50,273 research outputs found
Modular Acquisition and Stimulation System for Timestamp-Driven Neuroscience Experiments
Dedicated systems are fundamental for neuroscience experimental protocols
that require timing determinism and synchronous stimuli generation. We
developed a data acquisition and stimuli generator system for neuroscience
research, optimized for recording timestamps from up to 6 spiking neurons and
entirely specified in a high-level Hardware Description Language (HDL). Despite
the logic complexity penalty of synthesizing from such a language, it was
possible to implement our design in a low-cost small reconfigurable device.
Under a modular framework, we explored two different memory arbitration schemes
for our system, evaluating both their logic element usage and resilience to
input activity bursts. One of them was designed with a decoupled and latency
insensitive approach, allowing for easier code reuse, while the other adopted a
centralized scheme, constructed specifically for our application. The usage of
a high-level HDL allowed straightforward and stepwise code modifications to
transform one architecture into the other. The achieved modularity is very
useful for rapidly prototyping novel electronic instrumentation systems
tailored to scientific research.Comment: Preprint submitted to ARC 2015. Extended: 16 pages, 10 figures. The
final publication is available at link.springer.co
Where Is the Power? Transnational Networks, Authority and the Dispute over the Xayaburi Dam on the Lower Mekong Mainstream
Accounts of hydro-hegemony and counter hydro-hegemony provide state-based conceptions of power in international river basins. However, authority should be seen as transnationalized as small states develop coping strategies to augment their authority over decision-making processes. The article engages Rosenau’s spheres of authority concept to argue that hydro-hegemony is exercised by actors embedded in spheres of authority that reshape actor configurations as they emerge. These spheres consist of complex networks challenging customary notions of the local-global dichotomy and hydro-hegemony. Hydro-hegemony is therefore not fixed. The article examines these processes by analysing the dispute over the Xayaburi Dam in the Mekong Basin
Where Is the Power? Transnational Networks, Authority and the Dispute over the Xayaburi Dam on the Lower Mekong Mainstream
Accounts of hydro-hegemony and counter hydro-hegemony provide state-based conceptions of power in international river basins. However, authority should be seen as transnationalized as small states develop coping strategies to augment their authority over decision-making processes. The article engages Rosenau’s spheres of authority concept to argue that hydro-hegemony is exercised by actors embedded in spheres of authority that reshape actor configurations as they emerge. These spheres consist of complex networks challenging customary notions of the local-global dichotomy and hydro-hegemony. Hydro-hegemony is therefore not fixed. The article examines these processes by analysing the dispute over the Xayaburi Dam in the Mekong Basin
JPEG steganography with particle swarm optimization accelerated by AVX
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography. Optimization methods can improve the properties of images with embedded secret but introduce additional computational complexity to their processing. AVX instructions available in modern CPUs are, in this work, used to accelerate data parallel operations that are part of image steganography with advanced optimizations.Web of Science328art. no. e544
Reviewing the Drivers and Challenges in RFID Implementation in the Pharmaceutical Supply Chain
Counterfeiting is a global phenomenon that poses a serious financial threat to the pharmaceutical industry and more importantly jeopardizes public safety and security. Different measures, including new laws and regulations, have been put in place to mitigate the threat and tighten control in the pharmaceuticals supply chain. However, it appears that the most promising countermeasure is track-and-trace technology such as electronic-pedigree (E-pedigree) with Radio Frequency Identification (RFID) technology. In this study we present a framework exploring the antecedents and consequences of RFID applications in the pharmaceutical supply chain. The framework proposes that counterfeiting and E-pedigree regulation will drive the implementation of RFID in the pharmaceutical supply chain, which in turn provides strategic and operational benefits that enable competitive advantage. Meanwhile, the implementation of RFID requires overcoming many operational, technical and financial challenges. The framework provides a springboard that future study can explore using empirical data
Inland fisheries co-management in East Africa
The importance of inland fisheries resources to the East Africa Community Partner States of Kenya, Tanzania and Uganda is highlighted. Efforts and achievements to improve utilisation and management of fisheries resources for lasting social and economic benefits in the region are examined. Experiences from two projects, the Integrated Lake Management project in Uganda and the on-going implementation of a Fisheries Management Plan project on Lake Victoria are examined. Key achievements are examined and lessons learned for within and beyond the region are identified.Inland fisheries, Fishery management, Africa, Victoria L.,
The impact of agricultural activities on water quality: a case for collaborative catchment-scale management using integrated wireless sensor networks
The challenge of improving water quality is a growing global concern, typified by the European Commission Water Framework Directive and the United States Clean Water Act. The main drivers of poor water quality are economics, poor water management, agricultural practices and urban development. This paper reviews the extensive role of non-point sources, in particular the outdated agricultural practices, with respect to nutrient and contaminant contributions. Water quality monitoring (WQM) is currently undertaken through a number of data acquisition methods from grab sampling to satellite based remote sensing of water bodies. Based on the surveyed sampling methods and their numerous limitations, it is proposed that wireless sensor networks (WSNs), despite their own limitations, are still very attractive and effective for real-time spatio-temporal data collection for WQM applications. WSNs have been employed for WQM of surface and ground water and catchments, and have been fundamental in advancing the knowledge of contaminants trends through their high resolution observations. However, these applications have yet to explore the implementation and impact of this technology for management and control decisions, to minimize and prevent individual stakeholder’s contributions, in an autonomous and dynamic manner. Here, the potential of WSN-controlled agricultural activities and different environmental compartments for integrated water quality management is presented and limitations of WSN in agriculture and WQM are identified. Finally, a case for collaborative networks at catchment scale is proposed for enabling cooperation among individually networked activities/stakeholders (farming activities, water bodies) for integrated water quality monitoring, control and management
Numerical implementation of the eXtended Finite Element Method for dynamic crack analysis
A numerical implementation of the eXtended Finite Element Method (X-FEM) to analyze crack propagation in a structure under dynamic loading is presented in this paper. The arbitrary crack is treated by the X-FEM method without re-meshing but using an enrichment of the classical displacement-based finite element approximation in the framework of the partition of unity method. Several algorithms have been implemented, within an Oriented Object framework in C++, in the home made explicit FEM code. The new module, called DynaCrack, included in the dynamic FEM code DynELA, evaluates the crack geometry, the propagation of the crack and allow the post-processing of the numerical results. The module solves the system of discrete equations using an explicit integration scheme. Some numerical examples illustrating the main features and the computational efficiency of the DynaCrack module for dynamic crack propagation are presented in the last section of the paper
Sensornet checkpointing: enabling repeatability in testbeds and realism in simulations
When developing sensor network applications, the shift from
simulation to testbed causes application failures, resulting in additional
time-consuming iterations between simulation and testbed. We propose
transferring sensor network checkpoints between simulation and testbed
to reduce the gap between simulation and testbed. Sensornet checkpointing
combines the best of both simulation and testbeds: the nonintrusiveness
and repeatability of simulation, and the realism of testbeds
- …