Susan C.

    2012-01-01

    Factors that influence learning and the spread of behavior in wild animal populations are important for understanding species responses to changing environments and for species conservation. In populations of wildlife species that come into conflict with humans by raiding cultivated crops, simple models of exposure of individual animals to crops do not entirely explain the prevalence of crop raiding behavior. We investigated the influence of life history milestones using age and association patterns on the probability of being a crop raider among wild free ranging male African elephants; we focused on males because female elephants are not known to raid crops in our study population. We examined several features of an elephant association network; network density, community structure and association based on age similarity since they are known to influence the spread of behaviors in a population. We found that older males were more likely to be raiders than younger males, that males were more likely to be raiders when their closest associates were also raiders, and that males were more likely to be raiders when their second closest associates were raiders older than them. The male association network had sparse associations, a tendency for individuals similar in age and raiding status to associate, and a strong community structure. However, raiders were randomly distributed between communities. These features of the elephant association network may limit the spread of raiding behavior and likely determine the prevalence of raiding behavior in elephant populations. Our results suggest that social learning has a major influence on the acquisition of raiding behavior in younger males whereas life history factors are important drivers of raiding behavior in older males. Further, both life-history and network patterns may influence the acquisition and spread of complex behaviors in animal populations and provide insight on managing human-wildlife conflict. PMID:22347468

  10. A case for Redundant Arrays of Inexpensive Disks (RAID)

    NASA Technical Reports Server (NTRS)

    Patterson, David A.; Gibson, Garth; Katz, Randy H.

    1988-01-01

    Increasing performance of CPUs and memories will be squandered if not matched by a similar performance increase in I/O. While the capacity of Single Large Expensive Disks (SLED) has grown rapidly, the performance improvement of SLED has been modest. Redundant Arrays of Inexpensive Disks (RAID), based on the magnetic disk technology developed for personal computers, offers an attractive alternative to SLED, promising improvements of an order of magnitude in performance, reliability, power consumption, and scalability. This paper introduces five levels of RAIDs, giving their relative cost/performance, and compares RAID to an IBM 3380 and a Fujitsu Super Eagle.

  11. Thrilling but Pointless: General JO Shelby’s 1863 Cavalry Raid

    DTIC Science & Technology

    2013-12-13

    painfully acute. The air seems filled with exquisite music ; cities and towns rise up on every hand, crowned with spires and radiant with ten thousand...Raid. By the end of festivities , at nearly 2 a.m., Captain Hart recited a prepared poem entitled “Jo Shelby’s Raid.” The spirit of Shelby’s Brigade

  12. Change in birth outcomes among infants born to Latina mothers after a major immigration raid.

    PubMed

    Novak, Nicole L; Geronimus, Arline T; Martinez-Cardoso, Aresha M

    2017-06-01

    Growing evidence indicates that immigration policy and enforcement adversely affect the well-being of Latino immigrants, but fewer studies examine 'spillover effects' on USA-born Latinos. Immigration enforcement is often diffuse, covert and difficult to measure. By contrast, the federal immigration raid in Postville, Iowa, in 2008 was, at the time, the largest single-site federal immigration raid in US history. We employed a quasi-experimental design, examining ethnicity-specific patterns in birth outcomes before and after the Postville raid. We analysed Iowa birth-certificate data to compare risk of term and preterm low birthweight (LBW), by ethnicity and nativity, in the 37 weeks following the raid to the same 37-week period the previous year ( n  =   52 344). We model risk of adverse birth outcomes using modified Poisson regression and model distribution of birthweight using quantile regression. Infants born to Latina mothers had a 24% greater risk of LBW after the raid when compared with the same period 1 year earlier [risk ratio (95% confidence interval) = 1.24 (0.98, 1.57)]. No such change was observed among infants born to non-Latina White mothers. Increased risk of LBW was observed for USA-born and immigrant Latina mothers. The association between raid timing and LBW was stronger among term than preterm births. Changes in birthweight after the raid primarily reflected decreased birthweight below the 5th percentile of the distribution, not a shift in mean birthweight. Our findings highlight the implications of racialized stressors not only for the health of Latino immigrants, but also for USA-born co-ethnics. © The Author 2017; all rights reserved. Published by Oxford University Press on behalf of the International Epidemiological Association

  13. RAID Disk Arrays for High Bandwidth Applications

    NASA Technical Reports Server (NTRS)

    Moren, Bill

    1996-01-01

    High bandwidth applications require large amounts of data transferred to/from storage devices at extremely high data rates. Further, these applications often are 'real time' in which access to the storage device must take place on the schedule of the data source, not the storage. A good example is a satellite downlink - the volume of data is quite large and the data rates quite high (dozens of MB/sec). Further, a telemetry downlink must take place while the satellite is overhead. A storage technology which is ideally suited to these types of applications is redundant arrays of independent discs (RAID). Raid storage technology, while offering differing methodologies for a variety of applications, supports the performance and redundancy required in real-time applications. Of the various RAID levels, RAID-3 is the only one which provides high data transfer rates under all operating conditions, including after a drive failure.

  14. RAID v2.0: an updated resource of RNA-associated interactions across organisms

    PubMed Central

    Yi, Ying; Zhao, Yue; Li, Chunhua; Zhang, Lin; Huang, Huiying; Li, Yana; Liu, Lanlan; Hou, Ping; Cui, Tianyu; Tan, Puwen; Hu, Yongfei; Zhang, Ting; Huang, Yan; Li, Xiaobo; Yu, Jia; Wang, Dong

    2017-01-01

    With the development of biotechnologies and computational prediction algorithms, the number of experimental and computational prediction RNA-associated interactions has grown rapidly in recent years. However, diverse RNA-associated interactions are scattered over a wide variety of resources and organisms, whereas a fully comprehensive view of diverse RNA-associated interactions is still not available for any species. Hence, we have updated the RAID database to version 2.0 (RAID v2.0, www.rna-society.org/raid/) by integrating experimental and computational prediction interactions from manually reading literature and other database resources under one common framework. The new developments in RAID v2.0 include (i) over 850-fold RNA-associated interactions, an enhancement compared to the previous version; (ii) numerous resources integrated with experimental or computational prediction evidence for each RNA-associated interaction; (iii) a reliability assessment for each RNA-associated interaction based on an integrative confidence score; and (iv) an increase of species coverage to 60. Consequently, RAID v2.0 recruits more than 5.27 million RNA-associated interactions, including more than 4 million RNA–RNA interactions and more than 1.2 million RNA–protein interactions, referring to nearly 130 000 RNA/protein symbols across 60 species. PMID:27899615

  15. Redundant array of independent disks: practical on-line archiving of nuclear medicine image data.

    PubMed

    Lear, J L; Pratt, J P; Trujillo, N

    1996-02-01

    While various methods for long-term archiving of nuclear medicine image data exist, none support rapid on-line search and retrieval of information. We assembled a 90-Gbyte redundant array of independent disks (RAID) system using 10-, 9-Gbyte disk drives. The system was connected to a personal computer and software was used to partition the array into 4-Gbyte sections. All studies (50,000) acquired over a 7-year period were archived in the system. Based on patient name/number and study date, information could be located within 20 seconds and retrieved for display and analysis in less than 5 seconds. RAID offers a practical, redundant method for long-term archiving of nuclear medicine studies that supports rapid on-line retrieval.

  16. An Application of Computerized Axial Tomography (CAT) Technology to Mass Raid Tracking

    DTIC Science & Technology

    1989-08-01

    ESD-TR-89-305 MTR-10542 An Application of Computerized Axial Tomography ( CAT ) Technology to Mass Raid Tracking By John K. Barr August 1989...NO 11. TITLE (Include Security Classification) An Application of Computerized Axial Tomography ( CAT ) Technology to Mass Raid Tracking 12...by block number) Computerized Axial Tomography ( CAT ) Scanner Electronic Support Measures (ESM) Fusion (continued) 19. ABSTRACT (Continue on

  17. Subaru Telescope Network III (STN-III): more effective, more operation-oriented, and more inexpensive solutions for the observatory's needs

    NASA Astrophysics Data System (ADS)

    Noumaru, Junichi; Kawai, Jun A.; Schubert, Kiaina; Yagi, Masafumi; Takata, Tadafumi; Winegar, Tom; Scanlon, Tim; Nishida, Takuhiro; Fox, Camron; Hayasaka, James; Forester, Jason; Uchida, Kenji; Nakamura, Isamu; Tom, Richard; Koura, Norikazu; Yamamoto, Tadahiro; Tanoue, Toshiya; Yamada, Toru

    2008-07-01

    Subaru Telescope has recently replaced most equipment of Subaru Telescope Network II with the new equipment which includes 124TB of RAID system for data archive. Switching the data storage from tape to RAID enables users to access the data faster. The STN-III dropped some important components of STN-II, such as supercomputers, development & testing subsystem for Subaru Observation Control System, or data processing subsystem. On the other hand, we invested more computers to the remote operation system. Thanks to IT innovations, our LAN as well as the network between Hilo and summit were upgraded to gigabit network at the similar or even reduced cost from the previous system. As the result of the redesigning of the computer system by more focusing on the observatory operation, we greatly reduced the total cost for computer rental, purchase and maintenance.

  18. Development of the RAIDS extreme ultraviolet wedge and strip detector. [Remote Atmospheric and Ionospheric Detector System

    NASA Technical Reports Server (NTRS)

    Kayser, D. C.; Chater, W. T.; Christensen, A. B.; Howey, C. K.; Pranke, J. B.

    1988-01-01

    In the next few years the Remote Atmospheric and Ionospheric Detector System (RAIDS) package will be flown on a Tiros spacecraft. The EUV spectrometer experiment contains a position-sensitive detector based on wedge and strip anode technology. A detector design has been implemented in brazed alumina and kovar to provide a rugged bakeable housing and anode. A stack of three 80:1 microchannel plates is operated at 3500-4100 V. to achieve a gain of about 10 to the 7th. The top MCP is to be coated with MgF for increased quantum efficiency in the range of 50-115 nm. A summary of fabrication techniques and detector performance characteristics is presented.

  19. RAID v2.0: an updated resource of RNA-associated interactions across organisms.

    PubMed

    Yi, Ying; Zhao, Yue; Li, Chunhua; Zhang, Lin; Huang, Huiying; Li, Yana; Liu, Lanlan; Hou, Ping; Cui, Tianyu; Tan, Puwen; Hu, Yongfei; Zhang, Ting; Huang, Yan; Li, Xiaobo; Yu, Jia; Wang, Dong

    2017-01-04

    With the development of biotechnologies and computational prediction algorithms, the number of experimental and computational prediction RNA-associated interactions has grown rapidly in recent years. However, diverse RNA-associated interactions are scattered over a wide variety of resources and organisms, whereas a fully comprehensive view of diverse RNA-associated interactions is still not available for any species. Hence, we have updated the RAID database to version 2.0 (RAID v2.0, www.rna-society.org/raid/) by integrating experimental and computational prediction interactions from manually reading literature and other database resources under one common framework. The new developments in RAID v2.0 include (i) over 850-fold RNA-associated interactions, an enhancement compared to the previous version; (ii) numerous resources integrated with experimental or computational prediction evidence for each RNA-associated interaction; (iii) a reliability assessment for each RNA-associated interaction based on an integrative confidence score; and (iv) an increase of species coverage to 60. Consequently, RAID v2.0 recruits more than 5.27 million RNA-associated interactions, including more than 4 million RNA-RNA interactions and more than 1.2 million RNA-protein interactions, referring to nearly 130 000 RNA/protein symbols across 60 species. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  20. American Jihadist Terrorism: Combating a Complex Threat

    DTIC Science & Technology

    2010-12-07

    Esposito, “Terror Raids at JFK Airport Net American Alleged Terror Plotters Headed for Somalia,” abcnews.com, June 6, 2010, http://abcnews.go.com...Blotter/terror-raids- jfk - airport -net-alleged-terror-plotters/story?id= 10839045. 186 U.S. v. Mohamed Alessa and Carlos E. Almonte, Criminal Complaint... Airport Net American Alleged Terror Plotters Headed for Somalia,” ABC News, June 6, 2010, http://abcnews.go.com/Blotter/terror-raids- jfk - airport -net

  1. RAId_aPS: MS/MS Analysis with Multiple Scoring Functions and Spectrum-Specific Statistics

    PubMed Central

    Alves, Gelio; Ogurtsov, Aleksey Y.; Yu, Yi-Kuo

    2010-01-01

    Statistically meaningful comparison/combination of peptide identification results from various search methods is impeded by the lack of a universal statistical standard. Providing an -value calibration protocol, we demonstrated earlier the feasibility of translating either the score or heuristic -value reported by any method into the textbook-defined -value, which may serve as the universal statistical standard. This protocol, although robust, may lose spectrum-specific statistics and might require a new calibration when changes in experimental setup occur. To mitigate these issues, we developed a new MS/MS search tool, RAId_aPS, that is able to provide spectrum-specific -values for additive scoring functions. Given a selection of scoring functions out of RAId score, K-score, Hyperscore and XCorr, RAId_aPS generates the corresponding score histograms of all possible peptides using dynamic programming. Using these score histograms to assign -values enables a calibration-free protocol for accurate significance assignment for each scoring function. RAId_aPS features four different modes: (i) compute the total number of possible peptides for a given molecular mass range, (ii) generate the score histogram given a MS/MS spectrum and a scoring function, (iii) reassign -values for a list of candidate peptides given a MS/MS spectrum and the scoring functions chosen, and (iv) perform database searches using selected scoring functions. In modes (iii) and (iv), RAId_aPS is also capable of combining results from different scoring functions using spectrum-specific statistics. The web link is http://www.ncbi.nlm.nih.gov/CBBresearch/Yu/raid_aps/index.html. Relevant binaries for Linux, Windows, and Mac OS X are available from the same page. PMID:21103371

  2. American Jihadist Terrorism: Combating a Complex Threat

    DTIC Science & Technology

    2010-09-20

    www.nytimes.com/2010/07/30/us/30fbi.html. 177 Richard Esposito, “Terror Raids at JFK Airport Net American Alleged Terror Plotters Headed for Somalia...abcnews.com, June 6, 2010, http://abcnews.go.com/Blotter/terror-raids- jfk - airport -net-alleged-terror-plotters/story?id= 10839045. 178 U.S. v. Mohamed... Airport Net American Alleged Terror Plotters Headed for Somalia,” ABC News, June 6, 2010, http://abcnews.go.com/Blotter/terror-raids- jfk - airport -net

  3. Analysis of mean time to data loss of fault-tolerant disk arrays RAID-6 based on specialized Markov chain

    NASA Astrophysics Data System (ADS)

    Rahman, P. A.; D'K Novikova Freyre Shavier, G.

    2018-03-01

    This scientific paper is devoted to the analysis of the mean time to data loss of redundant disk arrays RAID-6 with alternation of data considering different failure rates of disks both in normal state of the disk array and in degraded and rebuild states, and also nonzero time of the disk replacement. The reliability model developed by the authors on the basis of the Markov chain and obtained calculation formula for estimation of the mean time to data loss (MTTDL) of the RAID-6 disk arrays are also presented. At last, the technique of estimation of the initial reliability parameters and examples of calculation of the MTTDL of the RAID-6 disk arrays for the different numbers of disks are also given.

  4. Life histories, blood revenge, and reproductive success among the Waorani of Ecuador

    PubMed Central

    Beckerman, Stephen; Erickson, Pamela I.; Yost, James; Regalado, Jhanira; Jaramillo, Lilia; Sparks, Corey; Iromenga, Moises; Long, Kathryn

    2009-01-01

    The Waorani may have the highest rate of homicide of any society known to anthropology. We interviewed 121 Waorani elders of both sexes to obtain genealogical information and recollections of raids in which they and their relatives participated. We also obtained complete raiding histories of 95 warriors. An analysis of the raiding histories, marital trajectories, and reproductive histories of these men reveals that more aggressive warriors have lower indices of reproductive success than their milder brethren. This result contrasts the findings of Chagnon [Chagnon N (1988) Science 239:985–992] for the Yanomamo. We suggest that the spacing of revenge raids may be involved in the explanation of why the consequences of aggressiveness differ between these 2 warlike lowland South American peoples. PMID:19433797

  5. The revised Bristol Rheumatoid Arthritis Fatigue measures and the Rheumatoid Arthritis Impact of Disease scale: validation in six countries

    PubMed Central

    Kirwan, John; Bode, Christina; Cramp, Fiona; Carmona, Loreto; Dures, Emma; Englbrecht, Matthias; Fransen, Jaap; Greenwood, Rosemary; Hagel, Sofia; van de Laar, Maart; Molto, Anna; Nicklin, Joanna; Petersson, Ingemar F; Redondo, Marta; Schett, Georg; Gossec, Laure

    2018-01-01

    Abstract Objective To evaluate the Bristol Rheumatoid Arthritis Fatigue Multidimensional Questionnaire (BRAF-MDQ), the revised Bristol Rheumatoid Arthritis Numerical Rating Scales (BRAF-NRS V2) and the Rheumatoid Arthritis Impact of Disease (RAID) scale in six countries. Methods We surveyed RA patients in France, Germany, The Netherlands, Spain, Sweden and the UK, including the HAQ, 36-item Short Form Health Survey (SF-36) and potential revisions of the BRAF-NRS coping and Spanish RAID coping items. Factor structure and internal consistency were examined by factor analysis and Cronbach’s α and construct validity by Spearman’s correlation. Results A total of 1276 patients participated (76% female, 25% with a disease duration <5 years, median HAQ 1.0). The original BRAF-MDQ four-factor structure and RAID single-factor structure were confirmed in every country with ⩾66% of variation in items explained by each factor and all item factor loadings of 0.71–0.98. Internal consistency for the BRAF-MDQ total and subscales was a Cronbach’s α of 0.75–0.96 and for RAID, 0.93–0.96. Fatigue construct validity was shown for the BRAF-MDQ and BRAF-NRS severity and effect scales, correlated internally with SF-36 vitality and with RAID fatigue (r = 0.63–0.93). Broader construct validity for the BRAFs and RAID was shown by correlation with each other, HAQ and SF-36 domains (r = 0.46–0.82), with similar patterns in individual countries. The revised BRAF-NRS V2 Coping item had stronger validity than the original in all analyses. The revised Spanish RAID coping item performed as well as the original. Conclusion Across six European countries, the BRAF-MDQ identifies the same four aspects of fatigue, and along with the RAID, shows strong factor structure and internal consistency and moderate–good construct validity. The revised BRAF-NRS V2 shows improved construct validity and replaces the original. PMID:29087507

  6. The revised Bristol Rheumatoid Arthritis Fatigue measures and the Rheumatoid Arthritis Impact of Disease scale: validation in six countries.

    PubMed

    Hewlett, Sarah; Kirwan, John; Bode, Christina; Cramp, Fiona; Carmona, Loreto; Dures, Emma; Englbrecht, Matthias; Fransen, Jaap; Greenwood, Rosemary; Hagel, Sofia; van de Laar, Maart; Molto, Anna; Nicklin, Joanna; Petersson, Ingemar F; Redondo, Marta; Schett, Georg; Gossec, Laure

    2018-02-01

    To evaluate the Bristol Rheumatoid Arthritis Fatigue Multidimensional Questionnaire (BRAF-MDQ), the revised Bristol Rheumatoid Arthritis Numerical Rating Scales (BRAF-NRS V2) and the Rheumatoid Arthritis Impact of Disease (RAID) scale in six countries. We surveyed RA patients in France, Germany, The Netherlands, Spain, Sweden and the UK, including the HAQ, 36-item Short Form Health Survey (SF-36) and potential revisions of the BRAF-NRS coping and Spanish RAID coping items. Factor structure and internal consistency were examined by factor analysis and Cronbach's α and construct validity by Spearman's correlation. A total of 1276 patients participated (76% female, 25% with a disease duration <5 years, median HAQ 1.0). The original BRAF-MDQ four-factor structure and RAID single-factor structure were confirmed in every country with ⩾66% of variation in items explained by each factor and all item factor loadings of 0.71-0.98. Internal consistency for the BRAF-MDQ total and subscales was a Cronbach's α of 0.75-0.96 and for RAID, 0.93-0.96. Fatigue construct validity was shown for the BRAF-MDQ and BRAF-NRS severity and effect scales, correlated internally with SF-36 vitality and with RAID fatigue (r = 0.63-0.93). Broader construct validity for the BRAFs and RAID was shown by correlation with each other, HAQ and SF-36 domains (r = 0.46-0.82), with similar patterns in individual countries. The revised BRAF-NRS V2 Coping item had stronger validity than the original in all analyses. The revised Spanish RAID coping item performed as well as the original. Across six European countries, the BRAF-MDQ identifies the same four aspects of fatigue, and along with the RAID, shows strong factor structure and internal consistency and moderate-good construct validity. The revised BRAF-NRS V2 shows improved construct validity and replaces the original. © The Author 2017. Published by Oxford University Press on behalf of the British Society for Rheumatology.

  7. Detailed Modeling of EUV Recombination and Contaminating Emissions Near 911 Å: A New Means of Dayside Ionospheric Sensing

    NASA Astrophysics Data System (ADS)

    Dymond, K.; Budzien, S. A.; Coker, C.; Nicholas, A. C.; Stephan, A. W.; Bishop, R. L.; Christensen, A. B.; Hecht, J. H.; Straus, P. R.

    2012-12-01

    The 911 Å emission is produced by radiative recombination of ionospheric O+ ions and electrons, which makes it useful for satellite remote sensing of the ionosphere during the daytime and at night. However, previous measurements of the 911 Å emission made by sounding rockets during the daytime, at altitudes less than 300 km, indicated that the emission was either very weak or non-existent. Furthermore, the daytime spectrum was shown to be contaminated by other EUV emissions produced by molecular nitrogen, thus suggesting that the 911 Å was useless as a dayside ionospheric diagnostic. Yet, satellite-based measurements made by the Low Resolution Airglow and Aurora Spectrograph (LORAAS) instrument launched aboard the Advanced Research and Global Observation Satellite (ARGOS), which operated between mid-May 1999 and April 2002 at an altitude of ~830 km, showed the emission to be present and strong enough to be accurately measured and inverted; those inversions were validated against ionosonde measurements and demonstrated the possibility of using the 911 Å emission for daytime ionospheric sensing. Recent measurements made by the Remote Atmospheric and Ionospheric Detection System (RAIDS) currently in operation aboard the International Space Station, at an altitude of 340 km, show that the daytime EUV spectrum is not as strongly contaminated as previously thought; the RAIDS measurements are shown to be in agreement with LORAAS measurements made between 1999-2002. A new analysis of the daytime and nighttime production of the 911 Å emission and the contaminating emissions that takes absorption by O, O2, and N2 into account shows that viewing geometry effects and absorption can explain these seemingly disparate observations. This analysis is shown to be in agreement with the RAIDS, LORAAS, and other recent observations. Simulations of the dayglow measurements are presented confirming that, although contaminated, the measurements can still provide an accurate measure of the daytime ionospheric electron density.

  8. RAID/C90 Technology Integration

    NASA Technical Reports Server (NTRS)

    Ciotti, Bob; Cooper, D. M. (Technical Monitor)

    1994-01-01

    In March 1993, NAS was the first to connect a Maximum Strategy RAID disk to the C90 using standard Cray provided software. This paper discusses the problems encountered, lessons learned, and performance achieved.

  9. Reliability model of disk arrays RAID-5 with data striping

    NASA Astrophysics Data System (ADS)

    Rahman, P. A.; D'K Novikova Freyre Shavier, G.

    2018-03-01

    Within the scope of the this scientific paper, the simplified reliability model of disk arrays RAID-5 (redundant arrays of inexpensive disks) and an advanced reliability model offered by the authors taking into the consideration nonzero time of the faulty disk replacement and different failure rates of disks in normal state of the disk array and in degraded and rebuild states are discussed. The formula obtained by the authors for calculation of the mean time to data loss (MTTDL) of the RAID-5 disk arrays on basis of the advanced model is also presented. Finally, the technique of estimation of the initial reliability parameters, which are used in the reliability model, and the calculation examples of the mean time to data loss of the RAID-5 disk arrays for the different number of disks are also given.

  10. Research and implementation on improving I/O performance of streaming media storage system

    NASA Astrophysics Data System (ADS)

    Lu, Zheng-wu; Wang, Yu-de; Jiang, Guo-song

    2008-12-01

    In this paper, we study the special requirements of a special storage system: streaming media server, and propose a solution to improve I/O performance of RAID storage system. The solution is suitable for streaming media applications. A streaming media storage subsystem includes the I/O interfaces, RAID arrays, I/O scheduling and device drivers. The solution is implemented on the top of the storage subsystem I/O Interface. Storage subsystem is the performance bottlenecks of a streaming media system, and I/O interface directly affect the performance of the storage subsystem. According to theoretical analysis, 64 KB block-size is most appropriate for streaming media applications. We carry out experiment in detail, and verified that the proper block-size really is 64KB. It is in accordance with our analysis. The experiment results also show that by using DMA controller, efficient memory management technology and mailbox interface design mechanism, streaming media storage system achieves a high-speed data throughput.

  11. Extreme behavioural shifts by baboons exploiting risky, resource-rich, human-modified environments.

    PubMed

    Fehlmann, Gaelle; O'Riain, M Justin; Kerr-Smith, Catherine; Hailes, Stephen; Luckman, Adrian; Shepard, Emily L C; King, Andrew J

    2017-11-08

    A range of species exploit anthropogenic food resources in behaviour known as 'raiding'. Such behavioural flexibility is considered a central component of a species' ability to cope with human-induced environmental changes. Here, we study the behavioural processes by which raiding male chacma baboons (Papio ursinus) exploit the opportunities and mitigate the risks presented by raiding in the suburbs of Cape Town, South Africa. Ecological sampling and interviews conducted with 'rangers' (employed to manage the baboons' space use) revealed that baboons are at risk of being herded out of urban spaces that contain high-energy anthropogenic food sources. Baboon-attached motion/GPS tracking collars showed that raiding male baboons spent almost all of their time at the urban edge, engaging in short, high-activity forays into the urban space. Moreover, activity levels were increased where the likelihood of deterrence by rangers was greater. Overall, these raiding baboons display a time-activity balance that is drastically altered in comparison to individuals living in more remote regions. We suggest our methods can be used to obtain precise estimates of management impact for this and other species in conflict with people.

  12. Work place drug testing of police officers after THC exposure during large volume cannabis seizures.

    PubMed

    Doran, Gregory S; Deans, Ralph; De Filippis, Carlo; Kostakis, Chris; Howitt, Julia A

    2017-06-01

    Police officers responsible for the seizure and removal of illegally grown cannabis plants from indoor and outdoor growing operations face the prospect of THC exposure while performing their work duties. As a result, a study investigating the amount of THC on hands and uniforms of officers during raids on cannabis growing houses (CGHs) and forest cannabis plantations (FCPs) and in the air at these sites was conducted. Swabs of gloves/hands, chests, and heads/necks were collected and analysed for THC. Results of hand swabs indicated that officers removing plants from FCPs were exposed to THC concentrations up to 20 times those involved in raids at CGHs, which was mainly associated with the number and size of plants seized. Air samples collected inside cannabis houses showed no detectable THC. Air samples collected inside the cargo area of the storage trucks used during FCP raids indicated that THC can be volatilised when lush plants are compressed by other seized plants loaded on top of them in the truck over a period of several days, allowing composting of plants at the bottom of the load to commence. The elevated temperature and humidity inside the truck may assist the decarboxylation of THCA to THC, as well as increasing the rate of volatilisation of THC. More than 100 urine samples were collected from officers in raids on both CGHs and FCPs and all tested negative for THC. Removal of cannabis plants by officers often resulted in cuts, abrasions and ruptured blisters on exposed skin surfaces, particularly at FCPs. The results in this study suggest that even when small areas of damaged skin are directly exposed to THC by contact transfer, the likelihood of showing a positive THC urine test is low. Crown Copyright © 2017. Published by Elsevier B.V. All rights reserved.

  13. Arms Transfer and Security Assistance to the Korean Peninsula, 1945-1980: Impact and Implications.

    DTIC Science & Technology

    1980-06-01

    Centuries of Warfare, (London: Octopus Books Ltd., 1978), pp. 450-452. 31. Ibid., p. 460. Alert to the possibilities that the Americans might resort...1973, in reality, found it could exert little control over 134 ii .4 Pyongyang’s actions. The commando raid on the " Blue House" and the axe-slayings...dramatic use of North Korean guerrilla raids, the armed clashes along the DMZ, and the 1968 commando raid on the " Blue House" obviously did nothing to belay

  14. Time optimized path-choice in the termite hunting ant Megaponera analis.

    PubMed

    Frank, Erik T; Hönle, Philipp O; Linsenmair, K Eduard

    2018-05-10

    Trail network systems among ants have received a lot of scientific attention due to their various applications in problem solving of networks. Recent studies have shown that ants select the fastest available path when facing different velocities on different substrates, rather than the shortest distance. The progress of decision-making by these ants is determined by pheromone-based maintenance of paths, which is a collective decision. However, path optimization through individual decision-making remains mostly unexplored. Here we present the first study of time-optimized path selection via individual decision-making by scout ants. Megaponera analis scouts search for termite foraging sites and lead highly organized raid columns to them. The path of the scout determines the path of the column. Through installation of artificial roads around M. analis nests we were able to influence the pathway choice of the raids. After road installation 59% of all recorded raids took place completely or partly on the road, instead of the direct, i.e. distance-optimized, path through grass from the nest to the termites. The raid velocity on the road was more than double the grass velocity, the detour thus saved 34.77±23.01% of the travel time compared to a hypothetical direct path. The pathway choice of the ants was similar to a mathematical model of least time allowing us to hypothesize the underlying mechanisms regulating the behavior. Our results highlight the importance of individual decision-making in the foraging behavior of ants and show a new procedure of pathway optimization. © 2018. Published by The Company of Biologists Ltd.

  15. High-Rate Data-Capture for an Airborne Lidar System

    NASA Technical Reports Server (NTRS)

    Valett, Susan; Hicks, Edward; Dabney, Philip; Harding, David

    2012-01-01

    A high-rate data system was required to capture the data for an airborne lidar system. A data system was developed that achieved up to 22 million (64-bit) events per second sustained data rate (1408 million bits per second), as well as short bursts (less than 4 s) at higher rates. All hardware used for the system was off the shelf, but carefully selected to achieve these rates. The system was used to capture laser fire, single-photon detection, and GPS data for the Slope Imaging Multi-polarization Photo-counting Lidar (SIMPL). However, the system has applications for other laser altimeter systems (waveform-recording), mass spectroscopy, xray radiometry imaging, high-background- rate ranging lidar, and other similar areas where very high-speed data capture is needed. The data capture software was used for the SIMPL instrument that employs a micropulse, single-photon ranging measurement approach and has 16 data channels. The detected single photons are from two sources those reflected from the target and solar background photons. The instrument is non-gated, so background photons are acquired for a range window of 13 km and can comprise many times the number of target photons. The highest background rate occurs when the atmosphere is clear, the Sun is high, and the target is a highly reflective surface such as snow. Under these conditions, the total data rate for the 16 channels combined is expected to be approximately 22 million events per second. For each photon detection event, the data capture software reads the relative time of receipt, with respect to a one-per-second absolute time pulse from a GPS receiver, from an event timer card with 0.1-ns precision, and records that information to a RAID (Redundant Array of Independent Disks) storage device. The relative time of laser pulse firings must also be read and recorded with the same precision. Each of the four event timer cards handles the throughput from four of the channels. For each detection event, a flag is recorded that indicates the source channel. To accommodate the expected maximum count rate and also handle the other extreme of very low rates occurring during nighttime operations, the software requests a set amount of data from each of the event timer cards and buffers the data. The software notes if any of the cards did not return all the data requested and then accommodates that lower rate. The data is buffered to minimize the I/O overhead of writing the data to storage. Care was taken to optimize the reads from the cards, the speed of the I/O bus, and RAID configuration.

  16. The course of anxiety in persons with dementia in Norwegian nursing homes: A 12-month follow-up study.

    PubMed

    Goyal, Alka R; Bergh, Sverre; Engedal, Knut; Kirkevold, Marit; Kirkevold, Øyvind

    2018-08-01

    Knowledge is scarce about the course of anxiety in persons with dementia (PWD) in nursing homes. This study aimed to describe the course of anxiety, anxiety symptoms, and the correlates of change in the Norwegian version of the Rating Anxiety in Dementia scale (RAID-N) score in PWD in nursing homes. Using the RAID-N, anxiety was assessed in 298 PWD aged 65 years and above from 17 Norwegian nursing homes. The assessments were made at baseline and after a mean follow-up period of 350 days (SD 12.3). Associations between the change in RAID-N score and demographic and clinical characteristics were analyzed with multilevel regression models. At 12 months, 93 participants (31.2%) had died. There was no significant change in the proportion of participants with anxiety, defined as RAID-N score ≥12, from baseline (33.7%) to follow-up (31.2%) (McNemar, p = 0.597). "Motor tension", "frightened and anxious", and "irritability" were the most frequent anxiety symptoms among those with dementia and anxiety. A higher Neuropsychiatric Inventory-Questionnaire (NPI-Q) sub-syndrome affective baseline score and more use of anxiolytics were associated with reduction in RAID-N score, whereas a higher NPI-Q sub-syndrome aroused baseline score and more use of antipsychotics were associated with an increase in RAID-N score at follow-up. The study did not control for ongoing treatment or changes of comorbidities. Anxiety and anxiety symptoms are highly prevalent among PWD in nursing homes over a12-month period. The symptoms "motor tension", "frightened and anxious", and "irritability" require attention in screening for anxiety. Copyright © 2018 Elsevier B.V. All rights reserved.

  17. Genetic evidence for intra- and interspecific slavery in honey ants (genus Myrmecocystus).

    PubMed

    Kronauer, D J C; Gadau, J; Hölldobler, B

    2003-04-22

    The New World honey ant species Myrmecocystus mimicus is well known for its highly stereotyped territorial tournaments, and for the raids on conspecific nests that can lead to intraspecific slavery. Our results from mitochondrial and nuclear markers show that the raided brood emerges in the raiding colony and is subsequently incorporated into the colony's worker force. We also found enslaved conspecifics in a second honey ant species, M. depilis, the sister taxon of M. mimicus, which occurs in sympatry with M. mimicus at the study site. Colonies of this species furthermore contained raided M. mimicus workers. Both species have an effective mating frequency that is not significantly different from 1. This study provides genetic evidence for facultative intra- and interspecific slavery in the genus Myrmecocystus. Slavery in ants has evolved repeatedly and supposedly by different means. We propose that, in honey ants, secondary contact between two closely related species that both exhibit intraspecific slavery gave rise to an early form of facultative interspecific slavery.

  18. Genetic evidence for intra- and interspecific slavery in honey ants (genus Myrmecocystus).

    PubMed Central

    Kronauer, D J C; Gadau, J; Hölldobler, B

    2003-01-01

    The New World honey ant species Myrmecocystus mimicus is well known for its highly stereotyped territorial tournaments, and for the raids on conspecific nests that can lead to intraspecific slavery. Our results from mitochondrial and nuclear markers show that the raided brood emerges in the raiding colony and is subsequently incorporated into the colony's worker force. We also found enslaved conspecifics in a second honey ant species, M. depilis, the sister taxon of M. mimicus, which occurs in sympatry with M. mimicus at the study site. Colonies of this species furthermore contained raided M. mimicus workers. Both species have an effective mating frequency that is not significantly different from 1. This study provides genetic evidence for facultative intra- and interspecific slavery in the genus Myrmecocystus. Slavery in ants has evolved repeatedly and supposedly by different means. We propose that, in honey ants, secondary contact between two closely related species that both exhibit intraspecific slavery gave rise to an early form of facultative interspecific slavery. PMID:12737658

  19. A case for automated tape in clinical imaging.

    PubMed

    Bookman, G; Baune, D

    1998-08-01

    Electronic archiving of radiology images over many years will require many terabytes of storage with a need for rapid retrieval of these images. As more large PACS installations are installed and implemented, a data crisis occurs. The ability to store this large amount of data using the traditional method of optical jukeboxes or online disk alone becomes an unworkable solution. The amount of floor space number of optical jukeboxes, and off-line shelf storage required to store the images becomes unmanageable. With the recent advances in tape and tape drives, the use of tape for long term storage of PACS data has become the preferred alternative. A PACS system consisting of a centrally managed system of RAID disk, software and at the heart of the system, tape, presents a solution that for the first time solves the problems of multi-modality high end PACS, non-DICOM image, electronic medical record and ADT data storage. This paper will examine the installation of the University of Utah, Department of Radiology PACS system and the integration of automated tape archive. The tape archive is also capable of storing data other than traditional PACS data. The implementation of an automated data archive to serve the many other needs of a large hospital will also be discussed. This will include the integration of a filmless cardiology department and the backup/archival needs of a traditional MIS department. The need for high bandwidth to tape with a large RAID cache will be examined and how with an interface to a RIS pre-fetch engine, tape can be a superior solution to optical platters or other archival solutions. The data management software will be discussed in detail. The performance and cost of RAID disk cache and automated tape compared to a solution that includes optical will be examined.

  20. The systems approach to airport security: The FAA (Federal Aviation Administration)/BWI (Baltimore-Washington International) Airport demonstration project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Caskey, D.L.; Olascoaga, M.T.

    1990-01-01

    Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will bemore » completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).« less

  1. United States Army Counter Partisan Operations in Northern Virginia During the American Civil War

    DTIC Science & Technology

    2016-06-10

    War Centennial Commission, accessed January 10, 2016, http://www.loudounhistory.org/history/ loudoun-cw-mosby-burning-raid.htm. This article...Mosby’s Raids. Edited by Fitzhugh Turner. Virginia Civil War Centennial Commission. Accessed January 10, 2016. http://www.loudounhistory.org/history

  2. Extreme Ultraviolet Spectroscopy of the Thermosphere from the RAIDS Experiment on the ISS

    NASA Astrophysics Data System (ADS)

    Bishop, R. L.; Stephan, A. W.; Christensen, A. B.; Budzien, S. A.; Straus, P. R.; van Epps, Z.

    2009-12-01

    The RAIDS experiment is a suite of eight instruments to be flown aboard the Japanese Experiment Module-Exposed Facility on the International Space Station (ISS) in 2009. One of the sensors is the Extreme Ultraviolet Spectrograph (EUVS). The EUVS measures the radiance of the Earth’s airglow with a f/5 Wadsworth spectrograph fronted by a mechanical grid collimator. The 0.1 x 2.3 degree field of view is imaged onto a wedge-and-strip two dimensional detector and collapsed into a one-dimensional spectrum. The vertical profile is assembled from a series of these spectra obtained as the RAIDS platform scans in altitude. Two grating positions provide coverage of the 50.0-85.0 nm region or the 77.0-110.0 nm region at 1.2 nm spectral resolution. We will present a discussion of the scientific targets for the RAIDS EUVS and, if launched on schedule, also the first spectra observed from this sensor. The EUVS is sensitive to a number of emissions in the Earth’s dayglow including atomic and ionized oxygen and argon, ionized nitrogen, and atomic helium. One of the primary RAIDS science objectives is to use the EUVS to obtain simultaneous OII 83.4 nm and 61.7 nm limb profiles to perform an in-depth investigation of the OII excitation and emission processes in the daytime ionosphere. Some of the more dominant spectral features such as the OI (98.9, 102.7 nm), OII (83.4, 61.7 nm), and NII (108.5, 91.6 nm) lines will provide the opportunity to develop new methods to monitor thermospheric O and N2. The OI (102.7 nm) observations may also be used, in conjunction with other RAIDS measurements, to retrieve the spectrally unresolved H Lyman beta and thus a measure of atomic hydrogen. The argon emissions Ar I (104.8, 106.7 nm) and Ar II (91.96, 93.21 nm) will provide information on its relative abundance in the lower thermosphere. . Combinations of measurements, such as the EUVS OI (98.9 nm) and the RAIDS Near Infrared Spectrometer OI (799.0 nm) emission can be used to probe the details of their associated branching ratios and excitation cross sections. Finally, the very quiet solar minimum period provides a unique opportunity to observe the He I 58.4 nm emission at these altitudes. The initial RAIDS EUVS spectra will highlight this potential wealth of future ionospheric and thermospheric studies that can be accomplished using such a unique dataset.

  3. Laboratory and semi-field evaluations of two (Transfluthrin) spatial repellent devices against Aedes aegypti (L.) (Diptera: Culicidae)

    USDA-ARS?s Scientific Manuscript database

    Two transfluthrin-based spatial repellent products (Raid Dual Action Insect Repellent and Home Freshener and Raid Shield (currently not commercially available), SC Johnson, Racine WI) were evaluated for spatial repellent effects against female Aedes aegypti (L.) mosquitoes underlaboratory (wind tunn...

  4. Border Jumping: Strategic and Operational Considerations in Planning Cross-Border Raids Against Insurgent Sanctuaries

    DTIC Science & Technology

    2013-06-01

    POLITICAL COSTS .......25 D. THE OVERALL TIMING OF NICARAGUAN CROSS-BORDER OFFENSIVES...27 E. THE TERMINATION OF NICARAGUAN CROSS-BORDER RAIDS...Exploit, and Analyze FARC Revolutionary Armed Forces of Colombia FDN Nicaraguan Democratic Force FLN Front de Libération Nationale FSLN Sandinista

  5. Beyond a Terabyte File System

    NASA Technical Reports Server (NTRS)

    Powers, Alan K.

    1994-01-01

    The Numerical Aerodynamics Simulation Facility's (NAS) CRAY C916/1024 accesses a "virtual" on-line file system, which is expanding beyond a terabyte of information. This paper will present some options to fine tuning Data Migration Facility (DMF) to stretch the online disk capacity and explore the transitions to newer devices (STK 4490, ER90, RAID).

  6. Performance measurements of the first RAID prototype

    NASA Technical Reports Server (NTRS)

    Chervenak, Ann L.

    1990-01-01

    The performance is examined of Redundant Arrays of Inexpensive Disks (RAID) the First, a prototype disk array. A hierarchy of bottlenecks was discovered in the system that limit overall performance. The most serious is the memory system contention on the Sun 4/280 host CPU, which limits array bandwidth to 2.3 MBytes/sec. The array performs more successfully on small random operations, achieving nearly 300 I/Os per second before the Sun 4/280 becomes CPU limited. Other bottlenecks in the system are the VME backplane, bandwidth on the disk controller, and overheads associated with the SCSI protocol. All are examined in detail. The main conclusion is that to achieve the potential bandwidth of arrays, more powerful CPU's alone will not suffice. Just as important are adequate host memory bandwidth and support for high bandwidth on disk controllers. Current disk controllers are more often designed to achieve large numbers of small random operations, rather than high bandwidth. Operating systems also need to change to support high bandwidth from disk arrays. In particular, they should transfer data in larger blocks, and should support asynchronous I/O to improve sequential write performance.

  7. Creating a Better End Games Strategy: Fully Exploiting the Capabilities of Multiple Disciplines

    DTIC Science & Technology

    2013-09-01

    example, in 2011, approximately 2,200 raids were conducted, and the Pentagon has estimated 90 percent of these raids “end without a shot fired ...first chances to demonstrate the HIG’s value. Abdulmutallab tried to detonate a bomb hidden in his underwear while traveling on a Northwest

  8. ICE Raids, Children, Media, and Making Sense of Latino Newcomers in Flyover Country

    ERIC Educational Resources Information Center

    Hamann, Edmund T.; Reeves, Jenelle

    2012-01-01

    Extant cultural models articulated in "Flyover Country" print media responses to ICE workplace raids showed a welcome of sorts of Latino newcomers. These models suggest a place for Latino students at school and more broadly for Latino children and parents in these communities. Thus, they index an unwillingness to see Latino newcomers in…

  9. Contemporary Deportation Raids and Historical Memory: Mexican Expulsions in the Nineteenth Century

    ERIC Educational Resources Information Center

    Hernandez, Jose Angel

    2010-01-01

    The contemporary situation in the United States with respect to Mexican migrants has reached a level of intensity that harkens back to the mass expulsions of the 1930s and the 1950s, when millions were forcefully removed south across the border. Recent deportation raids have targeted food processing plants and other large businesses hiring migrant…

  10. China’s Aerospace Power Trajectory in the Near Seas

    DTIC Science & Technology

    2012-07-01

    February 2005 article in the journal 舰船 知 识 (Naval and Merchant Ships), “Nemesis of Aircraft Carriers,” concluded that precision-guided ballistic missiles...www.asahi .com/. 43. Cui, ed., Air Raid and Anti–Air Raid in the 21st Century; Wang Zaigang, “Nemesis of Aircraft Carriers,” 舰船 知 识 [Naval and Merchant Ships

  11. The role of sensation seeking, perceived peer pressure, and harmful alcohol use in riding with an alcohol-impaired driver.

    PubMed

    Kim, Jun-Hong; Kim, Kwang Sik

    2012-09-01

    Alcohol-related motor vehicle collisions have been the top of policy agenda for more than three decades in Korea. Despite implementation of various traffic safety measures, some drivers' alcohol use and abuse has resulted in a high number of alcohol-impaired traffic fatalities every year. This paper presents the association of theoretical factors with behavior of riding with an alcohol-impaired driver (RAID) among all age groups in the Korean adult sample. The theoretical factors of the drivers are personality factor, socio-psychological factor, and alcohol-related behavioral risk factor. We utilized national survey data from 1007 respondents consisting of 703 males and 304 females aged 20-66 collected by Korean Institute of Criminology (KIC) to test our theorized model. Our results indicated that there were three major predictors of RAID involvement: sensation seeking propensity, perceived peer pressure, and frequent harmful drinking. Overall, prediction of RAID behavior by gender was mediated entirely through these predictors. The issue of males' higher risk of RAID involvements was addressed for effective communication strategies such as campaigns. Copyright © 2012 Elsevier Ltd. All rights reserved.

  12. Changing the Air Force Narrative

    DTIC Science & Technology

    2014-10-14

    Chinese forces in their struggle against the Imperial Japanese Army through the Hump Airlift (Hanson, 2007), the Doolittle Raid striking within the... Doolittle and the Tuskegee Airmen. Airpower came alive to the public through articles, stories and books written about and by these men...Defense Research Institute, RAND Corporation. Chun, C. K. S (2006). The Doolittle Raid 1942: America’s First Strike Back at Japan. Oxford: Osprey

  13. Natosi: Strong Medicine. Indian Culture Series: Stories of the Blackfeet.

    ERIC Educational Resources Information Center

    Roop, Peter

    Part of a series of stories about the Blackfeet Indians, the illustrated story details the capture of the first horses by the Blackfeet. In the story, young Running Crane is allowed to join a party of warriors who raid a Crow camp for horses. Running Crane uses gentleness to capture a black horse but is separated from the raiding party and must…

  14. IMS software developments for the detection of chemical warfare agent

    NASA Technical Reports Server (NTRS)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  15. The influence of space and time on the evolution of altruistic defence: the case of ant slave rebellion.

    PubMed

    Metzler, D; Jordan, F; Pamminger, T; Foitzik, S

    2016-05-01

    How can antiparasite defence traits evolve even if they do not directly benefit their carriers? An example of such an indirect defence is rebellion of enslaved Temnothorax longispinosus ant workers against their social parasite Temnothorax americanus, a slavemaking ant. Ant slaves have been observed to kill their oppressors' offspring, a behaviour from which the sterile slaves cannot profit directly. Parasite brood killing could, however, reduce raiding pressure on related host colonies nearby. We analyse with extensive computer simulations for the Temnothorax slavemaker system under what conditions a hypothetical rebel allele could invade a host population, and in particular, how host-parasite dynamics and population structure influence the rebel allele's success. Exploring a wide range of model parameters, we only found a small number of parameter combinations for which kin selection or multilevel selection could allow a slave rebellion allele to spread in the host population. Furthermore, we did not detect any cases in which the reduction of raiding pressure in the close vicinity of the slavemaker nest would substantially contribute to the inclusive fitness of rebels. This suggests that slave rebellion is not costly and perhaps a side-effect of some other beneficial trait. In some of our simulations, however, even a costly rebellion allele could spread in the population. This was possible when host-parasite interactions led to a metapopulation dynamic with frequent local extinctions and recolonizations of demes by the offspring of few immigrants. © 2016 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2016 European Society For Evolutionary Biology.

  16. Narco-Pipeline to West Africa

    DTIC Science & Technology

    2009-04-01

    2000 that criticized Plan Colombia: 56 Ungerman, Gerard. Plan Colombia: Cashing in on the Drug War Failure [DVD]. Cinema Libre. 57 Ibid...rescues, such as Israel’s Entebbe airport raid in 1976 or the Peruvian raid on the Japanese Embassy residence in Lima in 1996.”73 Certainly of interest...Gerard. Plan Colombia: Cashing in on the Drug War Failure [DVD]. Cinema Libre. United Nations Development Programme, “Human Development Index

  17. Decoupling erasure coding from massive multiplayer online role-playing games in model checking

    NASA Astrophysics Data System (ADS)

    Liu, Linhui; Li, Wei

    2009-07-01

    SMPs must work. Given the current status of unstable configurations, systems engineers predictably desire the emulation of RAID. in order to surmount this problem, we verify not only that IPv7 and symmetric encryption can cooperate to overcome this problem, but that the same is true for web browsers.

  18. Development of a networked four-million-pixel pathological and radiological digital image presentation system and its application to medical conferences

    NASA Astrophysics Data System (ADS)

    Sakano, Toshikazu; Furukawa, Isao; Okumura, Akira; Yamaguchi, Takahiro; Fujii, Tetsuro; Ono, Sadayasu; Suzuki, Junji; Matsuya, Shoji; Ishihara, Teruo

    2001-08-01

    The wide spread of digital technology in the medical field has led to a demand for the high-quality, high-speed, and user-friendly digital image presentation system in the daily medical conferences. To fulfill this demand, we developed a presentation system for radiological and pathological images. It is composed of a super-high-definition (SHD) imaging system, a radiological image database (R-DB), a pathological image database (P-DB), and the network interconnecting these three. The R-DB consists of a 270GB RAID, a database server workstation, and a film digitizer. The P-DB includes an optical microscope, a four-million-pixel digital camera, a 90GB RAID, and a database server workstation. A 100Mbps Ethernet LAN interconnects all the sub-systems. The Web-based system operation software was developed for easy operation. We installed the whole system in NTT East Kanto Hospital to evaluate it in the weekly case conferences. The SHD system could display digital full-color images of 2048 x 2048 pixels on a 28-inch CRT monitor. The doctors evaluated the image quality and size, and found them applicable to the actual medical diagnosis. They also appreciated short image switching time that contributed to smooth presentation. Thus, we confirmed that its characteristics met the requirements.

  19. Coevolution in host-parasite systems: behavioural strategies of slave-making ants and their hosts.

    PubMed

    Foitzik, S; DeHeer, C J; Hunjan, D N; Herbers, J M

    2001-06-07

    Recently, avian brood parasites and their hosts have emerged as model systems for the study of host-parasite coevolution. However, empirical studies of the highly analogous social parasites, which use the workers of another eusocial species to raise their own young, have never explicitly examined the dynamics of these systems from a coevolutionary perspective. Here, we demonstrate interpopulational variation in behavioural interactions between a socially parasitic slave-maker ant and its host that is consistent with the expectations of host-parasite coevolution. Parasite pressure, as inferred by the size, abundance and raiding frequency of Protomognathus americanus colonies, was highest in a New York population of the host Leptothorax longispinosus and lowest in a West Virginia population. As host-parasite coevolutionary theory would predict, we found that the slave-makers and the hosts from New York were more effective at raiding and defending against raiders, respectively, than were conspecifics from the West Virginia population. Some of these variations in efficacy were brought about by apparently simple shifts in behaviour. These results demonstrate that defence mechanisms against social parasites can evolve, and they give the first indications of the existence of a coevolutionary arms race between a social parasite and its host.

  20. Vocal behavior and risk assessment in wild chimpanzees

    NASA Astrophysics Data System (ADS)

    Wilson, Michael L.; Hauser, Marc D.; Wrangham, Richard W.

    2005-09-01

    If, as theory predicts, animal communication is designed to manipulate the behavior of others to personal advantage, then there will be certain contexts in which vocal behavior is profitable and other cases where silence is favored. Studies conducted in Kibale National Park, Uganda investigated whether chimpanzees modified their vocal behavior according to different levels of risk from intergroup aggression, including relative numerical strength and location in range. Playback experiments tested numerical assessment, and observations of chimpanzees throughout their range tested whether they called less frequently to avoid detection in border areas. Chimpanzees were more likely to call to playback of a stranger's call if they greatly outnumbered the stranger. Chimpanzees tended to reduce calling in border areas, but not in all locations. Chimpanzees most consistently remained silent when raiding crops: they almost never gave loud pant-hoot calls when raiding banana plantations outside the park, even though they normally give many pant-hoots on arrival at high-quality food resources. These findings indicate that chimpanzees have the capacity to reduce loud call production when appropriate, but that additional factors, such as advertising territory ownership, contribute to the costs and benefits of calling in border zones.

