50,273 research outputs found

    Modular Acquisition and Stimulation System for Timestamp-Driven Neuroscience Experiments

    Full text link
    Dedicated systems are fundamental for neuroscience experimental protocols that require timing determinism and synchronous stimuli generation. We developed a data acquisition and stimuli generator system for neuroscience research, optimized for recording timestamps from up to 6 spiking neurons and entirely specified in a high-level Hardware Description Language (HDL). Despite the logic complexity penalty of synthesizing from such a language, it was possible to implement our design in a low-cost small reconfigurable device. Under a modular framework, we explored two different memory arbitration schemes for our system, evaluating both their logic element usage and resilience to input activity bursts. One of them was designed with a decoupled and latency insensitive approach, allowing for easier code reuse, while the other adopted a centralized scheme, constructed specifically for our application. The usage of a high-level HDL allowed straightforward and stepwise code modifications to transform one architecture into the other. The achieved modularity is very useful for rapidly prototyping novel electronic instrumentation systems tailored to scientific research.Comment: Preprint submitted to ARC 2015. Extended: 16 pages, 10 figures. The final publication is available at link.springer.co

    Where Is the Power? Transnational Networks, Authority and the Dispute over the Xayaburi Dam on the Lower Mekong Mainstream

    Get PDF
    Accounts of hydro-hegemony and counter hydro-hegemony provide state-based conceptions of power in international river basins. However, authority should be seen as transnationalized as small states develop coping strategies to augment their authority over decision-making processes. The article engages Rosenau’s spheres of authority concept to argue that hydro-hegemony is exercised by actors embedded in spheres of authority that reshape actor configurations as they emerge. These spheres consist of complex networks challenging customary notions of the local-global dichotomy and hydro-hegemony. Hydro-hegemony is therefore not fixed. The article examines these processes by analysing the dispute over the Xayaburi Dam in the Mekong Basin

    Where Is the Power? Transnational Networks, Authority and the Dispute over the Xayaburi Dam on the Lower Mekong Mainstream

    Get PDF
    Accounts of hydro-hegemony and counter hydro-hegemony provide state-based conceptions of power in international river basins. However, authority should be seen as transnationalized as small states develop coping strategies to augment their authority over decision-making processes. The article engages Rosenau’s spheres of authority concept to argue that hydro-hegemony is exercised by actors embedded in spheres of authority that reshape actor configurations as they emerge. These spheres consist of complex networks challenging customary notions of the local-global dichotomy and hydro-hegemony. Hydro-hegemony is therefore not fixed. The article examines these processes by analysing the dispute over the Xayaburi Dam in the Mekong Basin

    JPEG steganography with particle swarm optimization accelerated by AVX

    Get PDF
    Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography. Optimization methods can improve the properties of images with embedded secret but introduce additional computational complexity to their processing. AVX instructions available in modern CPUs are, in this work, used to accelerate data parallel operations that are part of image steganography with advanced optimizations.Web of Science328art. no. e544

    Reviewing the Drivers and Challenges in RFID Implementation in the Pharmaceutical Supply Chain

    Get PDF
    Counterfeiting is a global phenomenon that poses a serious financial threat to the pharmaceutical industry and more importantly jeopardizes public safety and security. Different measures, including new laws and regulations, have been put in place to mitigate the threat and tighten control in the pharmaceuticals supply chain. However, it appears that the most promising countermeasure is track-and-trace technology such as electronic-pedigree (E-pedigree) with Radio Frequency Identification (RFID) technology. In this study we present a framework exploring the antecedents and consequences of RFID applications in the pharmaceutical supply chain. The framework proposes that counterfeiting and E-pedigree regulation will drive the implementation of RFID in the pharmaceutical supply chain, which in turn provides strategic and operational benefits that enable competitive advantage. Meanwhile, the implementation of RFID requires overcoming many operational, technical and financial challenges. The framework provides a springboard that future study can explore using empirical data

    Inland fisheries co-management in East Africa

    Get PDF
    The importance of inland fisheries resources to the East Africa Community Partner States of Kenya, Tanzania and Uganda is highlighted. Efforts and achievements to improve utilisation and management of fisheries resources for lasting social and economic benefits in the region are examined. Experiences from two projects, the Integrated Lake Management project in Uganda and the on-going implementation of a Fisheries Management Plan project on Lake Victoria are examined. Key achievements are examined and lessons learned for within and beyond the region are identified.Inland fisheries, Fishery management, Africa, Victoria L.,

    The impact of agricultural activities on water quality: a case for collaborative catchment-scale management using integrated wireless sensor networks

    No full text
    The challenge of improving water quality is a growing global concern, typified by the European Commission Water Framework Directive and the United States Clean Water Act. The main drivers of poor water quality are economics, poor water management, agricultural practices and urban development. This paper reviews the extensive role of non-point sources, in particular the outdated agricultural practices, with respect to nutrient and contaminant contributions. Water quality monitoring (WQM) is currently undertaken through a number of data acquisition methods from grab sampling to satellite based remote sensing of water bodies. Based on the surveyed sampling methods and their numerous limitations, it is proposed that wireless sensor networks (WSNs), despite their own limitations, are still very attractive and effective for real-time spatio-temporal data collection for WQM applications. WSNs have been employed for WQM of surface and ground water and catchments, and have been fundamental in advancing the knowledge of contaminants trends through their high resolution observations. However, these applications have yet to explore the implementation and impact of this technology for management and control decisions, to minimize and prevent individual stakeholder’s contributions, in an autonomous and dynamic manner. Here, the potential of WSN-controlled agricultural activities and different environmental compartments for integrated water quality management is presented and limitations of WSN in agriculture and WQM are identified. Finally, a case for collaborative networks at catchment scale is proposed for enabling cooperation among individually networked activities/stakeholders (farming activities, water bodies) for integrated water quality monitoring, control and management

    Numerical implementation of the eXtended Finite Element Method for dynamic crack analysis

    Get PDF
    A numerical implementation of the eXtended Finite Element Method (X-FEM) to analyze crack propagation in a structure under dynamic loading is presented in this paper. The arbitrary crack is treated by the X-FEM method without re-meshing but using an enrichment of the classical displacement-based finite element approximation in the framework of the partition of unity method. Several algorithms have been implemented, within an Oriented Object framework in C++, in the home made explicit FEM code. The new module, called DynaCrack, included in the dynamic FEM code DynELA, evaluates the crack geometry, the propagation of the crack and allow the post-processing of the numerical results. The module solves the system of discrete equations using an explicit integration scheme. Some numerical examples illustrating the main features and the computational efficiency of the DynaCrack module for dynamic crack propagation are presented in the last section of the paper

    Sensornet checkpointing: enabling repeatability in testbeds and realism in simulations

    Get PDF
    When developing sensor network applications, the shift from simulation to testbed causes application failures, resulting in additional time-consuming iterations between simulation and testbed. We propose transferring sensor network checkpoints between simulation and testbed to reduce the gap between simulation and testbed. Sensornet checkpointing combines the best of both simulation and testbeds: the nonintrusiveness and repeatability of simulation, and the realism of testbeds
    corecore