Feedforward B-KEY maximum I-KEY power I-KEY point I-KEY tracking I-KEY of O PV B-KEY systems I-KEY using O fuzzy B-KEY controller I-KEY A O feedforward O maximum O power O -LRB- O MP O -RRB- O point O tracking O scheme O is O developed O for O the O interleaved O dual O boost O -LRB- O IDB O -RRB- O converter O fed O photovoltaic O -LRB- O PV O -RRB- O system O using O fuzzy B-KEY controller I-KEY . O The O tracking B-KEY algorithm I-KEY changes O the O duty B-KEY ratio I-KEY of O the O converter O such O that O the O solar O cell O array O -LRB- O SCA O -RRB- O voltage O equals O the O voltage O corresponding O to O the O MP O point O at O that O solar B-KEY insolation I-KEY . O This O is O done O by O the O feedforward B-KEY loop I-KEY , O which O generates O an O error B-KEY signal I-KEY by O comparing O the O instantaneous B-KEY array I-KEY voltage I-KEY and O reference B-KEY voltage I-KEY . O The O reference B-KEY voltage I-KEY for O the O feedforward B-KEY loop I-KEY , O corresponding O to O the O MP O point O , O is O obtained O by O an O off-line B-KEY trained I-KEY neural I-KEY network I-KEY . O Experimental O data O is O used O for O off-line O training O of O the O neural O network O , O which O employs O back-propagation B-KEY algorithm I-KEY . O The O proposed O fuzzy B-KEY feedforward I-KEY peak I-KEY power I-KEY tracking I-KEY effectiveness I-KEY is O demonstrated O through O the O simulation O and O experimental O results O , O and O compared O with O the O conventional O proportional O plus O integral O -LRB- O PI O -RRB- O controller O based O system O . O Finally O , O a O comparative O study O of O interleaved O boost O and O conventional O boost O converter O for O the O PV O applications O is O given O and O their O suitability O is O discussed O Synchronizing B-KEY experiments I-KEY with O linear B-KEY interval I-KEY systems I-KEY Concerns O generalized O control B-KEY problems O without O exact O information O . O

O A O method O of O constructing O a O minimal O synchronizing O sequence O for O a O linear B-KEY interval I-KEY system I-KEY over O the O field O of O real B-KEY numbers I-KEY is O developed O . O This O problem O is O reduced O to O a O system O of O linear B-KEY inequalities I-KEY Convolution-based B-KEY global I-KEY simulation I-KEY technique O for O millimeter-wave B-KEY photodetector I-KEY and O photomixer B-KEY circuits O A O fast O convolution-based B-KEY time-domain I-KEY approach I-KEY to O global B-KEY photonic-circuit I-KEY simulation I-KEY is O presented O that O incorporates O a O physical B-KEY device I-KEY model I-KEY in O the O complete O detector O or O mixer O circuit O . O The O device O used O in O the O demonstration O of O this O technique O is O a O GaAs B-KEY metal-semiconductor-metal O -LRB- O MSM O -RRB- O photodetector O that O offers O a O high O response O speed O for O the O detection O and O generation O of O millimeter O waves O . O Global O simulation O greatly O increases O the O accuracy O in O evaluating O the O complete O circuit O performance O because O it O accounts O for O the O effects O of O the O millimeter-wave O embedding O circuit O . O Device O and O circuit O performance O are O assessed O by O calculating O optical B-KEY responsivity I-KEY and O bandwidth B-KEY . O Device-only O simulations O using O GaAs B-KEY MSMs O are O compared O with O global O simulations O that O illustrate O the O strong O interdependence O between O device O and O external O circuit O Managing O system O risk O Companies O are O increasingly O required O to O provide O assurance O that O their O systems O are O secure O and O conform O to O commercial B-KEY security I-KEY standards I-KEY . O Senior O business O managers O are O ultimately O responsible O for O the O security O of O their O corporate O systems O and O for O the O implications O in O the O event O of O a O failure O . O Businesses O will O be O exposed O to O unquantified O security O risks O unless O they O have O a O formal O risk B-KEY management I-KEY framework I-KEY in O place O to O enable O risks O to O be O identified O , O evaluated O and O managed O . O Failure O to O assess O and O manage O risks O can O lead O to O a O business O suffering O serious O financial O impacts O , O commercial O embarrassment O and O fines O or O sanctions O from O regulators O . O This O is O both O a O key O responsibility O and O opportunity O for O Management O Services O Practitioners O A O 120-mW O 3-D O rendering O engine O with O 6-Mb O embedded O DRAM O and O 3.2-GB O / O s O runtime O reconfigurable B-KEY bus I-KEY for O PDA O chip O A O low-power O three-dimensional O -LRB- O 3-D O -RRB- O rendering O engine O is O implemented O as O part O of O a O mobile O personal O digital O assistant O -LRB- O PDA O -RRB- O chip O . O Six-megabit O embedded B-KEY DRAM I-KEY macros I-KEY attached O to O 8-pixel-parallel B-KEY rendering I-KEY logic I-KEY are O logically O localized O with O a O 3.2-GB O / O s O runtime O