  1. Clausewitz, on Shakespeare

    DTIC Science & Technology

    1991-04-01

    Roger’s daughter, of marriageable age. -Cyrus Bourne - Dorcas and Reuben’s teen-age son. Captain Lovewell - leader of a raiding party that decisively...them for ransom. But the savagery of this war was not limited to the Indians as we see on 24 February 1724 when Lovewell returned to Dover from a...raid that destroyed the Norridgewock tribe including the women and children. On that day: Lovewell , with his company, came into Dover, "the ten scalps

  2. Archaeological Reconnaissance of the Lower Ohio River Navigation Area, Illinois and Kentucky

    DTIC Science & Technology

    1981-01-01

    Pulaski Counties, Illinois. O.L. Baskins and Company, Historical Publishers: Chicago, IL. Robbins , Chandles S., Bertel Brunn, and Herbert S. Zim 196b...woodpecker (Campephllus principalis) ( Robbins et^ al . 1966). Faunal resources available from the Ohio River, the levee flank lakes, and the backwater...the area, occasional raids occurred (Müller and Davy 1977:31). These Indian raids were often bloody and cruel ( Baskin 1883:536-537) as rage and

  3. Integration, acceptance testing, and clinical operation of the Medical Information, Communication and Archive System, phase II.

    PubMed

    Smith, E M; Wandtke, J; Robinson, A

    1999-05-01

    The Medical Information, Communication and Archive System (MICAS) is a multivendor incremental approach to picture archiving and communications system (PACS). It is a multimodality integrated image management system that is seamlessly integrated with the radiology information system (RIS). Phase II enhancements of MICAS include a permanent archive, automated workflow, study caches, Microsoft (Redmond, WA) Windows NT diagnostic workstations with all components adhering to Digital Information Communications in Medicine (DICOM) standards. MICAS is designed as an enterprise-wide PACS to provide images and reports throughout the Strong Health healthcare network. Phase II includes the addition of a Cemax-Icon (Fremont, CA) archive, PACS broker (Mitra, Waterloo, Canada), an interface (IDX PACSlink, Burlington, VT) to the RIS (IDXrad) plus the conversion of the UNIX-based redundant array of inexpensive disks (RAID) 5 temporary archives in phase I to NT-based RAID 0 DICOM modality-specific study caches (ImageLabs, Bedford, MA). The phase I acquisition engines and workflow management software was uninstalled and the Cemax archive manager (AM) assumed these functions. The existing ImageLabs UNIX-based viewing software was enhanced and converted to an NT-based DICOM viewer. Installation of phase II hardware and software and integration with existing components began in July 1998. Phase II of MICAS demonstrates that a multivendor open-system incremental approach to PACS is feasible, cost-effective, and has significant advantages over a single-vendor implementation.

  4. Claims and Counterclaims: Institutional Arrangements and Farmers' Response to the Delivery and Adoption of Innovations in the Okavango Delta, Botswana

    ERIC Educational Resources Information Center

    Noga, Sekondeko Ronnie; Kolawole, Oluwatoyin Dare; Thakadu, Olekae Tsompi; Masunga, Gaseitsiwe Smollie

    2017-01-01

    Purpose: This article examined how institutional factors influencing the promotion of two elephant crop-raiding deterrent innovations (ECDIs) introduced to farmers through a ministry-based extension system in the Okavango Delta, Botswana, have impacted farmers' adoption behaviour. Methodology: A standardised interview schedule was used to elicit…

  5. Facility for testing ice drills

    NASA Astrophysics Data System (ADS)

    Nielson, Dennis L.; Delahunty, Chris; Goodge, John W.; Severinghaus, Jeffery P.

    2017-05-01

    The Rapid Access Ice Drill (RAID) is designed for subsurface scientific investigations in Antarctica. Its objectives are to drill rapidly through ice, to core samples of the transition zone and bedrock, and to leave behind a borehole observatory. These objectives required the engineering and fabrication of an entirely new drilling system that included a modified mining-style coring rig, a unique fluid circulation system, a rod skid, a power unit, and a workshop with areas for the storage of supplies and consumables. An important milestone in fabrication of the RAID was the construction of a North American Test (NAT) facility where we were able to test drilling and fluid processing functions in an environment that is as close as possible to that expected in Antarctica. Our criteria for site selection was that the area should be cold during the winter months, be located in an area of low heat flow, and be at relatively high elevation. We selected a site for the facility near Bear Lake, Utah, USA. The general design of the NAT well (NAT-1) started with a 27.3 cm (10.75 in.) outer casing cemented in a 152 m deep hole. Within that casing, we hung a 14 cm (5.5 in.) casing string, and, within that casing, a column of ice was formed. The annulus between the 14 and 27.3 cm casings provided the path for circulation of a refrigerant. After in-depth study, we chose to use liquid CO2 to cool the hole. In order to minimize the likelihood of the casing splitting due to the volume increase associated with freezing water, the hole was first cooled and then ice was formed in increments from the bottom upward. First, ice cubes were placed in the inner liner and then water was added. Using this method, a column of ice was incrementally prepared for drilling tests. The drilling tests successfully demonstrated the functioning of the RAID system. Reproducing such a facility for testing of other ice drilling systems could be advantageous to other research programs in the future.

  6. The Coast Artillery Journal. Volume 62, Number 3, March 1925

    DTIC Science & Technology

    1925-03-01

    year 1918, a total number of 483 German planes were dispatched to raid Paris , only 37 penetrated the antiaircraft defenses of Paris and of these 31, 13...were brought down by antiaircraft fire. "I was present at the raid of September 15th, when 50 planes attempted to reach Paris . Of the 50, 47 planes...on Paris . The anti- aircraft defense of Paris consisted almost exclusively of guns, searchlights, and antiaircraft listening devices. "During the war

  7. Forward Arming and Refueling Points for Fighter Aircraft: Power Projection in an Antiaccess Environment

    DTIC Science & Technology

    2014-10-01

    Arming and Refueling Points for Fighter Aircraft Feature Fifth-Generation Doolittle Raid If we should have to fight, we should be prepared to do so from...the neck up instead of from the neck down. —Gen Jimmy Doolittle The famous Doolittle Raid during World War II offers a superb exam- ple of how an...innovative concept can lead to strategic effects. On 18 April 1942, just four months after the Japanese attack on Pearl Harbor, Lt Col Jimmy Doolittle

  8. Coevolution in host-parasite systems: behavioural strategies of slave-making ants and their hosts.

    PubMed Central

    Foitzik, S.; DeHeer, C. J.; Hunjan, D. N.; Herbers, J. M.

    2001-01-01

    Recently, avian brood parasites and their hosts have emerged as model systems for the study of host-parasite coevolution. However, empirical studies of the highly analogous social parasites, which use the workers of another eusocial species to raise their own young, have never explicitly examined the dynamics of these systems from a coevolutionary perspective. Here, we demonstrate interpopulational variation in behavioural interactions between a socially parasitic slave-maker ant and its host that is consistent with the expectations of host-parasite coevolution. Parasite pressure, as inferred by the size, abundance and raiding frequency of Protomognathus americanus colonies, was highest in a New York population of the host Leptothorax longispinosus and lowest in a West Virginia population. As host-parasite coevolutionary theory would predict, we found that the slave-makers and the hosts from New York were more effective at raiding and defending against raiders, respectively, than were conspecifics from the West Virginia population. Some of these variations in efficacy were brought about by apparently simple shifts in behaviour. These results demonstrate that defence mechanisms against social parasites can evolve, and they give the first indications of the existence of a coevolutionary arms race between a social parasite and its host. PMID:11375101

  9. RAID Unbound: Storage Fault Tolerance in a Distributed Environment

    NASA Technical Reports Server (NTRS)

    Ritchie, Brian

    1996-01-01

    Mirroring, data replication, backup, and more recently, redundant arrays of independent disks (RAID) are all technologies used to protect and ensure access to critical company data. A new set of problems has arisen as data becomes more and more geographically distributed. Each of the technologies listed above provides important benefits; but each has failed to adapt fully to the realities of distributed computing. The key to data high availability and protection is to take the technologies' strengths and 'virtualize' them across a distributed network. RAID and mirroring offer high data availability, which data replication and backup provide strong data protection. If we take these concepts at a very granular level (defining user, record, block, file, or directory types) and them liberate them from the physical subsystems with which they have traditionally been associated, we have the opportunity to create a highly scalable network wide storage fault tolerance. The network becomes the virtual storage space in which the traditional concepts of data high availability and protection are implemented without their corresponding physical constraints.

  10. Ion Heating and Flows in a High Power Helicon Source

    NASA Astrophysics Data System (ADS)

    Scime, Earl; Agnello, Riccardo; Furno, Ivo; Howling, Alan; Jacquier, Remy; Plyushchev, Gennady; Thompson, Derek

    2017-10-01

    We report experimental measurements of ion temperatures and flows in a high power, linear, magnetized, helicon plasma device, the Resonant Antenna Ion Device (RAID). RAID is equipped with a high power helicon source. Parallel and perpendicular ion temperatures on the order of 0.6 eV are observed for an rf power of 4 kW, suggesting that higher power helicon sources should attain ion temperatures in excess of 1 eV. The unique RAID antenna design produces broad, uniform plasma density and perpendicular ion temperature radial profiles. Measurements of the azimuthal flow indicate rigid body rotation of the plasma column of a few kHz. When configured with an expanding magnetic field, modest parallel ion flows are observed in the expansion region. The ion flows and temperatures are derived from laser induced fluorescence measurements of the Doppler resolved velocity distribution functions of argon ions. This work supported by U.S. National Science Foundation Grant No. PHY-1360278.

  11. Warfare and reproductive success in a tribal population

    PubMed Central

    Glowacki, Luke; Wrangham, Richard

    2015-01-01

    Intergroup conflict is a persistent feature of many human societies yet little is known about why individuals participate when doing so imposes a mortality risk. To evaluate whether participation in warfare is associated with reproductive benefits, we present data on participation in small-scale livestock raids among the Nyangatom, a group of nomadic pastoralists in East Africa. Nyangatom marriages require the exchange of a significant amount of bridewealth in the form of livestock. Raids are usually intended to capture livestock, which raises the question of whether and how these livestock are converted into reproductive opportunities. Over the short term, raiders do not have a greater number of wives or children than nonraiders. However, elders who were identified as prolific raiders in their youth have more wives and children than other elders. Raiders were not more likely to come from families with fewer older maternal sisters or a greater number of older maternal brothers. Our results suggest that in this cultural context raiding provides opportunities for increased reproductive success over the lifetime. PMID:25548190

  12. Increased host aggression as an induced defense against slave-making ants

    PubMed Central

    Pennings, Pleuni S.; Foitzik, Susanne

    2011-01-01

    Slave-making ants reduce the fitness of surrounding host colonies through regular raids, causing the loss of brood and frequently queen and worker death. Consequently, hosts developed defenses against slave raids such as specific recognition and aggression toward social parasites, and indeed, we show that host ants react more aggressively toward slavemakers than toward nonparasitic competitors. Permanent behavioral defenses can be costly, and if social parasite impact varies in time and space, inducible defenses, which are only expressed after slavemaker detection, can be adaptive. We demonstrate for the first time an induced defense against slave-making ants: Cues from the slavemaker Protomognathus americanus caused an unspecific but long-lasting behavioral response in Temnothorax host ants. A 5-min within-nest encounter with a dead slavemaker raised the aggression level in T. longispinosus host colonies. Contrarily, encounters with nonparasitic competitors did not elicit aggressive responses toward non-nestmates. Increased aggression can be adaptive if a slavemaker encounter reliably indicates a forthcoming attack and if aggression increases postraid survival. Host aggression was elevated over 3 days, showing the ability of host ants to remember parasite encounters. The response disappeared after 2 weeks, possibly because by then the benefits of increased aggression counterbalance potential costs associated with it. PMID:22476194

  13. Technology Transition and Adoption: A Study in Search of Metrics for Evaluating Transition

    DTIC Science & Technology

    2010-12-01

    Coalitions and Agents Project (Fast C2AP) 3 Direct Thermal to Electric Conversion (DTEC) 3 High-Frequency Active Auroral Project ( HAARP ) Instrument...which the technology is disruptive: 40 RAID TEAM SDS M&DC2 LCCMD DTEC AT3 WASP DOTS LASER Boomerang Virtual Autopsy  Program HAARP PCES Ultralog Sticky...RAID SDS Fast C2AP DTEC AT3 WASP Radar Scope DOTS SPEYES LASER Boomerang MAV ACTD HAARP TEAM PCES Ultralog Sticky Flare Active Templates LCCMD VIVID

  14. Department of Defense Dictionary of Military and Associated Terms

    DTIC Science & Technology

    2008-05-30

    cargo on board a ship for the purpose of accomplishing en route maintenance and security. supersonic — Of or pertaining to speed ...information systems TAK cargo ship T- AKR fast logistics ship TALCE tanker airlift control element Appendix A As Amended Through 30 May 2008...priorities committee — (*) A committee set up to determine the priorities of passengers and cargo . air raid reporting control ship — (*) A

  15. The psychometric properties, sensitivity and specificity of the geriatric anxiety inventory, hospital anxiety and depression scale, and rating anxiety in dementia scale in aged care residents.

    PubMed

    Creighton, Alexandra S; Davison, Tanya E; Kissane, David W

    2018-02-22

    Limited research has been conducted into the identification of a valid and reliable screening measure for anxiety in aged care settings, despite it being one of the most common psychological conditions. This study aimed to determine an appropriate anxiety screening tool for aged care by comparing the reliability and validity of three commonly used measures and identifying specific cut-offs for the identification of generalized anxiety disorder (GAD). One-hundred and eighty nursing home residents (M age = 85.39 years) completed the GAI, HADS-A, and RAID, along with a structured diagnostic interview. Twenty participants (11.1%) met DSM-5 criteria for GAD. All measures had good psychometric properties , although reliability estimates for the HADS-A were sub-optimal. Privileging sensitivity , the GAI cut-off score of 9 gave sensitivity of 90.0% and specificity of 86.3%; HADS-A cut-off of 6 gave sensitivity of 90.0% and specificity of 80.6%; and RAID cut-off of 11 gave sensitivity of 85.0% and specificity of 72.5%. While all three measures had adequate reliability, validity, and cut-scores with high levels of sensitivity and specificity to detect anxiety within aged care, the GAI was the most consistently reliable and valid measure for screening for GAD.

  16. Teleradiology network system and computer-aided diagnosis workstation using the web medical image conference system with a new information security solution

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki

    2011-03-01

    We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.

  17. Understanding Modern Maritime Piracy: A Complex Adaptive System Approach

    DTIC Science & Technology

    2014-03-12

    hol6 pet response Including the time for reviewing lnttructions. lellldling IJdsting deta aoun:es gatherin9end melntalnlng the data nNded. end...have a more drastic economic impact since the pirate organizations are able to capitalize on the sale of stolen cargo more quickly than the ransom...century, the corsairs increased their opportunity from the sea by conducting a greater number of raids inland against the European nations, venturing

  18. A novel field search and rescue system based on SIM card location

    NASA Astrophysics Data System (ADS)

    Zhang, Huihui; Guo, Shutao; Cui, Dejing

    2017-06-01

    Nowadays, the rapid development of outdoor sports and adventure leads to the increase of the frequency of missing accidents. On the other hand, it becomes much more convenient and efficient for the criminals to escape with the help of new technologies. So we have developed a long-distance raids targeted field search and rescue system which utilizes RSSI ranging and Kalman filtering algorithm to realize remote positioning and dynamic supervision management only by a mobile phone with a SIM card, without any additional terminal equipment.

  19. Central & Eastern Europe and Central Asia: police raids and violence put sex workers at risk of HIV.

    PubMed

    Crago, A L; Rakhmetova, A; Karadafov, M; Islamova, S; Maslova, I

    2008-12-01

    In most of the countries of Central & Eastern Europe and Central Asia, sex workers report very high levels of abuse from police, particularly in the context of police raids. In this article, based on an oral presentation at the conference, the Sex Workers' Rights Advocacy Network (SWAN) report on the results of a study conducted among sex workers in several countries in the region. The authors make the link between police violence and general violence, and between violence against sex workers and vulnerability to HIV infection. The authors advance a number of recommendations, including that sex work be decriminalized.

  20. Terabyte IDE RAID-5 Disk Arrays

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David A. Sanders et al.

    2003-09-30

    High energy physics experiments are currently recording large amounts of data and in a few years will be recording prodigious quantities of data. New methods must be developed to handle this data and make analysis at universities possible. We examine some techniques that exploit recent developments in commodity hardware. We report on tests of redundant arrays of integrated drive electronics (IDE) disk drives for use in offline high energy physics data analysis. IDE redundant array of inexpensive disks (RAID) prices now are less than the cost per terabyte of million-dollar tape robots! The arrays can be scaled to sizes affordablemore » to institutions without robots and used when fast random access at low cost is important.« less

  1. Experiences From NASA/Langley's DMSS Project

    NASA Technical Reports Server (NTRS)

    1996-01-01

    There is a trend in institutions with high performance computing and data management requirements to explore mass storage systems with peripherals directly attached to a high speed network. The Distributed Mass Storage System (DMSS) Project at the NASA Langley Research Center (LaRC) has placed such a system into production use. This paper will present the experiences, both good and bad, we have had with this system since putting it into production usage. The system is comprised of: 1) National Storage Laboratory (NSL)/UniTree 2.1, 2) IBM 9570 HIPPI attached disk arrays (both RAID 3 and RAID 5), 3) IBM RS6000 server, 4) HIPPI/IPI3 third party transfers between the disk array systems and the supercomputer clients, a CRAY Y-MP and a CRAY 2, 5) a "warm spare" file server, 6) transition software to convert from CRAY's Data Migration Facility (DMF) based system to DMSS, 7) an NSC PS32 HIPPI switch, and 8) a STK 4490 robotic library accessed from the IBM RS6000 block mux interface. This paper will cover: the performance of the DMSS in the following areas: file transfer rates, migration and recall, and file manipulation (listing, deleting, etc.); the appropriateness of a workstation class of file server for NSL/UniTree with LaRC's present storage requirements in mind the role of the third party transfers between the supercomputers and the DMSS disk array systems in DMSS; a detailed comparison (both in performance and functionality) between the DMF and DMSS systems LaRC's enhancements to the NSL/UniTree system administration environment the mechanism for DMSS to provide file server redundancy the statistics on the availability of DMSS the design and experiences with the locally developed transparent transition software which allowed us to make over 1.5 million DMF files available to NSL/UniTree with minimal system outage

  2. Towards Availability and Maintainability Benchmarks: A Case Study of Software RAID Systems

    DTIC Science & Technology

    2001-01-01

    on recent outages of big e-commerce providers and the major business impact of those out- ages is staggering; furthermore, several of those outages...uses one or more clients to generate a realistic, statistically reproducible web workload; its workload models what might be seen on a busy major server...the amount of dynamic content from 30% to 1% to keep the disks busy and to avoid saturating the CPU. This restriction was necessary because we used

  3. Through Trial and Error: Learning and Adaptation in the English Tactical System from Bannockburn to Poitiers

    DTIC Science & Technology

    2014-06-13

    continue to conduct irregular warfare through raids and ambushes. As the English vanguard approached, leery of attack from Scots in the wooded area... Scots , did not enter the wood line of New Park either. Robert the Bruce had successfully avoided battle with the English and repelled their...pulling back, to force the Scots further into the field so they could not retreat easily into the wood line, but his idea was challenged by a

  4. Archiving and Distributing Seismic Data at the Southern California Earthquake Data Center (SCEDC)

    NASA Astrophysics Data System (ADS)

    Appel, V. L.

    2002-12-01

    The Southern California Earthquake Data Center (SCEDC) archives and provides public access to earthquake parametric and waveform data gathered by the Southern California Seismic Network and since January 1, 2001, the TriNet seismic network, southern California's earthquake monitoring network. The parametric data in the archive includes earthquake locations, magnitudes, moment-tensor solutions and phase picks. The SCEDC waveform archive prior to TriNet consists primarily of short-period, 100-samples-per-second waveforms from the SCSN. The addition of the TriNet array added continuous recordings of 155 broadband stations (20 samples per second or less), and triggered seismograms from 200 accelerometers and 200 short-period instruments. Since the Data Center and TriNet use the same Oracle database system, new earthquake data are available to the seismological community in near real-time. Primary access to the database and waveforms is through the Seismogram Transfer Program (STP) interface. The interface enables users to search the database for earthquake information, phase picks, and continuous and triggered waveform data. Output is available in SAC, miniSEED, and other formats. Both the raw counts format (V0) and the gain-corrected format (V1) of COSMOS (Consortium of Organizations for Strong-Motion Observation Systems) are now supported by STP. EQQuest is an interface to prepackaged waveform data sets for select earthquakes in Southern California stored at the SCEDC. Waveform data for large-magnitude events have been prepared and new data sets will be available for download in near real-time following major events. The parametric data from 1981 to present has been loaded into the Oracle 9.2.0.1 database system and the waveforms for that time period have been converted to mSEED format and are accessible through the STP interface. The DISC optical-disk system (the "jukebox") that currently serves as the mass-storage for the SCEDC is in the process of being replaced with a series of inexpensive high-capacity (1.6 Tbyte) magnetic-disk RAIDs. These systems are built with PC-technology components, using 16 120-Gbyte IDE disks, hot-swappable disk trays, two RAID controllers, dual redundant power supplies and a Linux operating system. The system is configured over a private gigabit network that connects to the two Data Center servers and spans between the Seismological Lab and the USGS. To ensure data integrity, each RAID disk system constantly checks itself against its twin and verifies file integrity using 128-bit MD5 file checksums that are stored separate from the system. The final level of data protection is a Sony AIT-3 tape backup of the files. The primary advantage of the magnetic-disk approach is faster data access because magnetic disk drives have almost no latency. This means that the SCEDC can provide better "on-demand" interactive delivery of the seismograms in the archive.

  5. Remote sensing of the low-latitude daytime ionosphere: ICON simulations and retrievals

    NASA Astrophysics Data System (ADS)

    Stephan, A. W.; Korpela, E.; England, S.; Immel, T. J.

    2016-12-01

    The Ionospheric Connection Explorer (ICON) sensor suite includes a spectrograph that will provide altitude profiles of the OII 61.7 and 83.4 nm airglow features, from which the daytime F-region ionosphere can be inferred. To make the connection between these extreme-ultraviolet (EUV) airglow emissions and ionospheric densities, ICON will use a method that has matured significantly in the last decade with the analysis of data from the Remote Atmospheric and Ionospheric Detection System (RAIDS) on the International Space Station, and the Special Sensor Ultraviolet Limb Imager (SSULI) sensors on the Defense Meteorological Satellite Program (DMSP) series of satellites. We will present end-to-end simulations of ICON EUV airglow measurements and data inversion for the expected viewing geometry and sensor capabilities, including noise. While we will focus on the performance of the algorithm for ICON within the context of the current state of knowledge, we will also identify areas where fundamental information can be gained from the high-sensitivity ICON measurements that could be used as feedback to directly improve the overall performance of the algorithm itself.

  6. The Critical Mass Laboratory at Rocky Flats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rothe, Robert E

    2003-10-15

    The Critical Mass Laboratory (CML) at Rocky Flats northwest of Denver, Colorado, was built in 1964 and commissioned to conduct nuclear experiments on January 28, 1965. It was built to attain more accurate and precise experimental data to ensure nuclear criticality safety at the plant than were previously possible. Prior to its construction, safety data were obtained from long extrapolations of subcritical data (called in situ experiments), calculated parameters from reactor engineering 'models', and a few other imprecise methods. About 1700 critical and critical-approach experiments involving several chemical forms of enriched uranium and plutonium were performed between then and 1988.more » These experiments included single units and arrays of fissile materials, reflected and 'bare' systems, and configurations with various degrees of moderation, as well as some containing strong neutron absorbers. In 1989, a raid by the Federal Bureau of Investigation (FBI) caused the plant as a whole to focus on 'resumption' instead of further criticality safety experiments. Though either not recognized or not admitted for a few years, that FBI raid did sound the death knell for the CML. The plant's optimistic goal of resumption evolved to one of deactivation, decommissioning, and plantwide demolition during the 1990s. The once-proud CML facility was finally demolished in April of 2002.« less

  7. Ideas and Weapons.

    DTIC Science & Technology

    1983-01-01

    certain that our system is adequate to ensure this superiority. The experience of men who have grappled with this problem in the past should prove valuable...Nh’lre , Ini tlac prep’lira- lonl of th is Stuiillv, thle authIor coliliIl ted t1; p)e’Cri pt drafts of Chap- t(Trs "U cl ’’ fIile (mie men t ionied ab ove...thousand men led by a renowned officer landed on the coast of Normandy and pressed eastward in a raiding expedition penetrating almost to Paris. The

  8. RFI Risk Reduction Activities Using New Goddard Digital Radiometry Capabilities

    NASA Technical Reports Server (NTRS)

    Bradley, Damon; Kim, Ed; Young, Peter; Miles, Lynn; Wong, Mark; Morris, Joel

    2012-01-01

    The Goddard Radio-Frequency Explorer (GREX) is the latest fast-sampling radiometer digital back-end processor that will be used for radiometry and radio-frequency interference (RFI) surveying at Goddard Space Flight Center. The system is compact and deployable, with a mass of about 40 kilograms. It is intended to be flown on aircraft. GREX is compatible with almost any aircraft, including P-3, twin otter, C-23, C-130, G3, and G5 types. At a minimum, the system can function as a clone of the Soil Moisture Active Passive (SMAP) ground-based development unit [1], or can be a completely independent system that is interfaced to any radiometer, provided that frequency shifting to GREX's intermediate frequency is performed prior to sampling. If the radiometer RF is less than 200MHz, then the band can be sampled and acquired directly by the system. A key feature of GREX is its ability to simultaneously sample two polarization channels simultaneously at up to 400MSPS, 14-bit resolution each. The sampled signals can be recorded continuously to a 23 TB solid-state RAID storage array. Data captures can be analyzed offline using the supercomputing facilities at Goddard Space Flight Center. In addition, various Field Programmable Gate Array (FPGA) - amenable radiometer signal processing and RFI detection algorithms can be implemented directly on the GREX system because it includes a high-capacity Xilinx Virtex-5 FPGA prototyping system that is user customizable.

  9. Evaluation of coping strategies in established rheumatoid arthritis patients: emergence of concealment in an Asian cohort.

    PubMed

    Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P

    2016-11-01

    To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (r s = -0.23, P = 0.049), MCS (r s = -0.24, P = 0.04) and RAID (r s = 0.39, P < 0.001), and was significant in the multivariate model to explain lower disease-specific HRQoL (RAID) even after adjusting for disease activity, coping effectiveness and helplessness (β = 0.20, P = 0.04). Emotional expression was associated with poorer physical HRQoL (PCS), after adjusting for disease severity, body mass index, coping effectiveness, helplessness and Concealment (β = -0.39, P < 0.001). Perceived coping-related helplessness was significant in multivariate correlates for PCS (β = -0.25, P = 0.036), MCS (β = -0.29, P = 0.02) and RAID (β = 0.53, P < 0.001), after adjusting for covariates. Concealment and Emotional expression are associated with lower disease-specific HRQoL and physical HRQoL respectively, with the former coping strategy likely to be culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but patients' perception of their coping. © 2016 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  10. Patient and clinician reported outcomes for patients with new presentation of inflammatory arthritis: observations from the National Clinical Audit for Rheumatoid and Early Inflammatory Arthritis

    PubMed Central

    Ledingham, JM; Snowden, N; Rivett, A; Galloway, J; Firth, J; Ide, Z; MacPhie, E; Kandala, N; Dennison, EM; Rowe, I

    2017-01-01

    Objectives Our aim was to conduct a national audit assessing the impact and experience of early management of inflammatory arthritis by English and Welsh rheumatology units. The audit enables rheumatology services to measure for the first time their performance, patient outcomes and experience, benchmarked to regional and national comparators. Methods All individuals >16 years of age presenting to English and Welsh rheumatology services with suspected new-onset inflammatory arthritis were included in the audit. Clinician- and patient-derived outcome and patient-reported experience measures were collected. Results Data are presented for the 6354 patients recruited from 1 February 2014 to 31 January 2015. Ninety-seven per cent of English and Welsh trusts participated. At the first specialist assessment, the 28-joint DAS (DAS28) was calculated for 2659 (91%) RA patients [mean DAS28 was 5.0 and mean Rheumatoid Arthritis Impact of Disease (RAID) score was 5.6]. After 3 months of specialist care, the mean DAS28 was 3.5 and slightly >60% achieved a meaningful DAS28 reduction. The average RAID score and reduction in RAID score were 3.6 and 2.4, respectively. Of the working patients ages 16–65 years providing data, 7, 5, 16 and 37% reported that they were unable to work, needed frequent time off work, occasionally and rarely needed time off work due to their arthritis, respectively; only 42% reported being asked about their work. Seventy-eight per cent of RA patients providing data agreed with the statement ‘Overall in the last 3 months I have had a good experience of care for my arthritis’; <2% disagreed. Conclusion This audit demonstrates that most RA patients have severe disease at the time of presentation to rheumatology services and that a significant number continue to have high disease activity after 3 months of specialist care. There is a clear need for the National Health Service to develop better systems for capturing, coding and integrating information from outpatient clinics, including measures of patient experience and outcome and measures of ability to work. PMID:27694336

  11. The Two Micron All Sky Survey

    NASA Astrophysics Data System (ADS)

    Lonsdale, Carol

    The 2 Micron All Sky Survey (2MASS) project, a collaboration between the University of Massachusetts (Dr. Mike Skrutskie, PI) and the Infrared Processing and Analysis Center, JPL/Caltech funded primarily by NASA and the NSF, will scan the entire sky utilizing two new, highly automated 1.3m telescopes at Mt. Hopkins, AZ and at CTIO, Chile. Each telescope simultaneously scans the sky at J, H and Ks with a three channel camera using 256x256 arrays of HgCdTe detectors to detect point sources brighter than about 1 mJy (to SNR=10), with a pixel size of 2.0 arcseconds. The data rate is $\\sim 19$ Gbyte per night, with a total processed data volume of 13 Tbytes of images and 0.5 Tbyte of tabular data. The 2MASS data is archived nightly into the Infrared Science Information System at IPAC, which is based on an Informix database engine, judged at the time of purchase to have the best commercially available indexing and parallelization flexibility, and a 5 Tbyte-capacity RAID multi-threaded disk system with multi-server shared disk architecture. I will discuss the challenges of processing and archiving the 2MASS data, and of supporting intelligent query access to them by the astronomical community across the net, including possibilities for cross-correlation with other remote data sets.

  12. 76 FR 60025 - Product Cancellation Order for Certain Pesticide Registrations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ... for Paclobutrazol St. Augustine Grass. 000538-00201 Scotts Turf Manager II.... Paclobutrazol 001270...-264 Sumithrin Powder. 002724-00697 Permanone H and G Insect Permethrin Control. 004822-00531 Raid 1000...

  13. The MSG Central Facility - A Mission Control System for Windows NT

    NASA Astrophysics Data System (ADS)

    Thompson, R.

    The MSG Central Facility, being developed by Science Systems for EUMETSAT1, represents the first of a new generation of satellite mission control systems, based on the Windows NT operating system. The system makes use of a range of new technologies to provide an integrated environment for the planning, scheduling, control and monitoring of the entire Meteosat Second Generation mission. It supports packetised TM/TC and uses Science System's Space UNiT product to provide automated operations support at both Schedule (Timeline) and Procedure levels. Flexible access to historical data is provided through an operations archive based on ORACLE Enterprise Server, hosted on a large RAID array and off-line tape jukebox. Event driven real-time data distribution is based on the CORBA standard. Operations preparation and configuration control tools form a fully integrated element of the system.

  14. Lessons Learned, Headquarters, 2d Infantry Division

    DTIC Science & Technology

    responsibilities under the Armistice Agreement of 1953 in sector; (2) conduct anti-infiltration, anti-raiding, counter-espionage, and counter-sabotage activities; and (3) implement 2d Infantry Division portion of EUSA Cold War program.

  15. Ion heating and flows in a high power helicon source

    NASA Astrophysics Data System (ADS)

    Thompson, Derek S.; Agnello, Riccardo; Furno, Ivo; Howling, Alan; Jacquier, Rémy; Plyushchev, Gennady; Scime, Earl E.

    2017-06-01

    We report experimental measurements of ion temperatures and flows in a high power, linear, magnetized, helicon plasma device, the Resonant Antenna Ion Device (RAID). Parallel and perpendicular ion temperatures on the order of 0.6 eV are observed for an rf power of 4 kW, suggesting that higher power helicon sources should attain ion temperatures in excess of 1 eV. The unique RAID antenna design produces broad, uniform plasma density and perpendicular ion temperature radial profiles. Measurements of the azimuthal flow indicate rigid body rotation of the plasma column of a few kHz. When configured with an expanding magnetic field, modest parallel ion flows are observed in the expansion region. The ion flows and temperatures are derived from laser induced fluorescence measurements of the Doppler resolved velocity distribution functions of argon ions.

  16. Use and effectiveness of commercial flit-spray insecticides in control of mosquito population in Sagamu, Southwest Nigeria.

    PubMed

    Adedeji, A A; Ahmed, I A; Akinwunmi, M; Aina, S A; Tikare, O; Adeboye, A F; Badmos, S O; Adedeji, K A; Fehintola, F A; Amoo, A O J

    2012-06-01

    Control of mosquito vector is crucial to reducing the burden of malaria in endemic region. In the present study, we investigated the use of commercial insecticides in families and their effectiveness in control of mosquito population in Sagamu, southwest Nigeria. A pretested structured questionnaire was used to determine mosquito adulticides techniques employed in the community and most commonly used adulticides were evaluated for effectiveness by exposing adult mosquitoes to varying concentrations of the insecticides and responses monitored. Families differ in methods adopted to prevent mosquito and use of flit-spray insecticide was commoner. Although parents constitute 64% of those applying the insecticide, 22.2% were children. Household pyrethroid insecticide products of Baygon (Imiprothrin, Prallethrin plus Cyfluthrin), Mobil (Neopynamin, Prallethrin plus Cyphenothrin) and Raid (Pynamin forte, Neopynamin plus Deltimethrin) were three commonly used in the community. The exposure tie interval for eath of osquitoes was shorter with Raid (100% at 8 minutes) when compared with Mobil (80%) and Baygon (85%) at 10 minutes (p = 0.005). Kaplan-Meier survival curve of cumulative probability of surviving exposure to insecticide was lowest with Raid (log rank 2 = 14.56, P = 0.001). Although flit-spray insecticides are affordable with simple application tool, inexplicit use-instruction on labels may cause discrepancies in application. Monitoring responses of mosquitoes to commercial flit-spray insecticide may support effective control technique and prevention of vector resistance in poor resource communities.

  17. ECFS: A decentralized, distributed and fault-tolerant FUSE filesystem for the LHCb online farm

    NASA Astrophysics Data System (ADS)

    Rybczynski, Tomasz; Bonaccorsi, Enrico; Neufeld, Niko

    2014-06-01

    The LHCb experiment records millions of proton collisions every second, but only a fraction of them are useful for LHCb physics. In order to filter out the "bad events" a large farm of x86-servers (~2000 nodes) has been put in place. These servers boot from and run from NFS, however they use their local disk to temporarily store data, which cannot be processed in real-time ("data-deferring"). These events are subsequently processed, when there are no live-data coming in. The effective CPU power is thus greatly increased. This gain in CPU power depends critically on the availability of the local disks. For cost and power-reasons, mirroring (RAID-1) is not used, leading to a lot of operational headache with failing disks and disk-errors or server failures induced by faulty disks. To mitigate these problems and increase the reliability of the LHCb farm, while at same time keeping cost and power-consumption low, an extensive research and study of existing highly available and distributed file systems has been done. While many distributed file systems are providing reliability by "file replication", none of the evaluated ones supports erasure algorithms. A decentralised, distributed and fault-tolerant "write once read many" file system has been designed and implemented as a proof of concept providing fault tolerance without using expensive - in terms of disk space - file replication techniques and providing a unique namespace as a main goals. This paper describes the design and the implementation of the Erasure Codes File System (ECFS) and presents the specialised FUSE interface for Linux. Depending on the encoding algorithm ECFS will use a certain number of target directories as a backend to store the segments that compose the encoded data. When target directories are mounted via nfs/autofs - ECFS will act as a file-system over network/block-level raid over multiple servers.

  18. Confidence assignment for mass spectrometry based peptide identifications via the extreme value distribution.

    PubMed

    Alves, Gelio; Yu, Yi-Kuo

    2016-09-01

    There is a growing trend for biomedical researchers to extract evidence and draw conclusions from mass spectrometry based proteomics experiments, the cornerstone of which is peptide identification. Inaccurate assignments of peptide identification confidence thus may have far-reaching and adverse consequences. Although some peptide identification methods report accurate statistics, they have been limited to certain types of scoring function. The extreme value statistics based method, while more general in the scoring functions it allows, demands accurate parameter estimates and requires, at least in its original design, excessive computational resources. Improving the parameter estimate accuracy and reducing the computational cost for this method has two advantages: it provides another feasible route to accurate significance assessment, and it could provide reliable statistics for scoring functions yet to be developed. We have formulated and implemented an efficient algorithm for calculating the extreme value statistics for peptide identification applicable to various scoring functions, bypassing the need for searching large random databases. The source code, implemented in C ++ on a linux system, is available for download at ftp://ftp.ncbi.nlm.nih.gov/pub/qmbp/qmbp_ms/RAId/RAId_Linux_64Bit yyu@ncbi.nlm.nih.gov Supplementary data are available at Bioinformatics online. Published by Oxford University Press 2016. This work is written by US Government employees and is in the public domain in the US.

  19. Experiences with ATM in a multivendor pilot system at Forschungszentrum Julich

    NASA Astrophysics Data System (ADS)

    Kleines, H.; Ziemons, K.; Zwoll, K.

    1998-08-01

    The ATM technology for high speed serial transmission provides a new quality of communication by introducing novel features in a LAN environment, especially support of real time communication, of both LAN and WAN communication and of multimedia streams. In order to evaluate ATM for future DAQ systems and remote control systems as well as for a high speed picture archiving and communications system for medical images, Forschungszentrum Julich has build up a pilot system for the evaluation of ATM and standard low cost multimedia systems. It is a heterogeneous multivendor system containing a variety of switches and desktop solutions, employing different protocol options of ATM. The tests conducted in the pilot system revealed major difficulties regarding stability, interoperability and performance. The paper presents motivations, layout and results of the pilot system. Discussion of results concentrates on performance issues relevant for realistic applications, e.g., connection to a RAID system via NFS over ATM.

  20. DefenseLink Special: Doolittle Raid, April 18, 1942

    Science.gov Websites

    enhanced viewing {Flash 8} Macromedia Flash Player 8 required Download free Macromedia Flash Player Download free Internet Explorer DOOLITTLE RAIDERS – Retired Lt. Col. Chase Nelson, a Doolittle Raider

  1. Advances in remote sensing of the daytime ionosphere with EUV airglow

    NASA Astrophysics Data System (ADS)

    Stephan, Andrew W.

    2016-09-01

    This paper summarizes recent progress in developing a method for characterizing the daytime ionosphere from limb profile measurements of the OII 83.4 nm emission. This extreme ultraviolet emission is created by solar photoionization of atomic oxygen in the lower thermosphere and is resonantly scattered by O+ in the ionosphere. The brightness and shape of the measured altitude profile thus depend on both the photoionization source in the lower thermosphere and the ionospheric densities that determine the resonant scattering contribution. This technique has greatly matured over the past decade due to measurements by the series of Naval Research Laboratory Special Sensor Ultraviolet Limb Imager (SSULI) instruments flown on Defense Meteorological Satellite Program (DMSP) missions and the Remote Atmospheric and Ionospheric Detection System (RAIDS) on the International Space Station. The volume of data from these missions has enabled a better approach to handling specific biases and uncertainties in both the measurement and retrieval process that affect the accuracy of the result. This paper identifies the key measurement and data quality factors that will enable the continued evolution of this technique into an advanced method for characterization of the daytime ionosphere.

  2. Community-based human–elephant conflict mitigation: The value of an evidence-based approach in promoting the uptake of effective methods

    PubMed Central

    Gunaryadi, Donny; Sugiyo

    2017-01-01

    Human–elephant conflict (HEC) is a serious threat to elephants and can cause major economic losses. It is widely accepted that reduction of HEC will often require community-based methods for repelling elephants but there are few tests of such methods. We tested community-based crop-guarding methods with and without novel chili-based elephant deterrents and describe changes in farmers’ willingness to adopt these methods following our demonstration of their relative effectiveness. In three separate field-trials that took place over almost two years (October 2005 –May 2007) in two villages adjacent to Way Kambas National Park (WKNP) in Indonesia, we found that community-based crop-guarding was effective at keeping Asian elephants (Elephas maximus) out of crop fields in 91.2% (52 out of 57), 87.6% (156 out of 178), and 80.0% (16 out of 20) of attempted raids. Once the method had been shown to be effective at demonstration sites, farmers in 16 villages around WKNP voluntarily adopted it during the July 2008 to March 2009 period and were able to repel elephants in 73.9% (150 out of 203) of attempted raids, with seven villages repelling 100% of attempted raids. These 16 villages had all experienced high levels of HEC in the preceding years; e.g. they accounted for >97% of the 742 HEC incidents recorded for the entire park in 2006. Our work shows, therefore, that a simple evidence-based approach can facilitate significant reductions in HEC at the protected area scale. PMID:28510590

  3. The harsh life on the 15th century Croatia-Ottoman empire military border: analyzing and identifying the reasons for the massacre in Cepin.

    PubMed

    Slaus, Mario; Novak, Mario; Vyroubal, Vlasta; Bedić, Zeljka

    2010-03-01

    Excavation of the historic period cemetery in Cepin, Croatia revealed the presence of a large number of perimortem injuries distributed among males, females, and subadults. Archaeological and historical data suggest these individuals were victims of a raid carried out by Turkish akinji light cavalry in 1441. Comparisons with the frequencies of perimortem trauma in 12 other, temporally congruent skeletal series from the Balkans (n = 2,123 skeletons) support this assumption. The role of the akinji in the Ottoman army was twofold: to supply war captives, and to terrorize and disperse local populations before the advance of regular troops. This article tests the hypothesis that the purpose of the 1441 raid was the latter. To accomplish this, perimortem trauma in the series were analyzed by sex, age, location, and depth of the injury. A total of 82 perimortem injuries were recorded in 12 males, 7 females, and 3 subadults. The demographic profile of the victims suggests that young adults were specifically targeted in the attack. Significant sex differences are noted in the number, distribution, and pattern of perimortem trauma. Females exhibit significantly more perimortem injuries per individual, and per bone affected, than males. The morphology and pattern of perimortem trauma in females is suggestive of gratuitous violence. Cumulatively, analysis of the osteological data suggest that the objective of the 1441 akinji raid was to spread terror and panic in the Cepin area, either as revenge for recent military setbacks, or as part of a long-term strategy intended to depopulate the area around Osijek.

  4. RAID-2: Design and implementation of a large scale disk array controller

    NASA Technical Reports Server (NTRS)

    Katz, R. H.; Chen, P. M.; Drapeau, A. L.; Lee, E. K.; Lutz, K.; Miller, E. L.; Seshan, S.; Patterson, D. A.

    1992-01-01

    We describe the implementation of a large scale disk array controller and subsystem incorporating over 100 high performance 3.5 inch disk drives. It is designed to provide 40 MB/s sustained performance and 40 GB capacity in three 19 inch racks. The array controller forms an integral part of a file server that attaches to a Gb/s local area network. The controller implements a high bandwidth interconnect between an interleaved memory, an XOR calculation engine, the network interface (HIPPI), and the disk interfaces (SCSI). The system is now functionally operational, and we are tuning its performance. We review the design decisions, history, and lessons learned from this three year university implementation effort to construct a truly large scale system assembly.

  5. Ada Compiler Validation Summary Report: Certificate Number: 911028I1. 11229 Telesoft, Telegen2, Ada Development System, for VAX to 1750, Version 3.25, MicroVAX 3800 under VAX/VMS Version V5.4 (Host) to MIL-STD-1750A ECSPO ITS RAID Simulator, Version 6.0 (Target)

    DTIC Science & Technology

    1991-10-28

    included as appropriate. 2-1 IMPLEMENTATION DEPENDENCIES The following 185 tests have floating-point type declarations requiring more digits than...SYSTEM.MAX DIGITS : C24113F..Y (20 tests) C? 705F..Y (20 tests) C35706F..Y (20 tests) C35707F..Y (20 tests) C35708F..Y (20 tests) C35802F..Z (21 tests...trademark of Teleoft. TeleGen2m is a trademark of TeleSofL VAX and VMS! are registered trademarks of Digital Equipment Corp. RESTRICTED RIGHTS LEGEND Use

  6. Effectiveness of U.S. Military Female Engagement Teams

    DTIC Science & Technology

    2012-09-01

    way to curry favor with a potentially distrustful population. Medical care and education allow for measurable signs of progress to attract cooperation...increasing instances where military actions like Special Operations raids or drone strikes undertaken as a tactical response have a

  7. Mass spectrometry-based protein identification with accurate statistical significance assignment.

    PubMed

    Alves, Gelio; Yu, Yi-Kuo

    2015-03-01

    Assigning statistical significance accurately has become increasingly important as metadata of many types, often assembled in hierarchies, are constructed and combined for further biological analyses. Statistical inaccuracy of metadata at any level may propagate to downstream analyses, undermining the validity of scientific conclusions thus drawn. From the perspective of mass spectrometry-based proteomics, even though accurate statistics for peptide identification can now be achieved, accurate protein level statistics remain challenging. We have constructed a protein ID method that combines peptide evidences of a candidate protein based on a rigorous formula derived earlier; in this formula the database P-value of every peptide is weighted, prior to the final combination, according to the number of proteins it maps to. We have also shown that this protein ID method provides accurate protein level E-value, eliminating the need of using empirical post-processing methods for type-I error control. Using a known protein mixture, we find that this protein ID method, when combined with the Sorić formula, yields accurate values for the proportion of false discoveries. In terms of retrieval efficacy, the results from our method are comparable with other methods tested. The source code, implemented in C++ on a linux system, is available for download at ftp://ftp.ncbi.nlm.nih.gov/pub/qmbp/qmbp_ms/RAId/RAId_Linux_64Bit. Published by Oxford University Press 2014. This work is written by US Government employees and is in the public domain in the US.

  8. Patient- and clinician-reported outcomes for patients with new presentation of inflammatory arthritis: observations from the National Clinical Audit for Rheumatoid and Early Inflammatory Arthritis.

    PubMed

    Ledingham, Joanna M; Snowden, Neil; Rivett, Ali; Galloway, James; Ide, Zoe; Firth, Jill; MacPhie, Elizabeth; Kandala, Ngianga; Dennison, Elaine M; Rowe, Ian

    2017-02-01

    Our aim was to conduct a national audit assessing the impact and experience of early management of inflammatory arthritis by English and Welsh rheumatology units. The audit enables rheumatology services to measure for the first time their performance, patient outcomes and experience, benchmarked to regional and national comparators. All individuals >16 years of age presenting to English and Welsh rheumatology services with suspected new-onset inflammatory arthritis were included in the audit. Clinician- and patient-derived outcome and patient-reported experience measures were collected. Data are presented for the 6354 patients recruited from 1 February 2014 to 31 January 2015. Ninety-seven per cent of English and Welsh trusts participated. At the first specialist assessment, the 28-joint DAS (DAS28) was calculated for 2659 (91%) RA patients [mean DAS28 was 5.0 and mean Rheumatoid Arthritis Impact of Disease (RAID) score was 5.6]. After 3 months of specialist care, the mean DAS28 was 3.5 and slightly >60% achieved a meaningful DAS28 reduction. The average RAID score and reduction in RAID score were 3.6 and 2.4, respectively. Of the working patients ages 16-65 years providing data, 7, 5, 16 and 37% reported that they were unable to work, needed frequent time off work, occasionally and rarely needed time off work due to their arthritis, respectively; only 42% reported being asked about their work. Seventy-eight per cent of RA patients providing data agreed with the statement 'Overall in the last 3 months I have had a good experience of care for my arthritis'; <2% disagreed. This audit demonstrates that most RA patients have severe disease at the time of presentation to rheumatology services and that a significant number continue to have high disease activity after 3 months of specialist care. There is a clear need for the National Health Service to develop better systems for capturing, coding and integrating information from outpatient clinics, including measures of patient experience and outcome and measures of ability to work. © The Author 2016. Published by Oxford University Press on behalf of the British Society for Rheumatology. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. The Information Age?

    ERIC Educational Resources Information Center

    MacVicar, Margaret L. A.

    1985-01-01

    The author examines the concept of information and how it relates to our future. She discusses the various waves of information about education: the decay of technology and the raid on educational institutions for brainpower made by business and industry, foreign competition, and the quality of education. (CT)

  10. A Selective Chronology of Terrorist and Counter-Terrorist Incidents.

    ERIC Educational Resources Information Center

    Totten, Sam

    1986-01-01

    Beginning with the July 22, 1966, Palestinian hijacking of an El Al airliner and ending with the April 5, 1986, bombing raid on Libya by the United States, this chronology details 56 terrorist events which were covered in the world press. (JDH)

  11. Symbolic Martyrdom: The Ultimate Apology.

    ERIC Educational Resources Information Center

    Burkholder, Thomas R.

    1991-01-01

    Examines the claim that "scaffold speeches" (speeches by individuals awaiting execution) form a discrete genre. Argues that they constitute a subgenre within the larger genre of apologia. Illustrates the subgenre through analysis of John Brown's final speech at his trial following the Harper's Ferry raid. (SR)

  12. The coevolutionary dynamics of obligate ant social parasite systems--between prudence and antagonism.

    PubMed

    Brandt, Miriam; Foitzik, Susanne; Fischer-Blass, Birgit; Heinze, Jürgen

    2005-05-01

    In this synthesis we apply coevolutionary models to the interactions between socially parasitic ants and their hosts. Obligate social parasite systems are ideal models for coevolution, because the close phylogenetic relationship between these parasites and their hosts results in similar evolutionary potentials, thus making mutual adaptations in a stepwise fashion especially likely to occur. The evolutionary dynamics of host-parasite interactions are influenced by a number of parameters, for example the parasite's transmission mode and rate, the genetic structure of host and parasite populations, the antagonists' migration rates, and the degree of mutual specialisation. For the three types of obligate ant social parasites, queen-tolerant and queen-intolerant inquilines and slavemakers, several of these parameters, and thus the evolutionary trajectory, are likely to differ. Because of the fundamental differences in lifestyle between these social parasite systems, coevolution should further select for different traits in the parasites and their hosts. Queen-tolerant inquilines are true parasites that exert a low selection pressure on their host, because of their rarity and the fact that they do not conduct slave raids to replenish their labour force. Due to their high degree of specialisation and the potential for vertical transmission, coevolutionary theory would predict interactions between these workerless parasites and their hosts to become even more benign over time. Queen-intolerant inquilines that kill the host queen during colony take-over are best described as parasitoids, and their reproductive success is limited by the existing worker force of the invaded host nest. These parasites should therefore evolve strategies to best exploit this fixed resource. Slavemaking ants, by contrast, act as parasites only during colony foundation, while their frequent slave raids follow a predator prey dynamic. They often exploit a number of host species at a given site, and theory predicts that their associations are best described in terms of a highly antagonistic coevolutionary arms race.

  13. Oh sister, where art thou? Spatial population structure and the evolution of an altruistic defence trait.

    PubMed

    Pamminger, T; Foitzik, S; Metzler, D; Pennings, P S

    2014-11-01

    The evolution of parasite virulence and host defences is affected by population structure. This effect has been confirmed in studies focusing on large spatial scales, whereas the importance of local structure is not well understood. Slavemaking ants are social parasites that exploit workers of another species to rear their offspring. Enslaved workers of the host species Temnothorax longispinosus have been found to exhibit an effective post-enslavement defence behaviour: enslaved workers were observed killing a large proportion of the parasites' offspring. As enslaved workers do not reproduce, they gain no direct fitness benefit from this 'rebellion' behaviour. However, there may be an indirect benefit: neighbouring host nests that are related to 'rebel' nests can benefit from a reduced raiding pressure, as a result of the reduction in parasite nest size due to the enslaved workers' killing behaviour. We use a simple mathematical model to examine whether the small-scale population structure of the host species could explain the evolution of this potentially altruistic defence trait against slavemaking ants. We find that this is the case if enslaved host workers are related to nearby host nests. In a population genetic study, we confirm that enslaved workers are, indeed, more closely related to host nests within the raiding range of their resident slavemaker nest, than to host nests outside the raiding range. This small-scale population structure seems to be a result of polydomy (e.g. the occupation of several nests in close proximity by a single colony) and could have enabled the evolution of 'rebellion' by kin selection. © 2014 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2014 European Society For Evolutionary Biology.

