299 research outputs found

    Use of time-resolved fluorescence to monitor bioactive compounds in plant based foodstuffs

    Get PDF
    The study of compounds that exhibit antioxidant activity has recently received much interest in the food industry because of their potential health benefits. Most of these compounds are plant based, such as polyphenolics and carotenoids, and there is a need to monitor them from the field through processing and into the body. Ideally, a monitoring technique should be non-invasive with the potential for remote capabilities. The application of the phenomenon of fluorescence has proved to be well suited, as many plant associated compounds exhibit fluorescence. The photophysical behaviour of fluorescent molecules is also highly dependent on their microenvironment, making them suitable probes to monitor changes in pH, viscosity and polarity, for example. Time-resolved fluorescence techniques have recently come to the fore, as they offer the ability to obtain more information, coupled with the fact that the fluorescence lifetime is an absolute measure, while steady state just provides relative and average information. In this work, we will present illustrative time-resolved measurements, rather than a comprehensive review, to show the potential of time-resolved fluorescence applied to the study of bioactive substances. The aim is to help assess if any changes occur in their form, going from extraction via storage and cooking to the interaction with serum albumin, a principal blood transport protein

    A Software Prototype for the IBM Series/1 Remote Intelligent Printers

    Get PDF
    Over the period of December 1982 to May 1983, a software prototype to support the IBM 4975 model 01 A printer was developed. The host computer was the IBM Series/1 minicomputer. The printer controller used was the Feature Programmable Multi-Line Adapter. Both the controller and printer contain one or more microprocessors that do some processing for the Series/1. With the RS232C electrical interface, the printer has remote capabilities. The electrical interface performs data transmission that is serial, asynchronous, and full duplex. This thesis serves as an application showing how intelligent printers and controllers can be utilized effectively on the Series/1

    The remote monad design pattern

    Get PDF
    Remote Procedure Calls are expensive. This paper demonstrates how to reduce the cost of calling remote procedures from Haskell by using the remote monad design pattern, which amortizes the cost of remote calls. This gives the Haskell community access to remote capabilities that are not directly supported, at a surprisingly inexpensive cost. We explore the remote monad design pattern through six models of remote execution patterns, using a simulated Internet of Things toaster as a running example. We consider the expressiveness and optimizations enabled by each remote execution model, and assess the feasibility of our approach. We then present a full-scale case study: a Haskell library that provides a Foreign Function Interface to the JavaScript Canvas API. Finally, we discuss existing instances of the remote monad design pattern found in Haskell libraries

    Out-Of-Place debugging: a debugging architecture to reduce debugging interference

    Get PDF
    Context. Recent studies show that developers spend most of their programming time testing, verifying and debugging software. As applications become more and more complex, developers demand more advanced debugging support to ease the software development process. Inquiry. Since the 70's many debugging solutions were introduced. Amongst them, online debuggers provide a good insight on the conditions that led to a bug, allowing inspection and interaction with the variables of the program. However, most of the online debugging solutions introduce \textit{debugging interference} to the execution of the program, i.e. pauses, latency, and evaluation of code containing side-effects. Approach. This paper investigates a novel debugging technique called \outofplace debugging. The goal is to minimize the debugging interference characteristic of online debugging while allowing online remote capabilities. An \outofplace debugger transfers the program execution and application state from the debugged application to the debugger application, both running in different processes. Knowledge. On the one hand, \outofplace debugging allows developers to debug applications remotely, overcoming the need of physical access to the machine where the debugged application is running. On the other hand, debugging happens locally on the remote machine avoiding latency. That makes it suitable to be deployed on a distributed system and handle the debugging of several processes running in parallel. Grounding. We implemented a concrete out-of-place debugger for the Pharo Smalltalk programming language. We show that our approach is practical by performing several benchmarks, comparing our approach with a classic remote online debugger. We show that our prototype debugger outperforms by a 1000 times a traditional remote debugger in several scenarios. Moreover, we show that the presence of our debugger does not impact the overall performance of an application. Importance. This work combines remote debugging with the debugging experience of a local online debugger. Out-of-place debugging is the first online debugging technique that can minimize debugging interference while debugging a remote application. Yet, it still keeps the benefits of online debugging ( e.g. step-by-step execution). This makes the technique suitable for modern applications which are increasingly parallel, distributed and reactive to streams of data from various sources like sensors, UI, network, etc