reconfigurable B-KEY bus I-KEY , O reducing O the O area O by O 25 O % O compared O with O conventional O local O frame-buffer O architectures O . O The O low B-KEY power I-KEY consumption I-KEY is O achieved O by O polygon-dependent B-KEY access I-KEY to O the O embedded B-KEY DRAM I-KEY macros I-KEY with O line-block B-KEY mapping I-KEY providing O read-modify-write B-KEY data I-KEY transaction I-KEY . O The O 3-D O rendering O engine O with O 2.22-Mpolygons O / O s O drawing O speed O was O fabricated O using O 0.18 O - O mu O m O CMOS B-KEY embedded I-KEY memory I-KEY logic I-KEY technology I-KEY . O Its O area O is O 24 O mm/sup O 2 O / O and O its O power O consumption O is O 120 B-KEY mW I-KEY Application O of O nonlinear B-KEY time I-KEY series I-KEY analysis O techniques O to O high-frequency B-KEY currency I-KEY exchange I-KEY data I-KEY In O this O work O we O have O applied O nonlinear B-KEY time I-KEY series I-KEY analysis O to O high-frequency B-KEY currency I-KEY exchange I-KEY data I-KEY . O The O time O series O studied O are O the O exchange B-KEY rates I-KEY between O the O US B-KEY Dollar I-KEY and O 18 O other O foreign B-KEY currencies I-KEY from O within O and O without O the O Euro B-KEY zone I-KEY . O Our O goal O was O to O determine O if O their O dynamical O behaviours O were O in O some O way O correlated O . O The O nonexistence O of O stationarity B-KEY called O for O the O application O of O recurrence B-KEY quantification I-KEY analysis I-KEY as O a O tool O for O this O analysis O , O and O is O based O on O the O definition O of O several O parameters O that O allow O for O the O quantification O of O recurrence B-KEY plots I-KEY . O The O method O was O checked O using O the O European B-KEY Monetary I-KEY System I-KEY currency O exchanges O . O The O results O show O , O as O expected O , O the O high O correlation O between O the O currencies O that O are O part O of O the O Euro O , O but O also O a O strong O correlation O between O the O Japanese B-KEY Yen I-KEY , O the O Canadian B-KEY Dollar I-KEY and O the O British B-KEY Pound I-KEY . O Singularities O of O the O series O are O also O demonstrated O taking O into O account O historical B-KEY events I-KEY , O in O 1996 O , O in O the O Euro B-KEY zone I-KEY Finally O ! O some O sensible O European O legislation O on O software O The O European B-KEY Commission I-KEY has O formally O tabled O a O draft O Directive B-KEY on I-KEY the I-KEY Protection I-KEY by I-KEY Patents I-KEY of I-KEY Computer-Implemented I-KEY Inventions I-KEY . O The O aim O of O this O very O important O Directive O is O to O harmonise O national B-KEY patent I-KEY laws I-KEY relating O to O inventions O using O software O . O It O follows O an O extensive O consultation O launched O by O the O Commission O in O October O 2000 O . O The O impetus O behind O the O Directive O was O the O recognition O at O EU B-KEY level O of O a O total O lack O of O unity O between O the O European B-KEY Patent I-KEY Office I-KEY and O European O national B-KEY courts I-KEY in O deciding O what O was O or O was O not O deemed O patentable O when O it O came O to O the O subject O of O computer B-KEY programs I-KEY Project-based B-KEY learning I-KEY : O teachers B-KEY learning O and O using O high-tech O to O preserve O Cajun B-KEY culture I-KEY Using O project-based B-KEY learning I-KEY pedagogy O in O EdTc O 658 O Advances O in O Educational O Technology O , O the O author O has O trained O inservice O teachers O in O Southwestern O Louisiana O with O an O advanced O computer O multimedia O program O called O Director O -LRB- O R O -RRB- O -LRB- O Macromedia O , O Inc. O -RRB- O . O The O content O of O this O course O focused O on O modeling O the O project-based B-KEY learning I-KEY pedagogy O and O researching O Acadian O 's O traditions O and O legacy O . O With O the O multi-functions O of O microcomputers O , O new B-KEY technologies I-KEY were O used O to O preserve O and O celebrate O the O local B-KEY culture I-KEY with O superiority O of O text O , O graphics O , O animation O , O sound O , O and O video O . O The O article O describes O how O several O groups O of O school B-KEY teachers I-KEY in O the O surrounding O areas O of O a O regional O state O university O of O Louisiana O learned O computer O multimedia O using O project-based O learning O and O integrated O their O learning O into O local O cultural O heritage O A O nonlinear B-KEY modulation I-KEY strategy I-KEY for O hybrid B-KEY AC/DC I-KEY power I-KEY systems I-KEY A O nonlinear B-KEY control I-KEY strategy I-KEY to O improve O transient B-KEY stability I-KEY of O a O multi-machine B-KEY AC I-KEY power I-KEY system I-KEY with O several O DC B-KEY links I-KEY terminated O in O the O presence O of O large O disturbances O is O presented O . O The O approach O proposed O in O this O paper O is O based O on O differential B-KEY geometric I-KEY theory I-KEY , O and O the O HVDC B-KEY systems I-KEY are O taken O as O a O