  14. Detecting warning signs of trouble within population fluctuations: using capture-recapture modeling to uncover changes in population dynamics leading to declines

    USGS Publications Warehouse

    Spendelow, J.A.; Nichols, J.D.; Kendall, W.L.; Hines, J.E.; Hatfield, J.S.; Nisbet, I.C.T.

    2004-01-01

    An intensive mark-recapture/resighting program has been carried out on the Roseate Terns nesting at Falkner Island, Connecticut, since the late 1980s as part of a regional study of the metapopulation dynamics and ecology of the endangered Northwest Atlantic breeding population of this species. Substantial losses of tern eggs and chicks to predation at this colony site began in 1996 when at least five Black-crowned Night-Herons started nocturnal raids. This depredation has been a major factor in the reduction of productivity from an average of about 1.0 chicks/pair for the 10 years before night-heron predation began to as low as about 0.2 chicks/pair in 2002. Recent capture-recapture modelling analyses have detected other important impacts on the population dynamics of the Roseate Terns at this site including a reduction by about half in the 'development-of-residency' rates of first-time breeders, and a substantial decline in the local 'survival-and-fidelity' rates of experienced breeders believed due mostly to increased immigration rates to other colony sites.

  15. HEP Data Grid Applications in Korea

    NASA Astrophysics Data System (ADS)

    Cho, Kihyeon; Oh, Youngdo; Son, Dongchul; Kim, Bockjoo; Lee, Sangsan

    2003-04-01

    We will introduce the national HEP Data Grid applications in Korea. Through a five-year HEP Data Grid project (2002-2006) for CMS, AMS, CDF, PHENIX, K2K and Belle experiments in Korea, the Center for High Energy Physics, Kyungpook National University in Korea will construct the 1,000 PC cluster and related storage system such as 1,200 TByte Raid disk system. This project includes one of the master plan to construct Asia Regional Data Center by 2006 for the CMS and AMS Experiments and DCAF(DeCentralized Analysis Farm) for the CDF Experiments. During the first year of the project, we have constructed a cluster of around 200 CPU's with a 50 TBytes of a storage system. We will present our first year's experience of the software and hardware applications for HEP Data Grid of EDG and SAM Grid testbeds.

  16. Special Operations Forces--Responsive, Capable, and Ready

    DTIC Science & Technology

    1990-05-01

    communication Planning Criticisms of poor communications that hammeted mission success rangea from radio inoperability amorng raid force elements to strict...ons, an armory. and a means of rapid escape are also face the Unenviable choice of rushing light and inad- normally part of the complex. equate

  17. Schweinfurt Raids and the Pause in Daylight Strategic Bombing

    DTIC Science & Technology

    2008-06-13

    fundamentally flawed doctrine based upon faulty assumptions and the end result was the heavy loss of aircrew and aircraft. The Schweinfurt missions...maneuverable German fighters due to the Lightning’s turbochargers performing badly at higher altitudes in the high humidity and colder temperatures. The P-38

  18. Mexican Drug Trafficking Organizations: Matching Strategy to Threat

    DTIC Science & Technology

    2013-03-01

    raids,16 family ties, and heritage. Issues ranging from national security to the environment and migration are complex issues that demand involvement...the perfect network for the Sinaloa Cartel to move heroin and methamphetamine26, and this is just one of the aforementioned 1000 cities where DTOs

  19. "Knowledge Universe" and Virtual Schools: Educational Breakthrough or Digital Raid on the Public Treasury? Report

    ERIC Educational Resources Information Center

    Bracey, Gerald W.

    2004-01-01

    Correspondence schools, motion pictures, radio, educational television, and computer-assisted instruction have all been hailed as technological innovations that would revolutionize education, reducing, if not eliminating entirely, education's dependence on traditional schools and their teachers. The latest innovation is "virtual…

  20. Keeper of the Gates.

    ERIC Educational Resources Information Center

    Bushweller, Kevin

    1994-01-01

    Profiles Floyd Wiggins, Jr., veteran school security chief for Richmond (Virginia) Public Schools. Besides a security force, the district uses hand-held metal-detectors and police-dog raids in its secondary schools and is considering use of student identification cards, security video cameras, and a larger parent volunteer force. Wiggins feels…

  1. Civilian Morale under Aerial Bombardment 1914-1939. Part 1

    DTIC Science & Technology

    1948-12-01

    effects of the raids with the following observations. Those in Germany . . . who expected that air attacks on cities would cow the population of...Japanese when they attacked the Popular Grove Farms, an American enterprise near the city where choice Guernsey and Holstein milch cattle were raised

  2. Digital Games: Changing Education, One Raid at a Time

    ERIC Educational Resources Information Center

    Pivec, Paul; Pivec, Maja

    2011-01-01

    Digital Games are becoming a new form of interactive content and game playing provides an interactive and collaborative platform for learning purposes. Collaborative learning allows participants to produce new ideas as well as to exchange information, simplify problems, and resolve the tasks. Context based collaborative learning method is based on…

  3. Three United States Army Manhunts: Insights From the Past

    DTIC Science & Technology

    2004-06-17

    raid ( Toulmin 1935, 85-88). Another source of guides and information were the Americans living in the state of Chihuahua, many of whom worked for...Harrisburg: The Military Service Publishing Company. Toulmin , H. A. 1935. With Pershing in Mexico. With a foreword by Benson W. Hough. Harrisburg: The

  4. Is Mohammed a Strategic Leader?

    DTIC Science & Technology

    2011-03-01

    followers began to raid caravans running trade between Mecca, Medina, and Syria. He had no income other than booty from the spoils of war. He established...tide of the battle turned when his lead swordsmen and archers abandoned their posts to gather booty thereby allowing the Meccan cavalry to flank the

  5. Military Adaptation in War

    DTIC Science & Technology

    2009-06-01

    the rights of Germans who lived in the duchy of Schleswig- Holstein . This conflict certainly looked much more like the European conception of war...hitting more trees and cows than their intended targets. The first raid on the Ruhr on 15 May 1940 killed one dairyman in Cologne and wounded two people in

  6. MATERNAL EFFECTS IN ADVANCED HYBRIDS OF GENETICALLY MODIFIED AND NON-GENETICALLY MODIFIED BRASSICA SPECIES

    EPA Science Inventory

    Identification of fitness traits potentially impacted by gene flow from genetically modified (GM) crops to compatible relatives is of interest in risk assessments for GM crops. Reciprocal crosses were made between GM canola, Brassica napus cv. RaideRR that expresses CP4 EPSPS fo...

  7. The Impact of Immigration Enforcement Strategies on Infants and Toddlers

    ERIC Educational Resources Information Center

    Capps, Randy; Calderon, Miriam; Chaudry, Ajay

    2008-01-01

    Researchers, advocates, and community agencies are beginning to question the impact of U.S. immigration enforcement strategies on very young children. In particular, immigration raids may suddenly and sometimes violently separate children from their parents, place them in unstable living environments, and create barriers to accessing needed…

  8. Helicon wave-generated plasmas for negative ion beams for fusion

    NASA Astrophysics Data System (ADS)

    Furno, Ivo; Agnello, Riccardo; Fantz, U.; Howling, Alan; Jacquier, Remy; Marini, Claudio; Plyushchev, Gennady; Guittienne, Philippe; Simonin, Alain

    2017-10-01

    In the next generation of fusion reactors, such as DEMO, neutral beam injectors (NBIs) of high energy (0.8-1 MeV) deuterium atoms with high wall-plug efficiency (>50%) will be required to reach burning plasma conditions and to provide a significant amount of current drive. The present NBI system for DEMO assumes that 50 MW is delivered to the plasma by 3 NBIs. In the Siphore NBI concept, negative deuterium ions are extracted from a long, thin ion source 3 m high and 15 cm wide, accelerated and subsequently photo-neutralized. This requires the development of a new generation of negative ion sources. At the Swiss Plasma Center, a novel radio frequency helicon plasma source, based on a resonant network antenna source delivering up to 10 kW at 13.56 MHz, has been developed and is presently under study on the Resonant Antenna Ion Device (RAID). RAID is a linear device (1.9 m total length, 0.4 m diameter) and is equipped with an extensive set of diagnostics for full plasma characterization. In this work, the principles of operation of resonant antennas as helicon sources are introduced. We present absolute spectroscopy, Langmuir probe, and interferometry measurements on helicon plasmas. We characterize the performance of the source in terms of hydrogen/deuterium dissociation and negative ion production as a function of the input power. Furthermore, first results with the helicon birdcage antenna installed on the Cybele negative ion source at CEA-IRFM are presented, as a first step towards the validation of the Siphore concept.

  9. Influence of the hypogaeic army ant Dorylus (Dichthadia) laevigatus on tropical arthropod communities.

    PubMed

    Berghoff, Stefanie M; Maschwitz, Ulrich; Linsenmair, K Eduard

    2003-03-01

    The majority of army ant species forage hypogaeically. Due to the difficulties in observing these ants, their potential influence on hypogaeic and epigaeic arthropod communities has not yet been investigated. As the first hypogaeically foraging army ant studied in detail, we attracted Dorylus laevigatus to areas monitored for their arthropod diversity. Here, for the first time, the same sites were sampled before and after an army ant raid. Furthermore, interactions between D. laevigatus and the five most common ground-nesting ant species were noted and their life-history traits compared, allowing first inferences on possible mechanisms of their coexistence. The occurrence of D. laevigatus within a study plot had no evident effect on the number of arthropod taxa or individuals collected with epigaeic and hypogaeic pitfall traps. Likewise, juvenile arthropods, which are less mobile and thus are potentially easier prey for D. laevigatus, showed no differences in their collected numbers before and after the army ant had visited a plot. However, significantly fewer ant species were collected with hypogaeic traps after D. laevigatus had been within the study plots, indicating a possible predation of D. laevigatus especially on two Pseudolasius and one Pheidole species. The five most common ground-foraging ant species demonstrated their ability to avoid, kill, and even prey on the army ant. The reaction of Lophomyrmex bedoti towards D. laevigatus indicated the former to be a potential prey species, while Pachycondyla sp. 2 showed signs of "enemy specification." Odontoponera diversus and O. transversa actively preyed on D. laevigatus, while Pheidologeton affinis fought with D. laevigatus over resources. All ant species could co-occur with D. laevigatus at palm oil baits. Adding to the differences detected in previous studies between D. laevigatus and epigaeically foraging army ant species, the occurrence of this hypogaeic army ant seems to have less devastating effects on arthropod community compositions than those of epigaeically mass raiding species.

  10. Adversarial reasoning: challenges and approaches

    NASA Astrophysics Data System (ADS)

    Kott, Alexander; Ownby, Michael

    2005-05-01

    This paper defines adversarial reasoning as computational approaches to inferring and anticipating an enemy's perceptions, intents and actions. It argues that adversarial reasoning transcends the boundaries of game theory and must also leverage such disciplines as cognitive modeling, control theory, AI planning and others. To illustrate the challenges of applying adversarial reasoning to real-world problems, the paper explores the lessons learned in the CADET -- a battle planning system that focuses on brigade-level ground operations and involves adversarial reasoning. From this example of current capabilities, the paper proceeds to describe RAID -- a DARPA program that aims to build capabilities in adversarial reasoning, and how such capabilities would address practical requirements in Defense and other application areas.

  11. A Fault-Tolerant Radiation-Robust Mass Storage Concept for Highly Scaled Flash Memory

    NASA Astrophysics Data System (ADS)

    Fuchs, Cristian M.; Trinitis, Carsten; Appel, Nicolas; Langer, Martin

    2015-09-01

    Future spacemissions will require vast amounts of data to be stored and processed aboard spacecraft. While satisfying operational mission requirements, storage systems must guarantee data integrity and recover damaged data throughout the mission. NAND-flash memories have become popular for space-borne high performance mass memory scenarios, though future storage concepts will rely upon highly scaled flash or other memory technologies. With modern flash memory, single bit erasure coding and RAID based concepts are insufficient. Thus, a fully run-time configurable, high performance, dependable storage concept, requiring a minimal set of logic or software. The solution is based on composite erasure coding and can be adjusted for altered mission duration or changing environmental conditions.

  12. After Terror Charges, Artist Exhibits Academic Freedom

    ERIC Educational Resources Information Center

    Wilson, Robin

    2008-01-01

    Steven Kurtz, a professor of visual studies at the State University of New York, has been working with various bacteria as part of his counterculture exhibit artworks for nearly 20 years. Four years ago, federal agents raided his home in a bioterrorism investigation. The federal agents had been called to the house by local police officers…

  13. Handling Kids in Crisis with Care

    ERIC Educational Resources Information Center

    Bushinski, Cari

    2018-01-01

    The Handle with Care program helps schools help students who experience trauma. While at the scene of an event like a domestic violence call, drug raid, or car accident, law enforcement personnel determine the names and school of any children present. They notify that child's school to "handle ___ with care" the next day, and the school…

  14. Models and Analogues

    ERIC Educational Resources Information Center

    Maloney, Jane; Curtis, Sheila

    2012-01-01

    How do teachers help children understand the difference between the structure of a flower and that of a root? Depending on the time of year this activity is quite easy. Get a bunch of flowers, germinate some chickpeas and raid the kitchen for carrots and beetroots--the children can experience the "real thing". But what if teachers want the…

  15. The Arab - Israeli Conflict: A Study of Global and Regional Interaction

    DTIC Science & Technology

    1978-06-01

    to their regional interests. Rather than we-. kening domestic support for Nasir, however, the air raids on Egyptian soil served only to bolster his...protagonists who have been directly involved in every Arab- Israeli war. To those who therefore accuse America of pursuing an amoral " merchant of death

  16. Raiding, Targeting, and Meeting Outside Offers: Notes from Halfway through a Term.

    ERIC Educational Resources Information Center

    Burgan, Mary

    1985-01-01

    Notes the efforts of some universities to lure top professors from other universities. Reveals problems, such as raising the needed money and funding eminent scholars, and considers some positive aspects of the trend, such as the creation of new courses and emphases, and the clarification of priorities of a department. (EL)

  17. An Anthropologist Bridges Two Worlds

    ERIC Educational Resources Information Center

    Shea, Christopher

    2009-01-01

    Philippe Bourgois, who has spent his career studying some of America's roughest neighborhoods and subcultures, got an unusually harsh welcome to his new hometown: Last May, during a trip to North Philly to make contact with some drug dealers, he got caught up in a police raid. The arrest was Bourgois's first, though hardly his first brush with…

  18. Flowering times in genetically modified Brassica hybrids in the absence of selection

    EPA Science Inventory

    Changes in days to flowering (DTF) were observed among reciprocal F1 progeny of Brassica napus ‘RaideRR’ with other B. napus and also with weedy B. rapa. Changes in DTF are presented as factors to consider in evaluating the potential of crop to weed gene flow in different geograp...

  19. Sociologist Jailed Because He "Wouldn't Snitch" Ponders the Way Research Ought to Be Done.

    ERIC Educational Resources Information Center

    Monaghan, Peter

    1993-01-01

    A Washington doctoral candidate in sociology is jailed for contempt of court for not revealing conversations with animal-rights activists in a grand jury investigation of a research laboratory raid at his institution. The graduate student refused to breach an American Sociological Association pledge of scholarly confidentiality. (MSE)

  20. Public Colleges Fight Raids on Faculties

    ERIC Educational Resources Information Center

    June, Audrey Williams

    2008-01-01

    Public colleges and universities are girding themselves to win the war for tenured talent. Some are succeeding. State budget woes and a rocky economy have shaken public colleges and universities. One of the most noticeable shudders has been a pervasive "brain drain," as many state institutions face competition for their best faculty members from…

  1. Education in a Recovering Nation: Renewing Special Education in Kosovo

    ERIC Educational Resources Information Center

    Bartlett, Brendan; Power, Des; Blatch, Peter

    2004-01-01

    "The inexhaustible problem of the Balkans" (Tuchman, 1962, p. ix). Kosovo, technically still a province of Serbia, was devastated by the wars of the 1990s, culminating in 1999 in the flight of refugees to neighboring countries, whether voluntarily or through deliberate "ethnic cleansing", the NATO bombing raids; the withdrawal…

  2. John Brown's Raid: Park VideoPack for Home and Classroom.

    ERIC Educational Resources Information Center

    National Park Service (Dept. of Interior), Washington, DC.

    This video pack is intended for parents, teachers, librarians, students, and travelers interested in learning about national parklands and how they relate to the nation's natural and cultural heritage. The video pack includes a VHS video cassette on Harpers Ferry National Historical Park, an illustrated handbook with historical information on…

  3. Negroes in Pre-Civil War History: New Myths in the Making

    ERIC Educational Resources Information Center

    Spear, Lois

    1974-01-01

    This article analyzes three incidents in pre-Civil War history; Crispus Attucks and the Boston Massacre, John Brown and the raid on Harpers Ferry, and Abraham Lincoln and the Emancipation Proclamation. The article examines how these incidents have been distorted into myths and stereotypes and offers more correct historical interpretations. (DE)

  4. [PACS: storage and retrieval of digital radiological image data].

    PubMed

    Wirth, S; Treitl, M; Villain, S; Lucke, A; Nissen-Meyer, S; Mittermaier, I; Pfeifer, K-J; Reiser, M

    2005-08-01

    Efficient handling of both picture archiving and retrieval is a crucial factor when new PACS installations as well as technical upgrades are planned. For a large PACS installation for 200 actual studies, the number, modality,and body region of available priors were evaluated. In addition, image access time of 100 CT studies from hard disk (RAID), magneto-optic disk (MOD), and tape archives (TAPE) were accessed. For current examinations priors existed in 61.1% with an averaged quantity of 7.7 studies. Thereof 56.3% were within 0-3 months, 84.9% within 12 months, 91.7% within 24 months, and 96.2% within 36 months. On average, access to images from the hard disk cache was more than 100 times faster then from MOD or TAPE. Since only PACS RAID provides online image access, at least current imaging of the past 12 months should be available from cache. An accurate prefetching mechanism facilitates effective use of the expensive online cache area. For that, however, close interaction of PACS, RIS, and KIS is an indispensable prerequisite.

  5. Punishment sustains large-scale cooperation in prestate warfare

    PubMed Central

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  6. From forest to farm: systematic review of cultivar feeding by chimpanzees--management implications for wildlife in anthropogenic landscapes.

    PubMed

    Hockings, Kimberley J; McLennan, Matthew R

    2012-01-01

    Crop-raiding is a major source of conflict between people and wildlife globally, impacting local livelihoods and impeding conservation. Conflict mitigation strategies that target problematic wildlife behaviours such as crop-raiding are notoriously difficult to develop for large-bodied, cognitively complex species. Many crop-raiders are generalist feeders. In more ecologically specialised species crop-type selection is not random and evidence-based management requires a good understanding of species' ecology and crop feeding habits. Comprehensive species-wide studies of crop consumption by endangered wildlife are lacking but are important for managing human-wildlife conflict. We conducted a comprehensive literature search of crop feeding records by wild chimpanzees (Pan troglodytes), a ripe-fruit specialist. We assessed quantitatively patterns of crop selection in relation to species-specific feeding behaviour, agricultural exposure, and crop availability. Crop consumption by chimpanzees is widespread in tropical Africa. Chimpanzees were recorded to eat a considerable range of cultivars (51 plant parts from 36 species). Crop part selection reflected a species-typical preference for fruit. Crops widely distributed in chimpanzee range countries were eaten at more sites than sparsely distributed crops. We identified 'high' and 'low' conflict crops according to their attractiveness to chimpanzees, taking account of their importance as cash crops and/or staple foods to people. Most (86%) high conflict crops were fruits, compared to 13% of low conflict crops. Some widely farmed cash or staple crops were seldom or never eaten by chimpanzees. Information about which crops are most frequently consumed and which are ignored has enormous potential for aiding on-the-ground stakeholders (i.e. farmers, wildlife managers, and conservation and agricultural extension practitioners) develop sustainable wildlife management schemes for ecologically specialised and protected species in anthropogenic habitats. However, the economic and subsistence needs of local people, and the crop-raiding behaviour of sympatric wildlife, must be considered when assessing suitability of particular crops for conflict prevention and mitigation.

  7. Clinical experience with PACS at Northwestern: year two

    NASA Astrophysics Data System (ADS)

    Channin, David S.; Hawkins, Rodney C.; Enzmann, Dieter R.

    2001-08-01

    We have previously described the PACS configuration at Northwestern Memorial Hospital (NMH). As opposed to an imaging modality, PACS is an evolving system that continuously grows and changes to meet the needs of the institution. The NMH PACS has grown significantly in the past year and has undergone significant architectural enhancements. This growth and evolutionary change will be described and discussed. The system now contains over 339,000 studies consisting of over 13 million images. There are now two short-term RAID storage units that provide for twice as much fast storage. There are also two magneto-optical disk jukeboxes providing long-term archive. We have deployed a redundant database to improve reliability of the system in the event of database failure. The number of modalities connected to the system has increased and will be summarized. Statistics describing utilization of the PACS will be shown. Lastly, we will discuss our plans for exploiting the application service provider model in our PACS environment.

  8. Workload Characterization of a Leadership Class Storage Cluster

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kim, Youngjae; Gunasekaran, Raghul; Shipman, Galen M

    2010-01-01

    Understanding workload characteristics is critical for optimizing and improving the performance of current systems and software, and architecting new storage systems based on observed workload patterns. In this paper, we characterize the scientific workloads of the world s fastest HPC (High Performance Computing) storage cluster, Spider, at the Oak Ridge Leadership Computing Facility (OLCF). Spider provides an aggregate bandwidth of over 240 GB/s with over 10 petabytes of RAID 6 formatted capacity. OLCFs flagship petascale simulation platform, Jaguar, and other large HPC clusters, in total over 250 thousands compute cores, depend on Spider for their I/O needs. We characterize themore » system utilization, the demands of reads and writes, idle time, and the distribution of read requests to write requests for the storage system observed over a period of 6 months. From this study we develop synthesized workloads and we show that the read and write I/O bandwidth usage as well as the inter-arrival time of requests can be modeled as a Pareto distribution.« less

  9. Introduction to Data Acquisition 3.Let’s Acquire Data!

    NASA Astrophysics Data System (ADS)

    Nakanishi, Hideya; Okumura, Haruhiko

    In fusion experiments, diagnostic control and logging devices are usually connected through the field bus, e.g. GP-IB. Internet technologies are often applied for their remote operation. All equipment and digitizers are driven by pre-programmed sequences, in which clocks and triggers give the essential timing for data acquisition. Data production rate and amount must be checked in comparison with the transfer and store rates. To store binary raw data safely, journaling file systems are preferably used with redundant disks (RAID) or mirroring mechanism, such as “rsync”. A proper choice of the data compression method not only reduces the storage size but also improves the I/O throughputs. DBMS is even applicable to quick search or security around the table data.

  10. Educational Equity and Rights: The Responsibilities of California's Public Schools towards Immigrant Students and Communities

    ERIC Educational Resources Information Center

    Olivos, Edward M.; Mendoza, Marcela

    2009-01-01

    Immigration enforcement efforts have become increasingly intrusive and arbitrary in Latino-origin communities in the U.S. As a result, there are very real possibilities that schools which serve large Latino populations may be affected by immigration enforcement activities (also known as "raids") in their communities. This article offers…

  11. Lessons Learned from MG George Crook’s Apache Campaigns with Applicability for the Current Global War on Terror

    DTIC Science & Technology

    2003-04-07

    in Saudi Arabian internal politics. Islamism has other modern roots as well. In 1928 Hassan al- Banna formed the Islamic Brotherhood in Egypt.13...Soon afterward the Kandahar raid, the Northern Alliance / 5th SFG attacks increased the pace of peeling apart the opposition forces from each other

  12. Fully Realizing the Civic Potential of Immigrant Youth

    ERIC Educational Resources Information Center

    Callahan, Rebecca M.; Obenchain, Kathryn M.

    2018-01-01

    Over the course of a few cold days last February, immigrant families and their allies in Austin, Texas, were shaken by a series of raids as immigration officers descended upon the city. After all was said and done, Immigration and Customs Enforcement (ICE) officials arrested 51 undocumented immigrants, most of whom had no criminal record. In this…

  13. Visualization of Expert Chat Development in a World of Warcraft Player Group

    ERIC Educational Resources Information Center

    Chen, Mark

    2009-01-01

    This article describes expertise development in a player group in the massively multiplayer online game World of Warcraft using visualization of chat log data. Charts were created to get a general sense of chat trends in a specific player group engaged in "high-end raiding", a 40-person collaborative activity. These charts helped identify patterns…

  14. Coping with Illegal Immigrants in School

    ERIC Educational Resources Information Center

    Hardy, Lawrence

    2007-01-01

    Superintendent Steve Joel had reason to be concerned when he got a call from the police chief telling him that federal immigration authorities were coming to the local Swift & Company meat-packing plant to round up undocumented workers as part of a six-state raid. Of the 8,000 students in the Grand Island School District in Central Nebraska,…

  15. The Horse and the Plains Indian. Indian Culture Series.

    ERIC Educational Resources Information Center

    Schuessler, Raymond

    Produced by the Montana Council for Indian Education as part of its Indian Culture Series, the five short articles in the book explain how the Plains Indians got horses in legend and in fact. The stories describe the behavior codes, rules, cultural and social significance, and eventual cessation of horse raids, and the ceremony and tradition…

  16. The National Institutes of Health Clinical Center Digital Imaging Network, Picture Archival and Communication System, and Radiology Information System.

    PubMed

    Goldszal, A F; Brown, G K; McDonald, H J; Vucich, J J; Staab, E V

    2001-06-01

    In this work, we describe the digital imaging network (DIN), picture archival and communication system (PACS), and radiology information system (RIS) currently being implemented at the Clinical Center, National Institutes of Health (NIH). These systems are presently in clinical operation. The DIN is a redundant meshed network designed to address gigabit density and expected high bandwidth requirements for image transfer and server aggregation. The PACS projected workload is 5.0 TB of new imaging data per year. Its architecture consists of a central, high-throughput Digital Imaging and Communications in Medicine (DICOM) data repository and distributed redundant array of inexpensive disks (RAID) servers employing fiber-channel technology for immediate delivery of imaging data. On demand distribution of images and reports to clinicians and researchers is accomplished via a clustered web server. The RIS follows a client-server model and provides tools to order exams, schedule resources, retrieve and review results, and generate management reports. The RIS-hospital information system (HIS) interfaces include admissions, discharges, and transfers (ATDs)/demographics, orders, appointment notifications, doctors update, and results.

  17. Embedded system of image storage based on fiber channel

    NASA Astrophysics Data System (ADS)

    Chen, Xiaodong; Su, Wanxin; Xing, Zhongbao; Wang, Hualong

    2008-03-01

    In domains of aerospace, aviation, aiming, and optic measure etc., the embedded system of imaging, processing and recording is absolutely necessary, which has small volume, high processing speed and high resolution. But the embedded storage technology becomes system bottleneck because of developing slowly. It is used to use RAID to promote storage speed, but it is unsuitable for the embedded system because of its big volume. Fiber channel (FC) technology offers a new method to develop the high-speed, portable storage system. In order to make storage subsystem meet the needs of high storage rate, make use of powerful Virtex-4 FPGA and high speed fiber channel, advance a project of embedded system of digital image storage based on Xilinx Fiber Channel Arbitrated Loop LogiCORE. This project utilizes Virtex- 4 RocketIO MGT transceivers to transmit the data serially, and connects many Fiber Channel hard drivers by using of Arbitrated Loop optionally. It can achieve 400MBps storage rate, breaks through the bottleneck of PCI interface, and has excellences of high-speed, real-time, portable and massive capacity.

  18. Diabetes mellitus: biosensors for research and management.

    PubMed

    Turner, A P; Pickup, J C

    1985-01-01

    The condition of diabetes mellitus is described with particular reference to the parameters that it would be desirable to monitor in order to improve management and understanding of the disease. Previous attention has largely focused on analysis of glucose, but many other intermediates of carbohydrate, fat and protein metabolism are deranged in diabetes and may be alternative measures of control. The need for laboratory analysers, self-monitoring, closed-loop devices and alarms are detailed and the problems associated with implantable sensors discussed. Progress in the development of biosensors is reviewed using glucose sensors as the main example. Electrochemical, optoelectronic and calorimetric approaches to sensing are considered and it is concluded that configurations based either on hydrogen peroxide detection or on mediated electron transfer are most likely to provide a raid route to in vivo monitoring. The extension of biosensor technology to tackle other important substrates is discussed, the principal hurdle to success being seen as the lack of long-term stability of the biological component.

  19. Global Mapping of Cyber Attacks

    DTIC Science & Technology

    2014-01-01

    from any 10 particular vendor is wrong. Moreover, researchers often use anti-virus labels as ground-truth for evaluating new approaches [5, 17, 36...lnstrusions and Defenses (RAID), September 2007. [SJ U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior -based...International Development and Confiict Management International crisis behavior project http: I /www. cidcm. umd.edu/icb/. Last accessed: December 2011

  20. 75 FR 27798 - Notice of Issuance of Final Determination Concerning Certain Commodity-Based Clustered Storage Units

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-18

    ... device to function as a cloud computing device similar to a network storage RAID array (HDDs strung... contract. This final determination, in HQ H082476, was issued at the request of Scale Computing under... response to your request dated October 15, 2009, made on behalf of Scale Computing (``Scale''). You ask for...

  1. Pearl Harbor and America's Homefront Children: First Fears, Blackouts, Air Raid Drills, and Nightmares.

    ERIC Educational Resources Information Center

    Tuttle, William M., Jr.

    In conducting research about U.S. homefront children during the Second World War, a professor of history wrote to the 100 largest-circulation newspapers in the United States as well as 75 African-American, Hispanic American, and Jewish-American newspapers and magazines seeking letters from people who experienced the War as children. More than…

  2. The Gonzo Scientist. Slaying monsters for science.

    PubMed

    Bohannon, John

    2008-06-20

    Slaying Monsters for Science John Bohannon The first scientific conference held in Azeroth, the online universe of the role-playing game World of Warcraft, went off virtually without a hitch. Although the participants all died during the final day's social event - a massive raid on an enemy fort - they agree that this event is a glimpse at the future of scientific exchange.

  3. "The Story of Running Eagle" and "The Cause of Things."

    ERIC Educational Resources Information Center

    Schultz, James Willard

    The two illustrated children's stories are part of a series about the Blackfeet Indians. The first story, originally published in 1916, is the story of Weasel Woman, an orphaned girl who stole her way into a raiding party and became a successful warrior and, ultimately, a war chief named Running Eagle. The second story is a Blackfeet creation tale…

  4. Multi-Temporal Analysis of WWII Reconnaissance Photos

    NASA Astrophysics Data System (ADS)

    Meixner, P.; Eckstein, M.

    2016-06-01

    There are millions of aerial photographs from the period of the Second Wold War available in the Allied archives, obtained by aerial photo reconnaissance, covering most of today's European countries. They are spanning the time from 1938 until the end of the war and even beyond. Photo reconnaissance provided intelligence information for the Allied headquarters and accompanied the bombing offensive against the German homeland and the occupied territories. One of the initial principal targets in Bohemia were the synthetized fuel works STW AG (Sudetenländische Treibstoffwerke AG) in Zaluzi (formerly Maltheuren) near Most (formerly Brück), Czech Republic. The STW AG synthetized fuel plant was not only subject to bombing raids, but a subject to quite intensive photo reconnaissance, too - long before the start of the bombing campaign. With a multi-temporal analysis of the available imagery from international archives we will demonstrate the factory build-up during 1942 and 1943, the effects of the bombing raids in 1944 and the struggle to keep the plant working in the last year of the war. Furthermore we would like to show the impact the bombings have today, in form of potential unexploded ordnance in the adjacent area of the open cast mines.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swansiger, W.A.; Shepodd, T.J.; Phillips, M.L.F.

    The ability to identify the manufacturers and distributors of chemicals seized in raids of illicit drug labs would be of great value in controlling the diversion of these chemicals. We developed a tagging scheme based on the addition of sub-ppM concentrations of various combinations of rare-earth elements to the target chemicals and evaluated a number of techniques for detecting the tags. We developed soluble tags for tagging liquids and selected Inductively Coupled Plasma-Mass Spectrometry (ICP-MS) as the preferred detection technique. We developed insoluble tags for tagging solids and developed methods to analyze them and mix them into solid precursors. Wemore » have successfully demonstrated the tagging of several solvents and two of the precursor chemicals used in one of the most popular clandestine methamphetamine syntheses (ephedrine reacting with hydriodic acid/red phosphorus). The tagging scheme is capable of yielding tens of thousands of signatures (using holmium as an internal standard and up to 9 rare-earths at up to 3 concentrations yields 3{sup 9} {minus} 1 = 19,682 signatures) and is applicable to most of the chemicals on the precursor and essential chemicals list. In the concentrations employed, the tags are safe enough to be added to pharmaceuticals and cheap enough to tag tanker loads of chemicals.« less

  6. [Development and evaluation of the medical imaging distribution system with dynamic web application and clustering technology].

    PubMed

    Yokohama, Noriya; Tsuchimoto, Tadashi; Oishi, Masamichi; Itou, Katsuya

    2007-01-20

    It has been noted that the downtime of medical informatics systems is often long. Many systems encounter downtimes of hours or even days, which can have a critical effect on daily operations. Such systems remain especially weak in the areas of database and medical imaging data. The scheme design shows the three-layer architecture of the system: application, database, and storage layers. The application layer uses the DICOM protocol (Digital Imaging and Communication in Medicine) and HTTP (Hyper Text Transport Protocol) with AJAX (Asynchronous JavaScript+XML). The database is designed to decentralize in parallel using cluster technology. Consequently, restoration of the database can be done not only with ease but also with improved retrieval speed. In the storage layer, a network RAID (Redundant Array of Independent Disks) system, it is possible to construct exabyte-scale parallel file systems that exploit storage spread. Development and evaluation of the test-bed has been successful in medical information data backup and recovery in a network environment. This paper presents a schematic design of the new medical informatics system that can be accommodated from a recovery and the dynamic Web application for medical imaging distribution using AJAX.

  7. Commando Raids: 1946-1983.

    DTIC Science & Technology

    1985-10-01

    excluded, the success rate of elite forces declines to 33 percent. Nevertheless, commando and commando-type warfare possesses a number of advantages: * It...operations took place. When these two operations are excluded, the rate of success of elite forces declines significantly (to 33 percent). Commando units...102-103. 1°. -53- (68) Operation Aztec : attack on Jorge do Limpopo, Mapai, and Madulo Pan, Mozambique, May/June 1977: Cross-border operation

  8. Department of Defense Dictionary of Military and Associated Terms

    DTIC Science & Technology

    2005-08-31

    A committee set up to determine the priorities of passengers and cargo . air raid reporting control ship — (*) A ship ...also damage estimation. attack cargo ship — A naval ship designed or converted to transport combat-loaded cargo in an assault landing. Capabilities as...of comparable cargo ship types. Designated as LKA. attack group — (*) A subordinate task organization of the navy forces of an amphibious

  9. Physician Migration to and from Canada: The Challenge of Finding the Ethical and Political Balance between the Individual's Right to Mobility and Recruitment to Underserved Communities

    ERIC Educational Resources Information Center

    Dauphinee, W. Dale

    2005-01-01

    Physician migration to and from countries results from many local causes and international influences. These factors operate in the context of an increasingly globalized economy. From an ethical point of view, selective and targeted "raiding" of developing countries' medical workforce by wealthier countries is not acceptable. However,…

  10. Black Hawk. The Story of an American Indian.

    ERIC Educational Resources Information Center

    Cunningham, Maggi

    Born in 1767, Black Hawk was the last great war leader of the Sauk Indians, who lived in the Rock River valley in Illinois. By age 25, he was a famed warrior and leader of his people who raided neighboring tribes until a period of peace and prosperity began about 1800. Various treaties of which the Sauk knew and understood very little deprived the…

  11. Avenging Angel? John Brown, the Harpers Ferry Raid and the "Irrepressible" Conflict. A Unit of Study for Grades 9-12.

    ERIC Educational Resources Information Center

    Pyne, John; Sesso, Gloria

    This unit deals with the struggle between proslavery and antislavery proponents which exacerbated sectional discord and culminated in secession of the southern states and the Civil War. The lessons would most appropriately be taught as a prelude to the Civil War and as a culmination of units on the heightened sectional conflict resulting from…

  12. Patterns of Global Terrorism 2002

    DTIC Science & Technology

    2003-04-01

    Lebanon. On 25 July, SEPRINTE raided the Ciudad del Este office and apartment of alleged money launderer Fajkumar Naraindas Sabnani, who is allegedly...Saint-Jean-De- Luz , unidentified persons threw gasoline bombs at a police headquarters, causing material damage to police barracks and three parked...sustaining. 121 Revolutionary Organization 17 November a.k.a. 17 November Revolutionary People’s Liberation Party/Front (DHKP/C) a.k.a. Devrimci Sol

  13. Colombia: Issues for Congress

    DTIC Science & Technology

    2008-09-12

    Demobilization Ruling Thwarts Future Abuses,” July 19, 2006; “ Gobierno colombiano abrirá debate público sobre decretos reglamentarios de ley de ...ongoing scandal concerning past government ties to illegal paramilitary groups. Uribe’s popularity soared after Colombia’s March 2008 raid of a FARC camp...investigation for possible paramilitary ties . On July 28, 2008, Secretary of State Condoleezza Rice issued a certification to Congress asserting that the

  14. Coast Guard SOF

    DTIC Science & Technology

    2006-02-01

    Forces units into known Viet Cong (VC) strongholds, participating in direct action raids on VC junk bases, conducting psychological operations, and...and General McClure established the Army’s Psychological Warfare Cen- ter and 10th Special Forces Group in 1952.62 President Kennedy’s interest in...counterinsurgency warfare paved the way for the “Green Beret,” for which Army Special Forces renamed the Psychological Warfare Center the JFK Special

  15. Sik-ki-mi. Indian Culture Series: Stories of the Blackfeet.

    ERIC Educational Resources Information Center

    Roop, Peter

    The children's story is one of a series about the Blackfeet Tribe at the height of its power in Southern Alberta and North Central Montana. In the story, Eagle Head, a Blackfeet boy, proves his bravery as he faces the first steamboat on the Yellowstone River and recaptures his chief's favorite buffalo horse, Sik-ki-mi, in a raid on a Crow camp.…

  16. Zebra: A striped network file system

    NASA Technical Reports Server (NTRS)

    Hartman, John H.; Ousterhout, John K.

    1992-01-01

    The design of Zebra, a striped network file system, is presented. Zebra applies ideas from log-structured file system (LFS) and RAID research to network file systems, resulting in a network file system that has scalable performance, uses its servers efficiently even when its applications are using small files, and provides high availability. Zebra stripes file data across multiple servers, so that the file transfer rate is not limited by the performance of a single server. High availability is achieved by maintaining parity information for the file system. If a server fails its contents can be reconstructed using the contents of the remaining servers and the parity information. Zebra differs from existing striped file systems in the way it stripes file data: Zebra does not stripe on a per-file basis; instead it stripes the stream of bytes written by each client. Clients write to the servers in units called stripe fragments, which are analogous to segments in an LFS. Stripe fragments contain file blocks that were written recently, without regard to which file they belong. This method of striping has numerous advantages over per-file striping, including increased server efficiency, efficient parity computation, and elimination of parity update.

  17. Visualization in aerospace research with a large wall display system

    NASA Astrophysics Data System (ADS)

    Matsuo, Yuichi

    2002-05-01

    National Aerospace Laboratory of Japan has built a large- scale visualization system with a large wall-type display. The system has been operational since April 2001 and comprises a 4.6x1.5-meter (15x5-foot) rear projection screen with 3 BARCO 812 high-resolution CRT projectors. The reason we adopted the 3-gun CRT projectors is support for stereoscopic viewing, ease with color/luminosity matching and accuracy of edge-blending. The system is driven by a new SGI Onyx 3400 server of distributed shared-memory architecture with 32 CPUs, 64Gbytes memory, 1.5TBytes FC RAID disk and 6 IR3 graphics pipelines. Software is another important issue for us to make full use of the system. We have introduced some applications available in a multi- projector environment such as AVS/MPE, EnSight Gold and COVISE, and been developing some software tools that create volumetric images with using SGI graphics libraries. The system is mainly used for visualization fo computational fluid dynamics (CFD) simulation sin aerospace research. Visualized CFD results are of our help for designing an improved configuration of aerospace vehicles and analyzing their aerodynamic performances. These days we also use it for various collaborations among researchers.

  18. Fragility and State-Society Relations in South Sudan

    DTIC Science & Technology

    2013-09-01

    competition over resources (land, water, and cattle ), others arise from legacies of political competition between southern leaders during the war or...displacing more than 100,000, and stealing 100,000 head of cattle .6 The as- sault is part of a downward spiral of Lou Nuer-Murle attacks and reprisals...subjected to forced displacement, slavery, and cattle raiding by northern militias. The LRA in northern Uganda conducted regular attacks and kidnappings

  19. Diagnosing Guerilla Warfare: Was William Clarke Quantrill Missouri’s Francis Marion?

    DTIC Science & Technology

    2010-04-28

    the Military Struggle for American Independence. rev ed. A1m Arbor: University of Michigan Press, 1990. Sutherland , Daniel, ed. Guerillas, Unionists...Directed by Ray Emigh. Universal Intemational Pictures, 1950. The Outlaw Josey Wales. With Clint Eastwood and Sondra Locke. Directed by Clint ...raiding Jayhawkers. 87 The Outlaw Josey Wales. With Clint Eastwood and Sondra Locke. Directed by Clint ·Eastwood. Warner Studios, 1976. In one of

  20. Airpower in an Age of Limited War

    DTIC Science & Technology

    2017-05-25

    independent US Air Force and the nuclear bomb —further influenced airpower theory. The ensuing Cold War had the potential to drastically simplify airpower...transportation of supplies and personnel, and even bombing of enemy troops, supplies, and facilities, both day and night. In short, most of the...only to make high-explosive bombing raids over any sector of the enemy’s territory, but also to ravage his whole country by chemical and

  1. Teaching the Nuclear Age: A History Institute for Teachers. Footnotes. Volume 14, Number 5

    ERIC Educational Resources Information Center

    Kuehner, Trudy

    2009-01-01

    On March 28-29, 2009, FPRI's Wachman Center hosted 43 teachers from across the country for a weekend of discussion on teaching the nuclear age. In his opening remarks, Walter A. McDougall observed that although students today are not made to crawl under their desks in air raid drills, that atomic power remains, and it is still necessary to raise a…

  2. DDG 51 Operational Evaluation: Measures of Workload from Combat Information Center Communication Patterns

    DTIC Science & Technology

    1992-09-01

    RAIDS ......... 39 ix I. INTRODUCTION Communication is the act of sharing information. This thesis is about human communication , but human ...high costs, high stakes, high drama, and Ligh workload. From a methodological perspective, this thesis is about using natural human communication patterns...34* Fourth. The Operational Test and Evaluation (OPEVAL) of USS ARLEIGH BURKE (DDG 51) presented an opportunity to examine human communication patterns

  3. Private Security Contractors in Iraq and Afghanistan: Legal Issues

    DTIC Science & Technology

    2009-12-22

    Afghanistan: Background and Analysis, by Moshe Schwartz. 2 See James Risen and Mark Mazzetti, Blackwater Guards Tied to Secret C.I.A. Raids, NY...contractors, five Blackwater Worldwide employees under contract with the State Department were charged with manslaughter in connection with the 2007...at http://www.usdoj.gov/usao/law/news/wdl20081215.pdf. 125 Press Release, Department of Justice, Five Blackwater Employees Indicted on Manslaughter

  4. "I wz wondering-uhm could 'Raid' uhm 'e'ffect the brain permanently d'y know?": Some Observations on the Intersection of Speaking and Writing in Calls to a Poison Control Center.

    ERIC Educational Resources Information Center

    Frankel, Richard M.

    1989-01-01

    Focuses on how written records are created during calls to a Poison Control Center. Describes the relationship between writing and speaking in this bureaucratic context. Finds that keeping written records extends the length of call processing time, representing a barrier to handling new calls promptly. (MS)

  5. Translations on Narcotics and Dangerous Drugs No. 294

    DTIC Science & Technology

    1977-04-13

    Plan To Legalize Cannabis (THE GLOBE AND MAIL, 29 Mar 77) 26 Editorial Suggests UK Heroin Plan Has Merit (Editorial, Richard Chamberlain; THE...various dates)..... 72 Numerous Arrests Court Appearances 19 Remanded in Custody ’No Jail’ Plea for Cannabis Smokers (THE DAILY TELEGRAPH...25 Mar 77) 75 Briefs Cannabis Seized 76 Marihuana in Plane Hold 76 - e - AUSTRALIA DRUG ADDICTS RAID CHEMIST SHOPS Canberra THE AUSTRALIAN in

  6. Haunted by Enron's ghost. National Century Financial Enterprises files for Chapter 11, leaving a string of broken healthcare chains and hospitals.

    PubMed

    Taylor, Mark

    2002-11-25

    Some are calling it the Enron of the healthcare industry. Ryder trucks hauled possible evidence from embattled financier National Century Financial Enterprises during an FBI raid. NCFE filed for Chapter 11 bankruptcy protection last week, sending ripples through the industry and contributing to the bankruptcies of a string of national healthcare chains and at least six hospitals.

  7. Community Value Above Individualism: A Common Cultural Element in Modern Suicide Bombers

    DTIC Science & Technology

    2009-04-01

    Japanese kamikaze raids. The Japanese conducted over 3,000 aerial suicide attacks in an organized manner during World War II with varying degrees of...definition. The kamikaze missions show that suicide missions do not require justification by religious means alone. Japanese culture morally justifies suicide...when facing an impossible situation. Most Japanese are followers of the Buddhist and Shinto religions, which teach the Confucian values of dutiful

  8. The Long War Against Piracy: Historical Trends (Occasional Paper, Number 32)

    DTIC Science & Technology

    2010-05-01

    develop bases closer to their targets.8 Tortuga , located off the northwest coast of Hispaniola, was the first great pirate sanctuary. It maintained...the boucaniers fled to Tortuga , a small island off the northwest coast of Hispaniola, and turned to piracy. The French boucaniers, whose name was...buccaneers commanded large sailing vessels and operated with impunity throughout the Caribbean. Although the Spanish raided Tortuga from time to time

  9. Medical marijuana: California update.

    PubMed

    James, J S

    1996-08-23

    The Cannabis Buyers' Club in San Francisco remains closed after it was raided by the office of California Attorney General Dan Lungren. Many individuals with serious illnesses such as AIDS and cancer are without safe access to medical marijuana to relieve the symptoms of their diseases. The need for access to medicinal marijuana, the return of the confiscated confidential medical records held at the buyers' club, and the passage of California Proposition 215 in the November election, which allows for the legitimate use of marijuana for medical purposes are of immediate concern. Since the raid, the Cannabis Buyers' Club has denied charges that it sold marijuana to teenagers, saying the drug was sold to a teen's mother, an undercover narcotics officer. However, the club admitted to sales to non-medical individuals who used fraudulent documents in order to obtain the drug and acknowledges the need to tighten procedures. Individuals may be able to obtain marijuana at other buyers' clubs if they have documentation of a medical need. While literature on the medical use of marijuana is lacking, the Federal government continues to block any efforts toward medical research on this issue. A list of other cannabis buyers' clubs in California is included, as well as a list of organizations working for Proposition 215.

  10. Development of electronic cinema projectors

    NASA Astrophysics Data System (ADS)

    Glenn, William E.

    2001-03-01

    All of the components for the electronic cinema are now commercially available. Sony has a high definition progressively scanned 24 frame per second electronic cinema camera. This can be recorded digitally on tape or film on hard drives in RAID recorders. Much of the post production processing is now done digitally by scanning film, processing it digitally, and recording it on film for release. Fiber links and satellites can transmit cinema program material to theaters in real time. RAID or tape recorders can play programs for viewing at a much lower cost than storage on film. Two companies now have electronic cinema projectors on the market. Of all of the components, the electronic cinema projector is the most challenging. Achieving the resolution, light, output, contrast ratio, and color rendition all at the same time without visible artifacts is a difficult task. Film itself is, of course, a form of light-valve. However, electronically modulated light uses other techniques rather than changes in density to control the light. The optical techniques that have been the basis for many electronic light-valves have been under development for over 100 years. Many of these techniques are based on optical diffraction to modulate the light. This paper will trace the history of these techniques and show how they may be extended to produce electronic cinema projectors in the future.

  11. Design of a multispectral, wedge filter, remote-sensing instrument incorporating a multiport, thinned, CCD area array

    NASA Astrophysics Data System (ADS)

    Demro, James C.; Hartshorne, Richard; Woody, Loren M.; Levine, Peter A.; Tower, John R.

    1995-06-01

    The next generation Wedge Imaging Spectrometer (WIS) instruments currently in integration at Hughes SBRD incorporate advanced features to increase operation flexibility for remotely sensed hyperspectral imagery collection and use. These features include: a) multiple linear wedge filters to tailor the spectral bands to the scene phenomenology; b) simple, replaceable fore-optics to allow different spatial resolutions and coverages; c) data acquisition system (DAS) that collects the full data stream simultaneously from both WIS instruments (VNIR and SWIR/MWIR), stores the data in a RAID storage, and provides for down-loading of the data to MO disks; the WIS DAS also allows selection of the spectral band sets to be stored; d) high-performance VNIR camera subsystem based upon a 512 X 512 CCD area array and associated electronics.

  12. Network issues for large mass storage requirements

    NASA Technical Reports Server (NTRS)

    Perdue, James

    1992-01-01

    File Servers and Supercomputing environments need high performance networks to balance the I/O requirements seen in today's demanding computing scenarios. UltraNet is one solution which permits both high aggregate transfer rates and high task-to-task transfer rates as demonstrated in actual tests. UltraNet provides this capability as both a Server-to-Server and Server-to-Client access network giving the supercomputing center the following advantages highest performance Transport Level connections (to 40 MBytes/sec effective rates); matches the throughput of the emerging high performance disk technologies, such as RAID, parallel head transfer devices and software striping; supports standard network and file system applications using SOCKET's based application program interface such as FTP, rcp, rdump, etc.; supports access to the Network File System (NFS) and LARGE aggregate bandwidth for large NFS usage; provides access to a distributed, hierarchical data server capability using DISCOS UniTree product; supports file server solutions available from multiple vendors, including Cray, Convex, Alliant, FPS, IBM, and others.

  13. Cancer imaging with CEA antibodies: historical and current perspectives.

    PubMed

    Goldenberg, D M

    1992-01-01

    This article reviews the history and status of cancer imaging with radiolabeled antibodies against carcinoembryonic antigen (CEA). Although CEA and many other cancer-associated antigens are not distinct for neoplasia, the quantitative increase of these markers in malignant tissues provides a sufficient differential for selective antibody targeting. Animal studies with xenografted human tumors provided the first evidence of the prospects of this technology, followed by initial clinical success with purified goat whole IgG antibodies to CEA, labeled with 131I and with the use of dual-isotope subtraction methods. Subsequently, improved and earlier imaging could be accomplished with monoclonal antibody fragments, which then would permit the use of shorter-lived radionuclides, such as 111In, 123I, and 99mTc. The preferred use of a monoclonal anti-CEA IgG Fab' fragment, labeled with 99mTc by a recently developed, simple and rapid kit, has enabled the detection of small lesions, including those in the liver, within 4 h of injection. By means of SPECT imaging, a high sensitivity and specificity for RAID could be achieved.