    Towards a cyberterrorism life-cycle (CLC) model

    Get PDF
    Cyberterrorism has emerged as a new threat in the Information and Communication Technology (ICT) landscape. The ease of use, affordability, remote capabilities and access to critical targets makes cyberterrorism a potential threat to cause wide-scale damage. Cyberterrorism is often incorrectly perceived as encompassing all cybercrimes. However, cyberterrorism differs from cybercrime in various ways including motivation, attack goals, techniques and effects. Motivations for cyberterrorism, which is similar to terrorism in general, stem from religious, social and political views. Cyberterrorists generally would seek to have high impact in order to gain publicity for their cause, whereas cybercriminals often prefer to have their acts undetected in order to hide their financial theft, fraud or espionage. Therefore, there are various factors that drive the development of a cyberterrorist. This paper proposes a model for the development of cyberterrorism in order to show the various influential forces. The Cyberterrorism Life-Cycle (CLC) model presented in this paper is composed of five phases: Prepare, Acquaint, Choose, Execute, and Deter (PACED). In addition the paper looks at various factors, including social, practices, objectives, targets and countermeasures, which are mapped onto the PACED phases in order to show the interaction and dynamic nature during the life-cycle development

    NetIQ Evaluation Project

    Get PDF
    The motivation behind the NetIQ Evaluation Project stems from the fact that Regis University does not currently utilize network management software across the various campus networks. Although this “state of the network” in and of itself is reason alone for such a project, other factors such as an overall increase in the student populous, an increase in the demand for on-line education, and a general need for a secure, reliable and efficient network that spans multiple Regis University campuses has helped fuel project initiative. The NetIQ Evaluation Project’s overall goal is to evaluate the network management software suite known as NetIQ AppManager. This evaluation will provide Regis University policy makers with unbiased information in terms of selecting a network management software suite

    Using Virtual Reality to Visualize the 3D Pathline of Individual Particles in a Double Screw Mixer

    Get PDF
    Granular flows are found in many industries including food processing, pharmaceutical production, and energy generation. Understanding particle-particle mixing is important for process modeling and optimization. Recent work has used X-ray particle tracking velocimetry (XPTV) to characterize the threedimensional (3D) granular flow structures in a double screw mixer. However, visualizing the experimental 3D data can be challenging. This study uses virtual reality to allow a user to “walk through” the intermeshing screws of a simulated double screw mixing process and watch individual particles as they travel through the mixer. As the particle moves through the mixer, a particle path line is used to follow its movement. The virtual environment allows the user to view the particle from any direction using the physical movement of his or her body, augmented by a Wii remote for navigation beyond the physical space. The Wii remote also provides options to pause or reverse, to zoom in or out, and to slow down or speed up particle motion. Furthermore, the interaction code is flexible enough to allow other input devices, such as the Microsoft Kinect sensor and voice recognition, to control the system. The virtual reality environment provides researchers with a novel method to visualize the mixing process to gain unique insight into particle movement through a double screw mixer

    The Resource Page, Vol. 57, No. 1

    Get PDF
    ABA ETHICS OPINION REGARDING WORKING REMOTELY DURING PANDEMIC GROWING DEMAND FOR CIVICS EDUCATION JURY TRIALS DURING COVID-19 BEST LAPTOPS FOR LAWYERS 202

    A framework to detect cyber-attacks against networked medical devices (Internet of Medical Things):an attack-surface-reduction by design approach

    Get PDF
    Most medical devices in the healthcare system are not built-in security concepts. Hence, these devices' built-in vulnerabilities prone them to various cyber-attacks when connected to a hospital network or cloud. Attackers can penetrate devices, tamper, and disrupt services in hospitals and clinics, which results in threatening patients' health and life. A specialist can Manage Cyber-attacks risks by reducing the system's attack surface. Attack surface analysis, either as a potential source for exploiting a potential vulnerability by attackers or as a medium to reduce cyber-attacks play a significant role in mitigating risks. Furthermore, it is necessitated to perform attack surface analysis in the design phase. This research proposes a framework that integrates attack surface concepts into the design and development of medical devices. Devices are classified as high-risk, medium-risk, and low-risk. After risk assessment, the employed classification algorithm detects and analyzes the attack surfaces. Accordingly, the relevant adapted security controls will be prompted to hinder the attack. The simulation and evaluation of the framework is the subject of further research.</p
    • …
    corecore