4,160 research outputs found
Lessons from the submission and approval process of energy-efficiency CDM baseline and monitoring methodologies
Energy efficiency is a CDM project type that suffers from high methodology rejection rates. 43 baseline and monitoring methodologies for CDM energy efficiency projects are analyzed with respect to reasons for approval / rejection by the CDM Executive Board. Most methodologies have been rejected because they did not comply with implicit quality standards regarding presentation and conservativeness. Also, tools to select the baseline scenario and to prove additionality were frequently lacking. If the level or the quality of production in the baseline or the project scenario changes, a simple before-after-comparison is not valid. Black box models are not accepted and methodologies should be sufficiently differentiated to account for specific (technical) circumstances. The remaining lifetime of equipment has to be taken into account. Often, elements of small-scale methodologies have been retained in approvals of large-scale methodologies. --
Challenges of measuring body temperatures of free-ranging birds and mammals
The thermal physiology of most birds and mammals is characterised by considerable spatial and temporal variation in body temperature. Body temperature is, therefore, a key parameter in physiological, behavioural and ecological research. Temperature measurements on freely moving or free-ranging animals in the wild are challenging but can be undertaken using a range of techniques. Internal temperature may be sampled using thermometry, surgically implanted loggers or transmitters, gastrointestinal or non-surgically placed devices. Less invasive approaches measure peripheral temperature with subcutaneous passive integrated transponder tags or skin surface-mounted radio transmitters and data loggers, or use infrared thermography to record surface temperature. Choice of technique is determined by focal research question and region of interest that reflects appropriate physiological or behavioural causal mechanisms of temperature change, as well as welfare and logistical considerations. Particularly required are further studies that provide opportunities of continuously sampling from multiple sites from within the body. This will increase our understanding of thermoregulation and temperature variation in different parts of the body and how these temperatures may change in response to physiological, behavioural and environmental parameters. Technological advances that continue to reduce the size and remote sensing capability of temperature recorders will greatly benefit field research
Context-Aware Stemming algorithm for semantically related root words
There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are
flexible and adaptable for users. In this context, however, information retrieval (IR) is often defined in terms of location and delivery
of documents to a user to satisfy their information need. In most cases, morphological variants of words have similar semantic
interpretations and can be considered as equivalent for the purpose of IR applications. Consequently, document indexing will also be
more meaningful if semantically related root words are used instead of stems. The popular Porter’s stemmer was studied with the aim
to produce intelligible stems. In this paper, we propose Context-Aware Stemming (CAS) algorithm, which is a modified version of
the extensively used Porter’s stemmer. Considering only generated meaningful stemming words as the stemmer output, the results
show that the modified algorithm significantly reduces the error rate of Porter’s algorithm from 76.7% to 6.7% without compromising
the efficacy of Porter’s algorithm
Sixth Annual Users' Conference
Conference papers and presentation outlines which address the use of the Transportable Applications Executive (TAE) and its various applications programs are compiled. Emphasis is given to the design of the user interface and image processing workstation in general. Alternate ports of TAE and TAE subsystems are also covered
Using Modern Technologies to Capture and Share Indigenous Astronomical Knowledge
Indigenous Knowledge is important for Indigenous communities across the globe
and for the advancement of our general scientific knowledge. In particular,
Indigenous astronomical knowledge integrates many aspects of Indigenous
Knowledge, including seasonal calendars, navigation, food economics, law,
ceremony, and social structure. We aim to develop innovative ways of capturing,
managing, and disseminating Indigenous astronomical knowledge for Indigenous
communities and the general public for the future. Capturing, managing, and
disseminating this knowledge in the digital environment poses a number of
challenges, which we aim to address using a collaborative project involving
experts in the higher education, library, and industry sectors. Using
Microsoft's WorldWide Telescope and Rich Interactive Narratives technologies,
we propose to develop software, media design, and archival management solutions
to allow Indigenous communities to share their astronomical knowledge with the
world on their terms and in a culturally sensitive manner.Comment: Australian Academic & Research Libraries, Vol. 45(2), pp. 101-11
Security Policy Management for a Cooperative Firewall
Increasing popularity of the Internet service and increased number of connected devices along with the introduction of IoT are making the society ever more dependent on the Internet services availability. Therefore, we need to ensure the minimum level of security and reliability of services. Ultra-Reliable Communication (URC) refers to the availability of life and business critical services nearly 100 percent of the time. These requirements are an integral part of upcoming 5th generation (5G) mobile networks.
5G is the future mobile network, which at the same time is part of the future Internet. As an extension to the conventional communication architecture, 5G needs to provide ultra-high reliability of services where; it needs to perform better than the currently available solutions in terms of security, confidentiality, integrity and reliability and it should mitigate the risks of Internet attack and malicious activities. To achieve such requirements, Customer Edge Switching (CES) architecture is presented. It proposes that the Internet user’s agent in the network provider needs to have prior information about the expected traffic of users to mitigate maximum attacks and only allow expected communication between hosts. CES executes communication security policies of each user or device acting as the user’s agent. The policy describes with fine granularity what traffic is expected by the device. The policies are sourced as automatically as possible but can also be modified by the user. Stored policies will follow the mobile user and will be executed at the network edge node executing Customer Edge Switch functions to stop all unexpected traffic from entering the mobile network.
State-of-the-art in mobile network architectures utilizes the Quality of Service (QoS) policies of users. This thesis motivates the extension of current architecture to accommodate security and communication policy of end-users. The thesis presents an experimental implementation of a policy management system which is termed as Security Policy Management (SPM) to handle above-mentioned policies of users. We describe the architecture, implementation and integration of SPM with the Customer Edge Switching. Additionally, SPM has been evaluated in terms of performance, scalability, reliability and security offered via 5G customer edge nodes. Finally, the system has been analyzed for feasibility in the 5G architecture
The New Technology and Competencies for "The Most Typical of the Activities of Libraries": Technical Services
At a library conference in 1940, William M. Randall called technical
services the "most typical of the activities of libraries" "they are..." he
said, "the things which librarians do that no one else does the secrets of
the craft."
1 In those intervening forty-three years much has been written
and uttered in defense and derision of these "secrets of the craft." These
most typical of library activities have changed the name Randall used,
technical processes, to technical services. They have moved from being
sneeringly derided as "backroom," "basement" or other dreary location
activities to being enthusiastically hailed today as "where the action is."
They are, fortunately, no longer the "secrets" that they were in Randall's
day. They have been moved into, moved around within and even moved
out of the organizational charts. Regardless of all these attitudes and
activities, the functions of acquiring, organizing and preserving library
materials persist and the competencies necessary to carry out these three
functions will be the focus of this paper. In the paper, reference will
frequently be made to the "technical services librarian" meaning any
librarian who works in that aspect of librarianship. The emphasis is on no
particular type of library. The term library will be used as meaning also
information center.published or submitted for publicatio
Tampa Bay Region Mass Transportation: Phase II
Tampa Bay Region, Florida
Tampa Bay region mass transportation: Phase II. Prepared for the Tampa Bay Regional Planning Council, by Harvey N. Kreisberg. McLean, Va : TRW Systems Group, 1971. With appendixes document
- …