  14. Digital image archiving: challenges and choices.

    PubMed

    Dumery, Barbara

    2002-01-01

    In the last five years, imaging exam volume has grown rapidly. In addition to increased image acquisition, there is more patient information per study. RIS-PACS integration and information-rich DICOM headers now provide us with more patient information relative to each study. The volume of archived digital images is increasing and will continue to rise at a steeper incline than film-based storage of the past. Many filmless facilities have been caught off guard by this increase, which has been stimulated by many factors. The most significant factor is investment in new digital and DICOM-compliant modalities. A huge volume driver is the increase in images per study from multi-slice technology. Storage requirements also are affected by disaster recovery initiatives and state retention mandates. This burgeoning rate of imaging data volume presents many challenges: cost of ownership, data accessibility, storage media obsolescence, database considerations, physical limitations, reliability and redundancy. There are two basic approaches to archiving--single tier and multi-tier. Each has benefits. With a single-tier approach, all the data is stored on a single media that can be accessed very quickly. A redundant copy of the data is then stored onto another less expensive media. This is usually a removable media. In this approach, the on-line storage is increased incrementally as volume grows. In a multi-tier approach, storage levels are set up based on access speed and cost. In other words, all images are stored at the deepest archiving level, which is also the least expensive. Images are stored on or moved back to the intermediate and on-line levels if they will need to be accessed more quickly. It can be difficult to decide what the best approach is for your organization. The options include RAIDs (redundant array of independent disks), direct attached RAID storage (DAS), network storage using RAIDs (NAS and SAN), removable media such as different types of tape, compact disks (CDs and DVDs) and magneto-optical disks (MODs). As you evaluate the various options for storage, it is important to consider both performance and cost. For most imaging enterprises, a single-tier archiving approach is the best solution. With the cost of hard drives declining, NAS is a very feasible solution today. It is highly reliable, offers immediate access to all exams, and easily scales as imaging volume grows. Best of all, media obsolescence challenges need not be of concern. For back-up storage, removable media can be implemented, with a smaller investment needed as it will only be used for a redundant copy of the data. There is no need to keep it online and available. If further system redundancy is desired, multiple servers should be considered. The multi-tier approach still has its merits for smaller enterprises, but with a detailed long-term cost of ownership analysis, NAS will probably still come out on top as the solution of choice for many imaging facilities.

  15. Department of Defense Dictionary of Military and Associated Terms

    DTIC Science & Technology

    2007-03-22

    free drop; free fall; high velocity drop; low velocity drop. airdrop platform — A base upon which vehicles, cargo , or equipment are loaded for...displacement of cargo required to be carried by air for a specific task. See also airlift capability. airlift service — The performance or procurement of...effect. air priorities committee — (*) A committee set up to determine the priorities of passengers and cargo . air raid reporting control ship — (*) A

  16. JPRS Report: East Asia, Southeast Asia.

    DTIC Science & Technology

    1991-02-13

    Excerpt] About 30 fatigue-clad armed persons, believed to be New People’s Army (NPA) members, overran the municipal police station in Sogod, 60.5...carted away three M-16s, one M-14, a garand, a cal. 45 revolver and three cal. 38 revolvers during the 15-minute raid, said municipal police...Kabalawan, Sogod. Durano and PC Cebu Provincial Commander Lt. Col. Enrique Cuadra, in separate vehicles, were seen heading for the municipal hall at

  17. Repressive States and Insurgencies: Implications for Future Campaigns

    DTIC Science & Technology

    2006-03-12

    dissatisfied with the legitimacy of their government who sought to overthrow the ruling power by force. In contrast, “liberation insurgencies” pit insurgents...nuclear war. The history of the fighting behind the German lines, pitting various German security divisions, commands, and leaders against Soviet...Russian revolution was to Vasili Bliukher, who received the Order of the Red Banner for leading his 6,000 man ‘Urals Partisan Army’ on a 900-mile raid

  18. The Future Role of the Combined Action Program

    DTIC Science & Technology

    1991-05-06

    control predominates the VC can gain resources by means of covert purchase or hit-and-run raids if not by direct taxation . 36 Similar to the personnel...It may require changing accepted practises that are hundreds of years old. Nevertheless, change is imperative if CAP is to be successful. This is...8217Communist Party of the Philippines: Theory and Practise of United Front.* Masters Thesis, United States Army Command and General Staff College, Ft

  19. Categorical Confusion? The Strategic Implications of Recognizing Challenges Either as Irregular or Traditional

    DTIC Science & Technology

    2012-02-01

    its perpetrator. The signature military style of irregular belligerents is guerrilla tactics privileging a hit-and-run, which is to say raiding... style in warfare. Option 2. The challenge or threat environment for the Unit- ed States does not divide neatly into menaces readily and unambiguously...appears to be a fatal flaw in the proposition that there are distinctively hybrid challenges, wars, strategies, and styles of warfare. Hybridity is not

  20. The Doolittle Raid in History and Memory

    DTIC Science & Technology

    2000-02-15

    21 April, President Roosevelt told reporters that the planes came from Shangri - La , a fictional land found in James Hilton’s Lost Horizons, a novel...following this announcement, Roosevelt again correlated the planes with Shangri - La .46 The references confused people because the President did not...clarify whether Shangri - La was a codename for something the U.S. previously possessed or the actual name of a recently acquired air base or carrier

  1. Upstream: How Theory Shapes the Selection of Ways in Strategy

    DTIC Science & Technology

    2016-08-01

    application of theory cannot be simplified as mass casualty, nighttime-area bombing as evidenced by the daring Dambusters Raid in 1943. Nor did the...Americans only use “Industrial Web” precision bombing as evidenced throughout 1945 in Japan. In the case of Operation Desert Storm, a paradigm shift...machine. Morale-Effects theorists in the same war drew upon human philosophy and psychology to justify bombing civilian populations to break German

  2. Inherently Offensive: Airpower and the Dialectic with Defense

    DTIC Science & Technology

    2017-06-01

    preventing enemy planes from coming over and bombing us is to destroy them, just as the most practical and realistic way of preventing land and sea...offensive bombing campaigns in continental Europe 10 causing a response that highlights a significant obstacle to the offensive utility of airpower...aircraft involved in a typical allied bombing raid. 6 Jones, Reginald Victor. Most Secret War. Penguin UK, 2009, 400. 13 posits, “by the night

  3. Commerce Raiding: Historical Case Studies, 1755-2009

    DTIC Science & Technology

    2013-10-01

    Ariel proceed under bond.26 On 23 December, Alabama met Agrippina at the Arcas Islands off Yucatan and spent a week there taking on supplies and...as the population on the home islands. In particular, the U.S. unrestricted campaign dra- matically reduced the nutritional intake of most Japanese...See Jeune École Yucatan 80 Yusuf, Abdullahi 260, 262–63 Z Z, Operation 182 Zanzibar 128 Zeebrugge 140 Zhili Province 105, 108 The Newport

  4. China Report, Political, Sociological and Military Affairs, No. 445.

    DTIC Science & Technology

    1983-08-11

    three villages of Qarah Bagh subdivi- sion, north of Kabul. During a nine-hour fighting, 23 troops were killed and a number of others injured. The...Soviet-Karmal troops encircled four other villages in the area the following day. The guerrillas attacked them and damaged two tanks. These clashes...were followed by the Soviet bombing of the seven villages . 54 villagers were killed during the air raid. The guerrillas also attacks in Kabul during

  5. The Roles of Decision Makers in Special Operations

    DTIC Science & Technology

    2016-12-01

    question and hypotheses. 9 II. CASE STUDIES A. OPERATION THUNDERBOLT (THE RAID ON ENTEBBE) The Israeli Special Forces’ hostage rescue operation...Operations Warfare, 338. 28 Herzog, “The War Against Terrorism: Entebbe,” 338. 29 Chaitanya Arun Sathe, “A Case Study on Crisis Management with a...Assessment of the Roles of Decision Makers This assessment is based on this case study , and the decision makers’ roles in the three phases of a

  6. Future Fleet Project. What Can We Afford

    DTIC Science & Technology

    2016-12-21

    like ships based on an LCS hull with improved armor and armament. These twenty ships would be preceded by eight transitional LCS THE JOHNS HOPKINS...large aviation-ship hull for Navy sea-control/power-projection air wings and for Marine Corps vertical-raid/assault-air wings, reconfigurable...or antisubmarine warfare (ASW) within a common hull type that can self-defend in peacetime but aggregate to fight offensively in wartime • Tactical

  7. Information and Biological Revolutions: Global Governance Challenges Summary of a Study Group

    DTIC Science & Technology

    2000-01-01

    instruction and organize the classes. This change will come about slowly and then only if it proves to increase learning in the classroom. See Thomas K...dendrites and to form synaptic connections, then help to maintain and regulate synaptic activity responsible for learning and cognitive functions...testosterone may foster violent behavior is by the promotion of positive illusions about competitive ability . 77 Thus, an evolutionary history of raiding

  8. Operation Iraqi Freedom: Strategies, Approaches, Results, and Issues for Congress

    DTIC Science & Technology

    2008-12-15

    The New York Times, February 23, 2008; Lolita Baldor, “Gates: Turkey Raid Won’t Solve Problems,” Washington Post, February 23, 2008; Yochi Dreazen...In April 2004, the unofficial release of graphic photos of apparent detainee abuse at Abu Ghraib generated shock and horror among people inside and...who were driving through Fallujah, were ambushed and killed—and then their bodies were mutilated and hung from a bridge. Photos of that grisly

  9. The Rise of Pan-Islamism in Britain

    DTIC Science & Technology

    2006-12-01

    Algerian GIA (Groupe Islamique Arm) in Europe.”48 By the late 1990s Abu Hamza was the leader of the Finsbury Park Mosque.49 A police raid on the...2006). Abu Hamza is also wanted in the U.S. for the following charges: involvement with Earnest James Ujaama, providing support and finance to al...group. Such activities included anti-Libyan regime propaganda, financing , and terrorist planning, as well as alliance with other terrorist organization

  10. The National Drug Control Strategy: A Reality Check.

    DTIC Science & Technology

    1997-01-01

    papaya all suffer from quick spoilage and the absence of a good infrastructure to get them quickly to market. For papaya , a farmer is lucky to...democratic governments. 8 In Bolivia and Peru, coca production has assumed considerable cultural and political significance. Use of the coca leaf has...have been limited in impacting coca leaf 15 prices. One example is Operation Blast Furnace, in 1986, which used a series of military raids against

  11. No Failure of Imagination: Examining Foundational Flaws in America’s Homeland Security Enterprise

    DTIC Science & Technology

    2011-09-01

    Casualty Actuarial Society Enterprise Risk Management Committee (2003) has adopted the following definition of ERM in May 2003: ERM is the...refused to go to an air- raid shelter due to the mathematical improbability of a bomb killing him out of all the people in Moscow. He changed his mind... Actuarial Society. Casualty Actuarial Society Enterprise Risk Management Committee. (2003). Technical Report. Overview of enterprise risk management

  12. Venezuela: Issues in the 111th Congress

    DTIC Science & Technology

    2010-09-03

    in January 2010 under the de facto government of Roberto Micheletti. In June 2009, three additional countries joined— Ecuador , St. Vincent and the...files from Colombia’s March 2008 raid of a FARC camp in Ecuador had raised questions about potential support of the FARC by the Chávez government ...has been friction in relations for almost a decade under the government of populist President Hugo Chávez. U.S. officials have expressed concerns

  13. Military Review, July 1992. Volume 72, Number 7

    DTIC Science & Technology

    1992-07-01

    Electronic tensc. A defender’s raid can force the attacker to Operation Concentration Jamming MILITARY REVIEW * July 1992 37 three days of combat actions...electronic warfare plan is ambitious. more, the strength of the OMG is dissipated Blue CPs and transmitters are jammed on both somewhat by the use of...by an airborne CP. Soviet jamming mitted against the flank of the Blue offensive.] was normally directed at deeper, operational Commitment of the OMG

  14. Design and reliability analysis of high-speed and continuous data recording system based on disk array

    NASA Astrophysics Data System (ADS)

    Jiang, Changlong; Ma, Cheng; He, Ning; Zhang, Xugang; Wang, Chongyang; Jia, Huibo

    2002-12-01

    In many real-time fields the sustained high-speed data recording system is required. This paper proposes a high-speed and sustained data recording system based on the complex-RAID 3+0. The system consists of Array Controller Module (ACM), String Controller Module (SCM) and Main Controller Module (MCM). ACM implemented by an FPGA chip is used to split the high-speed incoming data stream into several lower-speed streams and generate one parity code stream synchronously. It also can inversely recover the original data stream while reading. SCMs record lower-speed streams from the ACM into the SCSI disk drivers. In the SCM, the dual-page buffer technology is adopted to implement speed-matching function and satisfy the need of sustainable recording. MCM monitors the whole system, controls ACM and SCMs to realize the data stripping, reconstruction, and recovery functions. The method of how to determine the system scale is presented. At the end, two new ways Floating Parity Group (FPG) and full 2D-Parity Group (full 2D-PG) are proposed to improve the system reliability and compared with the Traditional Parity Group (TPG). This recording system can be used conveniently in many areas of data recording, storing, playback and remote backup with its high-reliability.

  15. [Ophthalmologists in the proximity of Adolf Hitler].

    PubMed

    Rohrbach, J M

    2012-10-01

    Adolf Hitler met or at least knew about 5 ophthalmologists. The chair of ophthalmology in Berlin, Walther Löhlein, personally examined Hitler's eyes at least two times. The chair of ophthalmology in Breslau, Walter Dieter, developed "air raid protection spectacles" with the aid of high representatives of the NS-system and probably Adolf Hitler himself. Heinrich Wilhelm Kranz became rector of the universities of Giessen and Frankfurt/Main. He was known as a very strict advocate of the NS-race hygiene. Werner Zabel made plans for Hitler's diet and tried to interfere with Hitler's medical treatment. Finally, Hellmuth Unger was an influential representative of the medical press and a famous writer. Three of his novels with medical topics were made into a film which Hitler probably saw. Hitler had, so to say, a small "ophthalmological proximity" which, however, did not play a significant role for himself or the NS-state. © Georg Thieme Verlag KG Stuttgart · New York.

  16. The robotized workstation "MASTER" for users with tetraplegia: description and evaluation.

    PubMed

    Busnel, M; Cammoun, R; Coulon-Lauture, F; Détriché, J M; Le Claire, G; Lesigne, B

    1999-07-01

    The rehabilitation robotics MASTER program was developed by the French Atomic Energy Commission (CEA) and evaluated by the APPROCHE Rehabilitation centers. The aim of this program is to increase the autonomy and quality of life of persons with tetraplegia in domestic and vocational environments. Taking advantage of its experience in nuclear robotics, the CEA has supported studies dealing with the use of such technical aids in the medical area since 1975 with the SPARTACUS project, followed by MASTER 10 years later, and its European extension in the framework of the TIDE/RAID program. The present system is composed of a fixed robotized workstation that includes a six-axis SCARA robot mounted on a rail to allow horizontal movement and is equipped with tools for various tasks. The Operator Interface (OI) has been carefully adapted to the most severe tetraplegia. Results are given following a 2-year evaluation in real-life situations.

  17. Women as Symbols and Swords in Boko Haram’s Terror

    DTIC Science & Technology

    2016-03-01

    kid - napped women and telling them that, “these are your teachers from Chibok.” During raids “people were tied and laid down and the girls took it...discourages premarital sex and extols vir- tue. The women’s experiences have justifiably instilled a fear and loathing of Boko Haram among a diverse...boko-haram-offers-to-swap-detainees-for- kid - napped-girls/312497711/>. 48 “Shekau Denies Ceasefire, Says Chibok Girls have Converted to Islam

  18. Employing U.S. Information Operations Against Hybrid Warfare Threats

    DTIC Science & Technology

    2013-03-01

    Article 51.24 Cyber warfare is unique in that vulnerabilities that a network target may have could be discovered by software developers who then... cyber warfare rather than physical combat, a future subject to air strikes or ground-forces raids would likely be a powerful deterrent. Some in the U.S...Manwaring, The Complexity of Modern Asymmetric Warfare, (Norman, OK: Univ. of Oklahoma Press, 2012), 126-129. 23 Arie J. Schaap, “ Cyber Warfare Operations

  19. Raiding the Continent: The Origins of British Special Service Forces

    DTIC Science & Technology

    1980-06-06

    the transfigurations they may undergo during it are remarkable. The function of the military historian may be seen primarily as the explanation of the ...requirement for some type of operations to tie down German- troops along the coast, in aid of the land battle still taking place in the southern part of...preparations should be undertaken Immediately, though he gave no indications of where he thought such operations might take place . He pointed out that

  20. Communicating Why: Aligning the Air Force Message

    DTIC Science & Technology

    2015-02-17

    innovation as the Air Force’s HOW, after all the service could not have demonstrated its WHY without it. For example, Lt Col Jimmy Doolittle ...the Doolittle Raid.54 Later in the war, General Doolittle’s first order as the newly appointed commander of the 8th Air Force was to free the...fighters from their strict bomber tether so they could go on the offensive against the German fighters.55 As Doolittle later noted, the German General of

  1. Coordinated garbage collection for raid array of solid state disks

    DOEpatents

    Dillow, David A; Ki, Youngjae; Oral, Hakki S; Shipman, Galen M; Wang, Feiyi

    2014-04-29

    An optimized redundant array of solid state devices may include an array of one or more optimized solid-state devices and a controller coupled to the solid-state devices for managing the solid-state devices. The controller may be configured to globally coordinate the garbage collection activities of each of said optimized solid-state devices, for instance, to minimize the degraded performance time and increase the optimal performance time of the entire array of devices.

  2. Engendering Responses to Complex Emergencies: Lessons from South Sudan

    DTIC Science & Technology

    2016-03-01

    cattle raiding, gender roles also come into play in broader conflict tactics and strategies. Rape and sexual violence have become very com- mon in...Sudan. Women and girls suffer most from rape , but there is an increasing stock of evi- dence that boys and young men are vulnerable to rape as well...firewood and wild fruits, fetch water, as well as weed and harvest. These daily chores expose women to risks of violence and rape , which are often

  3. The Interim Years of Cyberspace

    DTIC Science & Technology

    2012-01-01

    the German Gotha Raids on England.2 However, the concept of using aircraft and balloons in warfare was not a new idea. One of the earliest uses dates...in World War I, to include Lieutenant Frank Luke Jr.’s destruction of fourteen heavily guarded German balloons ,4 it was obvious to many military...airshows to take place all around the globe.54 These early men and women kept audiences captive at airshows and air races which not only inspired future

  4. Cedar Grove: An Interdisciplinary Investigation of a Late Caddo Farmstead in the Red River Valley.

    DTIC Science & Technology

    1983-10-31

    a mixed subsistence economy. Nutritional adequacy was is free from problems and potential errors. Each method to be tested by analysis of the...horses. A 1517 slave raid by Hernandez de "wherein Margry made inexcusable alterations, deletions, and Cordoba on the Yucatan was the precursor for the... nutrition , low infection and porotic corresponded closely with the chronological distribution of hyperostosis rates, and a low probability of dying at

  5. Operation Iraqi Freedom: Strategies, Approaches, Results, and Issues for Congress

    DTIC Science & Technology

    2008-09-22

    Tavernise, “Turkish Troops Enter Iraq in Pursuit of Kurdish Militants,” The New York Times, February 23, 2008; Lolita Baldor, “Gates: Turkey Raid Won’t...unofficial release of graphic photos of apparent detainee abuse at Abu Ghraib generated shock and horror among people inside and outside Iraq. Some...were mutilated and hung from a bridge. Photos of that grisly aftermath were rapidly CRS-66 232 The Iraq Governing Council (IGC) was a critical part of

  6. Operation Iraqi Freedom: Strategies, Approaches, Results, and Issues for Congress

    DTIC Science & Technology

    2008-03-28

    23, 2008; Lolita Baldor, “Gates: Turkey Raid Won’t Solve Problems,” Washington Post, February 23, 2008; Yochi Dreazen, “U.S. Knew of Turkey’s Plan...release of graphic photos of apparent detainee abuse at Abu Ghraib generated shock and horror among people inside and outside Iraq. Some observers have...Blackwater, who were driving through Fallujah, were ambushed and killed — and then their bodies were mutilated and hung from a bridge. Photos of that

  7. Operation Iraqi Freedom: Strategies, Approaches, Results, and Issues for Congress

    DTIC Science & Technology

    2008-10-28

    2008; Lolita Baldor, “Gates: Turkey Raid Won’t Solve Problems,” Washington Post, February 23, 2008; Yochi Dreazen, “U.S. Knew of Turkey’s Plan to Hit...source of popular frustration. In April 2004, the unofficial release of graphic photos of apparent detainee abuse at Abu Ghraib generated shock and...and hung from a bridge. Photos of that grisly aftermath were rapidly transmitted around the world — riveting the attention of leaders in Baghdad

  8. Operation JUBILEE: The Allied Raid on Dieppe (1942) -- A Historical Analysis of a Planning Failure

    DTIC Science & Technology

    2008-03-06

    8217..’ ; I • l345.. THE FORMA ~~N OF ~~T F~RCES ii ~ \\ i J •.~..<a) For any amphIbIous CllDlpalgn lnvolvmg assaults on stroQgly defended coast:i held...the general pulicy of His Majesty’s Governm.ent. although an CXl’I’ptillll might havc been made .. iri the,-.o I .’ .. case of D~eppe,had the

  9. Private Security Contractors in Iraq and Afghanistan: Legal Issues

    DTIC Science & Technology

    2010-01-07

    involving Blackwater Worldwide private security guards on contract with the State Department, who reportedly opened fire in the crowded traffic circle in the...Background and Analysis, by Moshe Schwartz. 2 See James Risen and Mark Mazzetti, Blackwater Guards Tied to Secret C.I.A. Raids, NY TIMES, December 10...0360 (RMU), slip op. (D.D.C, .Dec. 31, 2009). 6 See Iraq: U.S. Blackwater Case Dismissal “Unacceptable,” REUTERS, Jan. 1, 2010. 7 See Iraq to

  10. Bahrain: Reform, Security, and U.S. Policy

    DTIC Science & Technology

    2014-01-06

    raided by the regime in May 2013. • Al Haq (Movement of Freedom and Democracy), another Shiite faction, is outlawed because of its calls for outright...to discuss the human rights situation in Bahrain. • The Bahrain Islamic Action Society, a small Shiite faction, also is an outlawed faction. It is...Amal’s leader, Shaykh Muhammad Ali al-Mafoodh, has been in prison since 2011 and Amal was outlawed in 2012. • Waad (“promise”) is a left-leaning

  11. The adaptive significance of phasic colony cycles in army ants.

    PubMed

    Garnier, Simon; Kronauer, Daniel J C

    2017-09-07

    Army ants are top arthropod predators in tropical forests around the world. The colonies of many army ant species undergo stereotypical behavioral and reproductive cycles, alternating between brood care and reproductive phases. In the brood care phase, colonies contain a cohort of larvae that are synchronized in their development and have to be fed. In the reproductive phase larvae are absent and oviposition takes place. Despite these colony cycles being a striking feature of army ant biology, their adaptive significance is unclear. Here we use a modeling approach to show that cyclic reproduction is favored under conditions where per capita foraging costs decrease with the number of larvae in a colony ("High Cost of Entry" scenario), while continuous reproduction is favored under conditions where per capita foraging costs increase with the number of larvae ("Resource Exhaustion" scenario). We argue that the former scenario specifically applies to army ants, because large raiding parties are required to overpower prey colonies. However, once raiding is successful it provides abundant food for a large cohort of larvae. The latter scenario, on the other hand, will apply to non-army ants, because in those species local resource depletion will force workers to forage over larger distances to feed large larval cohorts. Our model provides a quantitative framework for understanding the adaptive value of phasic colony cycles in ants. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Cost-effective data storage/archival subsystem for functional PACS

    NASA Astrophysics Data System (ADS)

    Chen, Y. P.; Kim, Yongmin

    1993-09-01

    Not the least of the requirements of a workable PACS is the ability to store and archive vast amounts of information. A medium-size hospital will generate between 1 and 2 TBytes of data annually on a fully functional PACS. A high-speed image transmission network coupled with a comparably high-speed central data storage unit can make local memory and magnetic disks in the PACS workstations less critical and, in an extreme case, unnecessary. Under these circumstances, the capacity and performance of the central data storage subsystem and database is critical in determining the response time at the workstations, thus significantly affecting clinical acceptability. The central data storage subsystem not only needs to provide sufficient capacity to store about ten days worth of images (five days worth of new studies, and on the average, about one comparison study for each new study), but also supplies images to the requesting workstation in a timely fashion. The database must provide fast retrieval responses upon users' requests for images. This paper analyzes both advantages and disadvantages of multiple parallel transfer disks versus RAID disks for short-term central data storage subsystem, as well as optical disk jukebox versus digital recorder tape subsystem for long-term archive. Furthermore, an example high-performance cost-effective storage subsystem which integrates both the RAID disks and high-speed digital tape subsystem as a cost-effective PACS data storage/archival unit are presented.

  13. How Bees Deter Elephants: Beehive Trials with Forest Elephants (Loxodonta africana cyclotis) in Gabon.

    PubMed

    Ngama, Steeve; Korte, Lisa; Bindelle, Jérôme; Vermeulen, Cédric; Poulsen, John R

    2016-01-01

    In Gabon, like elsewhere in Africa, crops are often sources of conflict between humans and wildlife. Wildlife damage to crops can drastically reduce income, amplifying poverty and creating a negative perception of wild animal conservation among rural people. In this context, crop-raiding animals like elephants quickly become "problem animals". To deter elephants from raiding crops beehives have been successfully employed in East Africa; however, this method has not yet been tested in Central Africa. We experimentally examined whether the presence of Apis mellifera adansonii, the African honey bee species present in Central Africa, deters forest elephants (Loxodonta Africana cyclotis) from feeding on fruit trees. We show for the first time that the effectiveness of beehives as deterrents of elephants is related to bee activity. Empty hives and those housing colonies of low bee activity do not deter elephants all the time; but beehives with high bee activity do. Although elephant disturbance of hives does not impede honey production, there is a tradeoff between deterrence and the quantity of honey produced. To best achieve the dual goals of deterring elephants and producing honey colonies must maintain an optimum activity level of 40 to 60 bee movements per minute. Thus, beehives colonized by Apis mellifera adansonii bees can be effective elephant deterrents, but people must actively manage hives to maintain bee colonies at the optimum activity level.

  14. How Bees Deter Elephants: Beehive Trials with Forest Elephants (Loxodonta africana cyclotis) in Gabon

    PubMed Central

    Ngama, Steeve; Korte, Lisa; Bindelle, Jérôme; Vermeulen, Cédric; Poulsen, John R.

    2016-01-01

    In Gabon, like elsewhere in Africa, crops are often sources of conflict between humans and wildlife. Wildlife damage to crops can drastically reduce income, amplifying poverty and creating a negative perception of wild animal conservation among rural people. In this context, crop-raiding animals like elephants quickly become “problem animals”. To deter elephants from raiding crops beehives have been successfully employed in East Africa; however, this method has not yet been tested in Central Africa. We experimentally examined whether the presence of Apis mellifera adansonii, the African honey bee species present in Central Africa, deters forest elephants (Loxodonta Africana cyclotis) from feeding on fruit trees. We show for the first time that the effectiveness of beehives as deterrents of elephants is related to bee activity. Empty hives and those housing colonies of low bee activity do not deter elephants all the time; but beehives with high bee activity do. Although elephant disturbance of hives does not impede honey production, there is a tradeoff between deterrence and the quantity of honey produced. To best achieve the dual goals of deterring elephants and producing honey colonies must maintain an optimum activity level of 40 to 60 bee movements per minute. Thus, beehives colonized by Apis mellifera adansonii bees can be effective elephant deterrents, but people must actively manage hives to maintain bee colonies at the optimum activity level. PMID:27196059

  15. Scaling and diffusion of oil spills in the Ocean Surface

    NASA Astrophysics Data System (ADS)

    Tarquis, A. M.; Platonov, A.; Grau, J.; Sekula, E.

    2010-05-01

    The region of the Gulf of Lions at the northwestern Mediterranean Sea has been studied within a ten-year period from December 1996 until November 2006. More than 1000 synthetic aperture radar (SAR) images, which have been acquired by the Second European Remote Sensing Satellite (ERS 1/2) as well as from ENVISAT. We present statistical results of the structure of several features revealed by SAR such as oil spills and tensioactive slicks dynamic. We compare oil splils obtained from the projects Clean Seas,ENVA4/CT/0334, RC2003/005700, ESP2005/07551 and ESA/AO/IP2240. Since natural (caused by plankton, fish, etc.) slicks as well as man-made oil slicks dampen the small-scale surface waves, which are responsible for the radar backscattering from the ocean surface, both types of effects may be confused and give look/alike false oil spill detections. The early SAR images were processed at a resolution of 1 pixel=200m and were provided by the RApid Information Dissemination System (RAIDS) SAR processing facility in West Freugh, UK. Recent ENVISAT images directly from ESA allow a higher resolution of 1 pixel = 26 m, improving the detected turbulent scaling range. The occurrence of marine oil pollution as well as several dynamic features near Barcelona (frames 8-10, 19, 20; 200 SAR images)is itself a random multi-scale process. The use of different multifractal techniques, both using limits to the smallest and largest available scales, show that the scaling laws are very complex and depend strongly on intermittency of the assumed turbulent cascade, the shapes of the multifractal spectra functions are seen to deviate from an homogeneous multifractal and depend both on the initial conditions of the spill or slick, and on the transit time that the spill has been subjected to the local turbulence.

  16. Understanding USSOCOM and US Marine Corps Roles in Crisis Response and Limited Contingency Operations

    DTIC Science & Technology

    2013-04-15

    are required. For example exploring MAGTF deployments on Littoral Combat Ships or building GCE , LCE, and ACE units that support company level ...objective raids that is likely due to the level of training and in the case of peace enforcement it is likely due to the regional focus of SOF...formed the SOF units and task forces over this period. The inherent “jointness” of USSOCOM is apparent at the lowest tactical level which contrasts

  17. The Role of the Airmechanized Raid in Operational Maneuver

    DTIC Science & Technology

    1990-04-16

    8217 Central Front. London: Jane’s, 1985. Liddell Hart, B.H. The Real War: 1914-1918. Boston: Little, Brown & Co., IS64. Lisov, Ivan . Airborne Troops of the...pp. 30-41. Canan - James. "Sorting Out the AirLand Partnership." Air Force Magazine, Vol. 71 (APR 1988), pp. 50-56. Chernyshov, Y. "A Tactical Airborne...Petersen, Phillip. "Soviet Air and Antlair Operations." Air University Review, Vol. 36 (MAR-APR 1985), pp. 36-54. Polykov, Ivan . "Anti-Helicopter

  18. The Hammelburg Raid Revisited

    DTIC Science & Technology

    1994-01-01

    tanks, and 20 halftracks (most filled with casualties) remaining, in addition to Baum’s Jeep. They were almost out of gas . Just 110 of the original 293... Tifton , Georgia. Harold Cohen Interview and Baron, Baum and Goldhurst, p.273. I 2 5 Relationships between the two units were so close that a 10th Armored...found a space on a halftrack. But after seeing the vehicle’s gas gage and learning how far they had to I travel, he knew the task force was in trouble

  19. Operational Raids: Cavalry in the Vicksburg Campaign, 1862-1863

    DTIC Science & Technology

    1990-06-01

    which should be fortified and guarded, and to which the army is to fall back in case of disaster.) This thinking served as the basis for how both sides...Initially prosecuted the war. The major limitation was that It did not seem to allow an army to operate without a base. This restrictive thinking , as...a wavering infantry line. This outlook pervaded the thinking of most commanders on both sides as the war started. Generals were unprepared to think of

  20. Dilemmas in Forward Basing: Understanding the Impact of the American Military Presence in Bahrain

    DTIC Science & Technology

    2014-06-01

    bases, local businessmen, a base workers group, and members of the self -defense force.75 Ultimately, Governor, Ota was voted out of office and a...U.S. access to Turkish soil in 1979 to rescue hostages in Tehran during the Islamic Revolution in Iran. Relations did not begin to heal until after...demonstrators from the roundabout with rubber bullets, and teargas. Four demonstrators were killed during the raid and others died shortly after. The

  1. Medical marijuana: the state of the research.

    PubMed

    Mirken, B

    1996-10-18

    Recent raids on buyers' clubs in San Francisco have focused attention on medicinal uses of marijuana. The Clinton administration's policy is that there is no scientific evidence that smoked marijuana is useful in treating pain and nausea in AIDS and cancer patients. However, mainstream medical literature has supported the use of cannabis in managing symptoms of diseases such as glaucoma and multiple sclerosis. Well designed, controlled studies of marijuana are needed to determine the effective medical uses of the drug and break the political stalemate on this issue.

  2. Nanoengineered particles for enhanced intra-articular retention and delivery of proteins.

    PubMed

    Singh, Ankur; Agarwal, Rachit; Diaz-Ruiz, Carlos A; Willett, Nick J; Wang, Peiyi; Lee, L Andrew; Wang, Qian; Guldberg, Robert E; García, Andrés J

    2014-10-01

    Localized intra-articular delivery of anti-inflammatory proteins can reduce inflammation in osteoarthritis but poses a challenge because of raid clearance within few hours of injection. A new class of polymer is developed that forms self-assembled nanoparticles ranging from 300 to 900 nm and demonstrates particle size dependent prolonged retention in intra-articular joint spaces compared to bolus protein over a period of 14 d. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  3. CTC Sentinel. Volume 8, Issue 11, November/December 2015

    DTIC Science & Technology

    2016-02-12

    instructed ” by Abaaoud to launch an attack in France on a soft target to achieve maximum casualties. The chosen target was a concert hall. Abaaoud had...State member in Syria who was communicating with him online. “Un attentat a été déjoué contre des marins de la base navale de Toulon,” Journal du... information re- ceived by the author from investigators. A tenth unidentified attacker blew himself up during the French commando raid in Saint-Denis on

  4. The United States and Saudi Arabia: A Special Relationship; Its Birth, Evolution and Reapportionment.

    DTIC Science & Technology

    1981-06-01

    state begins in its most concise form in 1932. On September 18 of that year, Abdul Aziz ibn Saud assumed the title of king and proclaimed his domain...dawn raid with less than fifty men, Abdul Aziz ibn Saud (commonly known in the West as Ibn Saud) reconquered Riyadh from the Rashids. Thus began the...period of consolidation, Abdul Aziz ibn Saud declared his realm on September 18, 1932, to be called the Kingdom of Saudi Arabia. Those foundations of

  5. Instances of Use of United States Armed Forces Abroad, 1798-2013

    DTIC Science & Technology

    2013-08-30

    Cuba. Brief landings in pursuit of pirates occurred April 8 near Escondido; April 16 near Cayo Blanco; July 11 at Siquapa Bay; July 21 at Cape Cruz ; and...affair and Villa’s raids and included capture of Vera Cruz and later Pershing’s expedition into northern Mexico. 1915-1934 Haiti. July 28, 1915, to...military leader General Manuel Noriega to resign, the United States sent 1,000 troops to Panama, to “further safeguard the canal, U.S. lives, property and

  6. Zionism and Southern Lebanon: A Historical Perspective on Six Decades of Controversy

    DTIC Science & Technology

    1979-06-01

    of different religions and thus actually worked against the purpose of the mandatory regime, which had been intended to educate the Syrians in the art...Palestine, be turned over to Lebanon, 203 Presu :-bly the refugees, ninety percent of whom were Muslims, would be settled in that region, 20 :erger, The...of Shamir resulted in the deaths of’ three women and brought more Israeli air 244 . -eIrei--w attacks on Lebanon. A seaborne raid on th4 saeitw of

  7. The Use of the Air Arm During Operation Change of Direction

    DTIC Science & Technology

    2009-01-01

    football stadium.56 Aircraft of the IAF for the first time raid targets in the predominantly Christian area to the north of Beirut. These attacks are...launching capa- bility, the organisation managed to fire a large number of Katyusha missiles from the border area into Israel on a daily basis. Of the...caused by budgetary restrictions. In its turn, Hezbollah was very much aware of the capability of the GSS and managed to keep strict secrecy by hiding

  8. Overview of TPC Benchmark E: The Next Generation of OLTP Benchmarks

    NASA Astrophysics Data System (ADS)

    Hogan, Trish

    Set to replace the aging TPC-C, the TPC Benchmark E is the next generation OLTP benchmark, which more accurately models client database usage. TPC-E addresses the shortcomings of TPC-C. It has a much more complex workload, requires the use of RAID-protected storage, generates much less I/O, and is much cheaper and easier to set up, run, and audit. After a period of overlap, it is expected that TPC-E will become the de facto OLTP benchmark.

  9. Car Talk: Ethnic And Religious Identity In The Central African Republic

    DTIC Science & Technology

    2017-12-01

    Republic and Democracy (APRD) began conducting raids on army positions. Ange-Felix Patassé controlled the APRD from his exile in Togo and the group was...Séléka forces razed villages to the ground. As it became apparent Djotodia could not or would not control the Séléka even more groups took up the Séléka...largest groups , the Rassemblement Patriotique pour le Renouveau de la Centrafrique (RPRC), the Front Populaire pour la Reniasance de la Centrafrique

  10. An Investigation into Islamic Fundamentalism and an Assessment of Its Relationship with the Concept of Jihad

    DTIC Science & Technology

    1992-06-05

    strict semantic inaccuracy, fundamentalism is the most suitable word for the purposes of this study, owing to common usage in the West. In contrast...Through this powerful medium of verse the heroic deeds of men were recounted: their bold raids, their resilience to suffering in the harsh desert conditions...by the economic and social conditions of desert life to the rank of a national institution’. 1 0 The Ghazwa involved dash and elan but little

  11. Reducing I/O variability using dynamic I/O path characterization in petascale storage systems

    DOE PAGES

    Son, Seung Woo; Sehrish, Saba; Liao, Wei-keng; ...

    2016-11-01

    In petascale systems with a million CPU cores, scalable and consistent I/O performance is becoming increasingly difficult to sustain mainly because of I/O variability. Furthermore, the I/O variability is caused by concurrently running processes/jobs competing for I/O or a RAID rebuild when a disk drive fails. We present a mechanism that stripes across a selected subset of I/O nodes with the lightest workload at runtime to achieve the highest I/O bandwidth available in the system. In this paper, we propose a probing mechanism to enable application-level dynamic file striping to mitigate I/O variability. We also implement the proposed mechanism inmore » the high-level I/O library that enables memory-to-file data layout transformation and allows transparent file partitioning using subfiling. Subfiling is a technique that partitions data into a set of files of smaller size and manages file access to them, making data to be treated as a single, normal file to users. Here, we demonstrate that our bandwidth probing mechanism can successfully identify temporally slower I/O nodes without noticeable runtime overhead. Experimental results on NERSC’s systems also show that our approach isolates I/O variability effectively on shared systems and improves overall collective I/O performance with less variation.« less

  12. PACS in Töölö hospital.

    PubMed

    Kinnunen, J; Pohjonen, H

    2001-07-01

    A 3-year PACS project was started in 1997 and completed in 1999 with filmless radiology and surgery. An efficient network for transferring images provides the infrastructure for integration of different distributed imaging systems and enables efficient handling of all patient-related information on one display station. Because of the need for high-speed communications and the massive amount of image data transferred in radiology, ATM (25, 155 Mbit/s) was chosen to be the main technology used. Both hardware and software redundancy of the system have been carefully planned. The size of the Dicom image library utilizing MO discs is currently 1.2 TB with 300 GB RAID capacity. For the increasing amount of teleradiologic consultations, a special Dicom gateway is planned. It allows a centralized and resilient handling and routing of received images around the hospital. Hospital-wide PACS has already improved the speed and quality of patient care by providing instant access to diagnostic information at multiple locations simultaneously. The benefits of PACS are considered from the viewpoint of the entire hospital: PACS offers a method for efficiently transporting patient-related images and reports to the referring physicians.

  13. The amino acid's backup bone - storage solutions for proteomics facilities.

    PubMed

    Meckel, Hagen; Stephan, Christian; Bunse, Christian; Krafzik, Michael; Reher, Christopher; Kohl, Michael; Meyer, Helmut Erich; Eisenacher, Martin

    2014-01-01

    Proteomics methods, especially high-throughput mass spectrometry analysis have been continually developed and improved over the years. The analysis of complex biological samples produces large volumes of raw data. Data storage and recovery management pose substantial challenges to biomedical or proteomic facilities regarding backup and archiving concepts as well as hardware requirements. In this article we describe differences between the terms backup and archive with regard to manual and automatic approaches. We also introduce different storage concepts and technologies from transportable media to professional solutions such as redundant array of independent disks (RAID) systems, network attached storages (NAS) and storage area network (SAN). Moreover, we present a software solution, which we developed for the purpose of long-term preservation of large mass spectrometry raw data files on an object storage device (OSD) archiving system. Finally, advantages, disadvantages, and experiences from routine operations of the presented concepts and technologies are evaluated and discussed. This article is part of a Special Issue entitled: Computational Proteomics in the Post-Identification Era. Guest Editors: Martin Eisenacher and Christian Stephan. Copyright © 2013. Published by Elsevier B.V.

  14. Time-to-collision analysis of pedestrian and pedal-cycle accidents for the development of autonomous emergency braking systems.

    PubMed

    Lenard, James; Welsh, Ruth; Danton, Russell

    2018-06-01

    The aim of this study was to describe the position of pedestrians and pedal cyclists relative to the striking vehicle in the 3 s before impact. This information is essential for the development of effective autonomous emergency braking systems and relevant test conditions for consumer ratings. The UK RAIDS-OTS study provided 175 pedestrian and 127 pedal-cycle cases based on in-depth, at-scene investigations of a representative sample of accidents in 2000-2010. Pedal cyclists were scattered laterally more widely than pedestrians (90% of cyclists within around ±80° compared to ±20° for pedestrians), however their distance from the striking vehicle in the seconds before impact was no greater (90% of cyclists within 42 m at 3 s compared to 50 m for pedestrians). This data is consistent with a greater involvement of slow moving vehicles in cycle accidents. The implication of the results is that AEB systems for cyclists require almost complete 180° side-to-side vision but do not need a longer distance range than for pedestrians. Copyright © 2018 Elsevier Ltd. All rights reserved.

  15. Introduction to the CEA family: structure, function and secretion.

    PubMed

    Von Kleist, S

    1992-01-01

    Due to the phenomenal progress in the field of tumor immunology that took place during the last twenty years, we dispose today of highly specific and sensitive techniques and reagents like monoclonal antibodies (MAbs). In this context the discovery in human carcinomas of tumor-associated antigens, such as CEA, was of primary importance, especially since the latter was found to have clinical relevance as a tumor marker. Based on animal models, a new in vivo technology for the detection of tumors and metastases was developed in recent years, that uses anti-CEA MAbs, or fragments of them, coupled to radio-isotopes. This technique, called radio-immunodetection (RAID), also paved the way for immunotherapeutic procedures, where again CEA served as the target-antigen. This new technique holds great promise, provided the epitope-specificity of the MAbs is well-controlled: it has been shown that CEA belongs to a large gene-family of at least 22 members, which can be subdivided into two subgroups (i.e., the CEA- and the PSG-subgroup) and which in turn belongs to the immunoglobulin-supergene family. Great structural similarities render the distinction of the various cross-reactive molecules by immunological means rather difficult.

  16. The Utilization of Robotic Pets in Dementia Care.

    PubMed

    Petersen, Sandra; Houston, Susan; Qin, Huanying; Tague, Corey; Studley, Jill

    2017-01-01

    Behavioral problems may affect individuals with dementia, increasing the cost and burden of care. Pet therapy has been known to be emotionally beneficial for many years. Robotic pets have been shown to have similar positive effects without the negative aspects of traditional pets. Robotic pet therapy offers an alternative to traditional pet therapy. The study rigorously assesses the effectiveness of the PARO robotic pet, an FDA approved biofeedback device, in treating dementia-related symptoms. A randomized block design with repeated measurements guided the study. Before and after measures included reliable, valid tools such as: RAID, CSDD, GDS, pulse rate, pulse oximetry, and GSR. Participants interacted with the PARO robotic pet, and the control group received standard activity programs. Five urban secure dementia units comprised the setting. 61 patients, with 77% females, average 83.4 years in age, were randomized into control and treatment groups. Compared to the control group, RAID, CSDD, GSR, and pulse oximetry were increased in the treatment group, while pulse rate, pain medication, and psychoactive medication use were decreased. The changes in GSR, pulse oximetry, and pulse rate over time were plotted for both groups. The difference between groups was consistent throughout the 12-week study for pulse oximetry and pulse rate, while GSR had several weeks when changes were similar between groups. Treatment with the PARO robot decreased stress and anxiety in the treatment group and resulted in reductions in the use of psychoactive medications and pain medications in elderly clients with dementia.

  17. The Utilization of Robotic Pets in Dementia Care

    PubMed Central

    Petersen, Sandra; Houston, Susan; Qin, Huanying; Tague, Corey; Studley, Jill

    2016-01-01

    Background: Behavioral problems may affect individuals with dementia, increasing the cost and burden of care. Pet therapy has been known to be emotionally beneficial for many years. Robotic pets have been shown to have similar positive effects without the negative aspects of traditional pets. Robotic pet therapy offers an alternative to traditional pet therapy. Objective: The study rigorously assesses the effectiveness of the PARO robotic pet, an FDA approved biofeedback device, in treating dementia-related symptoms. Methods: A randomized block design with repeated measurements guided the study. Before and after measures included reliable, valid tools such as: RAID, CSDD, GDS, pulse rate, pulse oximetry, and GSR. Participants interacted with the PARO robotic pet, and the control group received standard activity programs. Five urban secure dementia units comprised the setting. Results: 61 patients, with 77% females, average 83.4 years in age, were randomized into control and treatment groups. Compared to the control group, RAID, CSDD, GSR, and pulse oximetry were increased in the treatment group, while pulse rate, pain medication, and psychoactive medication use were decreased. The changes in GSR, pulse oximetry, and pulse rate over time were plotted for both groups. The difference between groups was consistent throughout the 12-week study for pulse oximetry and pulse rate, while GSR had several weeks when changes were similar between groups. Conclusions: Treatment with the PARO robot decreased stress and anxiety in the treatment group and resulted in reductions in the use of psychoactive medications and pain medications in elderly clients with dementia. PMID:27716673

  18. Comparing the Effects of Multisensory Stimulation and Individualized Music Sessions on Elderly People with Severe Dementia: A Randomized Controlled Trial.

    PubMed

    Sánchez, Alba; Maseda, Ana; Marante-Moar, M Pilar; de Labra, Carmen; Lorenzo-López, Laura; Millán-Calenti, José Carlos

    2016-03-08

    The objective of this study was to compare the effects of a multisensory stimulation environment (MSSE) and individualized music sessions on agitation, emotional and cognitive status, and dementia severity in a sample of institutionalized patients with severe dementia. Twenty-two participants with a diagnosis of severe or very severe dementia were randomly assigned to two groups: MSSE and individualized music sessions. Both groups participated in two 30-min weekly sessions over 16 weeks. Outcomes were agitation (Cohen-Mansfield Agitation Inventory, CMAI), mood (Cornell Scale for Depression in Dementia, CSDD), anxiety (Rating Anxiety in Dementia, RAID), cognitive function (Severe Mini-Mental State Examination, SMMSE), and the overall severity of dementia (Bedford Alzheimer Nursing Severity Scale, BANS-S). They were assessed at baseline (pre-trial), in the middle (mid-trial), at the end of the intervention (post-trial), and 8 weeks after the intervention (follow-up). Patients in the MSSE group showed significant improvement in their RAID and BANS-S scores compared with the individualized music group post- versus pre-trial. With regard to agitation, there was improvement during the intervention in both the MSSE and individualized music groups in the CMAI total score after 16 weeks of intervention, with no significant differences between the groups. The results suggest that MSSE could have better effects on anxiety symptoms and dementia severity in comparison with individualized music sessions in elderly patients with severe dementia.

  19. Fitting the message to the location: engaging adults with antimicrobial resistance in a World War 2 air raid shelter.

    PubMed

    Verran, Joanna; Haigh, Carol; Brooks, Jane; Butler, Jonathan; Redfern, James

    2018-05-31

    There are many different initiatives, global and local, designed to raise awareness of antimicrobial resistance (AMR) and change audience behaviour. However, it is not possible to assess the impact of specific, small-scale events on national and international outcomes - although one might acknowledge some contribution to the individual and collective knowledge and experience-focused 'science capital' As with any research, in preparation for a public engagement event, it is important to identify aims, and appropriate methods whose results might help satisfy those aims. Therefore, the aim of this paper was to develop, deliver and evaluate an event designed to engage an adult audience with AMR. The venue was a World War 2 air raid shelter, enabling comparison of the pre- and post-antibiotic eras via three different activity stations, focusing on nursing, the search for new antibiotics, and investigations into novel antimicrobials. The use of observers released the presenters from evaluation duties, enabling them to focus on their specific activities. Qualitative measures of audience engagement were combined with quantitative data. The evaluation revealed that adult audiences can easily be absorbed into an activity- particularly if hands-on - after a brief introduction. This research demonstrates that hands-on practical engagement with AMR can enable high level interaction and learning in an informal and enjoyable environment. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  20. Chemically armed mercenary ants protect fungus-farming societies.

    PubMed

    Adams, Rachelle M M; Liberti, Joanito; Illum, Anders A; Jones, Tappey H; Nash, David R; Boomsma, Jacobus J

    2013-09-24

    The ants are extraordinary in having evolved many lineages that exploit closely related ant societies as social parasites, but social parasitism by distantly related ants is rare. Here we document the interaction dynamics among a Sericomyrmex fungus-growing ant host, a permanently associated parasitic guest ant of the genus Megalomyrmex, and a raiding agro-predator of the genus Gnamptogenys. We show experimentally that the guest ants protect their host colonies against agro-predator raids using alkaloid venom that is much more potent than the biting defenses of the host ants. Relatively few guest ants are sufficient to kill raiders that invariably exterminate host nests without a cohabiting guest ant colony. We also show that the odor of guest ants discourages raider scouts from recruiting nestmates to host colonies. Our results imply that Sericomyrmex fungus-growers obtain a net benefit from their costly guest ants behaving as a functional soldier caste to meet lethal threats from agro-predator raiders. The fundamentally different life histories of the agro-predators and guest ants appear to facilitate their coexistence in a negative frequency-dependent manner. Because a guest ant colony is committed for life to a single host colony, the guests would harm their own interests by not defending the host that they continue to exploit. This conditional mutualism is analogous to chronic sickle cell anemia enhancing the resistance to malaria and to episodes in human history when mercenary city defenders offered either net benefits or imposed net costs, depending on the level of threat from invading armies.

  1. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    PubMed

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced. Copyright © 2014 Wiley Periodicals, Inc.

  2. Spatiotemporal resource distribution and foraging strategies of ants (Hymenoptera: Formicidae)

    PubMed Central

    Lanan, Michele

    2014-01-01

    The distribution of food resources in space and time is likely to be an important factor governing the type of foraging strategy used by ants. However, no previous systematic attempt has been made to determine whether spatiotemporal resource distribution is in fact correlated with foraging strategy across the ants. In this analysis, I present data compiled from the literature on the foraging strategy and food resource use of 402 species of ants from across the phylogenetic tree. By categorizing the distribution of resources reported in these studies in terms of size relative to colony size, spatial distribution relative to colony foraging range, frequency of occurrence in time relative to worker life span, and depletability (i.e., whether the colony can cause a change in resource frequency), I demonstrate that different foraging strategies are indeed associated with specific spatiotemporal resource attributes. The general patterns I describe here can therefore be used as a framework to inform predictions in future studies of ant foraging behavior. No differences were found between resources collected via short-term recruitment strategies (group recruitment, short-term trails, and volatile recruitment), whereas different resource distributions were associated with solitary foraging, trunk trails, long-term trail networks, group raiding, and raiding. In many cases, ant species use a combination of different foraging strategies to collect diverse resources. It is useful to consider these foraging strategies not as separate options but as modular parts of the total foraging effort of a colony. PMID:25525497

  3. A high-speed network for cardiac image review.

    PubMed

    Elion, J L; Petrocelli, R R

    1994-01-01

    A high-speed fiber-based network for the transmission and display of digitized full-motion cardiac images has been developed. Based on Asynchronous Transfer Mode (ATM), the network is scaleable, meaning that the same software and hardware is used for a small local area network or for a large multi-institutional network. The system can handle uncompressed digital angiographic images, considered to be at the "high-end" of the bandwidth requirements. Along with the networking, a general-purpose multi-modality review station has been implemented without specialized hardware. This station can store a full injection sequence in "loop RAM" in a 512 x 512 format, then interpolate to 1024 x 1024 while displaying at 30 frames per second. The network and review stations connect to a central file server that uses a virtual file system to make a large high-speed RAID storage disk and associated off-line storage tapes and cartridges all appear as a single large file system to the software. In addition to supporting archival storage and review, the system can also digitize live video using high-speed Direct Memory Access (DMA) from the frame grabber to present uncompressed data to the network. Fully functional prototypes have provided the proof of concept, with full deployment in the institution planned as the next stage.

  4. A high-speed network for cardiac image review.

    PubMed Central

    Elion, J. L.; Petrocelli, R. R.