variable B-KEY admittance I-KEY connected O at O the O inverter B-KEY or O rectifier B-KEY AC I-KEY bus I-KEY . O After O deriving O the O analytical O description O of O the O relationship O between O the O variable B-KEY admittance I-KEY and O active B-KEY power I-KEY flows I-KEY of O each O generator O , O the O traditional O generator B-KEY dynamic I-KEY equations I-KEY can O thus O be O expressed O with O the O variable B-KEY admittance I-KEY of O HVDC B-KEY systems I-KEY as O an O additional O state O variable O and O changed O to O an O affine B-KEY form I-KEY , O which O is O suitable O for O global B-KEY linearization I-KEY method I-KEY being O used O to O determine O its O control O variable O . O An O important O feature O of O the O proposed O method O is O that O , O the O modulated O DC O power O is O an O adaptive O and O non-linear O function O of O AC O system O states O , O and O it O can O be O realized O by O local B-KEY feedback I-KEY and O less O transmitted O data O from O , O adjacent B-KEY generators I-KEY . O The O design O procedure O is O tested O on O a O dual-infeed B-KEY hybrid I-KEY AC/DC I-KEY system I-KEY Two-step B-KEY integral I-KEY imaging I-KEY for O orthoscopic O three-dimensional O imaging O with O improved O viewing O resolution O We O present O a O two-step B-KEY integral I-KEY imaging I-KEY system O to O obtain O 3-D O orthoscopic O real O images O . O By O adopting O a O nonstationary B-KEY micro-optics I-KEY technique I-KEY , O we O demonstrate O experimentally O the O potential O usefulness O of O two-step B-KEY integral I-KEY imaging I-KEY Mathematical B-KEY fundamentals I-KEY of O constructing O fuzzy B-KEY Bayesian I-KEY inference I-KEY techniques I-KEY Problems O and O an O associated O technique O for O developing O a O Bayesian O approach O to O decision-making O in O the O case O of O fuzzy O data O are O presented O . O The O concept O of O fuzzy O and O pseudofuzzy B-KEY quantities I-KEY is O introduced O and O main O operations O with O pseudofuzzy B-KEY quantities I-KEY are O considered O . O The O basic O relationships O and O the O principal O concepts O of O the O Bayesian O decision O procedure O based O on O the O modus-ponens B-KEY rule I-KEY are O proposed O . O Some O problems O concerned O with O the O practical O realization O of O the O fuzzy O Bayesian O method O are O considered O Novel O active B-KEY noise-reducing I-KEY headset I-KEY using O earshell B-KEY vibration I-KEY control I-KEY Active O noise-reducing O -LRB- O ANR O -RRB- O headsets O are O available O commercially O in O applications O varying O from O aviation B-KEY communication I-KEY to O consumer B-KEY audio I-KEY . O Current O ANR O systems O use O passive B-KEY attenuation I-KEY at O high O frequencies O and O loudspeaker-based O active O noise O control O at O low O frequencies O to O achieve O broadband B-KEY noise I-KEY reduction I-KEY . O This O paper O presents O a O novel O ANR O headset O in O which O the O external O noise O transmitted O to O the O user O 's O ear O via O earshell O vibration O is O reduced O by O controlling O the O vibration O of O the O earshell O using O force B-KEY actuators I-KEY acting O against O an O inertial B-KEY mass I-KEY or O the O earshell O headband O . O Model-based O theoretical O analysis O using O velocity B-KEY feedback I-KEY control I-KEY showed O that O current O piezoelectric B-KEY actuators I-KEY provide O sufficient O force O but O require O lower O stiffness B-KEY for O improved O low-frequency O performance O . O Control O simulations O based O on O experimental O data O from O a O laboratory O headset O showed O that O good O performance O can O potentially O be O achieved O in O practice O by O a O robust B-KEY feedback I-KEY controller I-KEY , O while O a O single-frequency B-KEY real-time I-KEY control I-KEY experiment O verified O that O noise O reduction O can O be O achieved O using O earshell B-KEY vibration I-KEY control I-KEY Down O up O -LSB- O IT O projects O -RSB- O Despite O the O second O quarter O 's O gloomy O GDP O report O , O savvy O CIOs O are O forging O ahead O with O big O IT O projects O that O will O position O their O companies O to O succeed O when O the O economy O soars O again O Evicting O orang O utans O from O the O office O -LSB- O electronic B-KEY storage I-KEY of O legal B-KEY files I-KEY -RSB- O Having O espoused O the O principle O of O the O paperless B-KEY office I-KEY some O time O ago O , O we O decided O to O apply O it O to O our O stored O files O . O First O we O consulted O the O Law B-KEY Society I-KEY rules I-KEY governing O storage O of O files O on O electronic O media O . O The O next O step O was O for O us O to O draw O up O a O protocol O for O scanning O the O files O . O The O benefits O of O the O exercise O have O been O significant O . O The O area O previously O used O for O storage O has O been O freed O for O other O use O . O Files O are O now O available O online O , O instantaneously