10,875 research outputs found

    Feminist Perspective of Cross-gender Power Relation in Caryl Churchill's Top Girls

    Full text link
    Top Girls, one of Caryl Churchill's most popular plays, describes the lives of six female characters coming from different centuries. Each of them has their own story to tell, as they have all been victimized by the patriarchal system in the century when they live and have resisted the system with different strategies. They either employ roles that are traditionally reserved for men or they adopt the archetypically feminine qualities. Despite their resistance and success, they find themselves unhappy and unsatisfied over their achievements. Thus this raises the question of the effectiveness of the feminist movement

    Wideband, high efficiency optical modulator requires less than 10 watts drive power

    Get PDF
    Wideband optical modulation system operates with less than 10-watts drive power. It consists of an optical modulator and transistorized driver that combines small cross-section potassium dideuterium phosphate crystals with laser beam-condensing optics. Optical modulation systems may serve importantly in future space wideband communication systems

    Single- and Multiple-Shell Uniform Sampling Schemes for Diffusion MRI Using Spherical Codes

    Get PDF
    In diffusion MRI (dMRI), a good sampling scheme is important for efficient acquisition and robust reconstruction. Diffusion weighted signal is normally acquired on single or multiple shells in q-space. Signal samples are typically distributed uniformly on different shells to make them invariant to the orientation of structures within tissue, or the laboratory coordinate frame. The Electrostatic Energy Minimization (EEM) method, originally proposed for single shell sampling scheme in dMRI, was recently generalized to multi-shell schemes, called Generalized EEM (GEEM). GEEM has been successfully used in the Human Connectome Project (HCP). However, EEM does not directly address the goal of optimal sampling, i.e., achieving large angular separation between sampling points. In this paper, we propose a more natural formulation, called Spherical Code (SC), to directly maximize the minimal angle between different samples in single or multiple shells. We consider not only continuous problems to design single or multiple shell sampling schemes, but also discrete problems to uniformly extract sub-sampled schemes from an existing single or multiple shell scheme, and to order samples in an existing scheme. We propose five algorithms to solve the above problems, including an incremental SC (ISC), a sophisticated greedy algorithm called Iterative Maximum Overlap Construction (IMOC), an 1-Opt greedy method, a Mixed Integer Linear Programming (MILP) method, and a Constrained Non-Linear Optimization (CNLO) method. To our knowledge, this is the first work to use the SC formulation for single or multiple shell sampling schemes in dMRI. Experimental results indicate that SC methods obtain larger angular separation and better rotational invariance than the state-of-the-art EEM and GEEM. The related codes and a tutorial have been released in DMRITool.Comment: Accepted by IEEE transactions on Medical Imaging. Codes have been released in dmritool https://diffusionmritool.github.io/tutorial_qspacesampling.htm

    Wideband high efficiency optical modulator Final report, 15 Feb. 1966 - 15 Mar. 1967

    Get PDF
    Design of wideband high efficiency optical modulation system tested over 100-MHz ban

    Appraising the Market Overt Exception

    Full text link
    Under what circumstances can a sale of goods by a person, who is not the owner ofthe goods, nonetheless confer good title on the purchaser? The common law rule “nemo dat quodnon habet†embodies the principle that the transferee of goods cannot get better title than that of thetransferor. In other words, if goods are sold by a person who does not have title to the goods (forexample, because he had obtained the goods by theft), then he would be unable to pass title to asubsequent purchaser since he did not have title to begin with. The nemo dat rule thus protects thetrue or original owner of goods. One of the exceptions to this rule under the Hong Kong Sale ofGoods Ordinance is the market overt exception, which seeks to protect innocent purchasers. Thisarticle first considers the meanings of and rationales behind the nemo dat rule and the market overtexception respectively. Problems with the existing market overt exception will next be discussed. Asuggestion will then be made that the market overt exception be replaced with a rule that protectsinnocent buyers who deal as consumers and who have purchased goods from shops or markets inHong Kong

    A NETWORK INTRUSION DETECTION SYSTEM USING DECISION TREE MACHINE LEARNING ON AN ISTN ARCHITECTURE

    Get PDF
    In recent years, the Navy has shown interest in an integrated satellite-terrestrial networking (ISTN) architecture for unmanned systems. With the development of satellite networks and growing numbers of unmanned system networks being connected, security and privacy are major concerns in an ISTN. In this thesis, we develop a network intrusion detection system (NIDS) specifically for an ISTN. We identify the critical location of the NIDS within the ISTN architecture and use the decision tree machine learning algorithm to perform cyber-attack detection against various threat vectors, including distributed denial of service. The decision tree algorithm is used to classify and segregate attack traffic from benign traffic. We use an open source ISTN data set available in the literature to train our algorithm. The decision tree is implemented using different split criteria, varying number of splits, and the use of principal component analysis (PCA). We manipulate the size of the training data and the number of data features to achieve reasonable false positive rates. We show that our NIDS framework based on decision tree learning can effectively detect and segregate different attack data classes.Civilian, DSO National Labs, SingaporeApproved for public release. Distribution is unlimited
    • …
    corecore