    1994-01-01

    A high-speed fiber-based network for the transmission and display of digitized full-motion cardiac images has been developed. Based on Asynchronous Transfer Mode (ATM), the network is scaleable, meaning that the same software and hardware is used for a small local area network or for a large multi-institutional network. The system can handle uncompressed digital angiographic images, considered to be at the "high-end" of the bandwidth requirements. Along with the networking, a general-purpose multi-modality review station has been implemented without specialized hardware. This station can store a full injection sequence in "loop RAM" in a 512 x 512 format, then interpolate to 1024 x 1024 while displaying at 30 frames per second. The network and review stations connect to a central file server that uses a virtual file system to make a large high-speed RAID storage disk and associated off-line storage tapes and cartridges all appear as a single large file system to the software. In addition to supporting archival storage and review, the system can also digitize live video using high-speed Direct Memory Access (DMA) from the frame grabber to present uncompressed data to the network. Fully functional prototypes have provided the proof of concept, with full deployment in the institution planned as the next stage. PMID:7949964

  5. a Borehole Seismic System for Active and Passive Seimsic Studies to 3 KM at Ptrc's Aquistore Project

    NASA Astrophysics Data System (ADS)

    Schmitt, D. R.; Nixon, C.; Kofman, R.; White, D. J.; Worth, K.

    2015-12-01

    We have constructed a downhole seismic recording system for application to depths of nearly 3 km and temperatures up to 135 °C at Aquistore, an independent research and monitoring project in which liquid CO2 is being stored in a brine and sandstone water formation. The key component to this system is a set of commercially available slim-hole 3-C sondes carrying 15 Hz geophones deployable in open and cased boreholes with diameters as small as 57 mm. The system is currently hosted on a 4-conductor wireline with digital information streamed to the surface recording unit. We have further incorporated these sondes into a mobile passive monitoring unit that includes a number of redundancies such as a multiple Tbyte network accessible RAID hard-drive system (NAS) and a self-designed uninterruptible power supply. The system can be remotely controlled via the internet. The system is currently deployed covering a range of depths from 2850 m to 2910 m. Ambient temperatures at this depth are approximately 110 °C with onboard tool temperatures running at 115 °C. Data is continuously streamed to the NAS for archiving, approximately 11 GBytes of data is recorded per day at the sampling period of 0.5 ms. The lack of noise at this depth allows short data snippets to be flagged with a simple amplitude threshold criteria. The greatly reduced data volume of the snippets allows for ready access via the internet to the system for ongoing quality control. Spurious events, mostly small amplitude tube waves originating at or near the surface, are readily discounted. Active seismic measurements are carried out simultaneously but these require that an appropriately accurate independent GPS based time synchronization be used. Various experiences with event detection, orientation of sondes using both explosives and seismic vibrator, potential overheating of the surface electronics, and issues related to loss of shore power provide for a detailed case study. Aquistore, managed by the Petroleum Technology Research Centre, is Canada's first dedicated CO2 storage project, and is an integral component of SaskPower's Boundary Dam Integrated Carbon Capture and Storage (CCS) Demonstration project - the world's first fully integrated CCS demonstration project from a coal-fired power plant.

  6. History of the Joint Chiefs of Staff. The Joint Chiefs of Staff and the War in Vietnam, 1960-1968. Part 2

    DTIC Science & Technology

    2012-01-01

    antiaircraft fire.4- Ambassador Taylor recommended to Washington that the three cancelled missions be rescheduled "at once" for the morning of 8 February...officials did authorize a rescheduling of the VNAF strike even though Mr. McNamara doubted that it would do much damage, because it was essential "to...scheduled for 1 March, so that the raids would not coincide with the opening of a major Communist world conclave in Moscow that same day. Rescheduled for

  7. Environmental Threats to Security, Stability, and U.S. Interests in Southern Africa: Opportunity Knocks - Time for a Comprehensive Region Defense Environmental International Cooperation and Environmental Security Assistance Strategy

    DTIC Science & Technology

    2009-01-01

    Cattle raiding and the effects of poaching would likely intensify as well. Fisheries may be adversely impacted due to climatic effects on coral...organized crime to set roots in southern Africa during the early 1990s. Chinese gangs have since diversified into trafficking of poached rhino horn...charged with poaching rhino horn for shipment to China.90 Intelligence sources developed by Botswana security personnel for anti- poaching purposes

  8. Ranald S. Mackenzie and the Fourth Cavalry Cross-Border Raid on the Mexican Kickapoo Indians near Remolino, Coahuila, 17-21 May 1873

    DTIC Science & Technology

    2014-05-22

    was shy and reserved growing up on the family farm near the Hudson River. Shyness and reticence, especially when around women, were traits that Ranald...diplomatic trip to Mexico and greeting Ranald at the front gate to the family farm in New York, Alexander’s new-life diplomatic endeavors ended abruptly...on Ranald’s upbringing, struggled mightily over the next few years to support four children by herself. Eventually, she sold the farm and moved the

  9. Return of the Lost Boys to South Sudan: A Strategy to Building a Stronger South Sudan

    DTIC Science & Technology

    2011-12-01

    country.2 It was in these Murahiliin raids that the young South Sudanese boys and girls who would become known as the “Lost Boys” were separated...visit the camp reported seeing “only naked bodies, very thin, of boys, as far as the eye could see. They did not even have tukls [huts] to live in.”4...Challenges of the Lost Boys and Girls of Sudan Community in Winnipeg” (Working Paper No. WP01-09, University of Winnipeg, 2009). 4 government of

  10. Evaluative Testing of the Bent Canyon Stage Station on the Pinon Canyon Maneuver Site, Las Animas County, Colorado

    DTIC Science & Technology

    2005-01-01

    de Cristo Range to the west and the Raton Mesa uplift to the south), and the American Desert Southwest (Weber 1980). Geology and Geomorphology The...Purgatoire River which flows along the eastern edge of the maneuver area from its headwaters in the Sangre de Cristo mountains to its confluence with...peoples were now mounted , and raided for livestock as much as for food. The dominance that the Comanche came to have over the Apache in the 1700s is often

  11. Opportunities Gained and Lost: J.E.B. Stuart’s Cavalry Operations in the Seven Days Campaign

    DTIC Science & Technology

    1994-04-07

    Four Years With General Lee, (New York: D. Appleton and Company, 1878), p. 41. 4Report of the Joint Committee on the Conduct of ...19Wailter H. Taylor, Four Years With General Lee, (New York: D. Appleton and Company, 1878), p. 41 and Report of the Joint Committee on the Conduct of the...101 v CHAPTER 1 A CRITICAL ANALYSIS OF STUART As the passage from "Riding a Raid" on the preceding page suggests, there was a considerable amount

  12. Soviet News and Propaganda Analysis Based on RED STAR (The Official Newspaper of the Soviet Defense Establishment) for the Period 1-30 November 1984. Volume 4, Number 11.

    DTIC Science & Technology

    1984-11-30

    government. * Many innocent women and children are killed as a result of American sponsored military raids into Nicaragua. Fifty-six percent of Red...goals (in regard to the arms race): -- To gain a first-strike advantage. -- To double the number of nuclear weapons. -- To refuse to freeze arms...international issues/events. It addresses the issues important to the political elite.c-- .. Men and women in the Soviet armed forces receive political

  13. Solving the Dilemma of State Responses to Cyberattacks: A Justification for the use of Active Defenses Against States Who Neglect Their Duty to Prevent

    DTIC Science & Technology

    2009-04-01

    resolutions are all forms of state practice. RESTATEMENT (THIRD) OF THE FOREIGN RELATIONS LAW OF THE UNITED STATES § 102 ( 1987 ) [hereinafter...620-21 (quoting the Nicaragua case). But see Mark Baker, Terrorism and the Inherent Right of Self-Defense, 10 HOUS. J. INT’L L. 25,41 ( 1987 ) (raising...BUSINESSWEEK.COM, Dec. 7, 2008, http://www.businessweek.com/bwdaily/dnflash/content/dec2008/ db2008127_817606.htm; Peter Eisler , Raids on Federal Computer

  14. SEDs at Los Alamos: A Personal Memoir

    NASA Astrophysics Data System (ADS)

    Bederson, Benjamin

    2001-03-01

    I have written this personal memoir approximately 55 years after the events I describe. It is based almost exclusively on memory, since apart from the diary I kept while on Tinian, I have few documents concerning it. It covers my service in the U.S. Army's Special Engineering Detachment (SED) in Oak Ridge and Los Alamos in 1944-45, on Tinian island, the launching pad for the bombing raids on Japan, in the summer and fall of 1945, and my return to Los Alamos until my discharge in January 1946.

  15. DEFENSE MANAGEMENT. Industry Practices Can Help Military Exchanges Better Assure That Their Goods Are Not Made by Child or Forced Labor

    DTIC Science & Technology

    2002-01-01

    eliminating sweatshops in the United States. However, we reported on the widespread existence of sweatshops within the United States in the 1980s and 1990s.6...Monte, California, and found sweatshop working conditions-workers were confined behind razor wire fences and forced to work 20 hours a day for 70 cents...association, the El Monte raid provoked a public outcry and galvanized the U.S. government’s efforts against sweatshops . Concern in the United States about

  16. Mahan Goes to War: Effects of World War I on the U.S. Navy’s Force Structure and Operational Planning

    DTIC Science & Technology

    2012-05-17

    War Plan Orange originated from U.S.-Japanese tensions arising from massive Japanese immigration to the U.S. West Coast and racist local policies...Roosevelt suggested adding a second phase in which ships “ originally in the Blue Fleet, could represent a Black force pushing home its attack on our...area except that two divisions of dreadnoughts might be based on Brest for moral effect against anticipated raids by heavy enemy ships in the channel

  17. Tier-2 Optimisation for Computational Density/Diversity and Big Data

    NASA Astrophysics Data System (ADS)

    Fay, R. B.; Bland, J.

    2014-06-01

    As the number of cores on chip continues to trend upwards and new CPU architectures emerge, increasing CPU density and diversity presents multiple challenges to site administrators. These include scheduling for massively multi-core systems (potentially including Graphical Processing Units (GPU), integrated and dedicated) and Many Integrated Core (MIC)) to ensure a balanced throughput of jobs while preserving overall cluster throughput, as well as the increasing complexity of developing for these heterogeneous platforms, and the challenge in managing this more complex mix of resources. In addition, meeting data demands as both dataset sizes increase and as the rate of demand scales with increased computational power requires additional performance from the associated storage elements. In this report, we evaluate one emerging technology, Solid State Drive (SSD) caching for RAID controllers, with consideration to its potential to assist in meeting evolving demand. We also briefly consider the broader developing trends outlined above in order to identify issues that may develop and assess what actions should be taken in the immediate term to address those.

  18. Chemically armed mercenary ants protect fungus-farming societies

    PubMed Central

    Adams, Rachelle M. M.; Liberti, Joanito; Illum, Anders A.; Jones, Tappey H.; Nash, David R.; Boomsma, Jacobus J.

    2013-01-01

    The ants are extraordinary in having evolved many lineages that exploit closely related ant societies as social parasites, but social parasitism by distantly related ants is rare. Here we document the interaction dynamics among a Sericomyrmex fungus-growing ant host, a permanently associated parasitic guest ant of the genus Megalomyrmex, and a raiding agro-predator of the genus Gnamptogenys. We show experimentally that the guest ants protect their host colonies against agro-predator raids using alkaloid venom that is much more potent than the biting defenses of the host ants. Relatively few guest ants are sufficient to kill raiders that invariably exterminate host nests without a cohabiting guest ant colony. We also show that the odor of guest ants discourages raider scouts from recruiting nestmates to host colonies. Our results imply that Sericomyrmex fungus-growers obtain a net benefit from their costly guest ants behaving as a functional soldier caste to meet lethal threats from agro-predator raiders. The fundamentally different life histories of the agro-predators and guest ants appear to facilitate their coexistence in a negative frequency-dependent manner. Because a guest ant colony is committed for life to a single host colony, the guests would harm their own interests by not defending the host that they continue to exploit. This conditional mutualism is analogous to chronic sickle cell anemia enhancing the resistance to malaria and to episodes in human history when mercenary city defenders offered either net benefits or imposed net costs, depending on the level of threat from invading armies. PMID:24019482

  19. Mitochondrial DNA variation in the Viking age population of Norway.

    PubMed

    Krzewińska, Maja; Bjørnstad, Gro; Skoglund, Pontus; Olason, Pall Isolfur; Bill, Jan; Götherström, Anders; Hagelberg, Erika

    2015-01-19

    The medieval Norsemen or Vikings had an important biological and cultural impact on many parts of Europe through raids, colonization and trade, from about AD 793 to 1066. To help understand the genetic affinities of the ancient Norsemen, and their genetic contribution to the gene pool of other Europeans, we analysed DNA markers in Late Iron Age skeletal remains from Norway. DNA was extracted from 80 individuals, and mitochondrial DNA polymorphisms were detected by next-generation sequencing. The sequences of 45 ancient Norwegians were verified as genuine through the identification of damage patterns characteristic of ancient DNA. The ancient Norwegians were genetically similar to previously analysed ancient Icelanders, and to present-day Shetland and Orkney Islanders, Norwegians, Swedes, Scots, English, German and French. The Viking Age population had higher frequencies of K*, U*, V* and I* haplogroups than their modern counterparts, but a lower proportion of T* and H* haplogroups. Three individuals carried haplotypes that are rare in Norway today (U5b1b1, Hg A* and an uncommon variant of H*). Our combined analyses indicate that Norse women were important agents in the overseas expansion and settlement of the Vikings, and that women from the Orkneys and Western Isles contributed to the colonization of Iceland. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  20. Mitochondrial DNA variation in the Viking age population of Norway

    PubMed Central

    Krzewińska, Maja; Bjørnstad, Gro; Skoglund, Pontus; Olason, Pall Isolfur; Bill, Jan; Götherström, Anders; Hagelberg, Erika

    2015-01-01

    The medieval Norsemen or Vikings had an important biological and cultural impact on many parts of Europe through raids, colonization and trade, from about AD 793 to 1066. To help understand the genetic affinities of the ancient Norsemen, and their genetic contribution to the gene pool of other Europeans, we analysed DNA markers in Late Iron Age skeletal remains from Norway. DNA was extracted from 80 individuals, and mitochondrial DNA polymorphisms were detected by next-generation sequencing. The sequences of 45 ancient Norwegians were verified as genuine through the identification of damage patterns characteristic of ancient DNA. The ancient Norwegians were genetically similar to previously analysed ancient Icelanders, and to present-day Shetland and Orkney Islanders, Norwegians, Swedes, Scots, English, German and French. The Viking Age population had higher frequencies of K*, U*, V* and I* haplogroups than their modern counterparts, but a lower proportion of T* and H* haplogroups. Three individuals carried haplotypes that are rare in Norway today (U5b1b1, Hg A* and an uncommon variant of H*). Our combined analyses indicate that Norse women were important agents in the overseas expansion and settlement of the Vikings, and that women from the Orkneys and Western Isles contributed to the colonization of Iceland. PMID:25487335

  1. DSN Beowulf Cluster-Based VLBI Correlator

    NASA Technical Reports Server (NTRS)

    Rogstad, Stephen P.; Jongeling, Andre P.; Finley, Susan G.; White, Leslie A.; Lanyi, Gabor E.; Clark, John E.; Goodhart, Charles E.

    2009-01-01

    The NASA Deep Space Network (DSN) requires a broadband VLBI (very long baseline interferometry) correlator to process data routinely taken as part of the VLBI source Catalogue Maintenance and Enhancement task (CAT M&E) and the Time and Earth Motion Precision Observations task (TEMPO). The data provided by these measurements are a crucial ingredient in the formation of precision deep-space navigation models. In addition, a VLBI correlator is needed to provide support for other VLBI related activities for both internal and external customers. The JPL VLBI Correlator (JVC) was designed, developed, and delivered to the DSN as a successor to the legacy Block II Correlator. The JVC is a full-capability VLBI correlator that uses software processes running on multiple computers to cross-correlate two-antenna broadband noise data. Components of this new system (see Figure 1) consist of Linux PCs integrated into a Beowulf Cluster, an existing Mark5 data storage system, a RAID array, an existing software correlator package (SoftC) originally developed for Delta DOR Navigation processing, and various custom- developed software processes and scripts. Parallel processing on the JVC is achieved by assigning slave nodes of the Beowulf cluster to process separate scans in parallel until all scans have been processed. Due to the single stream sequential playback of the Mark5 data, some ramp-up time is required before all nodes can have access to required scan data. Core functions of each processing step are accomplished using optimized C programs. The coordination and execution of these programs across the cluster is accomplished using Pearl scripts, PostgreSQL commands, and a handful of miscellaneous system utilities. Mark5 data modules are loaded on Mark5 Data systems playback units, one per station. Data processing is started when the operator scans the Mark5 systems and runs a script that reads various configuration files and then creates an experiment-dependent status database used to delegate parallel tasks between nodes and storage areas (see Figure 2). This script forks into three processes: extract, translate, and correlate. Each of these processes iterates on available scan data and updates the status database as the work for each scan is completed. The extract process coordinates and monitors the transfer of data from each of the Mark5s to the Beowulf RAID storage systems. The translate process monitors and executes the data conversion processes on available scan files, and writes the translated files to the slave nodes. The correlate process monitors the execution of SoftC correlation processes on the slave nodes for scans that have completed translation. A comparison of the JVC and the legacy Block II correlator outputs reveals they are well within a formal error, and that the data are comparable with respect to their use in flight navigation. The processing speed of the JVC is improved over the Block II correlator by a factor of 4, largely due to the elimination of the reel-to-reel tape drives used in the Block II correlator.

  2. Revolution from a F.A.R. The Cuban Armed Forces in Africa and the Middle East

    DTIC Science & Technology

    1977-09-01

    UsalmatŘp. s1974, (Ps*tb Sloloff, Peter H.. "User’s Guide for Gurreralteed "Iaro. C.L IXrard 4Mak, 3,l, Bp. Ar Saae 97)A 8 Factor Analysis program...8217Economnic Analysis of the [atrocity DI5ilooedo of Itisinnus. Seesaw D., "Raid Diflompaw ta HowCriminal Activity,’ 30 pp.. Jusn 1974, (Presented atN re t...34ocieessdRteinof P13 Aulpoata. Joseph, "A Crmitiqu of Costl Analysis ,’ ui 49th Annual Conference, Western Economic Astocia AD A 007 912 pp.. Jut 1973, AD

  3. Exclusive inclusion: the violation of human rights and US immigration policy.

    PubMed

    Drevdahl, Denise J; Dorcy, Kathleen Shannon

    2007-01-01

    In this article, we examine US immigration policies relative to those who work as nurses and those who are manual/low-wage laborers. Recruiting foreign nurses from developing countries to alleviate the nursing shortage is a common practice. While specialized visas for these healthcare professionals facilitate the visa application and approval process, immigrants employed in low-wage positions are subjected to long waits for visas, workplace raids, and subsequent deportation. Selective assistance to some immigrants violates basic human rights and global expectations of justice. Moral and ethical frameworks need to guide US immigration policy.

  4. Profiling unauthorized natural resource users for better targeting of conservation interventions

    PubMed Central

    Baker, Julia; Twinamatsiko, Medard; Milner‐Gulland, E.J.

    2015-01-01

    Abstract Unauthorized use of natural resources is a key threat to many protected areas. Approaches to reducing this threat include law enforcement and integrated conservation and development (ICD) projects, but for such ICDs to be targeted effectively, it is important to understand who is illegally using which natural resources and why. The nature of unauthorized behavior makes it difficult to ascertain this information through direct questioning. Bwindi Impenetrable National Park, Uganda, has many ICD projects, including authorizing some local people to use certain nontimber forest resources from the park. However, despite over 25 years of ICD, unauthorized resource use continues. We used household surveys, indirect questioning (unmatched count technique), and focus group discussions to generate profiles of authorized and unauthorized resource users and to explore motivations for unauthorized activity. Overall, unauthorized resource use was most common among people from poor households who lived closest to the park boundary and farthest from roads and trading centers. Other motivations for unauthorized resource use included crop raiding by wild animals, inequity of revenue sharing, and lack of employment, factors that created resentment among the poorest communities. In some communities, benefits obtained from ICD were reported to be the greatest deterrents against unauthorized activity, although law enforcement ranked highest overall. Despite the sensitive nature of exploring unauthorized resource use, management‐relevant insights into the profiles and motivations of unauthorized resource users can be gained from a combination of survey techniques, as adopted here. To reduce unauthorized activity at Bwindi, we suggest ICD benefit the poorest people living in remote areas and near the park boundary by providing affordable alternative sources of forest products and addressing crop raiding. To prevent resentment from driving further unauthorized activity, ICDs should be managed transparently and equitably. PMID:26238261

  5. Impact of climate change on human-wildlife-ecosystem interactions in the Trans-Himalaya region of Nepal

    NASA Astrophysics Data System (ADS)

    Aryal, Achyut; Brunton, Dianne; Raubenheimer, David

    2014-02-01

    The Trans-Himalaya region boasts an immense biodiversity which includes several threatened species and supports the livelihood of local human populations. Our aim in this study was to evaluate the impact of recent climate change on the biodiversity and human inhabitants of the upper Mustang region of the Trans-Himalaya, Nepal. We found that the average annual temperature in the upper Mustang region has increased by 0.13 °C per year over the last 23 years; a higher annual temperature increase than experienced in other parts of Himalaya. A predictive model suggested that the mean annual temperature will double by 2161 to reach 20 °C in the upper Mustang region. The combined effects of increased temperature and diminished snowfall have resulted in a reduction in the area of land suitable for agriculture. Most seriously affected are Samjung village (at 4,100 m altitude) and Dhey village (at 3,800 m) in upper Mustang, where villagers have been forced to relocate to an area with better water availability. Concurrent with the recent change in climate, there have been substantial changes in vegetation communities. Between 1979 and 2009, grasslands and forests in the Mustang district have diminished by 11 and 42 %, respectively, with the tree line having shifted towards higher elevation. Further, grasses and many shrub species are no longer found in abundance at higher elevations and consequently blue sheep ( Pseduois nayaur) move to forage at lower elevations where they encounter and raid human crops. The movement of blue sheep attracts snow leopard ( Panthera uncia) from their higher-elevation habitats to lower sites, where they encounter and depredate livestock. Increased crop raiding by blue sheep and depredations of livestock by snow leopard have impacted adversely on the livelihoods of local people.

  6. A performance analysis of advanced I/O architectures for PC-based network file servers

    NASA Astrophysics Data System (ADS)

    Huynh, K. D.; Khoshgoftaar, T. M.

    1994-12-01

    In the personal computing and workstation environments, more and more I/O adapters are becoming complete functional subsystems that are intelligent enough to handle I/O operations on their own without much intervention from the host processor. The IBM Subsystem Control Block (SCB) architecture has been defined to enhance the potential of these intelligent adapters by defining services and conventions that deliver command information and data to and from the adapters. In recent years, a new storage architecture, the Redundant Array of Independent Disks (RAID), has been quickly gaining acceptance in the world of computing. In this paper, we would like to discuss critical system design issues that are important to the performance of a network file server. We then present a performance analysis of the SCB architecture and disk array technology in typical network file server environments based on personal computers (PCs). One of the key issues investigated in this paper is whether a disk array can outperform a group of disks (of same type, same data capacity, and same cost) operating independently, not in parallel as in a disk array.

  7. The UCL NASA 3D-RPIF Imaging Centre - a status report.

    NASA Astrophysics Data System (ADS)

    Muller, J.-P.; Grindrod, P.

    2013-09-01

    The NASA RPIF (Regional Planetary Imaging Facility) network of 9 US and 8 international centres were originally set-up in 1977 to "maintain photographic and digital data as well as mission documentation and cartographic data. Each facility's general holding contains images and maps of planets and their satellites taken by solar system exploration spacecraft. These planetary image facilities are open to the public. The facilities are primarily reference centers for browsing, studying, and selecting lunar and planetary photographic and cartographic materials. Experienced staff can assist scientists, educators, students, media, and the public in ordering materials for their own use." In parallel, the NASA Planetary Data System (PDS) and ESA Planetary Science Archive (PSA) were set-up to distribute digital data initially on media such as CDROM and DVD but now entirely online. The UK NASA RPIF was the first RPIF to be established outside of the US, in 1980. In [1], the 3D-RPIF is described. Some example products derived using this equipment are illustrated here. In parallel, at MSSL a large linux cluster and associated RAID_based system has been created to act as a mirror PDS Imaging node so that huge numbers of rover imagery (from MER & MSL to begin with) and very high resolution (large size) data is available to users of the RPIF and a variety of EU-FP7 projects based at UCL.

  8. Gibraltar v 1.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    CURRY, MATTHEW LEON; WARD, H. LEE; & SKJELLUM, ANTHONY

    Gibraltar is a library and associated test suite which performs Reed-Solomon coding and decoding of data buffers using graphics processing units which support NVIDIA's CUDA technology. This library is used to generate redundant data allowing for recovery of lost information. For example, a user can generate m new blocks of data from n original blocks, distributing those pieces over n+m devices. If any m devices fail, the contents of those devices can be recovered from the contents of the other n devices, even if some of the original blocks are lost. This is a generalized description of RAID, a techniquemore » for increasing data storage speed and size.« less

  9. Cancer Stem Cells and Chemoresistance: The Smartest Survives the Raid

    PubMed Central

    Zhao, Jihe

    2016-01-01

    Chemoresistant metastatic relapse of minimal residual disease plays a significant role for poor prognosis of cancer. Growing evidence supports a critical role of cancer stem cell (CSC) behind the mechanisms for this deadly disease. This review briefly introduces the basics of the conventional chemotherapies, updates the CSC theories, highlights the molecular and cellular mechanisms by which CSC smartly designs and utilizes multiple lines of self-defense to avoid being killed by chemotherapy, and concisely summarizes recent progress in studies on CSC-targeted therapies in the end, with the hope to help guide future research towards developing more effective therapeutic strategies to eradicate tumor cells in the patients. PMID:26899500

  10. Medical image digital archive: a comparison of storage technologies

    NASA Astrophysics Data System (ADS)

    Chunn, Timothy; Hutchings, Matt

    1998-07-01

    A cost effective, high capacity digital archive system is one of the remaining key factors that will enable a radiology department to eliminate film as an archive medium. The ever increasing amount of digital image data is creating the need for huge archive systems that can reliably store and retrieve millions of images and hold from a few terabytes of data to possibly hundreds of terabytes. Selecting the right archive solution depends on a number of factors: capacity requirements, write and retrieval performance requirements, scaleability in capacity and performance, conformance to open standards, archive availability and reliability, security, cost, achievable benefits and cost savings, investment protection, and more. This paper addresses many of these issues. It compares and positions optical disk and magnetic tape technologies, which are the predominant archive mediums today. New technologies will be discussed, such as DVD and high performance tape. Price and performance comparisons will be made at different archive capacities, plus the effect of file size on random and pre-fetch retrieval time will be analyzed. The concept of automated migration of images from high performance, RAID disk storage devices to high capacity, NearlineR storage devices will be introduced as a viable way to minimize overall storage costs for an archive.

  11. Application of Ni-63 photo and corona discharge ionization for the analysis of chemical warfare agents and toxic wastes

    NASA Technical Reports Server (NTRS)

    Stach, J.; Adler, J.; Brodacki, M.; Doring, H.-R.

    1995-01-01

    Over the past decade, advances in instrumental design and refinements in the understanding of ion molecule reactions at atmospheric pressure enabled the application of Ion Mobility Spectrometry (IMS) as a simple inexpensive and sensitive analytical method for the detection of organic trace compounds. Positive and negative gas-phase ions for ion mobility spectrometry have been produced by a variety of methods, including photo-ionization, laser multi photon ionization, surface ionization, corona discharge ionization. The most common ion source used in ion mobility spectrometry is a radioactive Ni-63 foil which is favored due to simplicity, stability, convenience, and high selectivity. If reactant ions like (H2O(n)H)(+) or (H2O(n)O2)(-) dominate in the reaction region, nearly all kinds of compounds with a given proton or electron affinity; are ionized. However, the radioactivity of the Ni-63 foil is one disadvantage of this ion source that stimulates the development and application of other ionization techniques. In this paper, we report analyses of old chemical warfare agents and toxic wastes using Bruker RAID ion mobility spectrometers. Due to the modular construction of the measuring cell, the spectrometers can be equipped with different ion sources. The combined use of Ni-63, photo- and corona discharge ionization allows the identification of different classes of chemical compounds and yields in most cases comparable results.

  12. Detection of co-eluted peptides using database search methods

    PubMed Central

    Alves, Gelio; Ogurtsov, Aleksey Y; Kwok, Siwei; Wu, Wells W; Wang, Guanghui; Shen, Rong-Fong; Yu, Yi-Kuo

    2008-01-01

    Background Current experimental techniques, especially those applying liquid chromatography mass spectrometry, have made high-throughput proteomic studies possible. The increase in throughput however also raises concerns on the accuracy of identification or quantification. Most experimental procedures select in a given MS scan only a few relatively most intense parent ions, each to be fragmented (MS2) separately, and most other minor co-eluted peptides that have similar chromatographic retention times are ignored and their information lost. Results We have computationally investigated the possibility of enhancing the information retrieval during a given LC/MS experiment by selecting the two or three most intense parent ions for simultaneous fragmentation. A set of spectra is created via superimposing a number of MS2 spectra, each can be identified by all search methods tested with high confidence, to mimick the spectra of co-eluted peptides. The generated convoluted spectra were used to evaluate the capability of several database search methods – SEQUEST, Mascot, X!Tandem, OMSSA, and RAId_DbS – in identifying true peptides from superimposed spectra of co-eluted peptides. We show that using these simulated spectra, all the database search methods will gain eventually in the number of true peptides identified by using the compound spectra of co-eluted peptides. Open peer review Reviewed by Vlad Petyuk (nominated by Arcady Mushegian), King Jordan and Shamil Sunyaev. For the full reviews, please go to the Reviewers' comments section. PMID:18597684

  13. Data storage and retrieval system abstract

    NASA Technical Reports Server (NTRS)

    Matheson, Barbara

    1992-01-01

    The STX mass storage system design is intended for environments requiring high speed access to large volumes of data (terabyte and greater). Prior to commitment to a product design plan, STX conducted an exhaustive study of the commercially available off-the-shelf hardware and software. STX also conducted research into the area of emerging technologies in networks and storage media so that the design could easily accommodate new interfaces and peripherals as they came on the market. All the selected system elements were brought together in a demo suite sponsored jointly by STX and ALLIANT where the system elements were evaluated based on actual operation using a client-server mirror image configuration. Testing was conducted to assess the various component overheads and results were compared against vendor data claims. The resultant system, while adequate to meet our capacity requirements, fell short of transfer speed expectations. A product team lead by STX was assembled and chartered with solving the bottleneck issues. Optimization efforts yielded a 60 percent improvement in throughput performance. The ALLIANT computer platform provided the I/O flexibility needed to accommodate a multitude of peripheral interfaces including the following: up to twelve 25MB/s VME I/O channels; up to five HiPPI I/O full duplex channels; IPI-s, SCSI, SMD, and RAID disk array support; standard networking software support for TCP/IP, NFS, and FTP; open architecture based on standard RISC processors; and V.4/POSIX-based operating system (Concentrix). All components including the software are modular in design and can be reconfigured as needs and system uses change. Users can begin with a small system and add modules as needed in the field. Most add-ons can be accomplished seamlessly without revision, recompilation or re-linking of software.

  14. Data storage and retrieval system abstract

    NASA Astrophysics Data System (ADS)

    Matheson, Barbara

    1992-09-01

    The STX mass storage system design is intended for environments requiring high speed access to large volumes of data (terabyte and greater). Prior to commitment to a product design plan, STX conducted an exhaustive study of the commercially available off-the-shelf hardware and software. STX also conducted research into the area of emerging technologies in networks and storage media so that the design could easily accommodate new interfaces and peripherals as they came on the market. All the selected system elements were brought together in a demo suite sponsored jointly by STX and ALLIANT where the system elements were evaluated based on actual operation using a client-server mirror image configuration. Testing was conducted to assess the various component overheads and results were compared against vendor data claims. The resultant system, while adequate to meet our capacity requirements, fell short of transfer speed expectations. A product team lead by STX was assembled and chartered with solving the bottleneck issues. Optimization efforts yielded a 60 percent improvement in throughput performance. The ALLIANT computer platform provided the I/O flexibility needed to accommodate a multitude of peripheral interfaces including the following: up to twelve 25MB/s VME I/O channels; up to five HiPPI I/O full duplex channels; IPI-s, SCSI, SMD, and RAID disk array support; standard networking software support for TCP/IP, NFS, and FTP; open architecture based on standard RISC processors; and V.4/POSIX-based operating system (Concentrix). All components including the software are modular in design and can be reconfigured as needs and system uses change. Users can begin with a small system and add modules as needed in the field. Most add-ons can be accomplished seamlessly without revision, recompilation or re-linking of software.

  15. PCIE interface design for high-speed image storage system based on SSD

    NASA Astrophysics Data System (ADS)

    Wang, Shiming

    2015-02-01

    This paper proposes and implements a standard interface of miniaturized high-speed image storage system, which combines PowerPC with FPGA and utilizes PCIE bus as the high speed switching channel. Attached to the PowerPC, mSATA interface SSD(Solid State Drive) realizes RAID3 array storage. At the same time, a high-speed real-time image compression patent IP core also can be embedded in FPGA, which is in the leading domestic level with compression rate and image quality, making that the system can record higher image data rate or achieve longer recording time. The notebook memory card buckle type design is used in the mSATA interface SSD, which make it possible to complete the replacement in 5 seconds just using single hand, thus the total length of repeated recordings is increased. MSI (Message Signaled Interrupts) interruption guarantees the stability and reliability of continuous DMA transmission. Furthermore, only through the gigabit network, the remote display, control and upload to backup function can be realized. According to an optional 25 frame/s or 30 frame/s, upload speeds can be up to more than 84 MB/s. Compared with the existing FLASH array high-speed memory systems, it has higher degree of modularity, better stability and higher efficiency on development, maintenance and upgrading. Its data access rate is up to 300MB/s, realizing the high speed image storage system miniaturization, standardization and modularization, thus it is fit for image acquisition, storage and real-time transmission to server on mobile equipment.

  16. Conserving social-ecological systems in Indonesia: human-nonhuman primate interconnections in Bali and Sulawesi.

    PubMed

    Riley, Erin P; Fuentes, Agustín

    2011-01-01

    An important question asked by primatologists and conservationists alike is: what is the relevance of primates and primate conservation for ecosystem conservation? The goal of this article is to contribute to this dialogue by advocating the use of a research perspective that focuses on the dynamics of human-nonhuman primate sympatry and interaction (i.e., ethnoprimatology) in order to better understand complex social-ecological systems and to inform their conservation management. This perspective/approach is based largely on the recognition that human primates are important components of all ecological systems and that niche construction is a fundamental feature of their adaptive success. To demonstrate the relevance of the human-nonhuman primate interface for ecosystem conservation, we provide examples from our research from two islands in the Indonesian archipelago: Bali and Sulawesi. In Bali, humans and long-tail macaques coexist in a system that creates favorable environments for the macaques. This anthropogenic landscape and the economic and ecological relationships between humans and monkeys on Bali provide insight into sustainable systems of human/nonhuman primate coexistence. In Lore Lindu National Park in Central Sulawesi, villagers and Tonkean macaques overlap in their use of both forest and cultivated resources. The finding that the Arenga pinnata palm is extremely important for both villagers and macaques points to a conservation management recommendation that may help protect the overall ecosystem; the cultivation and propagation of mutually important tree species at forest-agricultural ecotone as a means to curb crop raiding and to alleviate farmer's perceived need to clear additional forest.

  17. The mass storage testing laboratory at GSFC

    NASA Technical Reports Server (NTRS)

    Venkataraman, Ravi; Williams, Joel; Michaud, David; Gu, Heng; Kalluri, Atri; Hariharan, P. C.; Kobler, Ben; Behnke, Jeanne; Peavey, Bernard

    1998-01-01

    Industry-wide benchmarks exist for measuring the performance of processors (SPECmarks), and of database systems (Transaction Processing Council). Despite storage having become the dominant item in computing and IT (Information Technology) budgets, no such common benchmark is available in the mass storage field. Vendors and consultants provide services and tools for capacity planning and sizing, but these do not account for the complete set of metrics needed in today's archives. The availability of automated tape libraries, high-capacity RAID systems, and high- bandwidth interconnectivity between processor and peripherals has led to demands for services which traditional file systems cannot provide. File Storage and Management Systems (FSMS), which began to be marketed in the late 80's, have helped to some extent with large tape libraries, but their use has introduced additional parameters affecting performance. The aim of the Mass Storage Test Laboratory (MSTL) at Goddard Space Flight Center is to develop a test suite that includes not only a comprehensive check list to document a mass storage environment but also benchmark code. Benchmark code is being tested which will provide measurements for both baseline systems, i.e. applications interacting with peripherals through the operating system services, and for combinations involving an FSMS. The benchmarks are written in C, and are easily portable. They are initially being aimed at the UNIX Open Systems world. Measurements are being made using a Sun Ultra 170 Sparc with 256MB memory running Solaris 2.5.1 with the following configuration: 4mm tape stacker on SCSI 2 Fast/Wide; 4GB disk device on SCSI 2 Fast/Wide; and Sony Petaserve on Fast/Wide differential SCSI 2.

  18. 32. AERIAL VIEW OF THE ROCKY FLATS PLANT LOOKING NORTHWEST. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    32. AERIAL VIEW OF THE ROCKY FLATS PLANT LOOKING NORTHWEST. DURING THE 1980S, A NUMBER OF COMPLAINTS CONCERNING SAFETY AND ENVIRONMENTAL ERRORS SURFACED, CULMINATING IN THE 1989 RAID ON THE PLANT BY THE FBI FOR ALLEGED ENVIRONMENTAL INFRACTIONS. THAT SAME YEAR, PRODUCTION AT THE PLANT WAS HALTED FOR CORRECTION OF SAFETY DEFICIENCIES. BY 1991, A SERIES OF EVENTS WORLDWIDE REDUCED THE COLD WAR THREAT, AND IN 1992, THE SECRETARY OF ENERGY ANNOUNCED THAT THE MISSION AT THE PLANT WOULD BE CHANGED TO ENVIRONMENTAL RESTORATION AND WASTE MANAGEMENT, WITH THE GOAL OF CLEANING UP THE PLANT AND SITE (1989). - Rocky Flats Plant, Bounded by Indiana Street & Routes 93, 128 & 72, Golden, Jefferson County, CO

  19. Government gas vans and school gas chambers: preparedness and paranoia in Britain, 1936-1941.

    PubMed

    Moshenska, Gabriel

    2010-01-01

    In 1936 the Air Raid Precautions department of the British Home Office instigated a training programme in which members of the public, including school students, were systematically exposed to tear gas. Based around fixed and mobile gas chambers, this training aimed to educate the public in the value and efficacy of their gas masks. Drawing on documentary and oral historical sources, this paper examines the discrepancies between the stated form and aims of these tests, and their practical applications, including some excessively brutal training practices. In the last part of the paper I consider these variations in the context of both the gas panic and the moral panic about children's behaviour in wartime.

  20. 14C dates from Tel Rehov: Iron-Age chronology, pharaohs, and Hebrew kings.

    PubMed

    Bruins, Hendrik J; van der Plicht, Johannes; Mazar, Amihai

    2003-04-11

    Stratified radiocarbon dates provide an independent chronological link between archaeological layers and historical data. The invasion by Pharaoh Shoshenq I (Shishak) is a key historical synchronism, approximately 925 B.C.E., mentioned in both Egyptian inscriptions and the Hebrew Bible. The list of places raided by Shoshenq, mentioned at Karnak (Egypt), includes Rehov (Israel). The site yielded a consistent series of radiocarbon dates from the 12th to 9th century B.C.E. Our results (i) suggest a revised Iron-Age chronology; (ii) date an archaeological stratum to Shoshenq's campaign; (iii) indicate the similarity of "Solomonic" and "Omride" pottery; and (iv) provide correlation with Greece and Cyprus.

  1. Operation Allied Force: The View from Beijing

    DTIC Science & Technology

    2000-01-01

    should “learn and  master”  anti-air-raid,  anti-electronic-war- fare, and anti-information-control operations.19 Information Warfare Reporter Ye  Lu ...also wanted to see whether a strong stimu­ lus   could  provoke  internal  chaos  within China that would cause a change in China’s orientation.31...Ye  Lu ,  “Strategic  Thought  on  Weapons  Development,” Keji Ribao (Beijing), 20 May 1999, in FBIS-CHI-1999-0621; on-line, Internet, 3 July 1999

  2. Fast disk array for image storage

    NASA Astrophysics Data System (ADS)

    Feng, Dan; Zhu, Zhichun; Jin, Hai; Zhang, Jiangling

    1997-01-01

    A fast disk array is designed for the large continuous image storage. It includes a high speed data architecture and the technology of data striping and organization on the disk array. The high speed data path which is constructed by two dual port RAM and some control circuit is configured to transfer data between a host system and a plurality of disk drives. The bandwidth can be more than 100 MB/s if the data path based on PCI (peripheral component interconnect). The organization of data stored on the disk array is similar to RAID 4. Data are striped on a plurality of disk, and each striping unit is equal to a track. I/O instructions are performed in parallel on the disk drives. An independent disk is used to store the parity information in the fast disk array architecture. By placing the parity generation circuit directly on the SCSI (or SCSI 2) bus, the parity information can be generated on the fly. It will affect little on the data writing in parallel on the other disks. The fast disk array architecture designed in the paper can meet the demands of the image storage.

  3. The ins and outs of molecular pathology reporting.

    PubMed

    Tack, Véronique; Dufraing, Kelly; Deans, Zandra C; van Krieken, Han J; Dequeker, Elisabeth M C

    2017-08-01

    The raid evolution in molecular pathology resulting in an increasing complexity requires careful reporting. The need for standardisation is clearer than ever. While synoptic reporting was first used for reporting hereditary genetic diseases, it is becoming more frequent in pathology, especially molecular pathology reports too. The narrative approach is no longer feasible with the growing amount of essential data present on the report, although narrative components are still necessary for interpretation in molecular pathology. On the way towards standardisation of reports, guidelines can be a helpful tool. There are several guidelines that focus on reporting in the field of hereditary diseases, but it is not always feasible to extrapolate these to the reporting of somatic variants in molecular pathology. The rise of multi-gene testing causes challenges for the laboratories. In order to provide a continuous optimisation of the laboratory testing process, including reporting, external quality assessment is essential and has already proven to improve the quality of reports. In general, a clear and concise report for molecular pathology can be created by including elements deemed important by different guidelines, adapting the report to the process flows of the laboratory and integrating the report with the laboratory information management system and the patient record.

  4. Forest fragmentation and selective logging have inconsistent effects on multiple animal-mediated ecosystem processes in a tropical forest.

    PubMed

    Schleuning, Matthias; Farwig, Nina; Peters, Marcell K; Bergsdorf, Thomas; Bleher, Bärbel; Brandl, Roland; Dalitz, Helmut; Fischer, Georg; Freund, Wolfram; Gikungu, Mary W; Hagen, Melanie; Garcia, Francisco Hita; Kagezi, Godfrey H; Kaib, Manfred; Kraemer, Manfred; Lung, Tobias; Naumann, Clas M; Schaab, Gertrud; Templin, Mathias; Uster, Dana; Wägele, J Wolfgang; Böhning-Gaese, Katrin

    2011-01-01

    Forest fragmentation and selective logging are two main drivers of global environmental change and modify biodiversity and environmental conditions in many tropical forests. The consequences of these changes for the functioning of tropical forest ecosystems have rarely been explored in a comprehensive approach. In a Kenyan rainforest, we studied six animal-mediated ecosystem processes and recorded species richness and community composition of all animal taxa involved in these processes. We used linear models and a formal meta-analysis to test whether forest fragmentation and selective logging affected ecosystem processes and biodiversity and used structural equation models to disentangle direct from biodiversity-related indirect effects of human disturbance on multiple ecosystem processes. Fragmentation increased decomposition and reduced antbird predation, while selective logging consistently increased pollination, seed dispersal and army-ant raiding. Fragmentation modified species richness or community composition of five taxa, whereas selective logging did not affect any component of biodiversity. Changes in the abundance of functionally important species were related to lower predation by antbirds and higher decomposition rates in small forest fragments. The positive effects of selective logging on bee pollination, bird seed dispersal and army-ant raiding were direct, i.e. not related to changes in biodiversity, and were probably due to behavioural changes of these highly mobile animal taxa. We conclude that animal-mediated ecosystem processes respond in distinct ways to different types of human disturbance in Kakamega Forest. Our findings suggest that forest fragmentation affects ecosystem processes indirectly by changes in biodiversity, whereas selective logging influences processes directly by modifying local environmental conditions and resource distributions. The positive to neutral effects of selective logging on ecosystem processes show that the functionality of tropical forests can be maintained in moderately disturbed forest fragments. Conservation concepts for tropical forests should thus include not only remaining pristine forests but also functionally viable forest remnants.

  5. Beer is the cattle of women: sorghum beer commercialization and dietary intake of agropastoral families in Karamoja, Uganda.

    PubMed

    Dancause, Kelsey Needham; Akol, Helen A; Gray, Sandra J

    2010-04-01

    Karimojong agropastoralists of Uganda have employed a dual subsistence strategy of cattle herding and sorghum cultivation to survive in an unpredictable environment, one afflicted by a severe humanitarian crisis. Armed raiding since the 1970s has led to devastating cattle losses, high male mortality, and increased sedentarization of women and children in densely populated homesteads, where infectious diseases and malnutrition rates are prevalent. Fieldwork in 1998-1999 confirmed the detrimental effects of armed raiding on child growth and development. During this period, however, women maintained largely traditional subsistence patterns. Follow-up fieldwork in 2004 revealed surprising subsistence changes: sorghum beer, an important food and ritual item, was being brewed for sale, which had not been noted in previous literature on the Karimojong. We outline the role of beer in the diet by analyzing the nutritional profile of Karimojong women and children, nutrients supplied by beer, and those supplied by foodstuffs purchased with sales profits. Commercial beer supplied from 3 to 6% of energy intake, and grains leftover from brewing (dregs) supplied from 3 to 12%. Selling beer was women's preferred form of casual labor, with differing patterns of participation in brewing between rural and peri-urban areas. Women who were paid in currency relied on profits to purchase nutrient-rich supplemental foodstuffs important in an otherwise marginal diet, as well as beer. The households of women who worked for other brewers or purchased beer wholesale and sold it retail relied heavily on dregs for daily subsistence. Nutrient intake was highest among women with cattle and sorghum who brewed and sold beer from their homesteads, and lowest among women who lacked sorghum and worked for commercial brewers in urban centers. Because nutritional status remains marginal in Karamoja, beer commercialization as a consequence of subsistence changes could have dramatic health consequences for women and children. Copyright 2009 Elsevier Ltd. All rights reserved.

  6. Translating patient reported outcome measures: methodological issues explored using cognitive interviewing with three rheumatoid arthritis measures in six European languages.

    PubMed

    Hewlett, Sarah; Nicklin, Joanna; Bode, Chistina; Carmona, Loreto; Dures, Emma; Engelbrecht, Matthias; Hagel, Sofia; Kirwan, John; Molto, Anna; Redondo, Marta; Gossec, Laure

    2016-06-01

    Cross-cultural translation of patient-reported outcome measures (PROMs) is a lengthy process, often performed professionally. Cognitive interviewing assesses patient comprehension of PROMs. The objective was to evaluate the usefulness of cognitive interviewing to assess translations and compare professional (full) with non-professional (simplified) translation processes. A full protocol used for the Bristol RA Fatigue Multi-dimensional Questionnaire and Numerical Rating Scale (BRAF-MDQ, BRAF-NRS) was compared with a simplified protocol used for the RA Impact of Disease scale (RAID). RA patients in the UK, France, the Netherlands, Germany, Spain and Sweden completed the PROMs during cognitive interviewing (BRAFs in the UK were omitted as these were performed during development). Transcripts were deductively analysed for understanding, information retrieval, judgement and response options. Usefulness of cognitive interviewing was assessed by the nature of problems identified, and translation processes by percentage of consistently problematic items (⩾40% patients per country with similar concerns). Sixty patients participated (72% women). For the BRAFs (full protocol) one problematic item was identified (of 23 items × 5 languages, 1/115 = 0.9%). For the RAID (simplified protocol) two problematic items were identified (of 7 items × 6 languages, 2/42 = 4.8%), of which one was revised (Dutch). Coping questions were problematic in both PROMs. Conceptual and cultural challenges though rare were important, as identified by formal evaluation, demonstrating that cognitive interviewing is crucial in PROM translations. Proportionately fewer problematic items were found for the full than for the simplified translation procedure, suggesting that while both are acceptable, professional PROM translation might be preferable. Coping may be a particularly challenging notion cross-culturally. © The Author 2016. Published by Oxford University Press on behalf of the British Society for Rheumatology. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Forest Fragmentation and Selective Logging Have Inconsistent Effects on Multiple Animal-Mediated Ecosystem Processes in a Tropical Forest

    PubMed Central

    Schleuning, Matthias; Farwig, Nina; Peters, Marcell K.; Bergsdorf, Thomas; Bleher, Bärbel; Brandl, Roland; Dalitz, Helmut; Fischer, Georg; Freund, Wolfram; Gikungu, Mary W.; Hagen, Melanie; Garcia, Francisco Hita; Kagezi, Godfrey H.; Kaib, Manfred; Kraemer, Manfred; Lung, Tobias; Schaab, Gertrud; Templin, Mathias; Uster, Dana; Wägele, J. Wolfgang; Böhning-Gaese, Katrin

    2011-01-01

    Forest fragmentation and selective logging are two main drivers of global environmental change and modify biodiversity and environmental conditions in many tropical forests. The consequences of these changes for the functioning of tropical forest ecosystems have rarely been explored in a comprehensive approach. In a Kenyan rainforest, we studied six animal-mediated ecosystem processes and recorded species richness and community composition of all animal taxa involved in these processes. We used linear models and a formal meta-analysis to test whether forest fragmentation and selective logging affected ecosystem processes and biodiversity and used structural equation models to disentangle direct from biodiversity-related indirect effects of human disturbance on multiple ecosystem processes. Fragmentation increased decomposition and reduced antbird predation, while selective logging consistently increased pollination, seed dispersal and army-ant raiding. Fragmentation modified species richness or community composition of five taxa, whereas selective logging did not affect any component of biodiversity. Changes in the abundance of functionally important species were related to lower predation by antbirds and higher decomposition rates in small forest fragments. The positive effects of selective logging on bee pollination, bird seed dispersal and army-ant raiding were direct, i.e. not related to changes in biodiversity, and were probably due to behavioural changes of these highly mobile animal taxa. We conclude that animal-mediated ecosystem processes respond in distinct ways to different types of human disturbance in Kakamega Forest. Our findings suggest that forest fragmentation affects ecosystem processes indirectly by changes in biodiversity, whereas selective logging influences processes directly by modifying local environmental conditions and resource distributions. The positive to neutral effects of selective logging on ecosystem processes show that the functionality of tropical forests can be maintained in moderately disturbed forest fragments. Conservation concepts for tropical forests should thus include not only remaining pristine forests but also functionally viable forest remnants. PMID:22114695

  8. Profiling unauthorized natural resource users for better targeting of conservation interventions.

    PubMed

    Harrison, Mariel; Baker, Julia; Twinamatsiko, Medard; Milner-Gulland, E J

    2015-12-01

    Unauthorized use of natural resources is a key threat to many protected areas. Approaches to reducing this threat include law enforcement and integrated conservation and development (ICD) projects, but for such ICDs to be targeted effectively, it is important to understand who is illegally using which natural resources and why. The nature of unauthorized behavior makes it difficult to ascertain this information through direct questioning. Bwindi Impenetrable National Park, Uganda, has many ICD projects, including authorizing some local people to use certain nontimber forest resources from the park. However, despite over 25 years of ICD, unauthorized resource use continues. We used household surveys, indirect questioning (unmatched count technique), and focus group discussions to generate profiles of authorized and unauthorized resource users and to explore motivations for unauthorized activity. Overall, unauthorized resource use was most common among people from poor households who lived closest to the park boundary and farthest from roads and trading centers. Other motivations for unauthorized resource use included crop raiding by wild animals, inequity of revenue sharing, and lack of employment, factors that created resentment among the poorest communities. In some communities, benefits obtained from ICD were reported to be the greatest deterrents against unauthorized activity, although law enforcement ranked highest overall. Despite the sensitive nature of exploring unauthorized resource use, management-relevant insights into the profiles and motivations of unauthorized resource users can be gained from a combination of survey techniques, as adopted here. To reduce unauthorized activity at Bwindi, we suggest ICD benefit the poorest people living in remote areas and near the park boundary by providing affordable alternative sources of forest products and addressing crop raiding. To prevent resentment from driving further unauthorized activity, ICDs should be managed transparently and equitably. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  9. Pacopampa: Early evidence of violence at a ceremonial site in the northern Peruvian highlands.