O . O When O we O have O needed O to O send O out O files O to O the O client O or O following O a O change O of O solicitor O , O we O have O been O able O to O do O so O almost O immediately O , O by O E-mail O , O retaining O a O copy O for O our O future O reference O . O The O files O are O protected O from O loss O or O deterioration O , O back-up O copies O having O been O taken O which O are O stored O off O site O . O The O complete O stored O file B-KEY archive I-KEY can O be O put O in O your O pocket O -LRB- O in O CD-ROM B-KEY format O -RRB- O or O on O a O laptop O , O facilitating O remote O working O A O nonlinear B-KEY time-optimal I-KEY control I-KEY problem I-KEY Sufficient O conditions O for O the O existence O of O an O optimal O control O in O a O time-optimal O control O problem O with O fixed O ends O for O a O smooth B-KEY nonlinear I-KEY control I-KEY system I-KEY are O formulated O . O The O properties O of O this O system O for O characterizing O the O optimal B-KEY control I-KEY switching I-KEY points I-KEY are O studied O Quantitative B-KEY speed I-KEY control I-KEY for O SRM B-KEY drive I-KEY using O fuzzy B-KEY adapted I-KEY inverse I-KEY model I-KEY Quantitative O and O robust O speed O control O for O a O switched B-KEY reluctance I-KEY motor I-KEY -LRB- O SRM O -RRB- O drive O is O considered O to O be O rather O difficult O and O challenging O owing O to O its O highly O nonlinear B-KEY dynamic I-KEY behavior I-KEY . O A O speed O control O scheme O having O two-degree-of-freedom O -LRB- O 2DOF O -RRB- O structure O is O developed O here O to O improve O the O speed B-KEY dynamic I-KEY response I-KEY of O an O SRM B-KEY drive I-KEY . O In O the O proposed O control O scheme O , O the O feedback O controller O is O quantitatively O designed O to O meet O the O desired O regulation B-KEY control I-KEY requirements I-KEY first O . O Then O a O reference B-KEY model I-KEY and O a O command B-KEY feedforward I-KEY controller I-KEY based O on O an O inverse B-KEY plant I-KEY model I-KEY are O employed O to O yield O the O desired O tracking B-KEY response I-KEY at O nominal O case O . O As O the O variations O of O system B-KEY parameters I-KEY and O operating B-KEY conditions I-KEY occur O , O the O prescribed O control B-KEY specifications I-KEY may O not O be O satisfied O any O more O . O To O improve O this O , O the O inverse O model O is O adaptively O tuned O by O a O fuzzy B-KEY control I-KEY scheme I-KEY so O that O the O model-following B-KEY tracking I-KEY error I-KEY is O significantly O reduced O . O In O addition O , O a O simple O disturbance O cancellation O robust O controller O is O added O to O improve O the O tracking O and O regulation O control O performances O further O On O emotion B-KEY and O bounded B-KEY rationality I-KEY : O reply O to O Hanoch O The O author O refers O to O the O comment O made O by O Hanoch O -LRB- O see O ibid O . O vol O .49 O -LRB- O 2000 O -RRB- O -RRB- O on O his O model O of O bounded B-KEY rationality I-KEY and O the O role O of O the O Yerkes-Dodson B-KEY law I-KEY and O emotional B-KEY arousal O in O it O . O The O author O points O out O that O Hanoch O 's O comment O , O however O , O conspicuously O fails O to O challenge O - O much O less O contradict O - O the O central O hypothesis O of O his O paper O . O In O addition O , O several O of O Hanoch O 's O criticisms O are O based O on O a O wrong O characterization O of O the O positions O eMarketing O : O restaurant B-KEY Web I-KEY sites I-KEY that O click O A O number O of O global O companies O have O adopted O electronic B-KEY commerce I-KEY as O a O means O of O reducing O transaction O related O expenditures O , O connecting O with O current O and O potential O customers O , O and O enhancing O revenues B-KEY and O profitability B-KEY . O If O a O restaurant O is O to O have O an O Internet B-KEY presence I-KEY , O what O aspects O of O the O business O should O be O highlighted O ? O Food B-KEY service I-KEY companies I-KEY that O have O successfully O ventured O onto O the O web O have O employed O assorted O web-based O technologies O to O create O a O powerful O marketing O tool O of O unparalleled O strength O . O Historically O , O it O has O been O difficult O to O create O a O set O of O criteria O against O which O to O evaluate O website O effectiveness O . O As O practitioners O consider O additional O resources O for O website O development O , O the O effectiveness O of O e-marketing B-KEY investment O becomes O increasingly O important O . O Care O must O be O exercised O to O ensure O that O the O quality O of O the O site O adheres O to O high O standards O and O incorporates O evolving O technology O , O as O appropriate O . O Developing O a O coherent O website O strategy O , O including O an O effective O website O design O , O are O proving O critical O to O an O effective O web O presence O Central O hub O for O design O assets O : O Adobe B-KEY GoLive I-KEY 6.0 I-KEY Adobe