3,971 research outputs found

    Research Faculty, Entrepreneurship and Commercialization: The Case of Kansas State University

    Get PDF
    In this study, we assess the relationships between the demographic characteristics of researchers and their perspectives on entrepreneurship and the commercialization of their inventions, and analyze the relationship between faculty perceptions of university commercialization policies and their entrepreneurial orientation. We conclude that there is a need for effective educational programs to address each of the issues and increase awareness among faculty and researchers.Research and Development/Tech Change/Emerging Technologies, Teaching/Communication/Extension/Profession,

    3D Formation Control in Multi-Robot Teams Using Artificial Potential Fields

    Get PDF
    Multi-robot teams find applications in emergency response, search and rescue operations, convoy support and many more. Teams of autonomous aerial vehicles can also be used to protect a cargo of airplanes by surrounding them in some geometric shape. This research develops a control algorithm to attract UAVs to one or a set of bounded geometric shapes while avoiding collisions, re-configuring in the event of departure or addition of UAVs and maneuvering in mission space while retaining the configuration. Using potential field theory, weighted vector fields are described to attract UAVs to a desired formation. In order to achieve this, three vector fields are defined: one attracts UAVs located outside the formation towards bounded geometric shape; one pushes them away from the center towards the desired region and the third controls collision avoidance and dispersion of UAVs within the formation. The result is a control algorithm that is theoretically justified and verified using MATLAB which generates velocity vectors to attract UAVs to a loose formation and maneuver in the mission space while remaining in formation. This approach efficiently scales to different team sizes

    Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots

    Full text link
    The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots

    Hypertension in the elderly

    Get PDF
    This issue of eMedRef provides information to clinicians on the pathophysiology, diagnosis, and therapeutics of hypertension in the elderly

    SPICY ANTI-CANCER SPICES: A REVIEW

    Get PDF
    The uses of ethnomedicinal dietary antimutagens and anticarcinogens for human healthcare still remain the most promising approach to the protection of human health and medication system in developing and under developing nations. The plant sources of India provide effective anticancer agents. Spice Herbs have a vital role in the prevention and treatment of cancer. Spices have been used for thousands of years and are known for their flavor, taste and color in the food. Moreover, ethnomedicinal spices used to treat cancer are considerably cheap. Herbal drug treatment can be given to poor people in the rural areas to treat different cancers effectively at an affordable cost. The article reveals the most recent studies on dietary ethnomedicinal spices and their families used to treat various types of cancer

    An approximate method for solving a class of singular perturbation problems

    Get PDF
    AbstractAn approximate method for the numerical solution of a class of singularly perturbed two point boundary value problems is presented. The given region is divided into inner and outer regions. The original second-order problem is replaced by an asymptotically equivalent first-order problem and solved as an initial value problem in the inner region. A terminal boundary condition is then obtained from the solution of the inner region problem. In turn, an outer region problem is obtained, by replacing the second-order differential equation by an approximate first-order differential equation with a small deviating argument, and solved efficiently by employing the trapezoidal formula coupled with a discrete invariant imbedding algorithm. The proposed method is iterative on the terminal point of the inner region problem. Several numerical examples have been solved to demonstrate the applicability of the method
    • …
    corecore