    PubMed

    Nagaoka, Tomohito; Uzawa, Kazuhiro; Seki, Yuji; Morales Chocano, Daniel

    2017-01-01

    Pacopampa, a ceremonial complex in Peru's northern highlands, reveals early evidence of trauma in the Middle to Late Formative Period coinciding with the emergence of social stratification in the area. We examine the prevalence of trauma in human remains found at the site and present evidence of the circumstances surrounding the deaths of individuals who lived during the early stages of Andean civilization. The materials are the remains of 104 individuals (38 non-adult and 66 adult) from the Middle to Late Formative Periods. We explored trauma macroscopically and recorded patterns based on skeletons' locations, age at death, sex, social class, and chronology. We detected trauma in remains over the Middle to Late Formative Periods. While the prevalence of trauma was minimal in the Middle Formative Period, skeletons from the subsequent era exhibit more severe disturbances. However, all the skeletons show signs of healing and affected individuals experienced a low degree of trauma. Given the archaeological context (the remains were recovered from sites of ceremonial practices), as well as the equal distribution of trauma among both sexes and a lack of defensive architecture, it is plausible that rituals, rather than organized warfare or raids, caused most of the exhibited trauma. Pacopampa was home to a complex society founded on ritual activity in a ceremonial center: this is indicated by the presence of ritual violence in a society that built impressively large, ceremonial architecture and developed social stratification without any political control of surplus agricultural goods.

  10. Reconstruction of War Damaged Buildings - A Problem that Still Stands. The Case of the National Economy Bank in Warsaw Restored During the Second World War

    NASA Astrophysics Data System (ADS)

    Łotysz, Sławomir

    2016-12-01

    The Polish national historiography remains silent on the reconstruction of damaged towns and cities that was undertaken by the German administration after capturing Poland in September 1939. This paper, on the war-time restoration of the National Economy Bank's headquarters in Warsaw, is an attempt to at least partially fill the gap. Designed by celebrated architect Rudolf Świerczyński in the late 1920s in accordance with contemporary air raid defence regulations, it was bombed and nevertheless seriously damaged during the September Campaign. Under the German management of the bank, the building was reconstructed and even modernized by commissioned Polish engineers.

  11. Agricultural expansion as risk to endangered wildlife: Pesticide exposure in wild chimpanzees and baboons displaying facial dysplasia.

    PubMed

    Krief, Sabrina; Berny, Philippe; Gumisiriza, Francis; Gross, Régine; Demeneix, Barbara; Fini, Jean Baptiste; Chapman, Colin A; Chapman, Lauren J; Seguya, Andrew; Wasswa, John

    2017-11-15

    Prenatal exposure to environmental endocrine disruptors can affect development and induce irreversible abnormalities in both humans and wildlife. The northern part of Kibale National Park, a mid-altitude rainforest in western Uganda, is largely surrounded by industrial tea plantations and wildlife using this area (Sebitoli) must cope with proximity to human populations and their activities. The chimpanzees and baboons in this area raid crops (primarily maize) in neighboring gardens. Sixteen young individuals of the 66 chimpanzees monitored (25%) exhibit abnormalities including reduced nostrils, cleft lip, limb deformities, reproductive problems and hypopigmentation. Each pathology could have a congenital component, potentially exacerbated by environmental factors. In addition, at least six of 35 photographed baboons from a Sebitoli troop (17%) have similar severe nasal deformities. Our inquiries in villages and tea factories near Sebitoli revealed use of eight pesticides (glyphosate, cypermethrin, profenofos, mancozeb, metalaxyl, dimethoate, chlorpyrifos and 2,4-D amine). Chemical analysis of samples collected from 2014 to 2016 showed that mean levels of pesticides in fresh maize stems and seeds, soils, and river sediments in the vicinity of the chimpanzee territory exceed recommended limits. Notably, excess levels were found for total DDT and its metabolite pp'-DDE and for chlorpyrifos in fresh maize seeds and in fish from Sebitoli. Imidacloprid was detected in coated maize seeds planted at the edge the forest and in fish samples from the Sebitoli area, while no pesticides were detected in fish from central park areas. Since some of these pesticides are thyroid hormone disruptors, we postulate that excessive pesticide use in the Sebitoli area may contribute to facial dysplasia in chimpanzees and baboons through this endocrine pathway. Chimpanzees are considered as endangered by IUCN and besides their intrinsic value and status as closely related to humans, they have major economic value in Uganda via ecotourism. Identifying and limiting potential threats to their survival such be a conservation priority. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Redundant disk arrays: Reliable, parallel secondary storage. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Gibson, Garth Alan

    1990-01-01

    During the past decade, advances in processor and memory technology have given rise to increases in computational performance that far outstrip increases in the performance of secondary storage technology. Coupled with emerging small-disk technology, disk arrays provide the cost, volume, and capacity of current disk subsystems, by leveraging parallelism, many times their performance. Unfortunately, arrays of small disks may have much higher failure rates than the single large disks they replace. Redundant arrays of inexpensive disks (RAID) use simple redundancy schemes to provide high data reliability. The data encoding, performance, and reliability of redundant disk arrays are investigated. Organizing redundant data into a disk array is treated as a coding problem. Among alternatives examined, codes as simple as parity are shown to effectively correct single, self-identifying disk failures.

  13. How to avoid deferred-compensation troubles.

    PubMed

    Freeman, Todd I

    2005-06-01

    Executive compensation packages have long included stock options and deferred compensation plans in order to compete for talent. Last year, Congress passed a law in response to the Enron debacle, in which executives were perceived to be protecting their deferred compensation at the expense of employees, creditors, and investors. The new law is designed to protect companies and their shareholders from being raided by the very executives that guided the company to financial ruin. Physicians who are part owners of medical practices need to know about the changes in the law regarding deferred compensation and how to avoid costly tax penalties. This article discusses how the changes affect medical practices as well as steps physician-owned clinics can take to avoid the risk of penalty, such as freezing deferred compensation and creating a new deferred compensation plan.

  14. Evolution of magnetic disk subsystems

    NASA Astrophysics Data System (ADS)

    Kaneko, Satoru

    1994-06-01

    The higher recording density of magnetic disk realized today has brought larger storage capacity per unit and smaller form factors. If the required access performance per MB is constant, the performance of large subsystems has to be several times better. This article describes mainly the technology for improving the performance of the magnetic disk subsystems and the prospects of their future evolution. Also considered are 'crosscall pathing' which makes the data transfer channel more effective, 'disk cache' which improves performance coupling with solid state memory technology, and 'RAID' which improves the availability and integrity of disk subsystems by organizing multiple disk drives in a subsystem. As a result, it is concluded that since the performance of the subsystem is dominated by that of the disk cache, maximation of the performance of the disk cache subsystems is very important.

  15. Next generation PET data acquisition architectures

    NASA Astrophysics Data System (ADS)

    Jones, W. F.; Reed, J. H.; Everman, J. L.; Young, J. W.; Seese, R. D.

    1997-06-01

    New architectures for higher performance data acquisition in PET are proposed. Improvements are demanded primarily by three areas of advancing PET state of the art. First, larger detector arrays such as the Hammersmith ECAT/sup (R/) EXACT HR/sup ++/ exceed the addressing capacity of 32 bit coincidence event words. Second, better scintillators (LSO) make depth-of interaction (DOI) and time-of-flight (TOF) operation more practical. Third, fully optimized single photon attenuation correction requires higher rates of data collection. New technologies which enable the proposed third generation Real Time Sorter (RTS III) include: (1) 80 Mbyte/sec Fibre Channel RAID disk systems, (2) PowerPC on both VMEbus and PCI Local bus, and (3) quadruple interleaved DRAM controller designs. Data acquisition flexibility is enhanced through a wider 64 bit coincidence event word. PET methodology support includes DOI (6 bits), TOF (6 bits), multiple energy windows (6 bits), 512/spl times/512 sinogram indexes (18 bits), and 256 crystal rings (16 bits). Throughput of 10 M events/sec is expected for list-mode data collection as well as both on-line and replay histogramming. Fully efficient list-mode storage for each PET application is provided by real-time bit packing of only the active event word bits. Real-time circuits provide DOI rebinning.

  16. New super-computing facility in RIKEN

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ohta, Shigemi

    1994-12-31

    A new superconductor, Fujitsu VPP500/28, was installed in the Institute of Physical and Chemical Research (RIKEN) at the end of March, 1994. It consists of 28 processing elements (PE`s) connected by a high-speed crossbar switch. The switch is a combination of GaAs and ECL circuitry with peak band width of 800 Mbyte per second. Each PE consists of a GaAs/ECL vector processor with 1.6 Gflops peak speed and 256 Mbyte SRAM local memory. In addition, there are 8 GByte DRAM space, two 100 Gbyte RAID disks and a 10 TByte archive based on SONY File Bank system. The author ranmore » three major benchmarks on this machine: modified LINPACK, lattice QCD and FFT. In the modified LINPACK benchmark, a sustained speed of about 28 Gflops is achieved, by removing the restriction on the size of the matrices. In the lattice QCD benchmark, a sustained speed of about 30 Gflops is achieved for inverting staggered fermion propagation matrix on a 32{sup 4} lattice. In the FFT benchmark, real data of 32, 128, 512, and 2048 MByte are Fourier-transformed. The sustained speed for each is respectively 21, 21, 20, and 19 Gflops. The numbers are obtained after only a few weeks of coding efforts and can be improved further.« less

  17. Wound treatment and selective help in a termite-hunting ant.

    PubMed

    Frank, Erik T; Wehrhahn, Marten; Linsenmair, K Eduard

    2018-02-14

    Open wounds are a major health risk in animals, with species prone to injuries likely developing means to reduce these risks. We therefore analysed the behavioural response towards open wounds on the social and individual level in the termite group-hunting ant Megaponera analis During termite raids, some ants get injured by termite soldiers (biting off extremities), after the fight injured ants get carried back to the nest by nest-mates. We observed treatment of the injury by nest-mates inside the nest through intense allogrooming at the wound. Lack of treatment increased mortality from 10% to 80% within 24 h, most likely due to infections. Wound clotting occurred extraordinarily fast in untreated injured individuals, within 10 min. Furthermore, heavily injured ants (loss of five extremities) were not rescued or treated; this was regulated not by the helper but by the unresponsiveness of the injured ant. Interestingly, lightly injured ants behaved 'more injured' near nest-mates. We show organized social wound treatment in insects through a multifaceted help system focused on injured individuals. This was not only limited to selective rescuing of lightly injured individuals by carrying them back (thus reducing predation risk), but, moreover, included a differentiated treatment inside the nest. © 2018 The Author(s).

  18. In vitro and in vivo comparison of binding of 99m-Tc-labeled anti-CEA MAb F33-104 with 99m-Tc-labeled anti-CEA MAb BW431/26.

    PubMed

    Watanabe, N; Oriuchi, N; Sugiyama, S; Kuroki, M; Matsuoka, Y; Tanada, S; Murata, H; Inoue, T; Sasaki, Y

    1999-01-01

    The purpose of this study was to assess the potential for radio-immunodetection (RAID) of murine anti-carcinoembryonic antigen (CEA) monoclonal antibody (MAb) F33-104 labeled with technetium-99m (99m-Tc) by a reduction-mediated labeling method. The binding capacity of 99m-Tc-labeled anti-CEA MAb F33-104 with CEA by means of in vitro procedures such as immunoradiometric assay and cell binding assay and the biodistribution of 99m-Tc-labeled anti-CEA MAb F33-104 in normal nude mice and nude mice bearing human colon adenocarcinoma LS180 tumor were investigated and compared with 99m-Tc-labeled anti-CEA MAb BW431/26. The in vitro binding rate of 99m-Tc-labeled anti-CEA MAb F33-104 with CEA in solution and attached to the cell membrane was significantly higher than 99m-Tc-labeled anti-CEA MAb BW431/261 (31.4 +/- 0.95% vs. 11.9 +/- 0.55% at 100 ng/mL of soluble CEA, 83.5 +/- 2.84% vs. 54.0 +/- 2.54% at 10(7) of LS 180 cells). In vivo, accumulation of 99m-Tc-labeled anti-CEA MAb F33-104 was higher at 18 h postinjection than 99m-Tc-labeled anti-CEA MAb BW431/26 (20.1 +/- 3.50% ID/g vs. 14.4 +/- 3.30% ID/g). 99m-Tc-activity in the kidneys of nude mice bearing tumor was higher at 18 h postinjection than at 3 h (12.8 +/- 2.10% ID/g vs. 8.01 +/- 2.40% ID/g of 99m-Tc-labeled anti-CEA MAb F33-104, 10.7 +/- 1.70% ID/g vs. 8.10 +/- 1.75% ID/g of 99m-Tc-labeled anti-CEA MAb BW431/26). 99m-Tc-labeled anti-CEA MAb F33-104 is a potential novel agent for RAID of recurrent colorectal cancer.

  19. Pacopampa: Early evidence of violence at a ceremonial site in the northern Peruvian highlands

    PubMed Central

    Uzawa, Kazuhiro; Seki, Yuji; Morales Chocano, Daniel

    2017-01-01

    Objectives Pacopampa, a ceremonial complex in Peru’s northern highlands, reveals early evidence of trauma in the Middle to Late Formative Period coinciding with the emergence of social stratification in the area. We examine the prevalence of trauma in human remains found at the site and present evidence of the circumstances surrounding the deaths of individuals who lived during the early stages of Andean civilization. Materials and methods The materials are the remains of 104 individuals (38 non-adult and 66 adult) from the Middle to Late Formative Periods. We explored trauma macroscopically and recorded patterns based on skeletons’ locations, age at death, sex, social class, and chronology. Results We detected trauma in remains over the Middle to Late Formative Periods. While the prevalence of trauma was minimal in the Middle Formative Period, skeletons from the subsequent era exhibit more severe disturbances. However, all the skeletons show signs of healing and affected individuals experienced a low degree of trauma. Discussion Given the archaeological context (the remains were recovered from sites of ceremonial practices), as well as the equal distribution of trauma among both sexes and a lack of defensive architecture, it is plausible that rituals, rather than organized warfare or raids, caused most of the exhibited trauma. Pacopampa was home to a complex society founded on ritual activity in a ceremonial center: this is indicated by the presence of ritual violence in a society that built impressively large, ceremonial architecture and developed social stratification without any political control of surplus agricultural goods. PMID:28957380

  20. How Belfius Bank's response to the terrorist attacks in Brussels helped embed business continuity in the company culture.

    PubMed

    Jappens, Ludo

    2017-01-01

    Until 2015, major terrorist incidents in Belgium were considered a 'black swan'. However, the suicide attacks in Paris on 13th November, 2015 provided a wake-up call. Investigations revealed that the raid was prepared in Belgium by jihadists who grew up in Brussels and was coordinated by Belgian ISIS fighters in Syria. In an instant, it became clear that terror had been embedded in Belgian society and could erupt at any moment. At Belfius Bank Belgium, the subsequent months were a rollercoaster ride of terrorist-related events. Business activities were strongly affected, as the company's head office is located in the centre of Brussels. This paper focuses on the way Belfius responded to the events and how the lessons learned have helped to improve its business continuity and crisis management capability.

  1. Eye-fixation patterns of high- and low-span young and older adults: down the garden path and back again.

    PubMed

    Kemper, Susan; Crow, Angela; Kemtes, Karen

    2004-03-01

    Young and older adults' eye fixations were monitored as they read sentences with temporary ambiguities such as "The experienced soldiers warned about the dangers conducted the midnight raid." Their fixation patterns were similar except that older adults made many regressions. In a 2nd experiment, high- and low-span older adults were compared with high- and low-span young adults. Pint-pass fixations were similar, except low-span readers made many regressions and their total fixation times were longer. High-span readers also used the focus operator "only" (e.g., "Only experienced soldiers warned about the dangers.") to immediately resolve the temporary ambiguities. No age group differences were observed. These results are discussed with reference to theories of the role of working memory in sentence processing.

  2. Problem Reporting System

    NASA Technical Reports Server (NTRS)

    Potter, Don; Serian, Charles; Sweet, Robert; Sapir, Babak; Gamez, Enrique; Mays, David

    2008-01-01

    The Problem Reporting System (PRS) is a Web application, running on two Web servers (load-balanced) and two database servers (RAID-5), which establishes a system for submission, editing, and sharing of reports to manage risk assessment of anomalies identified in NASA's flight projects. PRS consolidates diverse anomaly-reporting systems, maintains a rich database set, and incorporates a robust engine, which allows tracking of any hardware, software, or paper process by configuring an appropriate life cycle. Global and specific project administration and setup tools allow lifecycle tailoring, along with customizable controls for user, e-mail, notifications, and more. PRS is accessible via the World Wide Web for authorized user at most any location. Upon successful log-in, the user receives a customizable window, which displays time-critical 'To Do' items (anomalies requiring the user s input before the system moves the anomaly to the next phase of the lifecycle), anomalies originated by the user, anomalies the user has addressed, and custom queries that can be saved for future use. Access controls exist depending on a user's role as system administrator, project administrator, user, or developer, and then, further by association with user, project, subsystem, company, or item with provisions for business-to-business exclusions, limitations on access according to the covert or overt nature of a given project, all with multiple layers of filtration, as needed. Reporting of metrics is built in. There is a provision for proxy access (in which the user may choose to grant one or more other users to view screens and perform actions as though they were the user, during any part of a tracking life cycle - especially useful during tight build schedules and vacations to keep things moving). The system also provides users the ability to have an anomaly link to or notify other systems, including QA Inspection Reports, Safety, GIDEP (Government-Industry Data Exchange Program) Alert, Corrective Actions, and Lessons Learned. The PRS tracking engine was designed as a very extensible and scalable system, able to support additional applications, with future development possibilities already discussed, including Incident Surprise Anomalies (for anomalies occurring during Operations phases of NASA Flight projects), GIDEP and NASA Alerts, and others.

  3. Neurological problems of jazz legends.

    PubMed

    Pearl, Phillip L

    2009-08-01

    A variety of neurological problems have affected the lives of giants in the jazz genre. Cole Porter courageously remained prolific after severe leg injuries secondary to an equestrian accident, until he succumbed to osteomyelitis, amputations, depression, and phantom limb pain. George Gershwin resisted explanations for uncinate seizures and personality change and herniated from a right temporal lobe brain tumor, which was a benign cystic glioma. Thelonious Monk had erratic moods, reflected in his pianism, and was ultimately mute and withdrawn, succumbing to cerebrovascular events. Charlie Parker dealt with mood lability and drug dependence, the latter emanating from analgesics following an accident, and ultimately lived as hard as he played his famous bebop saxophone lines and arpeggios. Charles Mingus hummed his last compositions into a tape recorder as he died with motor neuron disease. Bud Powell had severe posttraumatic headaches after being struck by a police stick defending Thelonious Monk during a Harlem club raid.

  4. Examining Player Anger in World of Warcraft

    NASA Astrophysics Data System (ADS)

    Barnett, Jane; Coulson, Mark; Foreman, Nigel

    This questionnaire study of the sources of anger in World of Warcraft applies classical quantitative measurement scale construction to a new problem, generating a host of questionnaire items that could find use in future studies, and identifying four major categories of events that cause negative effect among players. First, 33 players provided examples of in-game scenarios that had made them angry, and their responses were culled to create a 93-item battery rated by hundreds of player respondents in terms of anger intensity and anger frequency. An iterative process of factor analysis and scale reliability assessment led to a 28-item instrument measuring four anger-provoking factors: Raids/Instances, Griefers, Perceived Time Wasting, and Anti-social Players. These anger-causing scenarios were then illustrated by concrete examples from player and researcher experiences in World of Warcraft. One striking finding is that players become angry at other players' negative behavior, regardless of whether that behavior was intended to harm.

  5. A hierarchical storage management (HSM) scheme for cost-effective on-line archival using lossy compression.

    PubMed

    Avrin, D E; Andriole, K P; Yin, L; Gould, R G; Arenson, R L

    2001-03-01

    A hierarchical storage management (HSM) scheme for cost-effective on-line archival of image data using lossy compression is described. This HSM scheme also provides an off-site tape backup mechanism and disaster recovery. The full-resolution image data are viewed originally for primary diagnosis, then losslessly compressed and sent off site to a tape backup archive. In addition, the original data are wavelet lossy compressed (at approximately 25:1 for computed radiography, 10:1 for computed tomography, and 5:1 for magnetic resonance) and stored on a large RAID device for maximum cost-effective, on-line storage and immediate retrieval of images for review and comparison. This HSM scheme provides a solution to 4 problems in image archiving, namely cost-effective on-line storage, disaster recovery of data, off-site tape backup for the legal record, and maximum intermediate storage and retrieval through the use of on-site lossy compression.

  6. Health support for the Raid of the Seven Stones : in the footsteps of Navy physician Jules Crevaux in French Guiana.

    PubMed

    Barthes, N; Boudsocq, J-P

    2017-06-01

    In the summer of 2015, soldiers of the 3rd Foreign Infantry Regiment and civilian scientists mounted a joint expedition on foot to reconnoiter and better define the southern frontier of French Guiana with Brazil. Three doctor-nurse pairs worked in relay to provide medical support for this unprecedented 42-day, 320-km journey through a hostile and isolated environment, a mission whose success was made possible by large-scale logistic and technical prowess. The army health department, using knowledge gained from previous large-scale missions and expeditions and from its staff's local experience, provided its technical support for personnel selection, organization of the health logistics, and field support. This article describes the difficulties encountered from a medical perspective, the diseases encountered, and the final assessments of the personnel who completed this expedition.

  7. Spatial assessment of attitudes toward tigers in Nepal.

    PubMed

    Carter, Neil H; Riley, Shawn J; Shortridge, Ashton; Shrestha, Binoj K; Liu, Jianguo

    2014-03-01

    In many regions around the world, wildlife impacts on people (e.g., crop raiding, attacks on people) engender negative attitudes toward wildlife. Negative attitudes predict behaviors that undermine wildlife management and conservation efforts (e.g., by exacerbating retaliatory killing of wildlife). Our study (1) evaluated attitudes of local people toward the globally endangered tiger (Panthera tigris) in Nepal's Chitwan National Park; and (2) modeled and mapped spatial clusters of attitudes toward tigers. Factors characterizing a person's position in society (i.e., socioeconomic and cultural factors) influenced attitudes toward tigers more than past experiences with tigers (e.g., livestock attacks). A spatial cluster of negative attitudes toward tigers was associated with concentrations of people with less formal education, people from marginalized ethnic groups, and tiger attacks on people. Our study provides insights and descriptions of techniques to improve attitudes toward wildlife in Chitwan and many regions around the world with similar conservation challenges.

  8. The Advantages of Parametric Modeling for the Reconstruction of Historic Buildings. The Example of the in War Destroyed Church of ST. Catherine (katharinenkirche) in Nuremberg

    NASA Astrophysics Data System (ADS)

    Ludwig, M.; Herbst, G.; Rieke-Zapp, D.; Rosenbauer, R.; Rutishauser, S.; Zellweger, A.

    2013-02-01

    Consecrated in 1297 as the monastery church of the four years earlier founded St. Catherine's monastery, the Gothic Church of St. Catherine was largely destroyed in a devastating bombing raid on January 2nd 1945. To counteract the process of disintegration, the departments of geo-information and lower monument protection authority of the City of Nuremburg decided to getting done a three dimensional building model of the Church of St. Catherine's. A heterogeneous set of data was used for preparation of a parametric architectural model. In effect the modeling of historic buildings can profit from the so called BIM method (Building Information Modeling), as the necessary structuring of the basic data renders it into very sustainable information. The resulting model is perfectly suited to deliver a vivid impression of the interior and exterior of this former mendicant orders' church to present observers.

  9. Dealing with pollution from conflict: Analysis of discourses around the 2006 Lebanon oil spill.

    PubMed

    Takshe, Aseel A; Huby, Meg; Frantzi, Sofia; Lovett, Jon C

    2010-01-01

    In July 2006 a war between Lebanon and Israel resulted in severe environmental damage in Lebanon from Israeli bombing raids. An attack on the Lebanese Jiyyeh Power Plant released 15,000 tons of heavy fuel oil into the Mediterranean Sea. Remarkably, a clean-up operation was effected despite a continued state of war and lack of capacity in the Lebanese government. Civil society environmentalists played a key role in dealing with the pollution and complying with pollution-control legislation. In this study we use Q-methodology to analyse discourses on the effectiveness of pollution legislation during times of conflict using the Jiyyeh oil spill as an example. We interviewed 35 people from eight different stakeholder groups involved in environmental issues. Five distinct discourses were generated covering compensation schemes, need for new legislation, role of stakeholders during wartime and strengthening government ministries. Copyright 2009 Elsevier Ltd. All rights reserved.

  10. Re-caching by Western scrub-jays (Aphelocoma californica) cannot be attributed to stress.

    PubMed

    Thom, James M; Clayton, Nicola S

    2013-01-01

    Western scrub-jays (Aphelocoma californica) live double lives, storing food for the future while raiding the stores of other birds. One tactic scrub-jays employ to protect stores is "re-caching"-relocating caches out of sight of would-be thieves. Recent computational modelling work suggests that re-caching might be mediated not by complex cognition, but by a combination of memory failure and stress. The "Stress Model" asserts that re-caching is a manifestation of a general drive to cache, rather than a desire to protect existing stores. Here, we present evidence strongly contradicting the central assumption of these models: that stress drives caching, irrespective of social context. In Experiment (i), we replicate the finding that scrub-jays preferentially relocate food they were watched hiding. In Experiment (ii) we find no evidence that stress increases caching. In light of our results, we argue that the Stress Model cannot account for scrub-jay re-caching.

  11. IBM Demonstrates a General-Purpose, High-Performance, High-Availability Cloud-Hosted Data Distribution System With Live GOES-16 Weather Satellite Data

    NASA Astrophysics Data System (ADS)

    Snyder, P. L.; Brown, V. W.

    2017-12-01

    IBM has created a general purpose, data-agnostic solution that provides high performance, low data latency, high availability, scalability, and persistent access to the captured data, regardless of source or type. This capability is hosted on commercially available cloud environments and uses much faster, more efficient, reliable, and secure data transfer protocols than the more typically used FTP. The design incorporates completely redundant data paths at every level, including at the cloud data center level, in order to provide the highest assurance of data availability to the data consumers. IBM has been successful in building and testing a Proof of Concept instance on our IBM Cloud platform to receive and disseminate actual GOES-16 data as it is being downlinked. This solution leverages the inherent benefits of a cloud infrastructure configured and tuned for continuous, stable, high-speed data dissemination to data consumers worldwide at the downlink rate. It also is designed to ingest data from multiple simultaneous sources and disseminate data to multiple consumers. Nearly linear scalability is achieved by adding servers and storage.The IBM Proof of Concept system has been tested with our partners to achieve in excess of 5 Gigabits/second over public internet infrastructure. In tests with live GOES-16 data, the system routinely achieved 2.5 Gigabits/second pass-through to The Weather Company from the University of Wisconsin-Madison SSEC. Simulated data was also transferred from the Cooperative Institute for Climate and Satellites — North Carolina to The Weather Company, as well. The storage node allocated to our Proof of Concept system as tested was sized at 480 Terabytes of RAID protected disk as a worst case sizing to accommodate the data from four GOES-16 class satellites for 30 days in a circular buffer. This shows that an abundance of performance and capacity headroom exists in the IBM design that can be applied to additional missions.

  12. Responses to alternative rainfall regimes and antipoaching in a migratory system.

    PubMed

    Holdo, Ricardo M; Galvin, Kathleen A; Knapp, Eli; Polasky, Stephen; Hilborn, Ray; Holt, Robert D

    2010-03-01

    Migratory ungulates may be particularly vulnerable to the challenges imposed by growing human populations and climate change. These species depend on vast areas to sustain their migratory behavior, and in many cases come into frequent contact with human populations outside protected areas. They may also act as spatial coupling agents allowing feedbacks between ecological systems and local economies, particularly in the agropastoral subsistence economies found in the African savanna biome. We used HUMENTS, a spatially realistic socioecological model of the Greater Serengeti Ecosystem in East Africa, to explore the potential impacts of changing climate and poaching on the migratory wildebeest (Connochaetes taurinus) population, the fire regime, and habitat structure in the ecosystem, as well as changes in the size and economic activities of the human population outside the protected area. Unlike earlier models, the HUMENTS model predicted only moderate declines in the wildebeest population associated with an increasing human population over the next century, with a gradual expansion of agriculture, more poaching, and increases in fire frequency and reduced tree density. Changes in rainfall were predicted to have strong asymmetric effects on the size and economic activity of the human population and on livestock, and more moderate effects on wildlife and other ecological indicators. Conversely, antipoaching had a stronger effect on the ecological portion of the system because of its effect on wildebeest (and therefore on fire and habitat structure), and a weaker effect on the socioeconomic component, except in areas directly adjacent to the protected-area boundary, which were affected by crop-raiding and the availability of wildlife as a source of income. The results highlight the strong direct and indirect effects of rainfall on the various components of socioecological systems in semiarid environments, and the key role of mobile wildlife populations as agents of spatial coupling between the human-dominated and natural portions of ecosystems. They also underscore the fundamental importance of considering the spatial configuration of hunting refuges across the landscape in relation to human populations.

  13. Continuing quality improvement procedures for a clinical PACS.

    PubMed

    Andriole, K P; Gould, R G; Avrin, D E; Bazzill, T M; Yin, L; Arenson, R L

    1998-08-01

    The University of California at San Francisco (USCF) Department of Radiology currently has a clinically operational picture archiving and communication system (PACS) that is thirty-five percent filmless, with the goal of becoming seventy-five percent filmless within the year. The design and implementation of the clinical PACS has been a collaborative effort between an academic research laboratory and a commercial vendor partner. Images are digitally acquired from three computed radiography (CR) scanners, five computed tomography (CT) scanners, five magnetic resonance (MR) imagers, three digital fluoroscopic rooms, an ultrasound mini-PACS and a nuclear medicine mini-PACS. The DICOM (Digital Imaging and Communications in Medicine) standard communications protocol and image format is adhered to throughout the PACS. Images are archived in hierarchical staged fashion, on a RAID (redundant array of inexpensive disks) and on magneto-optical disk jukeboxes. The clinical PACS uses an object-oriented Oracle SQL (systems query language) database, and interfaces to the Radiology Information System using the HL7 (Health Languages 7) standard. Components are networked using a combination of switched and fast ethernet, and ATM (asynchronous transfer mode), all over fiber optics. The wide area network links six UCSF sites in San Francisco. A combination of high and medium resolution dual-monitor display stations have been placed throughout the Department of Radiology, the Emergency Department (ED) and Intensive Care Units (ICU). A continuing quality improvement (CQI) committee has been formed to facilitate the PACS installation and training, workflow modifications, quality assurance and clinical acceptance. This committee includes radiologists at all levels (resident, fellow, attending), radiology technologists, film library personnel, ED and ICU clinician end-users, and PACS team members. The CQI committee has proved vital in the creation of new management procedures, providing a means for user feedback and education, and contributing to the overall acceptance of, and user satisfaction with the system. Well developed CQI procedures have been essential to the successful clinical operation of the PACS as UCSF Radiology moves toward a filmless department.

  14. Real-time shipboard displays for science operation and planning on CGC Healy

    NASA Astrophysics Data System (ADS)

    Roberts, S.; Chayes, D.; Arko, R.

    2007-12-01

    To facilitate effective science planning and decision making, we have developed a real-time geospatial browser and other displays widely used by many if not all members of USCGC Healy's science cruises and some officers and crew since 2004. In order to enable a 'zero-configuration' experience to the end user with nearly any modern browser, on any platform, anywhere on the ship with wired (or wireless) network access, we chose a Web-based/server-centric approach that provides a very low barrier to access in an environment where we have many participants constantly coming and going, often with their own computers. The principle interface for planning and operational decision making is a georeferenced, Web-based user interface built on the MapServer Web GIS platform developed at the University of Minnesota (http://mapserver.gis.umn.edu/), using the PostGIS spatial database extensions (http://postgis.refractions.net/) to enable live database connectivity. Data available include current ship position and orientation, historical ship tracks and data, seafloor bathymetry, station locations, RADARSAT, and subbottom profiles among others. In addition to the user interfaces that are part of individual instrumentation (such as the sonars and navigation systems), custom interfaces have been developed to centralize data with high update rates such as sea surface temperature, vessel attitude, position, etc. Underlying data acquisition and storage is provided by the Lamont Data System (LDS) and the NOAA SCS system. All data are stored on RAIDed disk systems and shared across a switched network with a gigabit fiber backbone. The real-time displays access data in a number of ways including real-time UDP datagrams from LDS, accessing files on disk, and querying a PostgreSQL relational backend. This work is supported by grants from the U.S. National Science Foundation, Office of Polar Programs, Arctic Science section.

  15. American black bears and bee yard depredation at Okefenokee Swamp, Georgia

    USGS Publications Warehouse

    Clark, J.D.; Dobey, S.; Masters, D.V.; Scheick, B.K.; Pelton, M.R.; Sunquist, M.E.

    2005-01-01

    We studied American black bears (Ursus americanus), on the northwest periphery of Okefenokee Swamp in southeast Georgia, to assess landowner attitudes toward bears, estimate the extent of damage to commercial honey bee operations by bears, and evaluate methods to reduce bear depredations to apiaries. We collected 8,351 black bear radiolocations and identified 51 bee yards on our study area. Twenty-seven of 43 home ranges contained ≥1 bee yard, averaging 11.3 and 5.1 bee yards/home range of males (n = 7) and females (n = 20), respectively. From 1996 to 1998, we documented 7 instances of bears raiding bee yards within our study area and 6 instances in adjacent areas. All but 1 of the 13 raided yards were enclosed by electric fencing. In the 12 cases of damage to electrically fenced yards, however, the fences were not active because of depleted batteries. Based on compositional analysis, bear use of areas 800–1,400 m from bee yards was disproportionately greater than use 0–800 m from bee yards. Bears disproportionately used bay (red bay: Persea borbonia, loblolly bay: Gordonia lasianthus, and southern magnolia: Magnolia virginia), gum (water tupelo: Nyssa aquatic and black gum: N. sylvatica), and cypress (Taxodium spp.) and loblolly bay habitats, however, compared with slash pine (Pinus elliottii) or pine–oak (Quercus spp.), where bee yards usually were placed. The distribution of bear radiolocations likely reflected the use of those swamp and riparian areas, rather than avoidance of bee yards. Distances to streams from damaged bee yards (x̄ = 1,750 m) were less than from undamaged yards (x̄ = 4,442 m), and damaged bee yards were closer to unimproved roads (x̄ = 134 m) than were undamaged bee yards (x̄ = 802 m). Our analysis suggests that bee yard placement away from bear travel routes (such as streams and unimproved roads) can reduce bear depredation problems. Our results strongly indicate that working electric fences are effective deterrents to bear damage to bee yards, even in areas frequented by bears. A survey of beekeepers indicated that apiarists often relied on more expensive, less effective, and sometimes illegal methods to protect their bee yards from bears. Beekeepers within bear range should be urged to consider electric fencing, which can almost eliminate bear damage to their yards.

  16. Read-Write-Codes: An Erasure Resilient Encoding System for Flexible Reading and Writing in Storage Networks

    NASA Astrophysics Data System (ADS)

    Mense, Mario; Schindelhauer, Christian

    We introduce the Read-Write-Coding-System (RWC) - a very flexible class of linear block codes that generate efficient and flexible erasure codes for storage networks. In particular, given a message x of k symbols and a codeword y of n symbols, an RW code defines additional parameters k ≤ r,w ≤ n that offer enhanced possibilities to adjust the fault-tolerance capability of the code. More precisely, an RWC provides linear left(n,k,dright)-codes that have (a) minimum distance d = n - r + 1 for any two codewords, and (b) for each codeword there exists a codeword for each other message with distance of at most w. Furthermore, depending on the values r,w and the code alphabet, different block codes such as parity codes (e.g. RAID 4/5) or Reed-Solomon (RS) codes (if r = k and thus, w = n) can be generated. In storage networks in which I/O accesses are very costly and redundancy is crucial, this flexibility has considerable advantages as r and w can optimally be adapted to read or write intensive applications; only w symbols must be updated if the message x changes completely, what is different from other codes which always need to rewrite y completely as x changes. In this paper, we first state a tight lower bound and basic conditions for all RW codes. Furthermore, we introduce special RW codes in which all mentioned parameters are adjustable even online, that is, those RW codes are adaptive to changing demands. At last, we point out some useful properties regarding safety and security of the stored data.

  17. SAN/CXFS test report to LLNL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruwart, T M; Eldel, A

    2000-01-01

    The primary objectives of this project were to evaluate the performance of the SGI CXFS File System in a Storage Area Network (SAN) and compare/contrast it to the performance of a locally attached XFS file system on the same computer and storage subsystems. The University of Minnesota participants were asked to verify that the performance of the SAN/CXFS configuration did not fall below 85% of the performance of the XFS local configuration. There were two basic hardware test configurations constructed from the following equipment: Two Onyx 2 computer systems each with two Qlogic-based Fibre Channel/XIO Host Bus Adapter (HBA); Onemore » 8-Port Brocade Silkworm 2400 Fibre Channel Switch; and Four Ciprico RF7000 RAID Disk Arrays populated Seagate Barracuda 50GB disk drives. The Operating System on each of the ONYX 2 computer systems was IRIX 6.5.6. The first hardware configuration consisted of directly connecting the Ciprico arrays to the Qlogic controllers without the Brocade switch. The purpose for this configuration was to establish baseline performance data on the Qlogic controllers / Ciprico disk raw subsystem. This baseline performance data would then be used to demonstrate any performance differences arising from the addition of the Brocade Fibre Channel Switch. Furthermore, the performance of the Qlogic controllers could be compared to that of the older, Adaptec-based XIO dual-channel Fibre Channel adapters previously used on these systems. It should be noted that only raw device tests were performed on this configuration. No file system testing was performed on this configuration. The second hardware configuration introduced the Brocade Fibre Channel Switch. Two FC ports from each of the ONYX2 computer systems were attached to four ports of the switch and the four Ciprico arrays were attached to the remaining four. Raw disk subsystem tests were performed on the SAN configuration in order to demonstrate the performance differences between the direct-connect and the switched configurations. After this testing was completed, the Ciprico arrays were formatted with an XFS file system and performance numbers were gathered to establish a File System Performance Baseline. Finally, the disks were formatted with CXFS and further tests were run to demonstrate the performance of the CXFS file system. A summary of the results of these tests is given.« less

  18. Tutorial: Performance and reliability in redundant disk arrays

    NASA Technical Reports Server (NTRS)

    Gibson, Garth A.

    1993-01-01

    A disk array is a collection of physically small magnetic disks that is packaged as a single unit but operates in parallel. Disk arrays capitalize on the availability of small-diameter disks from a price-competitive market to provide the cost, volume, and capacity of current disk systems but many times their performance. Unfortunately, relative to current disk systems, the larger number of components in disk arrays leads to higher rates of failure. To tolerate failures, redundant disk arrays devote a fraction of their capacity to an encoding of their information. This redundant information enables the contents of a failed disk to be recovered from the contents of non-failed disks. The simplest and least expensive encoding for this redundancy, known as N+1 parity is highlighted. In addition to compensating for the higher failure rates of disk arrays, redundancy allows highly reliable secondary storage systems to be built much more cost-effectively than is now achieved in conventional duplicated disks. Disk arrays that combine redundancy with the parallelism of many small-diameter disks are often called Redundant Arrays of Inexpensive Disks (RAID). This combination promises improvements to both the performance and the reliability of secondary storage. For example, IBM's premier disk product, the IBM 3390, is compared to a redundant disk array constructed of 84 IBM 0661 3 1/2-inch disks. The redundant disk array has comparable or superior values for each of the metrics given and appears likely to cost less. In the first section of this tutorial, I explain how disk arrays exploit the emergence of high performance, small magnetic disks to provide cost-effective disk parallelism that combats the access and transfer gap problems. The flexibility of disk-array configurations benefits manufacturer and consumer alike. In contrast, I describe in this tutorial's second half how parallelism, achieved through increasing numbers of components, causes overall failure rates to rise. Redundant disk arrays overcome this threat to data reliability by ensuring that data remains available during and after component failures.

  19. CERA - the technical basis for WDCC

    NASA Astrophysics Data System (ADS)

    Thiemann, Hannes; Lautenschlager, Michael

    2010-05-01

    The World Data Centre for Climate (WDCC) is hosted by the German Climate Computing Centre (DKRZ). It collects, stores and disseminates data for climate research in order to serve the scientific community. Emphasis hereby is spent on climate modelling and related data products. CERA (Climate and environmental retrieval and archive) is the infrastructure hosting data and metadata from WDCC. Data originates from projects like IPCC (and IPCC-DDC), ENSEMBLES, COPS and several others. Currently more than 400 terabytes of data are managed within CERA. Even more data is addressed through metadata. Data stored inline in CERA is currently archived in an Oracle Database which itself is transparently linked to a sophisticated HSM system. Within this HSM system a wide range of storage systems like different RAID and tape devices are used. HSM for CERA is configured in such a way, that a unique media failure may not cause any data loss. Correct and complete metadata are an important ingredient for relevant archiving procedures. Within CERA special care is taken to assure these goals. As a high end service DOIs can be assigned to data entities as they make the management of intellectual property easier and more convenient. Any data format can be served from within CERA although most of the data stored in CERA is in either GRIB or netCDF format. Out of the box CERA provides several data reduction mechanisms like time-slicing or regional selection. More elaborate functions like format conversion or diverse processing is attached either in- our outline. Fine-grained access control allows data to be distributed under divers data policies. Currently up to 800 users are registered within CERA. More than 600.000 downloads (255 terabytes) have been served from CERA within 2009. At present CERA is restructured, more specific details of the current implementation and the future development will be given in the presentation.

  20. Collective Dynamics in Physical and Social Networks

    NASA Astrophysics Data System (ADS)

    Isakov, Alexander

    We study four systems where individual units come together to display a range of collective behavior. First, we consider a physical system of phase oscillators on a network that expands the Kuramoto model to include oscillator-network interactions and the presence of noise: using a Hebbian-like learning rule, oscillators that synchronize in turn strengthen their connections to each other. We find that the average degree of connectivity strongly affects rates of flipping between aligned and anti-aligned states, and that this result persists to the case of complex networks. Turning to a fully multi-player, multi-strategy evolutionary dynamics model of cooperating bacteria that change who they give resources to and take resources from, we find several regimes that give rise to high levels of collective structure in the resulting networks. In this setting, we also explore the conditions in which an intervention that affects cooperation itself (e.g. "seeding the network with defectors") can lead to wiping out an infection. We find a non-monotonic connection between the percent of disabled cooperation and cure rate, suggesting that in some regimes a limited perturbation can lead to total population collapse. At a larger scale, we study how the locomotor system recovers after amputation in fruit flies. Through experiment and a theoretical model of multi-legged motion controlled by neural oscillators, we find that proprioception plays a role in the ability of flies to control leg forces appropriately to recover from a large initial turning bias induced by the injury. Finally, at the human scale, we consider a social network in a traditional society in Africa to understand how social ties lead to group formation for collective action (stealth raids). We identify critical and distinct roles for both leadership (important for catalyzing a group) and friendship (important for final composition). We conclude with prospects for future work.

  1. [Epizootia of the avian flu among the wild waterfowl in Sargatsk of Omsk region in 2005].

    PubMed

    Erofeev, Iu V; Mubarakshina, I V; Mubarakshin, R R

    2006-01-01

    The epidemiological characteristic of avian flu among a wild waterfowl in Sargatsk region in 2005 is presented. The analysis of the climate-geographical characteristic of region and the data on migration and specific structure of a wild waterfowl, and also results of investigation of the facts of its destruction are submitted. Laboratory research with the PCR help has confirmed presence of influenza virus A (H5N1) at a wild birds. As a result of carried out in the period of epizootia in full preventive and antiepidemic measures, including quarantine contacts resulted in absence between a wild birds and poultry, with out of raid to the maintenance of poultry on farm-steads, etc., the mass destruction of poultry was absent. It is marked, that with a view of maintenance of epidemiological well-being in region high readiness for actions in conditions of an extreme situation, and also vaccination of the population should be kept.

  2. Provider’s Perspectives on the Impact of Immigration and Customs Enforcement (ICE) Activity on Immigrant Health

    PubMed Central

    Hacker, Karen; Chu, Jocelyn; Arsenault, Lisa; Marlin, Robert P.

    2013-01-01

    Introduction Increasing Immigration and Customs Enforcement (ICE) activities such as raids, detention and deportation may be affecting the health and well-being of immigrants. This study sought to understand the impact of ICE activities on immigrant health from the perspective of health care providers. Methods An online survey of primary care and emergency medicine providers was conducted to determine whether ICE activity was negatively affecting immigrant patients. Results Of 327 providers surveyed, 163 responded (50%) and 156 (48%) met criteria for inclusion. Seventy-five (48%) of them observed negative effects of ICE enforcement on the health or health access of immigrant patients. Forty-three providers gave examples of the impact on emotional health, ability to comply with health care recommendations and access. Conclusions Health care providers are witnessing the negative effects of ICE activities on their immigrant patients’ psychological and physical health. This should be considered an important determinant of immigrant health. PMID:22643614

  3. Forest Fragmentation as Cause of Bacterial Transmission among Nonhuman Primates, Humans, and Livestock, Uganda

    PubMed Central

    Gillespie, Thomas R.; Rwego, Innocent B.; Estoff, Elizabeth L.; Chapman, Colin A.

    2008-01-01

    We conducted a prospective study of bacterial transmission among humans, nonhuman primates (primates hereafter), and livestock in western Uganda. Humans living near forest fragments harbored Escherichia coli bacteria that were ≈75% more similar to bacteria from primates in those fragments than to bacteria from primates in nearby undisturbed forests. Genetic similarity between human/livestock and primate bacteria increased ≈3-fold as anthropogenic disturbance within forest fragments increased from moderate to high. Bacteria harbored by humans and livestock were approximately twice as similar to those of red-tailed guenons, which habitually enter human settlements to raid crops, than to bacteria of other primate species. Tending livestock, experiencing gastrointestinal symptoms, and residing near a disturbed forest fragment increased genetic similarity between a participant’s bacteria and those of nearby primates. Forest fragmentation, anthropogenic disturbance within fragments, primate ecology, and human behavior all influence bidirectional, interspecific bacterial transmission. Targeted interventions on any of these levels should reduce disease transmission and emergence. PMID:18760003

  4. EFFECTS OF OVERPRESSURES IN GROUP SHELTERS ON ANIMALS AND DUMMIES

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roberts, J.E.; White, C.S.; Chiffelle, T.L.

    1953-09-01

    S>Relative biological hazards of blast were studied in two types of communal air-raid shelters during Shots 1 and 8. Dogs, restrained within the shelters during detonation, were studied pathologically and clinically for blast injuries. Two anthropometric dummies were test objects for displacement studies utilizing high-speed photography. Physical data included pressure vs time and air-drag determinations. During Shot 1, animals sustained marked blast damages (hemorrhages in lungs and abdominal organs), three dogs were ataxic. and the dummies were rather violently displaced. In Shot 8, however, no significant injuries were found in the animals, and the dummies were minimally displaced. Analysis ofmore » the physical data indicated that blast injuries and violent displacements may occur at much lower static overpressures than previously assumed from conventional explosion data. Furthermore, biological damage appeared to be related to the rate of rise of the overpressure and air drag, as well as the maximum overpressure values. (auth)« less

  5. Coexistence and Conflict between the Island Flying fox (Pteropus hypomelanus) and Humans on Tioman Island, Peninsular Malaysia.

    PubMed

    Aziz, Sheema Abdul; Clements, Gopalasamy Reuben; Giam, Xingli; Forget, Pierre-Michel; Campos-Arceiz, Ahimsa

    2017-01-01

    As tropical landscapes become increasingly human-dominated, conflicts between people and wildlife threaten ecological processes. Old World fruit bats such as flying foxes are especially susceptible to extinction risk because there is low interest in their conservation, particularly when they are considered pests. In order to arrest fruit bat declines, there is an urgent need to understand human-bat conflict and its implications. On a tropical island in Peninsular Malaysia, we conducted a questionnaire survey to investigate coexistence between people and the island flying fox ( Pteropus hypomelanus ). Among 119 respondents, knowledge of ecosystem services provided by flying foxes was extremely low. Most respondents held negative attitudes towards the bats, and older male locals were more likely to support killing them. This was also true for older owners of fruit trees who derived income from selling fruit, and experienced flying fox raids. Our results can be used to design appropriate interventions to support conservation efforts, and has important implications for managing conflicts between humans and synanthropic wildlife.

  6. Prevention of nuclear war

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lifton, R.J.

    Physicians are exercising their responsibility as healers in their efforts to prevent nuclear war. Death for Hiroshima survivors was experienced in four stages: the immediate impact of destruction, the acute impact of radiation, delayed radiation effects, and later identification as an atomic bomb survivor. Each phase had its physical and psychological impacts and negates Hiroshima as a model for rational behavior despite those who claim survival is possible for those who are prepared. The psychic effects of modern nuclear, chemical, and germ warfare need to be challenged with a symbolization of life and immortality. Studies of psychological reactions to themore » terror children felt during practice air-raid drills indicate that the fears can be surpressed and re-emerge in adult life as a linking of death with collective annihilation. Other themes which emerge are feelings of impermanence, craziness, identification with the bomb, and a double existence. Psychic numbing and the religion of nuclearism cause dangerous conflicts with the anxieties caused by increasing awareness of death. (DCK)« less

  7. Emerging Technologies and MOUT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    YONAS,GEROLD; MOY,TIMOTHY DAVID

    Operating in a potentially hostile city is every soldier's nightmare. The staggering complexity of the urban environment means that deadly threats--or non-combatants-may lurk behind every corner, doorway, or window. Urban operations present an almost unparalleled challenge to the modern professional military. The complexity of urban operations is further amplified by the diversity of missions that the military will be called upon to conduct in urban terrain. Peace-making and peace-keeping missions, urban raids to seize airports or WMD sites or to rescue hostages, and extended urban combat operations all present different sorts of challenges for planners and troops on the ground.more » Technology almost never serves as a magic bullet, and past predictions of technological miracles pile high on the ash heap of history. At the same time, it is a vital element of planning in the modern age to consider and, if possible, take advantage of emerging technologies. We believe that technologies can assist military operations in urbanized terrain (MOUT) in three primary areas, which are discussed.« less

  8. Did Secret, Sacred Science: ``Kokopelli/Pamola,'' Motivate the Tarratines' Assassination of the Penobscots' Bashaba ca 1615, and Does ``Orono'' Yield Direct Physics Insights?

    NASA Astrophysics Data System (ADS)

    Ataide, Italani; de Souza, Beatriz; Pawa Matagamon, Sagamo

    2007-04-01

    ``Tarratine'' may share cognate phonetics with Tatoosh, (Makah, Pacific NE), Tuitan, Totonac, (coastal ``neighbors'' of the Aztec), Teedyuscung/Tatiuskundt, (Penn.), Teotihuacan, Tomtomhegan, (``ME'' ca 1781-2), Titikaka/Titicaca, and Tantaquidgeon, (Conn.); the military action that led to the assassination of the Penobscots' Bashaba has explanatory roots tying it to the last raid involving `Indian' military action of the Revolutionary War. ``Turf'' rights influenced conflict imperatives. Preserved linguistic roots have it best: Ñari Huallac, coupled with Arizona, Allagash, Allahpatah, and Orono/Orinoco, indicate traditionalists' information, by recognizing Kokopelli/Pamola/Pele/electromagnetics/EMF, says how nature behaves. Penobscots and modern Peruvian descendants of the Incas have it right: the concealed ``Serpent God'' of their EMF alter ego(s), says their science, (applied physics) is sacred because it ``predicts'' nature, even tinnitus, via ``Rawandagon''! To cite this abstract, use the following reference: http://meetings.aps.org/link/BAPS.2007.NES07.C2.8

  9. Flawed Nuclear Physics and Atomic Intelligence in the Campaign to deny Norwegian Heavy Water to Germany, 1942-1944

    NASA Astrophysics Data System (ADS)

    Børresen, Hans Christofer

    2012-12-01

    The military campaign to deny Norwegian heavy water to Germany in World War II did not diminish as the threat posed by heavy water in German hands dwindled, mainly because of excessive security among the Allies. Signs that Albert Speer (1905-1981) had decided in 1942 to stop the German atomic-bomb project were kept secret and ignored. Prominent Allied advisers like Leif Tronstad (1903-1945) and even Niels Bohr (1885-1962) were not told about the plutonium path to a German atomic bomb. Physicists did not brief advisers, decision makers, and Allied officers on how many years Werner Heisenberg (1901-1976) would need to accumulate enough heavy water (deuterium oxide, D2O) for an Uranmachine and then to extract and process plutonium for an atomic bomb. Had the flow of information been better, the military raids on the Norwegian heavy-water plant at Vemork could have been timed better, and the more costly of them could have been averted altogether.