O GoLive O is O a O strong O contender O for O Web B-KEY authoring I-KEY and O publishing O . O Version O 6.0 O features O a O flexible O GUI B-KEY environment O combined O with O a O comprehensive O workgroup O and O collaboration B-KEY server I-KEY , O plus O tight O integration O with O leading O design O tools O Design O and O implementation O of O a O 3-D O mapping O system O for O highly B-KEY irregular I-KEY shaped I-KEY objects I-KEY with O application O to O semiconductor O manufacturing O The O basic O technology O for O a O robotic B-KEY system I-KEY is O developed O to O automate O the O packing O of O polycrystalline B-KEY silicon I-KEY nuggets I-KEY into O fragile B-KEY fused I-KEY silica I-KEY crucible I-KEY in O Czochralski O -LRB- O melt O pulling O -RRB- O semiconductor O wafer O production O . O The O highly O irregular O shapes O of O the O nuggets O and O the O packing O constraints O make O this O a O difficult O and O challenging O task O . O It O requires O the O delicate O manipulation O and O packing O of O highly O irregular O polycrystalline B-KEY silicon I-KEY nuggets I-KEY into O a O fragile O fused O silica O crucible O . O For O this O application O , O a O dual O optical O 3-D O surface O mapping O system O that O uses O active B-KEY laser I-KEY triangulation I-KEY has O been O developed O and O successfully O tested O . O One O part O of O the O system O measures O the O geometry O profile O of O a O nugget O being O packed O and O the O other O the O profile O of O the O nuggets O already O in O the O crucible O . O A O resolution O of O 1 O mm O with O 15-KHz O sampling B-KEY frequency I-KEY is O achieved O . O Data O from O the O system O are O used O by O the O packing B-KEY algorithm I-KEY , O which O determines O optimal O nugget O placement O . O The O key O contribution O is O to O describe O the O design O and O implementation O of O an O efficient O and O robust B-KEY 3-D I-KEY imaging I-KEY system I-KEY to O map O highly B-KEY irregular I-KEY shaped I-KEY objects I-KEY using O conventional O components O in O context O of O real O commercial O manufacturing O processes O Information B-KEY architecture I-KEY in O JASIST O : O just O where O did O we O come O from O ? O The O emergence O of O Information B-KEY Architecture I-KEY within O the O information B-KEY systems I-KEY world O has O been O simultaneously O drawn O out O yet O rapid O . O Those O with O an O eye O on O history O are O quick O to O point O to O Wurman O 's O 1976 O use O of O the O term O `` O architecture O of O information O , O '' O but O it O has O only O been O in O the O last O 2 O years O that O IA O has O become O the O source O of O sufficient O interest O for O people O to O label O themselves O professionally O as O Information O Architects O . O The O impetus O for O this O recent O emergence O of O IA O can O be O traced O to O a O historical O summit O , O supported O by O ASIS&T O in O May O 2000 O at O Boston O . O It O was O here O that O several O hundred O of O us O gathered O to O thrash O out O the O questions O of O just O what O IA O was O and O what O this O new O field O might O become O . O At O the O time O of O the O summit O , O invited O to O present O a O short O talk O on O my O return O journey O from O the O annual O ACM O SIGCHI O conference O , O I O entered O the O summit O expecting O little O and O convinced O that O IA O was O nothing O new O . O I O left O 2 O days O later O refreshed O , O not O just O by O the O enthusiasm O of O the O attendees O for O this O term O but O by O IA O 's O potential O to O unify O the O disparate O perspectives O and O orientations O of O professionals O from O a O range O of O disciplines O . O It O was O at O this O summit O that O the O idea O for O the O special O issue O took O root O . O I O proposed O the O idea O to O Don O Kraft O , O hoping O he O would O find O someone O else O to O run O with O it O . O AS O luck O would O have O it O , O I O ended O up O taking O charge O of O it O myself O , O with O initial O support O from O David O Blair O . O From O the O suggestion O to O the O finished O product-has O been O the O best O part O of O 2 O years O , O and O in O that O time O more O than O 50 O volunteers O reviewed O over O 20 O submissions O Mixture O of O experts O classification B-KEY using O a O hierarchical B-KEY mixture I-KEY model I-KEY A O three-level O hierarchical B-KEY mixture I-KEY model I-KEY for O classification B-KEY is O presented O that O models O the O following O data B-KEY generation I-KEY process I-KEY : O -LRB- O 1 O -RRB- O the O data O are O generated O by O a O finite O number O of O sources O -LRB- O clusters O -RRB- O , O and O -LRB- O 2 O -RRB- O the O generation O mechanism O of O each O source O assumes O the O existence O of O individual O internal O class-labeled O sources O -LRB- O subclusters O of O the O external O cluster O -RRB- O . O The O model O estimates O the O posterior B-KEY probability