4,160 research outputs found

    Lessons from the submission and approval process of energy-efficiency CDM baseline and monitoring methodologies

    Get PDF
    Energy efficiency is a CDM project type that suffers from high methodology rejection rates. 43 baseline and monitoring methodologies for CDM energy efficiency projects are analyzed with respect to reasons for approval / rejection by the CDM Executive Board. Most methodologies have been rejected because they did not comply with implicit quality standards regarding presentation and conservativeness. Also, tools to select the baseline scenario and to prove additionality were frequently lacking. If the level or the quality of production in the baseline or the project scenario changes, a simple before-after-comparison is not valid. Black box models are not accepted and methodologies should be sufficiently differentiated to account for specific (technical) circumstances. The remaining lifetime of equipment has to be taken into account. Often, elements of small-scale methodologies have been retained in approvals of large-scale methodologies. --

    Challenges of measuring body temperatures of free-ranging birds and mammals

    Get PDF
    The thermal physiology of most birds and mammals is characterised by considerable spatial and temporal variation in body temperature. Body temperature is, therefore, a key parameter in physiological, behavioural and ecological research. Temperature measurements on freely moving or free-ranging animals in the wild are challenging but can be undertaken using a range of techniques. Internal temperature may be sampled using thermometry, surgically implanted loggers or transmitters, gastrointestinal or non-surgically placed devices. Less invasive approaches measure peripheral temperature with subcutaneous passive integrated transponder tags or skin surface-mounted radio transmitters and data loggers, or use infrared thermography to record surface temperature. Choice of technique is determined by focal research question and region of interest that reflects appropriate physiological or behavioural causal mechanisms of temperature change, as well as welfare and logistical considerations. Particularly required are further studies that provide opportunities of continuously sampling from multiple sites from within the body. This will increase our understanding of thermoregulation and temperature variation in different parts of the body and how these temperatures may change in response to physiological, behavioural and environmental parameters. Technological advances that continue to reduce the size and remote sensing capability of temperature recorders will greatly benefit field research

    Context-Aware Stemming algorithm for semantically related root words

    Get PDF
    There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible and adaptable for users. In this context, however, information retrieval (IR) is often defined in terms of location and delivery of documents to a user to satisfy their information need. In most cases, morphological variants of words have similar semantic interpretations and can be considered as equivalent for the purpose of IR applications. Consequently, document indexing will also be more meaningful if semantically related root words are used instead of stems. The popular Porter’s stemmer was studied with the aim to produce intelligible stems. In this paper, we propose Context-Aware Stemming (CAS) algorithm, which is a modified version of the extensively used Porter’s stemmer. Considering only generated meaningful stemming words as the stemmer output, the results show that the modified algorithm significantly reduces the error rate of Porter’s algorithm from 76.7% to 6.7% without compromising the efficacy of Porter’s algorithm

    Sixth Annual Users' Conference

    Get PDF
    Conference papers and presentation outlines which address the use of the Transportable Applications Executive (TAE) and its various applications programs are compiled. Emphasis is given to the design of the user interface and image processing workstation in general. Alternate ports of TAE and TAE subsystems are also covered

    Using Modern Technologies to Capture and Share Indigenous Astronomical Knowledge

    Full text link
    Indigenous Knowledge is important for Indigenous communities across the globe and for the advancement of our general scientific knowledge. In particular, Indigenous astronomical knowledge integrates many aspects of Indigenous Knowledge, including seasonal calendars, navigation, food economics, law, ceremony, and social structure. We aim to develop innovative ways of capturing, managing, and disseminating Indigenous astronomical knowledge for Indigenous communities and the general public for the future. Capturing, managing, and disseminating this knowledge in the digital environment poses a number of challenges, which we aim to address using a collaborative project involving experts in the higher education, library, and industry sectors. Using Microsoft's WorldWide Telescope and Rich Interactive Narratives technologies, we propose to develop software, media design, and archival management solutions to allow Indigenous communities to share their astronomical knowledge with the world on their terms and in a culturally sensitive manner.Comment: Australian Academic & Research Libraries, Vol. 45(2), pp. 101-11

    Security Policy Management for a Cooperative Firewall

    Get PDF
    Increasing popularity of the Internet service and increased number of connected devices along with the introduction of IoT are making the society ever more dependent on the Internet services availability. Therefore, we need to ensure the minimum level of security and reliability of services. Ultra-Reliable Communication (URC) refers to the availability of life and business critical services nearly 100 percent of the time. These requirements are an integral part of upcoming 5th generation (5G) mobile networks. 5G is the future mobile network, which at the same time is part of the future Internet. As an extension to the conventional communication architecture, 5G needs to provide ultra-high reliability of services where; it needs to perform better than the currently available solutions in terms of security, confidentiality, integrity and reliability and it should mitigate the risks of Internet attack and malicious activities. To achieve such requirements, Customer Edge Switching (CES) architecture is presented. It proposes that the Internet user’s agent in the network provider needs to have prior information about the expected traffic of users to mitigate maximum attacks and only allow expected communication between hosts. CES executes communication security policies of each user or device acting as the user’s agent. The policy describes with fine granularity what traffic is expected by the device. The policies are sourced as automatically as possible but can also be modified by the user. Stored policies will follow the mobile user and will be executed at the network edge node executing Customer Edge Switch functions to stop all unexpected traffic from entering the mobile network. State-of-the-art in mobile network architectures utilizes the Quality of Service (QoS) policies of users. This thesis motivates the extension of current architecture to accommodate security and communication policy of end-users. The thesis presents an experimental implementation of a policy management system which is termed as Security Policy Management (SPM) to handle above-mentioned policies of users. We describe the architecture, implementation and integration of SPM with the Customer Edge Switching. Additionally, SPM has been evaluated in terms of performance, scalability, reliability and security offered via 5G customer edge nodes. Finally, the system has been analyzed for feasibility in the 5G architecture

    The New Technology and Competencies for "The Most Typical of the Activities of Libraries": Technical Services

    Get PDF
    At a library conference in 1940, William M. Randall called technical services the "most typical of the activities of libraries" "they are..." he said, "the things which librarians do that no one else does the secrets of the craft." 1 In those intervening forty-three years much has been written and uttered in defense and derision of these "secrets of the craft." These most typical of library activities have changed the name Randall used, technical processes, to technical services. They have moved from being sneeringly derided as "backroom," "basement" or other dreary location activities to being enthusiastically hailed today as "where the action is." They are, fortunately, no longer the "secrets" that they were in Randall's day. They have been moved into, moved around within and even moved out of the organizational charts. Regardless of all these attitudes and activities, the functions of acquiring, organizing and preserving library materials persist and the competencies necessary to carry out these three functions will be the focus of this paper. In the paper, reference will frequently be made to the "technical services librarian" meaning any librarian who works in that aspect of librarianship. The emphasis is on no particular type of library. The term library will be used as meaning also information center.published or submitted for publicatio

    Tampa Bay Region Mass Transportation: Phase II

    Get PDF
    Tampa Bay Region, Florida Tampa Bay region mass transportation: Phase II. Prepared for the Tampa Bay Regional Planning Council, by Harvey N. Kreisberg. McLean, Va : TRW Systems Group, 1971. With appendixes document
    • …
    corecore