  10. "Final solution" in Myanmar?

    PubMed

    Lintner, B

    1992-07-01

    The conditions of Burmese prostitutes in Thailand's border communities are described to show how they are mistreated and denied health information on AIDS prevention. The police had been returning prostitutes to Myanmar, until it was brought to their attention that 25 female prostitutes had been fatally injected with cyanide by Burmese authorities to stop the spread of HIV. Myanmar's military rulers have concentrated AIDS education on the military. They do not want the soldiers, who keep the military regime in power to become infected with AIDS. The reports of Burmese murders of prostitutes have come from all quarters. In the group of 25 prostitutes were two cousins of a Burmese citizen who reported the disappearance of his relatives after they left for a shopping trip in the southern Thai city of Ranong, opposite Kawthaung in Myanmar. Thai police found that the two cousins had been kidnapped and sold into prostitution in a brothel in Ranong, which had been raided by police. In the northern city of Chiang Mai, it is estimated that 10,000 of the prostitutes are Burmese girls and women. UNICEF has reported that as many as 40,000 Burmese girls are sold into prostitution in Bangkok and border towns such as Ranong and Chiang Mai. Anti-Slavery International estimated that more than 1500 of the prostitutes in Ranong are Burmese girls and women who have been forced into this work. Their condition is very similar to slavery. Girls are forced to work long hours and may be fed only a bowl of rice with watery soup. Prostitution flourished because 20,000 Burmese fisherman, who are at sea for prolonged periods, frequent the brothels on their return. There is a growing prevalence of HIV infection in Ranong in part due to the fishermen's widespread heroin use aboard ship. In Ranong, 1 in 5 prostitutes were found to be HIV positive including 1 in 3 of the Burmese women. Those locked in brothels are not included in the figures. Unfortunately the Burmese captives know no or very little Thai or English, which means there is no exposure to AIDS prevention efforts. Conditions were reported in a letter signed by 73 Burmese captive prostitutes who wanted to return to their parents. The letter was smuggled out of brothel operating in the Grand Victoria Hotel in Ranong. POlice raids and the return of prostitute to Myanmar by boat have been hindered by brothel owners who bribe officials.

  11. The Earthscope USArray Array Network Facility (ANF): Evolution of Data Acquisition, Processing, and Storage Systems

    NASA Astrophysics Data System (ADS)

    Davis, G. A.; Battistuz, B.; Foley, S.; Vernon, F. L.; Eakins, J. A.

    2009-12-01

    Since April 2004 the Earthscope USArray Transportable Array (TA) network has grown to over 400 broadband seismic stations that stream multi-channel data in near real-time to the Array Network Facility in San Diego. In total, over 1.7 terabytes per year of 24-bit, 40 samples-per-second seismic and state of health data is recorded from the stations. The ANF provides analysts access to real-time and archived data, as well as state-of-health data, metadata, and interactive tools for station engineers and the public via a website. Additional processing and recovery of missing data from on-site recorders (balers) at the stations is performed before the final data is transmitted to the IRIS Data Management Center (DMC). Assembly of the final data set requires additional storage and processing capabilities to combine the real-time data with baler data. The infrastructure supporting these diverse computational and storage needs currently consists of twelve virtualized Sun Solaris Zones executing on nine physical server systems. The servers are protected against failure by redundant power, storage, and networking connections. Storage needs are provided by a hybrid iSCSI and Fiber Channel Storage Area Network (SAN) with access to over 40 terabytes of RAID 5 and 6 storage. Processing tasks are assigned to systems based on parallelization and floating-point calculation needs. On-site buffering at the data-loggers provide protection in case of short-term network or hardware problems, while backup acquisition systems at the San Diego Supercomputer Center and the DMC protect against catastrophic failure of the primary site. Configuration management and monitoring of these systems is accomplished with open-source (Cfengine, Nagios, Solaris Community Software) and commercial tools (Intermapper). In the evolution from a single server to multiple virtualized server instances, Sun Cluster software was evaluated and found to be unstable in our environment. Shared filesystem architectures using PxFS and QFS were found to be incompatible with our software architecture, so sharing of data between systems is accomplished via traditional NFS. Linux was found to be limited in terms of deployment flexibility and consistency between versions. Despite the experimentation with various technologies, our current virtualized architecture is stable to the point of an average daily real time data return rate of 92.34% over the entire lifetime of the project to date.

  12. Undiagnosed illnesses and radioactive warfare.

    PubMed

    Duraković, Asaf

    2003-10-01

    The internal contamination with depleted uranium (DU) isotopes was detected in British, Canadian, and United States Gulf War veterans as late as nine years after inhalational exposure to radioactive dust in the Persian Gulf War I. DU isotopes were also identified in a Canadian veteran's autopsy samples of lung, liver, kidney, and bone. In soil samples from Kosovo, hundreds of particles, mostly less than 5 microm in size, were found in milligram quantities. Gulf War I in 1991 resulted in 350 metric tons of DU deposited in the environment and 3-6 million grams of DU aerosol released into the atmosphere. Its legacy, Gulf War disease, is a complex, progressive, incapacitating multiorgan system disorder. The symptoms include incapacitating fatigue, musculoskeletel and joint pains, headaches, neuropsychiatric disorders, affect changes, confusion, visual problems, changes of gait, loss of memory, lymphadenopathies, respiratory impairment, impotence, and urinary tract morphological and functional alterations. Current understanding of its etiology seems far from being adequate. After the Afghanistan Operation Anaconda (2002), our team studied the population of Jalalabad, Spin Gar, Tora Bora, and Kabul areas, and identified civilians with the symptoms similar to those of Gulf War syndrome. Twenty-four-hour urine samples from 8 symptomatic subjects were collected by the following criteria: 1) the onset of symptoms relative to the bombing raids; 2) physical presence in the area of the bombing; and 3) clinical manifestations. Control subjects were selected among the sympotom-free residents in non-targeted areas. All samples were analyzed for the concentration and ratio of four uranium isotopes, (234)U, (235)U, (236)U and (238)U, by using a multicollector, inductively coupled plasma ionization mass spectrometry. The first results from the Jalalabad province revealed urinary excretion of total uranium in all subjects significantly exceeding the values in the nonexposed population. The analysis of the isotopic ratios identified non-depleted uranium. Studies of specimens collected in 2002 revealed uranium concentrations up to 200 times higher in the districts of Tora Bora, Yaka Toot, Lal Mal, Makam Khan Farm, Arda Farm, Bibi Mahro, Poli Cherki, and the Kabul airport than in the control population. Uranium levels in the soil samples from the bombsites show values two to three times higher than worldwide concentration levels of 2 to 3 mg/kg and significantly higher concentrations in water than the World Health Organization maximum permissible levels. This growing body of evidence undoubtedly puts the problem of prevention and solution of the DU contamination high on the priority list.

  13. Assessment of Crop Damage by Protected Wild Mammalian Herbivores on the Western Boundary of Tadoba-Andhari Tiger Reserve (TATR), Central India

    PubMed Central

    Bayani, Abhijeet; Tiwade, Dilip; Dongre, Ashok; Dongre, Aravind P.; Phatak, Rasika; Watve, Milind

    2016-01-01

    Crop raiding by wild herbivores close to an area of protected wildlife is a serious problem that can potentially undermine conservation efforts. Since there is orders of magnitude difference between farmers’ perception of damage and the compensation given by the government, an objective and realistic estimate of damage was found essential. We employed four different approaches to estimate the extent of and patterns in crop damage by wild herbivores along the western boundary of Tadoba-Andhari Tiger Reserve in the state of Maharashtra, central India. These approaches highlight different aspects of the problem but converge on an estimated damage of over 50% for the fields adjacent to the forest, gradually reducing in intensity with distance. We found that the visual damage assessment method currently employed by the government for paying compensation to farmers was uncorrelated to and grossly underestimated actual damage. The findings necessitate a radical rethinking of policies to assess, mitigate as well as compensate for crop damage caused by protected wildlife species. PMID:27093293

  14. A previously undiscovered group of chimpanzees (Pan troglodytes verus) is observed living in the Tonkolili district of Sierra Leone.

    PubMed

    Halloran, Andrew R; Cloutier, Christina T; Sesay, Papanie Bai

    2013-06-01

    A previously undocumented group of wild chimpanzees (Pan troglodytes verus) was recently discovered along the Pampana River in the Tonkolili District of Sierra Leone. Based on interviews from local residents (N = 6), we estimate the group size to be approximately 30 individuals. Though this population does not show up in the most recent census of chimpanzees in Sierra Leone, it concurs with findings that indicate most of the chimpanzees in Sierra Leone live scattered throughout the country alongside villages, rather than in protected areas. During a three-week observation in the area, two chimpanzees were hunted and killed. The reason for these deaths, along with other reported instances of hunting in the area, are primarily due to crop-raiding and competition for resources between chimpanzees and humans. We conclude that this is a heavily imperiled population. Based on the ecology of the area and composition of local villages, we propose a number of conservation strategies that will promote a symbiotic relationship between the chimpanzees and human populations residing in the area. © 2013 Wiley Periodicals, Inc.

  15. Prudent Protomognathus and despotic Leptothorax duloticus: Differential costs of ant slavery

    PubMed Central

    Hare, James F.; Alloway, Thomas M.

    2001-01-01

    The concept of ant slavery rests on the untested assumption that slave-making ants impose fitness costs on colonies of the species they raid. We tested that assumption by comparing the summertime seasonal productivity of Leptothorax spp. colonies in field exclosures without slavemakers, with a colony of the obligatory slave-making ant Protomognathus americanus, or with a colony of the obligatory slavemaker Leptothorax duloticus. Leptothorax longispinosus colonies placed in exclosures with P. americanus colonies did not differ significantly in any demographic attribute from colonies in exclosures without slavemakers. By contrast, Leptothorax curvispinosus colonies exposed to L. duloticus experienced significant reductions in dealate queens, workers, and larvae relative to control colonies exclosed without slavemakers. The pronounced difference in the impact of these slavemakers on their host-species populations correlates with differences in the behavior of the slavemakers observed in the laboratory and likely explains why P. americanus is more abundant than L. duloticus in nature. It seems that more advanced social parasites, like anatomical parasites, evolve to minimize their impact on their hosts, and thus can be regarded as “prudent social parasites.” PMID:11572933

  16. Changing perceptions of protected area benefits and problems around Kibale National Park, Uganda.

    PubMed

    MacKenzie, Catrina A; Salerno, Jonathan; Hartter, Joel; Chapman, Colin A; Reyna, Rafael; Tumusiime, David Mwesigye; Drake, Michael

    2017-09-15

    Local residents' changing perceptions of benefits and problems from living next to a protected area in western Uganda are assessed by comparing household survey data from 2006, 2009, and 2012. Findings are contextualized and supported by long-term data sources for tourism, protected area-based employment, tourism revenue sharing, resource access agreements, and problem animal abundance. We found decreasing perceived benefit and increasing perceived problems associated with the protected area over time, with both trends dominated by increased human-wildlife conflict due to recovering elephant numbers. Proportions of households claiming benefit from specific conservation strategies were increasing, but not enough to offset crop raiding. Ecosystem services mitigated perceptions of problems. As human and animal populations rise, wildlife authorities in Sub-Saharan Africa will be challenged to balance perceptions and adapt policies to ensure the continued existence of protected areas. Understanding the dynamic nature of local people's perceptions provides a tool to adapt protected area management plans, prioritize conservation resources, and engage local communities to support protected areas. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Ethanol-induced analgesia

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pohorecky, L.A.; Shah, P.

    1987-09-07

    The effect of ethanol (ET) on nociceptive sensitivity was evaluated using a new tail deflection response (TDR) method. The IP injection of ET (0.5 - 1.5 g/kg) produced raid dose-dependent analgesia. Near maximal effect (97% decrease in TDR) was produced with the 1.5 g/kg dose of ET ten minutes after injection. At ninety minutes post-injection there was still significant analgesia. Depression of ET-induced nociceptive sensitivity was partially reversed by a 1 mg/kg dose of naloxone. On the other hand, morphine (0.5 or 5.0 mg/kg IP) did not modify ET-induced analgesia, while 3.0 minutes of cold water swim (known to producemore » non-opioid mediated analgesia) potentiated ET-induced analgesic effect. The 0.5 g/kg dose of ET by itself did not depress motor activity in an open field test, but prevented partially the depression in motor activity produced by cold water swim (CWS). Thus, the potentiation by ET of the depression of the TDR produced by CWS cannot be ascribed to the depressant effects of ET on motor activity. 21 references, 4 figures, 1 table.« less

  18. [War Relief of Japanese Red Cross Nurses in the Lost Battle of Burma].

    PubMed

    Kawahara, Yukari

    2015-12-01

    This paper aims to reveal changes in the relief support of the Japanese Red Cross relief units dispatched to Burma during the Second World War, from the beginning of fighting in Burma to the Japanese withdrawal. Japanese Red Cross relief units began their relief support when Japan invaded Burma in February of 1942. Counterattacks by the British, Indian and Chinese armies from December 1942 caused an increase in the number of patients. There were also many cases of malnutrition and malaria due to the extreme shortage of medical supplies as a result of the Battle of Imphal, which began in March of 1944. Bomb raids became even more intense after the battle ended in July 1944, and patients were carried into bomb shelters and caves on a daily basis. Just prior to invasion by enemy troops, they were ordered to evacuate to neighboring Thailand. Nurses from the Wakayama group hid their identity as members of the Red Cross and evacuated, with 15 out of 23 dying or being reported missing in action.

  19. Risk, media, and stigma at Rocky Flats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flynn, J.; Peters, E.; Mertz, C.K.

    1998-12-01

    Public responses to nuclear technologies are often strongly negative. Events, such as accidents or evidence of unsafe conditions at nuclear facilities, receive extensive and dramatic coverage by the news media. These news stories affect public perceptions of nuclear risks and the geographic areas near nuclear facilities. One result of these perceptions, avoidance behavior, is a form of technological stigma that leads to losses in property values near nuclear facilities. The social amplification of risk is a conceptual framework that attempts to explain how stigma is created through media transmission of information about hazardous places and public perceptions and decisions. Thismore » paper examines stigma associated with the US Department of energy`s Rocky Flats facility, a major production plant in the nation`s nuclear weapons complex, located near Denver, Colorado. This study, based upon newspaper analyses and a survey of Denver area residents, finds that the social amplification theory provides a reasonable framework for understanding the events and public responses that took place in regard to Rocky Flats during a 6-year period, beginning with an FBI raid of the facility in 1989.« less

  20. Multiple Convergent Origins of Workerlessness and Inbreeding in the Socially Parasitic Ant Genus Myrmoxenus.

    PubMed

    Heinze, Jürgen; Buschinger, Alfred; Poettinger, Theo; Suefuji, Masaki

    2015-01-01

    The socially parasitic ant genus Myrmoxenus varies strongly in fundamental life history traits, such as queen-worker ratio, the timing of sexual production, and mating behavior. Myrmoxenus queens generally take over nests of Temnothorax ants, kill the resident queen by throttling, and force the workers to take care of the social parasite's brood. Young queens of M. ravouxi and other species produce large numbers of workers, which during "slave-raids" pillage host pupae from neighboring Temnothorax colonies to increase the workforce in their own nests. Other species, such as M. corsicus, have lost caste polyphenism and rear only male and female sexual offspring. Using sequences of the genes CO I/CO II and wingless we reconstruct the phylogeny of Myrmoxenus and document that the worker caste was lost convergently at least three times. Furthermore, mating in the nest and inbreeding obviously also evolved in parallel from ancestors whose sexuals presumably mated during nuptial flights. Myrmoxenus might thus provide a suitable model to investigate caste differentiation and the plasticity of mating behavior in Hymenoptera.

  1. Assigning statistical significance to proteotypic peptides via database searches

    PubMed Central

    Alves, Gelio; Ogurtsov, Aleksey Y.; Yu, Yi-Kuo

    2011-01-01

    Querying MS/MS spectra against a database containing only proteotypic peptides reduces data analysis time due to reduction of database size. Despite the speed advantage, this search strategy is challenged by issues of statistical significance and coverage. The former requires separating systematically significant identifications from less confident identifications, while the latter arises when the underlying peptide is not present, due to single amino acid polymorphisms (SAPs) or post-translational modifications (PTMs), in the proteotypic peptide libraries searched. To address both issues simultaneously, we have extended RAId’s knowledge database to include proteotypic information, utilized RAId’s statistical strategy to assign statistical significance to proteotypic peptides, and modified RAId’s programs to allow for consideration of proteotypic information during database searches. The extended database alleviates the coverage problem since all annotated modifications, even those occurred within proteotypic peptides, may be considered. Taking into account the likelihoods of observation, the statistical strategy of RAId provides accurate E-value assignments regardless whether a candidate peptide is proteotypic or not. The advantage of including proteotypic information is evidenced by its superior retrieval performance when compared to regular database searches. PMID:21055489

  2. [Conviction, pragmatism, research enthusiasm--mechanisms of conformity. The Medical Faculty of Giessen during National Socialism].

    PubMed

    Oehler-Klein, Sigrid

    2007-01-01

    In the course of its history the University of Giessen was threatened several times by closure, due to the University's geographical location, size, or a relative lack of reputation. This paper deals with the policy of the University's Medical Faculty during the Nazi period, when it faced specific demands and opportunities. While the University's restructuring had been initiated by some active National Socialists, this process was pragmatically supported by the Medical Faculty as a whole in order to gain advantages from its location. In particular, the Faculty (1.) institutionalized racial hygiene--a chair for one of the most radical representatives of this subject in Germany was requested--and (2.) established collaboration with the "Wehrmacht". The newly opened up perspectives for research were seen as an opportunity. In fact, from 1940 the University of Giessen was frequented again by many medical students; in 1943, the Berlin Academy for Military Medicine relocated some institutes and scientists to the University of Giessen, as the capital had become too unsafe for them because of increasing air raids.

  3. US defensive operations against Libya and the nuclear accident at Chernobyl. Markup before the Committee on Foreign Affairs, House of Representatives, Ninety-Ninth Congress, Second Session on H. Res. 424 and H. Res 440, May 1, 1986

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1986-01-01

    The House Foreign Affairs Committee met to mark up two resolutions: H. Res. 424 and H. Res. 440. H. Res. 424 thanks the United Kingdom for its assistance in the April 14, 1986 operation against Libya. Despite objections to the raid and to including the British, as well as questions about the quality of the US response and about the President's compliance with the Constitution and the War Powers Resolution, the resolution passed. H. Res. 440 expresses sympathy to the victims of the Chernobyl accident and asks the Soviet Union to relax restrictions on communications and the transfer of whatevermore » technology and assistance will be helpful. It also criticizes the Soviet handling of information about the accident. An amendment strengthened the wording of the criticism, and the resolution passed. The report includes the committee discussion and the tests of the two resolutions.« less

  4. HIV, sex work, and civil society in China.

    PubMed

    Kaufman, Joan

    2011-12-01

    Harm reduction programs for sex workers have been hampered by the prioritization of law enforcement over AIDS prevention. For example, the April 2010 "strike-hard" campaign against prostitution in Beijing, during which bars, nightclubs, saunas, and karaoke bars were raided, created an atmosphere that critically impeded human immunodeficiency virus (HIV) outreach activities for sex workers. In China, criminalization has limited the growth of a coherent and cohesive set of nongovernmental organization (NGO) actors working with sex workers to prevent HIV infection. Compared with other risk groups for HIV sexual transmission, such as men who have sex with men, the NGO community for sex workers is fragmented and poorly coordinated with government efforts, and basic rights for sex workers are often violated. This article examines civil society groups working on AIDS prevention and care for female sex workers in China and reviews constraints to their operations. China's HIV prevention programs for sex workers are compared with sex worker HIV prevention in other Asian states where more well-developed NGOs exist and criminalization has been better balanced with harm reduction approaches, and recommendations are offered on improving China's policies and programs.

  5. [Alteration of textilfibres by explosion gases expelled distant from the muzzle (author's transl)].

    PubMed

    Bonte, W; Kijewski, H

    1976-03-24

    This paper presents the reconstruction of an unusual case of suicide. After raiding a branch-bank a robber fled shooting with his Sauer-Western revolver caliber .44 magnum at the pursuing policemen and succeeded in wrestling a pistol Walther caliber 7,65 mm from them. Under the fire of sub-machine guns he destroyed himself by a shot to the neck. Our investigations concerned a textile damage at the front of the sweater of the deceased surrounded by primer residue, showing characteristics of a close-up shot. The damage was identified as effect of explosion gases exhausting far-off the muzzle. The distance between this injury and the bullet hole corresponded with the length of the barrel of the Sauer-Western revolver and could be used for identification; it confirmed the diagnosis of a close-up shot at the neck, too. Collateral experiments with shots from distant ranges developed spadiceous melt figures of textile fibers around the bullet hole, the appearance of which is considered proof for a close-up shot commonly.

  6. Historical trends of polycyclic aromatic hydrocarbons in the reservoir sediment core at Osaka

    NASA Astrophysics Data System (ADS)

    Moriwaki, Hiroshi; Katahira, Kenshi; Yamamoto, Osamu; Fukuyama, Joji; Kamiura, Toshikazu; Yamazaki, Hideo; Yoshikawa, Shusaku

    The historical trends of polycyclic aromatic hydrocarbons (PAHs) in the sediment core of the moat in Osaka Castle, located at the center of Osaka city, Japan, were studied. The moats in Osaka Castle were built in the 1620s, and the undisturbed sediment core, which consists of atmospheric deposits in Osaka city from 1671 to 1976, was withdrawn from the moat. PAHs in the sediment core were identified and quantified in the total concentration range of 0.053-26 mg kg -1 dry wt. The highest content of PAHs was found in the sample, which was dated to 1944 during World War II. Osaka Castle was exposed to intense bombing raids during World War II, and the spiked peak of the PAH concentration during the mid-1940s was due to the air attacks. The total PAH concentration in the sediment core sample during World War II was about two-fold greater than the average after the war. This study made it appear that the largest impact of PAHs on the atmospheric environment in Osaka city in almost 300 years was caused by modern warfare.

  7. The subglacial roughness of Antarctica: Analogs, interpretation and implications for ice thickness uncertainities

    NASA Astrophysics Data System (ADS)

    Young, D. A.; Grima, C.; Greenbaum, J. S.; Beem, L.; Cavitte, M. G.; Quartini, E.; Kempf, S. D.; Roberts, J. L.; Siegert, M. J.; Ritz, C.; Blankenship, D. D.

    2017-12-01

    Over the last twenty five years, extensive ice penetrating radar (IPR) coverage of Antarctica has been obtained, at lines spacings down to 1 km in some cases. However, many glacial processes occur at finer scales, so infering likely landscape parameters is required for a useful interpolation between lines. Profile roughness is also important for understanding the uncertainties inherent in IPR observations. Subglacial roughness has also been used to infer large scale bed rock properties and history. Similar work has been conducted on a regional basis with complilations of data from the 1970's and more recent local studies. Here we present a compilation of IPR-derived profile roughness data covering three great basins of Antarctica: the Byrd Subglacial Basin in West Antarctica, and the Wilkes Subglacial Basin and Aurora Subglacial Basins in East Antarctica; and treat these data using root mean squared deviation (RMSD). Coverage is provied by a range of IPR systems with varying vintages with differing instrument and processing parameters; we present approaches to account for the differences between these systems. We use RMSD, a tool commonly used in planetary investigations, to investigate the self-affine behaviour of the bed at kilometer scales and extract fractal parameters from the data to predict roughness and uncertainties in ice thickness measurement. Lastly, we apply a sensor model to a range of bare-earth terrestrial digital elevation models to futher understand the impact of the sensor model on the inference of subglacial topography and roughness, and to the first order analogies for the lithology of the substrate. This map of roughness, at scales between the pulse limited radar footprint and typical line spacings, provides an understanding of the distribution of Paleogene subglacial sediments, insight in to the distribution of uncertainties and a potential basal properties mask for ice sheet models. A particular goal of this map is to provide insight into required IPR coverage needs for site selection for old ice and subglacial samples for subglacial access systems like US-RAID and SUBGLACIOR.

  8. European multicentre pilot survey to assess vitamin D status in rheumatoid arthritis patients and early development of a new Patient Reported Outcome questionnaire (D-PRO).

    PubMed

    Vojinovic, Jelena; Tincani, Angela; Sulli, Alberto; Soldano, Stefano; Andreoli, Laura; Dall'Ara, Francesca; Ionescu, Ruxandra; Pasalic, Katarina Simic; Balcune, Inete; Ferraz-Amaro, Ivan; Tlustochowicz, Małgorzata; Butrimiene, Irena; Punceviciene, Egle; Toroptsova, Natalia; Grazio, Simeon; Morovic-Vergles, Jadranka; Masaryk, Pavol; Otsa, Kati; Bernardes, Miguel; Boyadzhieva, Vladimira; Salaffi, Fausto; Cutolo, Maurizio

    2017-05-01

    To collect data on vitamin D (25(OH)D) serum levels in a large number of rheumatoid arthritis (RA) patients from different European countries, to investigate their relation with disease activity, disability, quality of life, and possibly to construct a new Patient Reported Outcome (PRO) questionnaire in order to self-estimate if they are at risk for vitamin D insufficiency/deficiency-related clinical implications (D-PRO). This was a European League Against Rheumatism (EULAR) supported cross-sectional study (project No CLI064) which involved 625 RA patients (mean age 55±11years, mean disease duration 11±9years), 276 age and sex matched healthy subjects, and rheumatologists working in academic institutions or hospital centres, as well as PARE organizations (patient representatives) from 13 European countries. Serum samples for 25(OH)D level measurement were collected during winter time and analyzed in a central laboratory using chemiluminescence immunoassay (DiaSorin). Patient past medical history was recorded. RA patients were provided with three questionnaires: the Rheumatoid Arthritis Impact Diseases score (RAID), the Health Assessment Questionnaire (HAQ), and the new D-PRO questionnaire at the time of 25(OH)D serum sampling. D-PRO questionnaire consisted of three domains, Symptom Risk Score (SRS), Habitus Risk Score (HRS) and Global Risk Score (SRS+HRS=GRS), constructed with items possibly related to vitamin D deficiency. D-PRO was correlated with both clinical and PRO scores. DAS28-CRP was also evaluated. Statistical analysis was performed by non parametric tests. Mean serum concentration of 25(OH)D in RA patients (17.62±9.76ng/ml) was found significantly lower if compared to the levels obtained in matched controls (18.95±9.45ng/ml) (p=0.01), with statistically significant differences among several European countries. Negative correlations were found between 25(OH)D serum levels and DAS28-CRP (p<0.001), RAID (p=0.05) and HAQ (p=0.04) scores in the RA patients group. Negative correlations were also found in the cohort of enrolled RA patients between 25(OH)D serum concentrations and SRS (p=0.04), HRS (p=0.02) and GRS (p=0.02) domains of the D-PRO questionnaire. This first multicentre European survey add new evidences that vitamin D insufficiency/deficiency is frequent in RA patients with statistically significant differences among several countries. Vitamin D serum concentrations seem to correlate negatively and significantly with the D-PRO Global Risk Score, clinimetric indexes for quality of life, disease activity and disability in present cohort of RA European patients. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Infections and risk factors for livestock with species of Anaplasma, Babesia and Brucella under semi-nomadic rearing in Karamoja Region, Uganda.

    PubMed

    Lolli, Chiara; Marenzoni, Maria Luisa; Strona, Paolo; Lappo, Pier Giorgio; Etiang, Patrick; Diverio, Silvana

    2016-03-01

    A survey was conducted to estimate the prevalence of Anaplasma, Babesia and Brucella spp. infections in cattle, goats and sheep in the Karamoja Region of Uganda and to identify possible risk factors existing in this semi-nomadic and pastoral area. Low cost laboratory tests were used to diagnose infections (Rose Bengal test for Brucella spp. antibodies and direct microscopic examination for Anaplasma and Babesia spp.). Multivariable logistic regression models were applied to identify possible risk factors linked to gender, animal species, age (only for cattle) and districts. A total of 3935 cattle, 729 goats and 306 sheep of five districts of the Karamoja Region were tested. Seroprevalence for Brucella was 9.2 % (CI, 95 %: 8.4-10), for Anaplasma 19.5 % (CI 95 %: 18.4-20.6) and for Babesia 16 % (CI 95 %: 15-17.1). Significant differences in infections prevalence were observed against risk factors associated with districts and species. Cattle were the species with higher risk of the infections. Female gender was identified as at risk only for Brucella spp. infection. Cattle more than one year old had greater likelihood to be Brucella seropositive. Co-infections of Anaplasma and Babesia spp. were statistically associated, especially in goats and sheep. Further studies to identify risk factors related to host species and geographical districts are needed. The influence on the semi-nomadic agro-pastoral system in Karamoja of animal raids and animal mixing should be further investigated. Findings were important to sensitize Karamojong undertaking measures on infection control, especially on cattle, which are their main source of food.

  10. Integrated Geophysycal Prospecting in Late Antiquity and Early Medieval Sites in Italy

    NASA Astrophysics Data System (ADS)

    Giannotta, Maria Teresa; Leucci, Giovanni; De Giorgi, Lara; Matera, Loredana; Persico, Raffaele; Muci, Giuseppe

    2016-04-01

    In this contribution, the results of some integrated geophysical prospecting (magnetometric and GPR) are exposed. This work has been performed in collaboration between archaeologists and geophysicists within the research project "History and Global Archaeology of the Rural Landascapes in Italy, between Late Antiquity and Medieval period. Integrated systems of sources, methodologies, and technologies for a sustainable development", financed by the Italian Ministry for Instruction, University and Research MIUR. In particular, the archaeological sites of Badia and San Giovanni in Malcantone, both in the Apulia Region (eastern-southern Italy) have been prospect. The sites have been identified on the basis of available documents, archaeological surveys and testimonies. In particular, we know that in Badia [1] it was probable the presence of an ancient roman villa of the late ancient period (strongly damaged by the subsequent ploughing activities). Whereas in San Giovanni there is still, today, a small chapel (deconsecrated) that was likely to be part of a previous larger church (probably a basilica of the early Christian period) restricted in the subsequent centuries (probably in more phases). The Saracen raids of the XVI centuries made the site ruined and abandoned. In both sites integrated prospecting have been performed [2-6] with a the integration of archaeological, magnetometer and a GPR data have provided some interesting results, allowing to overcome the difficulties relative to an extensive GPR prospecting, that could not be performed because of the intrinsic superficial roughness and/or the intensive ploughing activities. The prospecting activities, in particular, have added elements that seem to confirm the main archaeological hypothesis that motivate their performing, as it will be show at the conference. References [1] M. T, Giannotta, G. Leucci, R. Persico, M. Leo Imperiale, The archaeological site of Badia in terra d'Otranto: contribution of the geophysical prospecting to the reconstruction of the landscape from the late antiquity to the middle age, Proc. of 6th International Congress "Science and Technology for the Safeguard of Cultural Heritage in the Mediterranean Basin", Athens, Greece, 22nd-25th October 2013. [2] L. De Giorgi, G. Leucci, Detection of hazardous cavities below a road using combined geophysical methods. Surveys in Geophysics, online DOI 10.1007/s10712-013-9277-4, 2014. [3] R. Persico, Introduction to Ground Penetrating Radar: Inverse Scattering and data processing. Wiley, 2014 [4] S. Piscitelli, E.Rizzo, F. Cristallo,V. Lapenna, L. Crocco, R. Persico, F. Soldovieri, GPR and Microwave Tomography for Detecting shallow Cavities in the Historical Area of Sassi of Matera (Southern Italy), Near Surface Geophysics, vol. 5, pp. 275-285, 2007. [5] G. Leucci, N. Masini, R. Persico, F. Soldovieri." GPR and sonic tomography for structural restoration: the case of the Cathedral of Tricarico", Journal of Geophysics and Engineering, vol. 8, pp. S76-S92, Aug. 2011. [6] L. Matera, M. Noviello, M. Ciminale, R. Persico, Integration of multisensor data: an experiment in the archaeological park of Egnazia (Apulia, Southern Italy), Near Surface Geophysics, vol. 13, n. 6, pp. 613-621, 2015

  11. Local knowledge and perceptions of chimpanzees in Cantanhez National Park, Guinea-Bissau.

    PubMed

    Sousa, Joana; Vicente, Luís; Gippoliti, Spartaco; Casanova, Catarina; Sousa, Cláudia

    2014-02-01

    Our study concerns local knowledge and perceptions of chimpanzees among farming communities within Cantanhez National Park, Guinea-Bissau. We submitted a survey questionnaire to 100 people living in four villages in the Park to enquire about their knowledge of chimpanzee ecology and human-chimpanzee interactions. Local farmers live in close contact with chimpanzees, consider them to be more similar to humans than any other species, and attribute special importance to them primarily due to expectations of tourism revenue. Interviewees' responses, as a function of gender, village, and age, were analyzed statistically using non-parametric tests (Mann-Whitney and Kruskal-Wallis). Age influenced responses significantly, while gender and village had no significant effect. Youngsters emphasized morphological aspects of human-chimpanzee similarities, while adults emphasized chimpanzee behavior and narratives about the shared history of humans and chimpanzees. Tourism, conservation, and crop raiding feature prominently in people's reports about chimpanzees. Local people's engagement with conservation and tourism-related activities is likely to allow them to manage not only the costs but also the benefits of conservation, and can in turn inform the expectations built upon tourism. © 2013 Wiley Periodicals, Inc.

  12. Nuclear forensic analysis of an unknown uranium ore concentrate sample seized in a criminal investigation in Australia

    DOE PAGES

    Keegan, Elizabeth; Kristo, Michael J.; Colella, Michael; ...

    2014-04-13

    In early 2009, a state policing agency raided a clandestine drug laboratory in a suburb of a major city in Australia. While searching the laboratory, they discovered a small glass jar labelled “Gamma Source” and containing a green powder. The powder was radioactive. This paper documents the detailed nuclear forensic analysis undertaken to characterize and identify the material and determine its provenance. Isotopic and impurity content, phase composition, microstructure and other characteristics were measured on the seized sample, and the results were compared with similar material obtained from the suspected source (ore and ore concentrate material). While an extensive rangemore » of parameters were measured, the key ‘nuclear forensic signatures’ used to identify the material were the U isotopic composition, Pb and Sr isotope ratios, and the rare earth element pattern. These measurements, in combination with statistical analysis of the elemental and isotopic content of the material against a database of uranium ore concentrates sourced from mines located worldwide, led to the conclusion that the seized material (a uranium ore concentrate of natural isotopic abundance) most likely originated from Mary Kathleen, a former Australian uranium mine.« less

  13. Fitness costs of worker specialization for ant societies

    PubMed Central

    Jongepier, Evelien; Foitzik, Susanne

    2016-01-01

    Division of labour is of fundamental importance for the success of societies, yet little is known about how individual specialization affects the fitness of the group as a whole. While specialized workers may be more efficient in the tasks they perform than generalists, they may also lack the flexibility to respond to rapid shifts in task needs. Such rigidity could impose fitness costs when societies face dynamic and unpredictable events, such as an attack by socially parasitic slavemakers. Here, we experimentally assess the colony-level fitness consequences of behavioural specialization in Temnothorax longispinosus ants that are attacked by the slavemaker ant T. americanus. We manipulated the social organization of 102 T. longispinosus colonies, based on the behavioural responses of all 3842 workers. We find that strict specialization is disadvantageous for a colony's annual reproduction and growth during slave raids. These fitness costs may favour generalist strategies in dynamic environments, as we also demonstrate that societies exposed to slavemakers in the field show a lower degree of specialization than those originating from slavemaker-free populations. Our findings provide an explanation for the ubiquity of generalists and highlight their importance for the flexibility and functional robustness of entire societies. PMID:26763706

  14. Wild Asian elephants distinguish aggressive tiger and leopard growls according to perceived danger.

    PubMed

    Thuppil, Vivek; Coss, Richard G

    2013-10-23

    Prey species exhibit antipredator behaviours such as alertness, aggression and flight, among others, in response to predators. The nature of this response is variable, with animals reacting more strongly in situations of increased vulnerability. Our research described here is the first formal study to investigate night-time antipredator behaviour in any species of elephants, Asian or African. We examined the provocative effects of elephant-triggered tiger and leopard growls while elephants attempted to crop-raid. Tigers opportunistically prey on elephant calves, whereas leopards pose no threat; therefore, we predicted that the elephant response would be reflective of this difference. Elephants reacted similarly cautiously to the simulated presence of felids of both species by eventually moving away, but differed markedly in their more immediate behavioural responses. Elephants retreated silently to tiger-growl playbacks, whereas they responded with aggressive vocalizations, such as trumpets and grunts, to leopard-growl playbacks. Elephants also lingered in the area and displayed alert or investigative behaviours in response to leopard growls when compared with tiger growls. We anticipate that the methods outlined here will promote further study of elephant antipredator behaviour in a naturalistic context, with applications for conservation efforts as well.

  15. Viking voyages: the origin of multiple sclerosis? An essay in medical history.

    PubMed

    Poser, C M

    1995-01-01

    Multiple sclerosis is most frequently found in Scandinavia, Iceland, the British Isles and the countries settled by their inhabitants and their descendants, i.e. the United States, Canada, Australia and New Zealand. This suggests that the Vikings may have been instrumental in disseminating genetic susceptibility to the disease in those areas, as well as in other parts of the world. The Vikings raided most European countries and settled in Normandy and in Sicily and southern Italy. They engaged in trade with the Arabs along the river routes to the Caucasus, to the Black and Caspian Seas, and penetrated Persia, India and probably China. They also migrated to the East and established the Russian state. Under the name Varangians, they became part of the Byzantine army and were active in all the military activities of the Byzantine Empire. They participated in the Crusades. Russians, many of Scandinavian origin also constituted a regiment of the Mongol army and roamed throughout that Empire as well. The custom of capturing and keeping or selling women and children, which was widespread in the early Middle Ages, as well as the flourishing slave trade in men, were important factors in this genetic dissemination.

  16. "Someone Else's Problem": New Psychoactive Substances in the Online Hungarian Media.

    PubMed

    Kassai, Szilvia; Rácz, József; Nagy, Alexandra; Bíbók, Tamás; Galambvári, Éva; Kilián, Csillag; Gyarmathy, V Anna

    2017-01-01

    Media monitoring is an important method to inform public health and prevention services about emerging health issues, such as new psychoactive substances (NPS). This study assessed the portrayal of NPS in online Hungarian media in 2015 using qualitative content analysis. Hungarian online media considers the dealer to be the main cause of drug use, which is portrayed as a problem for youth, poor people, minorities, and rural populations. The point of view of the articles is externalized, and so is the solution offered by them. From the perspective of the police or using a biomedical approach, the articles suggest that drug use is an individual (someone else's) problem, and the perspectives of insiders (such as users or addiction treatment professionals) are absent. The media portrays low socioeconomic background and the hopelessness of disadvantaged rural and mostly minority populations as the roots of NPS use, and misses the pressing incapability of health care emergency and drug treatment services to cope with the problem. The dominant portrayal of police raids is rarely counterbalanced by voices of active or recovering drug users or professionals in addiction treatment and harm reduction, who could offer a systematic solution to the apparent rapid spread of NPS use.

  17. Police-related experiences and HIV risk among female sex workers in Andhra Pradesh, India.

    PubMed

    Erausquin, Jennifer Toller; Reed, Elizabeth; Blankenship, Kim M

    2011-12-01

    Research suggests experiences with police are related to human immunodeficiency virus (HIV) sexual risk among women working as sex workers. However, little is known about the links between specific police-related behaviors and HIV vulnerability. We examine whether 5 police-related experiences are associated with measures of HIV risk and violence among a sample of female sex workers (FSWs) in Andhra Pradesh, India, and consider the implications for HIV prevention. FSWs at least 18 years of age (n = 835) were recruited through respondent-driven sampling for a cross-sectional survey conducted as part of Avahan, the India AIDS Initiative. Using logistic regression models adjusted for age, age at start of sex work, and sex work venue, we assessed police-related experiences reported by FSWs in relation to HIV risk behaviors and violence. Results showed having sex with police to avoid trouble, giving gifts to police to avoid trouble, having police take condoms away, experiencing a workplace raid, and being arrested were associated with sexually transmitted infection symptoms, inconsistent condom use, acceptance of more money for sex without a condom, and experience of client violence. These findings suggest a need for interventions targeting police-FSW interactions to reduce HIV vulnerability among FSWs.

  18. Honolulu and Waikiki

    NASA Technical Reports Server (NTRS)

    2002-01-01

    Honolulu is one of the most exotic resort destinations in the United States. Honolulu is located on Oahu, the most populated of the Hawaiian Islands. Just to the East of Honolulu is Waikiki Beach, with throngs of tourists and dozens of high-rise hotels. Overlooking Waikiki is Diamond Head, a volcanic crater formed from 70,000 to 500,000 years ago, long after Oahu's principle volcanoes-Ko'olau and Wai'anae-stopped erupting. North of Diamond Head are the eroded remains of Ko'olau. The clouds in the upper right hand corner of this image are an almost permanent feature of Oahu. Trade winds blowing from the northeast are stopped by the 3,000 foot (960 meter) high mountain range, where they rain out most of their moisture. As a result, the windward side of Oahu is usually cloudy, and the leeward side is relatively clear and dry. On the lefthand side of the image is Pearl Harbor, site of the Japanese air raid which drew America into World War II. The harbor still serves as a U.S. Navy base. The image was captured by the Landsat 7 satellite's Enhanced Thematic Mapper plus (ETM+) instrument on March 18, 2001. Image courtesy Landsat 7 Science Team

  19. Nuclear forensic analysis of an unknown uranium ore concentrate sample seized in a criminal investigation in Australia.

    PubMed

    Keegan, Elizabeth; Kristo, Michael J; Colella, Michael; Robel, Martin; Williams, Ross; Lindvall, Rachel; Eppich, Gary; Roberts, Sarah; Borg, Lars; Gaffney, Amy; Plaue, Jonathan; Wong, Henri; Davis, Joel; Loi, Elaine; Reinhard, Mark; Hutcheon, Ian

    2014-07-01

    Early in 2009, a state policing agency raided a clandestine drug laboratory in a suburb of a major city in Australia. During the search of the laboratory, a small glass jar labelled "Gamma Source" and containing a green powder was discovered. The powder was radioactive. This paper documents the detailed nuclear forensic analysis undertaken to characterise and identify the material and determine its provenance. Isotopic and impurity content, phase composition, microstructure and other characteristics were measured on the seized sample, and the results were compared with similar material obtained from the suspected source (ore and ore concentrate material). While an extensive range of parameters were measured, the key 'nuclear forensic signatures' used to identify the material were the U isotopic composition, Pb and Sr isotope ratios, and the rare earth element pattern. These measurements, in combination with statistical analysis of the elemental and isotopic content of the material against a database of uranium ore concentrates sourced from mines located worldwide, led to the conclusion that the seized material (a uranium ore concentrate of natural isotopic abundance) most likely originated from Mary Kathleen, a former Australian uranium mine. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  20. Nuclear forensic analysis of an unknown uranium ore concentrate sample seized in a criminal investigation in Australia

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keegan, Elizabeth; Kristo, Michael J.; Colella, Michael

    In early 2009, a state policing agency raided a clandestine drug laboratory in a suburb of a major city in Australia. While searching the laboratory, they discovered a small glass jar labelled “Gamma Source” and containing a green powder. The powder was radioactive. This paper documents the detailed nuclear forensic analysis undertaken to characterize and identify the material and determine its provenance. Isotopic and impurity content, phase composition, microstructure and other characteristics were measured on the seized sample, and the results were compared with similar material obtained from the suspected source (ore and ore concentrate material). While an extensive rangemore » of parameters were measured, the key ‘nuclear forensic signatures’ used to identify the material were the U isotopic composition, Pb and Sr isotope ratios, and the rare earth element pattern. These measurements, in combination with statistical analysis of the elemental and isotopic content of the material against a database of uranium ore concentrates sourced from mines located worldwide, led to the conclusion that the seized material (a uranium ore concentrate of natural isotopic abundance) most likely originated from Mary Kathleen, a former Australian uranium mine.« less

  1. Generalized Detectability for Discrete Event Systems

    PubMed Central

    Shu, Shaolong; Lin, Feng

    2011-01-01

    In our previous work, we investigated detectability of discrete event systems, which is defined as the ability to determine the current and subsequent states of a system based on observation. For different applications, we defined four types of detectabilities: (weak) detectability, strong detectability, (weak) periodic detectability, and strong periodic detectability. In this paper, we extend our results in three aspects. (1) We extend detectability from deterministic systems to nondeterministic systems. Such a generalization is necessary because there are many systems that need to be modeled as nondeterministic discrete event systems. (2) We develop polynomial algorithms to check strong detectability. The previous algorithms are based on observer whose construction is of exponential complexity, while the new algorithms are based on a new automaton called detector. (3) We extend detectability to D-detectability. While detectability requires determining the exact state of a system, D-detectability relaxes this requirement by asking only to distinguish certain pairs of states. With these extensions, the theory on detectability of discrete event systems becomes more applicable in solving many practical problems. PMID:21691432

  2. Point pattern match-based change detection in a constellation of previously detected objects

    DOEpatents

    Paglieroni, David W.

    2016-06-07

    A method and system is provided that applies attribute- and topology-based change detection to objects that were detected on previous scans of a medium. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, detection strength, size, elongation, orientation, etc. The locations define a three-dimensional network topology forming a constellation of previously detected objects. The change detection system stores attributes of the previously detected objects in a constellation database. The change detection system detects changes by comparing the attributes and topological consistency of newly detected objects encountered during a new scan of the medium to previously detected objects in the constellation database. The change detection system may receive the attributes of the newly detected objects as the objects are detected by an object detection system in real time.

  3. Research of the absorbance detection and fluorescence detection for multifunctional nutrition analyzer

    NASA Astrophysics Data System (ADS)

    Ni, Zhengyuan; Yan, Huimin; Ni, Xuxiang; Zhang, Xiuda

    2017-10-01

    The research of the multifunctional analyzer which integrates absorbance detection, fluorescence detection, time-resolved fluorescence detection, biochemical luminescence detection methods, can make efficient detection and analysis for a variety of human body nutrients. This article focuses on the absorbance detection and fluorescence detection system. The two systems are modular in design and controlled by embedded system, to achieve automatic measurement according to user settings. In the optical path design, the application of confocal design can improve the optical signal acquisition capability, and reduce the interference. A photon counter is used for detection, and a high performance counter module is designed to measure the output of photon counter. In the experiment, we use neutral density filters and potassium dichromate solution to test the absorbance detection system, and use fluorescein isothiocyanate FITC for fluorescence detection system performance test. The experimental results show that the absorbance detection system has a detection range of 0 4OD, and has good linearity in the detection range, while the fluorescence detection system has a high sensitivity of 1pmol/L concentration.

  4. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and each smoke detection system on a unit must— (1) Be approved by the Commandant; and (2) Have a visual...

  5. Imaging, object detection, and change detection with a polarized multistatic GPR array

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beer, N. Reginald; Paglieroni, David W.

    A polarized detection system performs imaging, object detection, and change detection factoring in the orientation of an object relative to the orientation of transceivers. The polarized detection system may operate on one of several modes of operation based on whether the imaging, object detection, or change detection is performed separately for each transceiver orientation. In combined change mode, the polarized detection system performs imaging, object detection, and change detection separately for each transceiver orientation, and then combines changes across polarizations. In combined object mode, the polarized detection system performs imaging and object detection separately for each transceiver orientation, and thenmore » combines objects across polarizations and performs change detection on the result. In combined image mode, the polarized detection system performs imaging separately for each transceiver orientation, and then combines images across polarizations and performs object detection followed by change detection on the result.« less

  6. Intrusion Detection in Control Systems using Sequence Characteristics

    NASA Astrophysics Data System (ADS)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  7. Supporting the Development and Adoption of Automatic Lameness Detection Systems in Dairy Cattle: Effect of System Cost and Performance on Potential Market Shares

    PubMed Central

    Van Weyenberg, Stephanie; Van Nuffel, Annelies; Lauwers, Ludwig; Vangeyte, Jürgen

    2017-01-01

    Simple Summary Most prototypes of systems to automatically detect lameness in dairy cattle are still not available on the market. Estimating their potential adoption rate could support developers in defining development goals towards commercially viable and well-adopted systems. We simulated the potential market shares of such prototypes to assess the effect of altering the system cost and detection performance on the potential adoption rate. We found that system cost and lameness detection performance indeed substantially influence the potential adoption rate. In order for farmers to prefer automatic detection over current visual detection, the usefulness that farmers attach to a system with specific characteristics should be higher than that of visual detection. As such, we concluded that low system costs and high detection performances are required before automatic lameness detection systems become applicable in practice. Abstract Most automatic lameness detection system prototypes have not yet been commercialized, and are hence not yet adopted in practice. Therefore, the objective of this study was to simulate the effect of detection performance (percentage missed lame cows and percentage false alarms) and system cost on the potential market share of three automatic lameness detection systems relative to visual detection: a system attached to the cow, a walkover system, and a camera system. Simulations were done using a utility model derived from survey responses obtained from dairy farmers in Flanders, Belgium. Overall, systems attached to the cow had the largest market potential, but were still not competitive with visual detection. Increasing the detection performance or lowering the system cost led to higher market shares for automatic systems at the expense of visual detection. The willingness to pay for extra performance was €2.57 per % less missed lame cows, €1.65 per % less false alerts, and €12.7 for lame leg indication, respectively. The presented results could be exploited by system designers to determine the effect of adjustments to the technology on a system’s potential adoption rate. PMID:28991188

  8. 46 CFR 161.002-2 - Types of fire-protective systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., but not be limited to, automatic fire and smoke detecting systems, manual fire alarm systems, sample extraction smoke detection systems, watchman's supervisory systems, and combinations of these systems. (b) Automatic fire detecting systems. For the purpose of this subpart, automatic fire and smoke detecting...

  9. 46 CFR 161.002-2 - Types of fire-protective systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., but not be limited to, automatic fire and smoke detecting systems, manual fire alarm systems, sample extraction smoke detection systems, watchman's supervisory systems, and combinations of these systems. (b) Automatic fire detecting systems. For the purpose of this subpart, automatic fire and smoke detecting...

  10. Detection probability of an in-stream passive integrated transponder (PIT) tag detection system for juvenile salmonids in the Klamath River, northern California, 2011

    USGS Publications Warehouse

    Beeman, John W.; Hayes, Brian; Wright, Katrina

    2012-01-01

    A series of in-stream passive integrated transponder (PIT) detection antennas installed across the Klamath River in August 2010 were tested using tagged fish in the summer of 2011. Six pass-by antennas were constructed and anchored to the bottom of the Klamath River at a site between the Shasta and Scott Rivers. Two of the six antennas malfunctioned during the spring of 2011 and two pass-through antennas were installed near the opposite shoreline prior to system testing. The detection probability of the PIT tag detection system was evaluated using yearling coho salmon implanted with a PIT tag and a radio transmitter and then released into the Klamath River slightly downstream of Iron Gate Dam. Cormack-Jolly-Seber capture-recapture methods were used to estimate the detection probability of the PIT tag detection system based on detections of PIT tags there and detections of radio transmitters at radio-telemetry detection systems downstream. One of the 43 PIT- and radio-tagged fish released was detected by the PIT tag detection system and 23 were detected by the radio-telemetry detection systems. The estimated detection probability of the PIT tag detection system was 0.043 (standard error 0.042). Eight PIT-tagged fish from other studies also were detected. Detections at the PIT tag detection system were at the two pass-through antennas and the pass-by antenna adjacent to them. Above average river discharge likely was a factor in the low detection probability of the PIT tag detection system. High discharges dislodged two power cables leaving 12 meters of the river width unsampled for PIT detections and resulted in water depths greater than the read distance of the antennas, which allowed fish to pass over much of the system with little chance of being detected. Improvements in detection probability may be expected under river discharge conditions where water depth over the antennas is within maximum read distance of the antennas. Improvements also may be expected if additional arrays of antennas are used.

  11. The design method and research status of vehicle detection system based on geomagnetic detection principle

    NASA Astrophysics Data System (ADS)

    Lin, Y. H.; Bai, R.; Qian, Z. H.

    2018-03-01

    Vehicle detection systems are applied to obtain real-time information of vehicles, realize traffic control and reduce traffic pressure. This paper reviews geomagnetic sensors as well as the research status of the vehicle detection system. Presented in the paper are also our work on the vehicle detection system, including detection algorithms and experimental results. It is found that the GMR based vehicle detection system has a detection accuracy up to 98% with a high potential for application in the road traffic control area.