I-KEY of I-KEY class I-KEY membership I-KEY similar O to O a O mixture O of O experts B-KEY classifier I-KEY . O In O order O to O learn O the O parameters O of O the O model O , O we O have O developed O a O general O training O approach O based O on O maximum O likelihood O that O results O in O two O efficient O training O algorithms O . O Compared O to O other O classification B-KEY mixture O models O , O the O proposed O hierarchical O model O exhibits O several O advantages O and O provides O improved O classification B-KEY performance O as O indicated O by O the O experimental O results O Adaptive O state B-KEY feedback I-KEY control O for O a O class O of O linear O systems O with O unknown O bounds O of O uncertainties O The O problem O of O adaptive O robust B-KEY stabilization I-KEY for O a O class O of O linear B-KEY time-varying I-KEY systems I-KEY with O disturbance O and O nonlinear B-KEY uncertainties I-KEY is O considered O . O The O bounds O of O the O disturbance O and O uncertainties O are O assumed O to O be O unknown O , O being O even O arbitrary O . O For O such O uncertain B-KEY dynamical I-KEY systems I-KEY , O the O adaptive O robust O state B-KEY feedback I-KEY controller O is O obtained O . O And O the O resulting O closed-loop B-KEY systems I-KEY are O asymptotically O stable O in O theory O . O Moreover O , O an O adaptive O robust O state B-KEY feedback I-KEY control O scheme O is O given O . O The O scheme O ensures O the O closed-loop B-KEY systems I-KEY exponentially O practically O stable O and O can O be O used O in O practical O engineering O . O Finally O , O simulations O show O that O the O control O scheme O is O effective O Information B-KEY architecture I-KEY : O looking O ahead O It O may O be O a O bit O strange O to O consider O where O the O field O of O information B-KEY architecture I-KEY -LRB- O IA O -RRB- O is O headed O . O After O all O , O many O would O argue O that O it O 's O too O new O to O be O considered O as O a O field O at O all O , O or O that O it O is O mislabeled O , O and O by O no O means O is O there O a O widely O accepted O definition O of O what O information B-KEY architecture I-KEY actually O is O . O Practicing O information B-KEY architects I-KEY probably O number O in O the O thousands O , O and O this O vibrant O group O is O already O building O various O forms O of O communal B-KEY infrastructure I-KEY , O ranging O from O an O IA O journal O and O a O self-organizing O `` O library O '' O of O resources O to O a O passel O of O local B-KEY professional I-KEY groups I-KEY and O degree-granting B-KEY academic I-KEY programs I-KEY . O So O the O profession O has O achieved O a O beachhead O that O will O enable O it O to O stabilize O and O perhaps O even O grow O during O these O difficult O times O Using O the O Small O Business B-KEY Innovation O Research O Program O to O turn O your O ideas O into O products O The O US B-KEY Government I-KEY 's O Small O Business B-KEY Innovation O Research O Program O helps O small O businesses O transform O new O ideas O into O commercial O products O . O The O program O provides O an O ideal O means O for O businesses B-KEY and O universities B-KEY to O obtaining O funding B-KEY for O cooperative B-KEY projects I-KEY . O Rules O and O information O for O the O program O are O readily O available O , O and O I O will O give O a O few O helpful O hints O to O provide O guidance O When O a O better O interface O and O easy O navigation O are O n't O enough O : O examining O the O information B-KEY architecture I-KEY in O a O law B-KEY enforcement I-KEY agency I-KEY An O information B-KEY architecture I-KEY that O allows O users O to O easily O navigate O through O a O system O and O quickly O recover O from O mistakes O is O often O defined O as O a O highly O usable O system O . O But O usability O in O systems O design O goes O beyond O a O good O interface O and O efficient O navigation O . O In O this O article O we O describe O two O database O systems O in O a O law B-KEY enforcement I-KEY agency I-KEY . O One O system O is O a O legacy O , O text-based O system O with O cumbersome O navigation O -LRB- O RMS B-KEY -RRB- O ; O the O newer O system O is O a O graphical B-KEY user I-KEY interface I-KEY with O simplified B-KEY navigation I-KEY -LRB- O CopNet B-KEY -RRB- O . O It O is O hypothesized O that O law B-KEY enforcement I-KEY users I-KEY will O evaluate O CopNet B-KEY higher O than O RMS B-KEY , O but O experts O of O the O older O system O will O evaluate O it O higher O than O others O will O . O We O conducted O two O user O studies O . O One O study O examined O what O users O thought O of O RMS B-KEY and O CopNet B-KEY , O and O compared O RMS B-KEY experts O ' O evaluations O with O nonexperts O . O We O found O that O all O users O evaluated O CopNet B-KEY as O more O effective O , O easier O to O use O , O and O easier O to O navigate O than O RMS B-KEY , O and O this O was O especially O noticeable O for O users O who O were O not O experts O with O the O older O system O . O The O second O , O follow-up O study O examined O use O behavior O after O CopNet B-KEY was O deployed O some O time O later O . O The O findings O revealed O that O evaluations O of O CopNet B-KEY were O not O associated O with O its O use O . O If O the O newer O system O had O a O better O interface O and O was O easier O to O navigate O than O the O older O , O legacy O system O , O why O were O law O enforcement O personnel O reluctant O to O switch O ? O We O discuss O reasons O why O switching O to O a O new O system O is O difficult O , O especially O for O those O who O are O most O adept O at O using O the O older O system O . O Implications O for O system O design O and O usability O are O also O discussed O Acquiring O materials O in O the O history O of O science B-KEY , O technology B-KEY , O and O medicine B-KEY This O article O provides O detailed O advice O on O acquiring O new O , O out-of-print O , O and O rare B-KEY materials I-KEY in O the O history O of O science B-KEY , O technology B-KEY , O and O medicine B-KEY for O the O beginner O in O these O fields O . O The O focus O is O on O the O policy B-KEY formation I-KEY , O basic B-KEY reference I-KEY tools I-KEY , O and O methods O of O collection B-KEY development I-KEY and O acquisitions O that O are O the O necessary O basis O for O success O in O this O endeavor O An O identity-based B-KEY society I-KEY oriented I-KEY signature I-KEY scheme I-KEY with O anonymous B-KEY signers I-KEY In O this O paper O , O we O propose O a O new O society O oriented O scheme O , O based O on O the O Guillou-Quisquater O -LRB- O 1989 O -RRB- O signature O scheme O . O The O scheme O is O identity-based O and O the O signatures O are O verified O with O respect O to O only O one O identity O . O That O is O , O the O verifier O does O not O have O to O know O the O identity O of O the O co-signers O , O but O just O that O of O the O organization O they O represent O The O congenial B-KEY talking I-KEY philosophers I-KEY problem I-KEY in O computer B-KEY networks I-KEY Group B-KEY mutual I-KEY exclusion I-KEY occurs O naturally O in O situations O where O a O resource O can O be O shared O by O processes O of O the O same O group O , O but O not O by O processes O of O different O groups O . O For O example O , O suppose O data O is O stored O in O a O CD-jukebox O . O Then O , O when O a O disc O is O loaded O for O access O , O users O that O need O data O on O the O disc O can O concurrently O access O the O disc O , O while O users O that O need O data O on O a O different O disc O have O to O wait O until O the O current O disc O is O unloaded O . O The O design O issues O for O group B-KEY mutual I-KEY exclusion I-KEY have O been O modeled O as O the O Congenial B-KEY Talking I-KEY Philosophers I-KEY problem I-KEY , O and O solutions O for O shared O memory O models O have O been O proposed O -LRB- O Y.-J O . O Young O , O 2000 O ; O P. O Keane O and O M. O Moir O , O 1999 O -RRB- O . O As O in O ordinary O mutual O exclusion O and O many O other O problems O in O distributed B-KEY systems I-KEY , O however O , O techniques O developed O for O shared O memory O do O not O necessarily O apply O to O message O passing O -LRB- O and O vice O versa O -RRB- O . O We O investigate O solutions O for O Congenial O Talking O Philosophers O in O computer B-KEY networks I-KEY where O processes B-KEY communicate I-KEY by O asynchronous B-KEY message I-KEY passing I-KEY . O We O first O present O a O solution O that O is O a O straightforward O adaptation O from O G. O Ricart O and O A.K. O Agrawala O 's O -LRB- O 1981 O -RRB- O algorithm O for O ordinary O mutual O exclusion O . O Then O we O show O that O the O simple O modification O suffers O a O severe O performance O degradation O that O could O cause O the O system O to O behave O as O though O only O one O process O of O a O group O can O be O in O the O critical B-KEY section I-KEY at O a O time O . O We O then O present O a O more O efficient O and O highly O concurrent B-KEY distributed I-KEY algorithm I-KEY for O the O problem O , O the O first O such O solution O in O computer B-KEY networks I-KEY Using O Internet B-KEY search I-KEY engines I-KEY to O estimate O word O frequency O The O present O research O investigated O Internet B-KEY search I-KEY engines I-KEY as O a O rapid O , O cost-effective O alternative O for O estimating O word O frequencies O . O Frequency O estimates O for O 382 O words O were O obtained O and O compared O across O four O methods O : O -LRB- O 1 O -RRB- O Internet B-KEY search I-KEY engines I-KEY , O -LRB- O 2 O -RRB- O the O Kucera O and O Francis O -LRB- O 1967 O -RRB- O analysis O of O a O traditional O linguistic B-KEY corpus I-KEY , O -LRB- O 3 O -RRB- O the O CELEX B-KEY English I-KEY linguistic I-KEY database I-KEY -LRB- O Baayen O et O al. O , O 1995 O -RRB- O , O and O -LRB- O 4 O -RRB- O participant O ratings O