  12. Detection technique of targets for missile defense system

    NASA Astrophysics Data System (ADS)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  13. Detection of cat-eye effect echo based on unit APD

    NASA Astrophysics Data System (ADS)

    Wu, Dong-Sheng; Zhang, Peng; Hu, Wen-Gang; Ying, Jia-Ju; Liu, Jie

    2016-10-01

    The cat-eye effect echo of optical system can be detected based on CCD, but the detection range is limited within several kilometers. In order to achieve long-range even ultra-long-range detection, it ought to select APD as detector because of the high sensitivity of APD. The detection system of cat-eye effect echo based on unit APD is designed in paper. The implementation scheme and key technology of the detection system is presented. The detection performances of the detection system including detection range, detection probability and false alarm probability are modeled. Based on the model, the performances of the detection system are analyzed using typical parameters. The results of numerical calculation show that the echo signal-to-noise ratio is greater than six, the detection probability is greater than 99.9% and the false alarm probability is less tan 0.1% within 20 km detection range. In order to verify the detection effect, we built the experimental platform of detection system according to the design scheme and carry out the field experiments. The experimental results agree well with the results of numerical calculation, which prove that the detection system based on the unit APD is feasible to realize remote detection for cat-eye effect echo.

  14. 46 CFR 27.203 - What are the requirements for fire detection on towing vessels?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... detection on towing vessels? You must have a fire-detection system installed on your vessel to detect engine... use an existing engine-room-monitoring system (with fire-detection capability) instead of a fire-detection system, if the monitoring system is operable and complies with this section. You must ensure that...

  15. Fusion of local and global detection systems to detect tuberculosis in chest radiographs.

    PubMed

    Hogeweg, Laurens; Mol, Christian; de Jong, Pim A; Dawson, Rodney; Ayles, Helen; van Ginneken, Bramin

    2010-01-01

    Automatic detection of tuberculosis (TB) on chest radiographs is a difficult problem because of the diverse presentation of the disease. A combination of detection systems for abnormalities and normal anatomy is used to improve detection performance. A textural abnormality detection system operating at the pixel level is combined with a clavicle detection system to suppress false positive responses. The output of a shape abnormality detection system operating at the image level is combined in a next step to further improve performance by reducing false negatives. Strategies for combining systems based on serial and parallel configurations were evaluated using the minimum, maximum, product, and mean probability combination rules. The performance of TB detection increased, as measured using the area under the ROC curve, from 0.67 for the textural abnormality detection system alone to 0.86 when the three systems were combined. The best result was achieved using the sum and product rule in a parallel combination of outputs.

  16. Development of a HIV-1 Virus Detection System Based on Nanotechnology.

    PubMed

    Lee, Jin-Ho; Oh, Byung-Keun; Choi, Jeong-Woo

    2015-04-27

    Development of a sensitive and selective detection system for pathogenic viral agents is essential for medical healthcare from diagnostics to therapeutics. However, conventional detection systems are time consuming, resource-intensive and tedious to perform. Hence, the demand for sensitive and selective detection system for virus are highly increasing. To attain this aim, different aspects and techniques have been applied to develop virus sensor with improved sensitivity and selectivity. Here, among those aspects and techniques, this article reviews HIV virus particle detection systems incorporated with nanotechnology to enhance the sensitivity. This review mainly focused on four different detection system including vertically configured electrical detection based on scanning tunneling microscopy (STM), electrochemical detection based on direct electron transfer in virus, optical detection system based on localized surface plasmon resonance (LSPR) and surface enhanced Raman spectroscopy (SERS) using plasmonic nanoparticle.

  17. 46 CFR 108.413 - Fusible element fire detection system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the system...

  18. An immunity-based anomaly detection system with sensor agents.

    PubMed

    Okamoto, Takeshi; Ishida, Yoshiteru

    2009-01-01

    This paper proposes an immunity-based anomaly detection system with sensor agents based on the specificity and diversity of the immune system. Each agent is specialized to react to the behavior of a specific user. Multiple diverse agents decide whether the behavior is normal or abnormal. Conventional systems have used only a single sensor to detect anomalies, while the immunity-based system makes use of multiple sensors, which leads to improvements in detection accuracy. In addition, we propose an evaluation framework for the anomaly detection system, which is capable of evaluating the differences in detection accuracy between internal and external anomalies. This paper focuses on anomaly detection in user's command sequences on UNIX-like systems. In experiments, the immunity-based system outperformed some of the best conventional systems.

  19. Nucleic acid detection system and method for detecting influenza

    DOEpatents

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  20. The estimation method on diffusion spot energy concentration of the detection system

    NASA Astrophysics Data System (ADS)

    Gao, Wei; Song, Zongxi; Liu, Feng; Dan, Lijun; Sun, Zhonghan; Du, Yunfei

    2016-09-01

    We propose a method to estimate the diffusion spot energy of the detection system. We do outdoor observation experiments in Xinglong Observatory, by using a detection system which diffusion spot energy concentration is estimated (the correlation coefficient is approximate 0.9926).The aperture of system is 300mm and limiting magnitude of system is 14.15Mv. Observation experiments show that the highest detecting magnitude of estimated system is 13.96Mv, and the average detecting magnitude of estimated system is about 13.5Mv. The results indicate that this method can be used to evaluate the energy diffusion spot concentration level of detection system efficiently.

  1. 46 CFR 108.411 - Smoke detection system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a smoke detection system must be located on the overhead of the compartment protected by the system in a location...

  2. Alkaloid venom weaponry of three Megalomyrmex thief ants and the behavioral response of Cyphomyrmex costatus host ants.

    PubMed

    Adams, Rachelle M M; Jones, Tappey H; Longino, John T; Weatherford, Robert G; Mueller, Ulrich G

    2015-04-01

    Social parasites exploit other societies by invading and stealing resources. Some enter protected nests using offensive chemical weaponry made from alkaloid-based venom. We characterized the venoms of three Megalomyrmex thief ant species (M. mondabora, M. mondaboroides, and M. silvestrii) that parasitize the fungus-growing ants, and developed an ethogram to describe host ant reactions to raiding M. mondaboroides and M. silvestrii parasites. We compared piperidine, pyrrolidine, and pyrolizidine venom alkaloid structures with synthetic samples from previous studies, and describe the novel stereochemistry of trans 2-hexyl-5-[8-oxononyl]-pyrrolidine (3) from M. mondabora. We showed that workers of Cyphomyrmex costatus, the host of M. mondaboroides and M. silvestrii, react to a sting by Megalomyrmex parasites mainly with submissive behavior, playing dead or retreating. Host submission also followed brief antennal contact. The behavior of C. costatus ants observed in this study was similar to that of Cyphomyrmex cornutus, host of M. mondabora, suggesting that the alkaloidal venoms with pyrrolidines from M. mondabora, piperidines from M. mondaboroides, and pyrolizidines from M. silvestrii may function similarly as appeasement and repellent allomones against host ants, despite their different chemical structure. With the use of these chemical weapons, the Megalomyrmex thief ants are met with little host resistance and easily exploit host colony resources.

  3. Performance and prospects of payments for ecosystem services programs: evidence from China.

    PubMed

    Yang, Wu; Liu, Wei; Viña, Andrés; Luo, Junyan; He, Guangming; Ouyang, Zhiyun; Zhang, Hemin; Liu, Jianguo

    2013-09-30

    Systematic evaluation of the environmental and socioeconomic effects of Payments for Ecosystem Services (PES) programs is crucial for guiding policy design and implementation. We evaluated the performance of the Natural Forest Conservation Program (NFCP), a national PES program of China, in the Wolong Nature Reserve for giant pandas. The environmental effects of the NFCP were evaluated through a historical trend (1965-2001) analysis of forest cover to estimate a counter-factual (i.e., without-PES) forest cover baseline for 2007. The socioeconomic effects of the NFCP were evaluated using data collected through household interviews carried out before and after NFCP implementation in 2001. Our results suggest that the NFCP was not only significantly associated with increases in forest cover, but also had both positive (e.g., labor reduction for fuelwood collection) and negative (e.g., economic losses due to crop raiding by wildlife) effects on local households. Results from this study emphasize the importance of integrating local conditions and understanding underlying mechanisms to enhance the performance of PES programs. Our findings are useful for the design and implementation of successful conservation policies not only in our study area but also in similar places around the world. Copyright © 2013 Elsevier Ltd. All rights reserved.

  4. Gambling in revolutionary Paris - The Palais Royal: 1789-1838.

    PubMed

    Barnhart, R T

    1992-06-01

    By the revolution of 1789, the four-story, quadrangular Palais Royal in Paris had become the most glittering tourist center of Europe, with 180 shops and cafes in its ground floor arcades. By 1791, its basement and secondary story contained over 100 separate, illicit gambling operations featuring the most popular dice and card games. The mania for gambling had been transferred from defunct, monarchical Versailles to the thriving, bourgeois Palais Royal, where the five main gaming clubs throbbed from noon till midnight. During the Revolution, Prince Talleyrand won 30,000 francs at one club, and after Waterloo in 1815, Marshal Blucher lost 1,500,000 francs in one night at another. To bring the situation under control and raise taxes for the state, in 1806 Napoleon legalized the main clubs, which from 1819 to 1837 grossed an enormous 137 million francs. When the anti-gambling forces triumphed in 1837 and the clubs were closed down, the National Guard had to be called out to evict the mobs of gamblers who refused to leave the tables. Dramatic reports from Revolutionary police raids, and quotations from the memoirs of humorous French gamblers and shocked foreign visitors, provide anecdotal illustrations of the 49 years during which the Palais Royal was the most intriguing and picturesque gambling mecca of Europe-and probably of the world.

  5. [President J. H. Brand and his medical history].

    PubMed

    Retief, F P

    1981-03-14

    During his term of office of 25 years (1863-1888) Johannes Hendrikus Brand, fourth President of the Orange Free State, proved himself a remarkable statesman of international stature. Born in the Cape Town of Lord Charles Somerset he was educated in the British tradition, and later received knighthoods from both Portugal and Britain. However, in converting his young embryonic state into South Africa's 'Model Republic' he showed himself to be a staunch republican. Total loyalty towards his country of adoption was aptly demonstrated by his uncompromising stand over the British annexation of the diamond fields in 1871. While preparing to put his case before the Colonial Secretary in London, he developed Bright's disease at the age of 49 years in August 1872. After an extreme illness lasting 5 months he appeared to recover fully. His subsequent health was excellent up to the end of the next decade when he developed symptoms of heart failure, epistaxis and possibly a cerebrovascular incident. In March 1888 his two Bloemfontein doctors, C. J. G. Krause and B. O. Kellner, in consultation with Dr Leander Starr Jameson (of Jameson Raid fame) diagnosed a recurrence of his kidney ailment and progressive heart disease. His death on 14 July 1888 was probably due to acute left ventricular failure as a late hypertensive complication of glomerulonephritis.

  6. Initial results on computational performance of Intel Many Integrated Core (MIC) architecture: implementation of the Weather and Research Forecasting (WRF) Purdue-Lin microphysics scheme

    NASA Astrophysics Data System (ADS)

    Mielikainen, Jarno; Huang, Bormin; Huang, Allen H.

    2014-10-01

    Purdue-Lin scheme is a relatively sophisticated microphysics scheme in the Weather Research and Forecasting (WRF) model. The scheme includes six classes of hydro meteors: water vapor, cloud water, raid, cloud ice, snow and graupel. The scheme is very suitable for massively parallel computation as there are no interactions among horizontal grid points. In this paper, we accelerate the Purdue Lin scheme using Intel Many Integrated Core Architecture (MIC) hardware. The Intel Xeon Phi is a high performance coprocessor consists of up to 61 cores. The Xeon Phi is connected to a CPU via the PCI Express (PICe) bus. In this paper, we will discuss in detail the code optimization issues encountered while tuning the Purdue-Lin microphysics Fortran code for Xeon Phi. In particularly, getting a good performance required utilizing multiple cores, the wide vector operations and make efficient use of memory. The results show that the optimizations improved performance of the original code on Xeon Phi 5110P by a factor of 4.2x. Furthermore, the same optimizations improved performance on Intel Xeon E5-2603 CPU by a factor of 1.2x compared to the original code.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hancock, R.G.V.; Farquhar, R.M.; Pavlish, L.A.

    In 1639, French Jesuit missionaries established the fortified mission of Ste. Marie I at Midland, Ontario. Ten years later, following a series of Iroquoian war-party raids that were facilitated by Dutch and English trading interests, the mission was abandoned and destroyed. The missionaries and local Wendats (Hurons) debated new venues, finally settling on Christian Island in southwestern Georgian Bay as a temporary safe haven rather than their original first choice, the more distant and safer Manitoulin Island. In 1649, they began establishing the fortified mission of Ste. Marie 11. A Wendat settlement existed on the island, but unlike the fortmore » whose walls are intact today, little evidence remains of the island`s single-year population of {approximately} 10000 Wendats, most of whom perished. There was extreme deprivation on the island during the winter of 1649-1650. People died of famine, disease, and ill-fated sorties to the mainland. In June of 1650, after a single year of occupation, the site of Ste. Marie 11 was abandoned when the missionaries were recalled to the relative safety of Quebec City. The remaining Wendats were either assimilated by other groups or killed by the Iroquois. An analysis was performed of the brass goods discarded in the area of the island fort and nearby villages.« less

  8. First evidence for slave rebellion: enslaved ant workers systematically kill the brood of their social parasite protomognathus americanus.

    PubMed

    Achenbach, Alexandra; Foitzik, Susanne

    2009-04-01

    During the process of coevolution, social parasites have evolved sophisticated strategies to exploit the brood care behavior of their social hosts. Slave-making ant queens invade host colonies and kill or eject all adult host ants. Host workers, which eclose from the remaining brood, are tricked into caring for the parasite brood. Due to their high prevalence and frequent raids, following which stolen host broods are similarly enslaved, slave-making ants exert substantial selection upon their hosts, leading to the evolution of antiparasite adaptations. However, all host defenses shown to date are active before host workers are parasitized, whereas selection was thought to be unable to act on traits of already enslaved hosts. Yet, here we demonstrate the rebellion of enslaved Temnothorax workers, which kill two-thirds of the female pupae of the slave-making ant Protomognathus americanus. Thereby, slaves decrease the long-term parasite impact on surrounding related host colonies. This novel antiparasite strategy of enslaved workers constitutes a new level in the coevolutionary battle after host colony defense has failed. Our discovery is analogous to recent findings in hosts of avian brood parasites where perfect mimicry of parasite eggs leads to the evolution of chick recognition as a second line of defense.

  9. The dissemination of multiple sclerosis: a Viking saga? A historical essay.

    PubMed

    Poser, C M

    1994-12-01

    The highest prevalence rates for multiple sclerosis are found in Iceland, Scandinavia, the British Isles, and the countries settled by their inhabitants and their descendants, that is, the United States, Canada, Australia, and New Zealand. This suggests that the Vikings may have been instrumental in disseminating the genetic susceptibility to the disease in those areas as well as in other parts of the world. The Vikings raided in most European countries and settled in Normandy and in Sicily and southern Italy. They engaged in trade with the Arabs along the river routes to the Caucasus and to the Black and Caspian Seas and penetrated into Persia, India, and probably China. They also migrated to the East and established the Russian state. Under the name Varangians, they became part of the Byzantine army and were active in all of the military activities of the Byzantine Empire. They participated in the Crusades. Russians, many of Scandinavian origin, also constituted a regiment of the Mongol army and roamed throughout that empire as well. The custom of capturing and keeping or selling women and children, which was widespread in the early Middle Ages, as well as the flourishing slave trade in men, were important factors in this genetic dissemination.

  10. Police-Related Experiences and HIV Risk Among Female Sex Workers in Andhra Pradesh, India

    PubMed Central

    Reed, Elizabeth; Blankenship, Kim M.

    2011-01-01

    Research suggests experiences with police are related to human immunodeficiency virus (HIV) sexual risk among women working as sex workers. However, little is known about the links between specific police-related behaviors and HIV vulnerability. We examine whether 5 police-related experiences are associated with measures of HIV risk and violence among a sample of female sex workers (FSWs) in Andhra Pradesh, India, and consider the implications for HIV prevention. FSWs at least 18 years of age (n = 835) were recruited through respondent-driven sampling for a cross-sectional survey conducted as part of Avahan, the India AIDS Initiative. Using logistic regression models adjusted for age, age at start of sex work, and sex work venue, we assessed police-related experiences reported by FSWs in relation to HIV risk behaviors and violence. Results showed having sex with police to avoid trouble, giving gifts to police to avoid trouble, having police take condoms away, experiencing a workplace raid, and being arrested were associated with sexually transmitted infection symptoms, inconsistent condom use, acceptance of more money for sex without a condom, and experience of client violence. These findings suggest a need for interventions targeting police–FSW interactions to reduce HIV vulnerability among FSWs. PMID:22043036

  11. Working memory constraints on the processing of syntactic ambiguity.

    PubMed

    MacDonald, M C; Just, M A; Carpenter, P A

    1992-01-01

    We propose a model that explains how the working-memory capacity of a comprehender can constrain syntactic parsing and thereby affect the processing of syntactic ambiguities. The model's predictions are examined in four experiments that measure the reading times for two constructions that contain a temporary syntactic ambiguity. An example of the syntactic ambiguity is The soldiers warned about the dangers . . . ; the verb warned may either be the main verb, in which case soldiers is the agent; or the verb warned may introduce a relative clause, in which case soldiers is the patient of warned rather than the agent, as in The soldiers warned about the dangers conducted the midnight raid. The model proposes that both alternative interpretations of warned are initially activated. However, the duration for which both interpretations are maintained depends, in part, on the reader's working-memory capacity, which can be assessed by the Reading Span task (Daneman & Carpenter, 1980). The word-by-word reading times indicate that all subjects do additional processing after encountering an ambiguity, suggesting that they generate both representations. Furthermore, readers with larger working-memory capacities maintain both representations for some period of time (several words), whereas readers with smaller working-memory capacities revert to maintaining only the more likely representation.

  12. Collocated Dataglyphs for large-message storage and retrieval

    NASA Astrophysics Data System (ADS)

    Motwani, Rakhi C.; Breidenbach, Jeff A.; Black, John R.

    2004-06-01

    In contrast to the security and integrity of electronic files, printed documents are vulnerable to damage and forgery due to their physical nature. Researchers at Palo Alto Research Center utilize DataGlyph technology to render digital characteristics to printed documents, which provides them with the facility of tamper-proof authentication and damage resistance. This DataGlyph document is known as GlyphSeal. Limited DataGlyph carrying capacity per printed page restricted the application of this technology to a domain of graphically simple and small-sized single-paged documents. In this paper the authors design a protocol motivated by techniques from the networking domain and back-up strategies, which extends the GlyphSeal technology to larger-sized, graphically complex, multi-page documents. This protocol provides fragmentation, sequencing and data loss recovery. The Collocated DataGlyph Protocol renders large glyph messages onto multiple printed pages and recovers the glyph data from rescanned versions of the multi-page documents, even when pages are missing, reordered or damaged. The novelty of this protocol is the application of ideas from RAID to the domain of DataGlyphs. The current revision of this protocol is capable of generating at most 255 pages, if page recovery is desired and does not provide enough data density to store highly detailed images in a reasonable amount of page space.

  13. Does war beget child aggression? Military violence, gender, age and aggressive behavior in two Palestinian samples.

    PubMed

    Qouta, Samir; Punamäki, Raija-Leena; Miller, Thomas; El-Sarraj, Eyad

    2008-01-01

    We examined, first, the relations between children's exposure to military violence and their aggressive behavior and the role of age and gender in that relation in two Palestinian samples. Second, we tested parenting practices as a moderator of the relation between exposure to military violence and aggressive behavior, and third, whether exposure to military violence of different nature (direct victimization versus witnessing) has specific associations with different forms of aggression (reactive, proactive and aggression-enjoyment). Study I was conducted in a relatively calm military-political atmosphere in Palestine-Gaza, and included 640 children, aged 6-16 years whose parents (N=622) and teachers (N=457) provided reports. Older children (> or =12 years) provided self-reports (N=211). Study II included 225 Palestinian children aged 10-14-year, who participated during a high-violence period of the Al Aqsa Intifada characterized by air raids, killing and destruction. Results showed that witnessing severe military violence was associated with children's aggressive and antisocial behavior (parent-reported) in study I, and with proactive, reactive and aggression-enjoyment (child-reported) in the study II. As hypothesized, good and supporting parenting practices could moderate the link between exposure to military violence and aggressive behavior. Aggr. Copyright 2007 Wiley-Liss, Inc.

  14. Emerging and reemerging epidemic-prone diseases among settling nomadic pastoralists in Uganda.

    PubMed

    Cummings, Matthew J; Wamala, Joseph F; Komakech, Innocent; Malimbo, Mugagga; Lukwago, Luswa

    2014-09-01

    Epidemic-prone diseases have traditionally been uncommon among nomadic pastoralists as mobility allows already dispersed populations to migrate away from epidemic threats. In the Karamoja region of Uganda, nomadic pastoralists are transitioning to an increasingly settled lifestyle due to cattle raiding and associated civil insecurity. In attempts to reduce conflict in the region, the Ugandan government has instituted disarmament campaigns and encouraged sedentism in place of mobility. In Karamoja, this transition to sedentism has contributed to the emergence and reemergence of epidemic-prone diseases such as cholera, hepatitis E, yellow fever, and meningococcal meningitis. The incidence of these diseases remains difficult to measure and several challenges exist to their control. Challenges to communicable disease surveillance and control among settling nomadic pastoralists are related to nomadic mobility, remote geography, vaccination and immunity, and poor sanitation and safe water access. In addition to improving gaps in infrastructure, attracting well-trained government health workers to Karamoja and similar areas with longstanding human resource limitations is critical to address the challenges to epidemic-prone disease surveillance and control among settling nomadic pastoralists. In conjunction with government health workers, community health teams provide a sustainable method by which public health programs can be improved in the austere environments inhabited by mobile and settling pastoralists. Copyright © 2014 Elsevier B.V. All rights reserved.

  15. The simulation study on optical target laser active detection performance

    NASA Astrophysics Data System (ADS)

    Li, Ying-chun; Hou, Zhao-fei; Fan, Youchen

    2014-12-01

    According to the working principle of laser active detection system, the paper establishes the optical target laser active detection simulation system, carry out the simulation study on the detection process and detection performance of the system. For instance, the performance model such as the laser emitting, the laser propagation in the atmosphere, the reflection of optical target, the receiver detection system, the signal processing and recognition. We focus on the analysis and modeling the relationship between the laser emitting angle and defocus amount and "cat eye" effect echo laser in the reflection of optical target. Further, in the paper some performance index such as operating range, SNR and the probability of the system have been simulated. The parameters including laser emitting parameters, the reflection of the optical target and the laser propagation in the atmosphere which make a great influence on the performance of the optical target laser active detection system. Finally, using the object-oriented software design methods, the laser active detection system with the opening type, complete function and operating platform, realizes the process simulation that the detection system detect and recognize the optical target, complete the performance simulation of each subsystem, and generate the data report and the graph. It can make the laser active detection system performance models more intuitive because of the visible simulation process. The simulation data obtained from the system provide a reference to adjust the structure of the system parameters. And it provides theoretical and technical support for the top level design of the optical target laser active detection system and performance index optimization.

  16. Real-time system for imaging and object detection with a multistatic GPR array

    DOEpatents

    Paglieroni, David W; Beer, N Reginald; Bond, Steven W; Top, Philip L; Chambers, David H; Mast, Jeffrey E; Donetti, John G; Mason, Blake C; Jones, Steven M

    2014-10-07

    A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the imaging and detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across the surface and that travels down the surface. The imaging and detection system pre-processes the return signal to suppress certain undesirable effects. The imaging and detection system then generates synthetic aperture radar images from real aperture radar images generated from the pre-processed return signal. The imaging and detection system then post-processes the synthetic aperture radar images to improve detection of subsurface objects. The imaging and detection system identifies peaks in the energy levels of the post-processed image frame, which indicates the presence of a subsurface object.

  17. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Fire detection system. 108.405 Section 108.405 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and...

  18. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Fire detection system. 108.405 Section 108.405 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and...

  19. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Fire detection system. 108.405 Section 108.405 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and...

  20. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Fire detection system. 108.405 Section 108.405 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and...

  1. 46 CFR 161.002-15 - Sample extraction smoke detection systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 6 2010-10-01 2010-10-01 false Sample extraction smoke detection systems. 161.002-15..., CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL ELECTRICAL EQUIPMENT Fire-Protective Systems § 161.002-15 Sample extraction smoke detection systems. The smoke detecting system must consist of a means for...

  2. 46 CFR 108.404 - Selection of fire detection system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Selection of fire detection system. 108.404 Section 108... DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If a... space. (b) The fire detection system must be designed to minimize false alarms. ...

  3. A stereo vision-based obstacle detection system in vehicles

    NASA Astrophysics Data System (ADS)

    Huh, Kunsoo; Park, Jaehak; Hwang, Junyeon; Hong, Daegun

    2008-02-01

    Obstacle detection is a crucial issue for driver assistance systems as well as for autonomous vehicle guidance function and it has to be performed with high reliability to avoid any potential collision with the front vehicle. The vision-based obstacle detection systems are regarded promising for this purpose because they require little infrastructure on a highway. However, the feasibility of these systems in passenger car requires accurate and robust sensing performance. In this paper, an obstacle detection system using stereo vision sensors is developed. This system utilizes feature matching, epipoplar constraint and feature aggregation in order to robustly detect the initial corresponding pairs. After the initial detection, the system executes the tracking algorithm for the obstacles. The proposed system can detect a front obstacle, a leading vehicle and a vehicle cutting into the lane. Then, the position parameters of the obstacles and leading vehicles can be obtained. The proposed obstacle detection system is implemented on a passenger car and its performance is verified experimentally.

  4. Improvement of the Raman detection system for pesticide residues on/in fruits and vegetables

    NASA Astrophysics Data System (ADS)

    Li, Yan; Peng, Yankun; Zhai, Chen; Chao, Kuanglin; Qin, Jianwei

    2017-05-01

    Pesticide residue is one of the major challenges to fruits safety, while the traditional detection methods of pesticide residue on fruits and vegetables can't afford the demand of rapid detection in actual production because of timeconsuming. Thus rapid identification and detection methods for pesticide residue are urgently needed at present. While most Raman detection systems in the market are spot detection systems, which limits the range of application. In the study, our lab develops a Raman detection system to achieve area-scan thorough the self-developed spot detection Raman system with a control software and two devices. In the system, the scanning area is composed of many scanning spots, which means every spot needs to be detected and more time will be taken than area-scan Raman system. But lower detection limit will be achieved in this method. And some detection device is needed towards fruits and vegetables in different shape. Two detection devices are developed to detect spherical fruits and leaf vegetables. During the detection, the device will make spherical fruit rotate along its axis of symmetry, and leaf vegetables will be pressed in the test surface smoothly. The detection probe will be set to keep a proper distance to the surface of fruits and vegetables. It should make sure the laser shins on the surface of spherical fruit vertically. And two software are used to detect spherical fruits and leaf vegetables will be integrated to one, which make the operator easier to switch. Accordingly two detection devices for spherical fruits and leaf vegetables will also be portable devices to make it easier to change. In the study, a new way is developed to achieve area-scan result by spot-scan Raman detection system.

  5. Supporting the Development and Adoption of Automatic Lameness Detection Systems in Dairy Cattle: Effect of System Cost and Performance on Potential Market Shares.

    PubMed

    Van De Gucht, Tim; Van Weyenberg, Stephanie; Van Nuffel, Annelies; Lauwers, Ludwig; Vangeyte, Jürgen; Saeys, Wouter

    2017-10-08

    Most automatic lameness detection system prototypes have not yet been commercialized, and are hence not yet adopted in practice. Therefore, the objective of this study was to simulate the effect of detection performance (percentage missed lame cows and percentage false alarms) and system cost on the potential market share of three automatic lameness detection systems relative to visual detection: a system attached to the cow, a walkover system, and a camera system. Simulations were done using a utility model derived from survey responses obtained from dairy farmers in Flanders, Belgium. Overall, systems attached to the cow had the largest market potential, but were still not competitive with visual detection. Increasing the detection performance or lowering the system cost led to higher market shares for automatic systems at the expense of visual detection. The willingness to pay for extra performance was €2.57 per % less missed lame cows, €1.65 per % less false alerts, and €12.7 for lame leg indication, respectively. The presented results could be exploited by system designers to determine the effect of adjustments to the technology on a system's potential adoption rate.

  6. NASA's Earth Observing System Data and Information System - Many Mechanisms for On-Going Evolution

    NASA Astrophysics Data System (ADS)

    Ramapriyan, H. K.

    2012-12-01

    NASA's Earth Observing System Data and Information System has been serving a broad user community since August 1994. As a long-lived multi-mission system serving multiple scientific disciplines and a diverse user community, EOSDIS has been evolving continuously. It has had and continues to have many forms of community input to help with this evolution. Early in its history, it had inputs from the EOSDIS Advisory Panel, benefited from the reviews by various external committees and evolved into the present distributed architecture with discipline-based Distributed Active Archive Centers (DAACs), Science Investigator-led Processing Systems and a cross-DAAC search and data access capability. EOSDIS evolution has been helped by advances in computer technology, moving from an initially planned supercomputing environment to SGI workstations to Linux Clusters for computation and from near-line archives of robotic silos with tape cassettes to RAID-disk-based on-line archives for storage. The network capacities have increased steadily over the years making delivery of data on media almost obsolete. The advances in information systems technologies have been having an even greater impact on the evolution of EOSDIS. In the early days, the advent of the World Wide Web came as a game-changer in the operation of EOSDIS. The metadata model developed for the EOSDIS Core System for representing metadata from EOS standard data products has had an influence on the Federal Geographic Data Committee's metadata content standard and the ISO metadata standards. The influence works both ways. As ISO 19115 metadata standard has developed in recent years, EOSDIS is reviewing its metadata to ensure compliance with the standard. Improvements have been made in the cross-DAAC search and access of data using the centralized metadata clearing house (EOS Clearing House - ECHO) and the client Reverb. Given the diversity of the Earth science disciplines served by the DAACs, the DAACs have developed a number of software tools tailored to their respective user communities. Web services play an important part in improved access to data products including some basic analysis and visualization capabilities. A coherent view into all capabilities available from EOSDIS is evolving through the "Coherent Web" effort. Data are being made available in near real-time for scientific research as well as time-critical applications. On-going community inputs for infusion for maintaining vitality of EOSDIS come from technology developments by NASA-sponsored community data system programs - Advancing Collaborative Connections for Earth System Science (ACCESS), Making Earth System Data Records for Use in Research Environments (MEaSUREs) and Applied Information System Technology (AIST), as well as participation in Earth Science Data System Working Groups, the Earth Science Information Partners Federation and other interagency/international activities. An important source of community needs is the annual American Customer Satisfaction Index survey of EOSDIS users. Some of the key areas in which improvements are required and incremental progress is being made are: ease of discovery and access; cross-organizational interoperability; data inter-use; ease of collaboration; ease of citation of datasets; preservation of provenance and context and making them conveniently available to users.

  7. 46 CFR 108.409 - Location and spacing of tubing in pneumatic fire detection system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... detection system. 108.409 Section 108.409 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... and spacing of tubing in pneumatic fire detection system. (a) All tubing in a pneumatic fire detection... exposed in the space. (c) A pneumatic fire detection system must be set to activate after approximately a...

  8. 21 CFR 866.5900 - Cystic fibrosis transmembrane conductance regulator (CFTR) gene mutation detection system.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... regulator (CFTR) gene mutation detection system. 866.5900 Section 866.5900 Food and Drugs FOOD AND DRUG...) gene mutation detection system. (a) Identification. The CFTR gene mutation detection system is a device used to simultaneously detect and identify a panel of mutations and variants in the CFTR gene. It is...

  9. 21 CFR 866.5900 - Cystic fibrosis transmembrane conductance regulator (CFTR) gene mutation detection system.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... regulator (CFTR) gene mutation detection system. 866.5900 Section 866.5900 Food and Drugs FOOD AND DRUG...) gene mutation detection system. (a) Identification. The CFTR gene mutation detection system is a device used to simultaneously detect and identify a panel of mutations and variants in the CFTR gene. It is...

  10. 21 CFR 866.5900 - Cystic fibrosis transmembrane conductance regulator (CFTR) gene mutation detection system.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... regulator (CFTR) gene mutation detection system. 866.5900 Section 866.5900 Food and Drugs FOOD AND DRUG...) gene mutation detection system. (a) Identification. The CFTR gene mutation detection system is a device used to simultaneously detect and identify a panel of mutations and variants in the CFTR gene. It is...

  11. 21 CFR 866.5900 - Cystic fibrosis transmembrane conductance regulator (CFTR) gene mutation detection system.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... regulator (CFTR) gene mutation detection system. 866.5900 Section 866.5900 Food and Drugs FOOD AND DRUG...) gene mutation detection system. (a) Identification. The CFTR gene mutation detection system is a device used to simultaneously detect and identify a panel of mutations and variants in the CFTR gene. It is...

  12. Large-scale automated image analysis for computational profiling of brain tissue surrounding implanted neuroprosthetic devices using Python.

    PubMed

    Rey-Villamizar, Nicolas; Somasundar, Vinay; Megjhani, Murad; Xu, Yan; Lu, Yanbin; Padmanabhan, Raghav; Trett, Kristen; Shain, William; Roysam, Badri

    2014-01-01

    In this article, we describe the use of Python for large-scale automated server-based bio-image analysis in FARSIGHT, a free and open-source toolkit of image analysis methods for quantitative studies of complex and dynamic tissue microenvironments imaged by modern optical microscopes, including confocal, multi-spectral, multi-photon, and time-lapse systems. The core FARSIGHT modules for image segmentation, feature extraction, tracking, and machine learning are written in C++, leveraging widely used libraries including ITK, VTK, Boost, and Qt. For solving complex image analysis tasks, these modules must be combined into scripts using Python. As a concrete example, we consider the problem of analyzing 3-D multi-spectral images of brain tissue surrounding implanted neuroprosthetic devices, acquired using high-throughput multi-spectral spinning disk step-and-repeat confocal microscopy. The resulting images typically contain 5 fluorescent channels. Each channel consists of 6000 × 10,000 × 500 voxels with 16 bits/voxel, implying image sizes exceeding 250 GB. These images must be mosaicked, pre-processed to overcome imaging artifacts, and segmented to enable cellular-scale feature extraction. The features are used to identify cell types, and perform large-scale analysis for identifying spatial distributions of specific cell types relative to the device. Python was used to build a server-based script (Dell 910 PowerEdge servers with 4 sockets/server with 10 cores each, 2 threads per core and 1TB of RAM running on Red Hat Enterprise Linux linked to a RAID 5 SAN) capable of routinely handling image datasets at this scale and performing all these processing steps in a collaborative multi-user multi-platform environment. Our Python script enables efficient data storage and movement between computers and storage servers, logs all the processing steps, and performs full multi-threaded execution of all codes, including open and closed-source third party libraries.

  13. Buried object detection in GPR images

    DOEpatents

    Paglieroni, David W; Chambers, David H; Bond, Steven W; Beer, W. Reginald

    2014-04-29

    A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the imaging and detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across the surface and that travels down the surface. The imaging and detection system pre-processes the return signal to suppress certain undesirable effects. The imaging and detection system then generates synthetic aperture radar images from real aperture radar images generated from the pre-processed return signal. The imaging and detection system then post-processes the synthetic aperture radar images to improve detection of subsurface objects. The imaging and detection system identifies peaks in the energy levels of the post-processed image frame, which indicates the presence of a subsurface object.

  14. An automatically tuning intrusion detection system.

    PubMed

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  15. Integrated Performance Testing Workshop, Modules 6 - 11

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leach, Janice; Torres, Teresa M.

    These modules cover performance testing of: Interior Detection Systems; Access Controls; Exterior Detection Systems; Video Assessment Systems; SNM / Contraband Detection Systems; Access Delay Elements

  16. 46 CFR 108.407 - Detectors for electric fire detection system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Detectors for electric fire detection system. 108.407... DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.407 Detectors for electric fire detection system. (a) Each detector in an electric fire detection system must be located where— (1) No...

  17. Microcontroller based driver alertness detection systems to detect drowsiness

    NASA Astrophysics Data System (ADS)

    Adenin, Hasibah; Zahari, Rahimi; Lim, Tiong Hoo

    2018-04-01

    The advancement of embedded system for detecting and preventing drowsiness in a vehicle is a major challenge for road traffic accident systems. To prevent drowsiness while driving, it is necessary to have an alert system that can detect a decline in driver concentration and send a signal to the driver. Studies have shown that traffc accidents usually occur when the driver is distracted while driving. In this paper, we have reviewed a number of detection systems to monitor the concentration of a car driver and propose a portable Driver Alertness Detection System (DADS) to determine the level of concentration of the driver based on pixelated coloration detection technique using facial recognition. A portable camera will be placed at the front visor to capture facial expression and the eye activities. We evaluate DADS using 26 participants and have achieved 100% detection rate with good lighting condition and a low detection rate at night.

  18. Data acquisition system

    DOEpatents

    Shapiro, Stephen L.; Mani, Sudhindra; Atlas, Eugene L.; Cords, Dieter H. W.; Holbrook, Britt

    1997-01-01

    A data acquisition circuit for a particle detection system that allows for time tagging of particles detected by the system. The particle detection system screens out background noise and discriminate between hits from scattered and unscattered particles. The detection system can also be adapted to detect a wide variety of particle types. The detection system utilizes a particle detection pixel array, each pixel containing a back-biased PIN diode, and a data acquisition pixel array. Each pixel in the particle detection pixel array is in electrical contact with a pixel in the data acquisition pixel array. In response to a particle hit, the affected PIN diodes generate a current, which is detected by the corresponding data acquisition pixels. This current is integrated to produce a voltage across a capacitor, the voltage being related to the amount of energy deposited in the pixel by the particle. The current is also used to trigger a read of the pixel hit by the particle.

  19. Adaptable radiation monitoring system and method

    DOEpatents

    Archer, Daniel E [Livermore, CA; Beauchamp, Brock R [San Ramon, CA; Mauger, G Joseph [Livermore, CA; Nelson, Karl E [Livermore, CA; Mercer, Michael B [Manteca, CA; Pletcher, David C [Sacramento, CA; Riot, Vincent J [Berkeley, CA; Schek, James L [Tracy, CA; Knapp, David A [Livermore, CA

    2006-06-20

    A portable radioactive-material detection system capable of detecting radioactive sources moving at high speeds. The system has at least one radiation detector capable of detecting gamma-radiation and coupled to an MCA capable of collecting spectral data in very small time bins of less than about 150 msec. A computer processor is connected to the MCA for determining from the spectral data if a triggering event has occurred. Spectral data is stored on a data storage device, and a power source supplies power to the detection system. Various configurations of the detection system may be adaptably arranged for various radiation detection scenarios. In a preferred embodiment, the computer processor operates as a server which receives spectral data from other networked detection systems, and communicates the collected data to a central data reporting system.

  20. Minimum detectable gas concentration performance evaluation method for gas leak infrared imaging detection systems.

    PubMed

    Zhang, Xu; Jin, Weiqi; Li, Jiakun; Wang, Xia; Li, Shuo

    2017-04-01

    Thermal imaging technology is an effective means of detecting hazardous gas leaks. Much attention has been paid to evaluation of the performance of gas leak infrared imaging detection systems due to several potential applications. The minimum resolvable temperature difference (MRTD) and the minimum detectable temperature difference (MDTD) are commonly used as the main indicators of thermal imaging system performance. This paper establishes a minimum detectable gas concentration (MDGC) performance evaluation model based on the definition and derivation of MDTD. We proposed the direct calculation and equivalent calculation method of MDGC based on the MDTD measurement system. We build an experimental MDGC measurement system, which indicates the MDGC model can describe the detection performance of a thermal imaging system to typical gases. The direct calculation, equivalent calculation, and direct measurement results are consistent. The MDGC and the minimum resolvable gas concentration (MRGC) model can effectively describe the performance of "detection" and "spatial detail resolution" of thermal imaging systems to gas leak, respectively, and constitute the main performance indicators of gas leak detection systems.

  1. 40 CFR 63.1184 - What do I need to know about the design specifications, installation, and operation of a bag leak...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... design specifications, installation, and operation of a bag leak detection system? 63.1184 Section 63... bag leak detection system? A bag leak detection system must meet the following requirements: (a) The bag leak detection system must be certified by the manufacturer to be capable of detecting PM...

  2. A Survey on Anomaly Based Host Intrusion Detection System

    NASA Astrophysics Data System (ADS)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  3. Accurate mobile malware detection and classification in the cloud.

    PubMed

    Wang, Xiaolei; Yang, Yuexiang; Zeng, Yingzhi

    2015-01-01

    As the dominator of the Smartphone operating system market, consequently android has attracted the attention of s malware authors and researcher alike. The number of types of android malware is increasing rapidly regardless of the considerable number of proposed malware analysis systems. In this paper, by taking advantages of low false-positive rate of misuse detection and the ability of anomaly detection to detect zero-day malware, we propose a novel hybrid detection system based on a new open-source framework CuckooDroid, which enables the use of Cuckoo Sandbox's features to analyze Android malware through dynamic and static analysis. Our proposed system mainly consists of two parts: anomaly detection engine performing abnormal apps detection through dynamic analysis; signature detection engine performing known malware detection and classification with the combination of static and dynamic analysis. We evaluate our system using 5560 malware samples and 6000 benign samples. Experiments show that our anomaly detection engine with dynamic analysis is capable of detecting zero-day malware with a low false negative rate (1.16 %) and acceptable false positive rate (1.30 %); it is worth noting that our signature detection engine with hybrid analysis can accurately classify malware samples with an average positive rate 98.94 %. Considering the intensive computing resources required by the static and dynamic analysis, our proposed detection system should be deployed off-device, such as in the Cloud. The app store markets and the ordinary users can access our detection system for malware detection through cloud service.

  4. Damage Detection and Verification System (DDVS) for In-Situ Health Monitoring

    NASA Technical Reports Server (NTRS)

    Williams, Martha K.; Lewis, Mark; Szafran, J.; Shelton, C.; Ludwig, L.; Gibson, T.; Lane, J.; Trautwein, T.

    2015-01-01

    Project presentation for Game Changing Program Smart Book Release. Detection and Verification System (DDVS) expands the Flat Surface Damage Detection System (FSDDS) sensory panels damage detection capabilities and includes an autonomous inspection capability utilizing cameras and dynamic computer vision algorithms to verify system health. Objectives of this formulation task are to establish the concept of operations, formulate the system requirements for a potential ISS flight experiment, and develop a preliminary design of an autonomous inspection capability system that will be demonstrated as a proof-of-concept ground based damage detection and inspection system.

  5. Integration of the TDWR and LLWAS wind shear detection system

    NASA Technical Reports Server (NTRS)

    Cornman, Larry

    1991-01-01

    Operational demonstrations of a prototype TDWR/LLWAS (Terminal Doppler Weather Radar/Low Level Wind shear Alarm System) integrated wind shear detection system were conducted. The integration of wind shear detection systems is needed to provide end-users with a single, consensus source of information. A properly implemented integrated system provides wind shear warnings of a higher quality than stand-alone LLWAS or TDWR systems. The algorithmic concept used to generate the TDWR/LLWAS integrated products and several case studies are discussed, indicating the viability and potential of integrated wind shear detection systems. Implications for integrating ground and airborne wind shear detection systems are briefly examined.

  6. 46 CFR 111.05-21 - Ground detection.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Ground detection. 111.05-21 Section 111.05-21 Shipping... REQUIREMENTS Equipment Ground, Ground Detection, and Grounded Systems § 111.05-21 Ground detection. There must be ground detection for each: (a) Electric propulsion system; (b) Ship's service power system; (c...

  7. 46 CFR 111.05-21 - Ground detection.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Ground detection. 111.05-21 Section 111.05-21 Shipping... REQUIREMENTS Equipment Ground, Ground Detection, and Grounded Systems § 111.05-21 Ground detection. There must be ground detection for each: (a) Electric propulsion system; (b) Ship's service power system; (c...

  8. 76 FR 70075 - Proximity Detection Systems for Continuous Mining Machines in Underground Coal Mines

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-10

    ... Detection Systems for Continuous Mining Machines in Underground Coal Mines AGENCY: Mine Safety and Health... proposed rule addressing Proximity Detection Systems for Continuous Mining Machines in Underground Coal... Detection Systems for Continuous Mining Machines in Underground Coal Mines. MSHA conducted hearings on...

  9. 76 FR 63238 - Proximity Detection Systems for Continuous Mining Machines in Underground Coal Mines

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-12

    ... Detection Systems for Continuous Mining Machines in Underground Coal Mines AGENCY: Mine Safety and Health... Agency's proposed rule addressing Proximity Detection Systems for Continuous Mining Machines in... proposed rule for Proximity Detection Systems on Continuous Mining Machines in Underground Coal Mines. Due...

  10. 21 CFR 864.7280 - Factor V Leiden DNA mutation detection systems.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Factor V Leiden DNA mutation detection systems....7280 Factor V Leiden DNA mutation detection systems. (a) Identification. Factor V Leiden deoxyribonucleic acid (DNA) mutation detection systems are devices that consist of different reagents and...

  11. 21 CFR 864.7280 - Factor V Leiden DNA mutation detection systems.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Factor V Leiden DNA mutation detection systems....7280 Factor V Leiden DNA mutation detection systems. (a) Identification. Factor V Leiden deoxyribonucleic acid (DNA) mutation detection systems are devices that consist of different reagents and...

  12. 21 CFR 864.7280 - Factor V Leiden DNA mutation detection systems.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Factor V Leiden DNA mutation detection systems....7280 Factor V Leiden DNA mutation detection systems. (a) Identification. Factor V Leiden deoxyribonucleic acid (DNA) mutation detection systems are devices that consist of different reagents and...

  13. 21 CFR 864.7280 - Factor V Leiden DNA mutation detection systems.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 8 2013-04-01 2013-04-01 false Factor V Leiden DNA mutation detection systems....7280 Factor V Leiden DNA mutation detection systems. (a) Identification. Factor V Leiden deoxyribonucleic acid (DNA) mutation detection systems are devices that consist of different reagents and...

  14. 21 CFR 864.7280 - Factor V Leiden DNA mutation detection systems.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Factor V Leiden DNA mutation detection systems....7280 Factor V Leiden DNA mutation detection systems. (a) Identification. Factor V Leiden deoxyribonucleic acid (DNA) mutation detection systems are devices that consist of different reagents and...

  15. Vision-based vehicle detection and tracking algorithm design

    NASA Astrophysics Data System (ADS)

    Hwang, Junyeon; Huh, Kunsoo; Lee, Donghwi

    2009-12-01

    The vision-based vehicle detection in front of an ego-vehicle is regarded as promising for driver assistance as well as for autonomous vehicle guidance. The feasibility of vehicle detection in a passenger car requires accurate and robust sensing performance. A multivehicle detection system based on stereo vision has been developed for better accuracy and robustness. This system utilizes morphological filter, feature detector, template matching, and epipolar constraint techniques in order to detect the corresponding pairs of vehicles. After the initial detection, the system executes the tracking algorithm for the vehicles. The proposed system can detect front vehicles such as the leading vehicle and side-lane vehicles. The position parameters of the vehicles located in front are obtained based on the detection information. The proposed vehicle detection system is implemented on a passenger car, and its performance is verified experimentally.

  16. Advanced power system protection and incipient fault detection and protection of spaceborne power systems

    NASA Technical Reports Server (NTRS)

    Russell, B. Don

    1989-01-01

    This research concentrated on the application of advanced signal processing, expert system, and digital technologies for the detection and control of low grade, incipient faults on spaceborne power systems. The researchers have considerable experience in the application of advanced digital technologies and the protection of terrestrial power systems. This experience was used in the current contracts to develop new approaches for protecting the electrical distribution system in spaceborne applications. The project was divided into three distinct areas: (1) investigate the applicability of fault detection algorithms developed for terrestrial power systems to the detection of faults in spaceborne systems; (2) investigate the digital hardware and architectures required to monitor and control spaceborne power systems with full capability to implement new detection and diagnostic algorithms; and (3) develop a real-time expert operating system for implementing diagnostic and protection algorithms. Significant progress has been made in each of the above areas. Several terrestrial fault detection algorithms were modified to better adapt to spaceborne power system environments. Several digital architectures were developed and evaluated in light of the fault detection algorithms.

  17. Farmers' preferences for automatic lameness-detection systems in dairy cattle.

    PubMed

    Van De Gucht, T; Saeys, W; Van Nuffel, A; Pluym, L; Piccart, K; Lauwers, L; Vangeyte, J; Van Weyenberg, S

    2017-07-01

    As lameness is a major health problem in dairy herds, a lot of attention goes to the development of automated lameness-detection systems. Few systems have made it to the market, as most are currently still in development. To get these systems ready for practice, developers need to define which system characteristics are important for the farmers as end users. In this study, farmers' preferences for the different characteristics of proposed lameness-detection systems were investigated. In addition, the influence of sociodemographic and farm characteristics on farmers' preferences was assessed. The third aim was to find out if preferences change after the farmer receives extra information on lameness and its consequences. Therefore, a discrete choice experiment was designed with 3 alternative lameness-detection systems: a system attached to the cow, a walkover system, and a camera system. Each system was defined by 4 characteristics: the percentage missed lame cows, the percentage false alarms, the system cost, and the ability to indicate which leg is lame. The choice experiment was embedded in an online survey. After answering general questions and choosing their preferred option in 4 choice sets, extra information on lameness was provided. Consecutively, farmers were shown a second block of 4 choice sets. Results from 135 responses showed that farmers' preferences were influenced by the 4 system characteristics. The importance a farmer attaches to lameness, the interval between calving and first insemination, and the presence of an estrus-detection system contributed significantly to the value a farmer attaches to lameness-detection systems. Farmers who already use an estrus detection system were more willing to use automatic detection systems instead of visual lameness detection. Similarly, farmers who achieve shorter intervals between calving and first insemination and farmers who find lameness highly important had a higher tendency to choose for automatic lameness detection. A sensor attached to the cow was preferred, followed by a walkover system and a camera system. In general, visual lameness detection was preferred over automatic detection systems, but this preference changed after informing farmers about the consequences of lameness. To conclude, the system cost and performance were important features, but dairy farmers should be sensitized on the consequences of lameness and its effect on farm profitability. Copyright © 2017 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  18. Long distance high power optical laser fiber break detection and continuity monitoring systems and methods

    DOEpatents

    Rinzler, Charles C.; Gray, William C.; Faircloth, Brian O.; Zediker, Mark S.

    2016-02-23

    A monitoring and detection system for use on high power laser systems, long distance high power laser systems and tools for performing high power laser operations. In particular, the monitoring and detection systems provide break detection and continuity protection for performing high power laser operations on, and in, remote and difficult to access locations.

  19. Human care system for heart-rate and human-movement trajectory in home and its application to detect mental disease

    NASA Astrophysics Data System (ADS)

    Hata, Yutaka; Kanazawa, Seigo; Endo, Maki; Tsuchiya, Naoki; Nakajima, Hiroshi

    2012-06-01

    This paper proposes a heart rate monitoring system for detecting autonomic nervous system by the heart rate variability using an air pressure sensor to diagnose mental disease. Moreover, we propose a human behavior monitoring system for detecting the human trajectory in home by an infrared camera. In day and night times, the human behavior monitoring system detects the human movement in home. The heart rate monitoring system detects the heart rate in bed in night time. The air pressure sensor consists of a rubber tube, cushion cover and pressure sensor, and it detects the heart rate by setting it to bed. It unconstraintly detects the RR-intervals; thereby the autonomic nervous system can be assessed. The autonomic nervous system analysis can examine the mental disease. While, the human behavior monitoring system obtains distance distribution image by an infrared camera. It classifies adult, child and the other object from distance distribution obtained by the camera, and records their trajectories. This behavior, i.e., trajectory in home, strongly corresponds to cognitive disorders. Thus, the total system can detect mental disease and cognitive disorders by uncontacted sensors to human body.

  20. Spot restoration for GPR image post-processing

    DOEpatents

    Paglieroni, David W; Beer, N. Reginald

    2014-05-20

    A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the imaging and detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across the surface and that travels down the surface. The imaging and detection system pre-processes the return signal to suppress certain undesirable effects. The imaging and detection system then generates synthetic aperture radar images from real aperture radar images generated from the pre-processed return signal. The imaging and detection system then post-processes the synthetic aperture radar images to improve detection of subsurface objects. The imaging and detection system identifies peaks in the energy levels of the post-processed image frame, which indicates the presence of a subsurface object.

Top