of O familiarity O . O The O results O showed O that O Internet B-KEY search I-KEY engines I-KEY produced O frequency O estimates O that O were O highly O consistent O with O those O reported O by O Kucera O and O Francis O and O those O calculated O from O CELEX O , O highly O consistent O across O search O engines O , O and O very O reliable O over O a O 6 O month O period O of O time O . O Additional O results O suggested O that O Internet B-KEY search I-KEY engines I-KEY are O an O excellent O option O when O traditional O word O frequency O analyses O do O not O contain O the O necessary O data O -LRB- O e.g. O , O estimates O for O forenames O and O slang O -RRB- O . O In O contrast O , O participants O ' O familiarity O judgments O did O not O correspond O well O with O the O more O objective O estimates O of O word O frequency O . O Researchers O are O advised O to O use O search O engines O with O large B-KEY databases I-KEY -LRB- O e.g. O , O AltaVista O -RRB- O to O ensure O the O greatest O representativeness O of O the O frequency O estimates O Model B-KEY predictive I-KEY control I-KEY helps O to O regulate O slow O processes-robust O barrel O temperature O control O Slow O temperature O control O is O a O challenging O control O problem O . O The O problem O becomes O even O more O challenging O when O multiple O zones O are O involved O , O such O as O in O barrel O temperature O control O for O extruders B-KEY . O Often O , O strict O closed-loop O performance O requirements O -LRB- O such O as O fast O startup O with O no O overshoot O and O maintaining O tight O temperature O control O during O production O -RRB- O are O given O for O such O applications O . O When O characteristics O of O the O system O are O examined O , O it O becomes O clear O that O a O commonly O used O proportional O plus O integral O plus O derivative O -LRB- O PID O -RRB- O controller O can O not O meet O such O performance O specifications O for O this O kind O of O system O . O The O system O either O will O overshoot O or O not O maintain O the O temperature O within O the O specified O range O during O the O production O run O . O In O order O to O achieve O the O required O performance O , O a O control O strategy O that O utilizes O techniques O such O as O model B-KEY predictive I-KEY control I-KEY , O autotuning B-KEY , O and O multiple B-KEY parameter I-KEY PID I-KEY is O formulated O . O This O control O strategy O proves O to O be O very O effective O in O achieving O the O desired O specifications O , O and O is O very O robust O Controller B-KEY performance I-KEY analysis I-KEY with O LQG B-KEY benchmark I-KEY obtained O under O closed O loop O conditions O This O paper O proposes O a O new O method O for O obtaining O a O linear O quadratic O Gaussian O -LRB- O LQG O -RRB- O benchmark O in O terms O of O the O variances O of O process O input O and O output O from O closed-loop B-KEY data I-KEY , O for O assessing O the O controller O performance O . O LQG B-KEY benchmark I-KEY has O been O proposed O in O the O literature O to O assess O controller O performance O since O the O LQG O tradeoff O curve O represents O the O limit O of O performance O in O terms O of O input O and O output O variances O . O However O , O an O explicit O parametric O model O is O required O to O calculate O the O LQG B-KEY benchmark I-KEY . O In O this O work O , O we O propose O a O data O driven O subspace O approach O to O calculate O the O LQG B-KEY benchmark I-KEY under O closed-loop O conditions O with O certain O external O excitations O . O The O optimal O LQG-benchmark O variances O are O obtained O directly O from O the O subspace B-KEY matrices I-KEY corresponding O to O the O deterministic B-KEY inputs I-KEY and O the O stochastic B-KEY inputs I-KEY , O which O are O identified O using O closed-loop B-KEY data I-KEY with O setpoint O excitation O . O These O variances O are O used O for O assessing O the O controller O performance O . O The O method O proposed O in O this O paper O is O applicable O to O both O univariate O and O multivariate B-KEY systems I-KEY . O Profit B-KEY analysis I-KEY for O the O implementation O of O feedforward B-KEY control I-KEY to O the O existing O feedback-only O control O system O is O also O analyzed O under O the O optimal O LQG O performance O framework O Prospective O on O computer B-KEY applications I-KEY in O power O The O so-called O `` O deregulation O '' O and O restructuring O of O the O electric O power O industry O have O made O it O very O difficult O to O keep O up O with O industry O changes O and O have O made O it O much O more O difficult O to O envision O the O future O . O In O this O article O , O current O key O issues O and O major O developments O of O the O past O few O years O are O reviewed O to O provide O perspective O , O and O prospects O for O future O computer B-KEY applications I-KEY in O power O are O suggested O . O Technology B-KEY changes I-KEY are O occurring O at O an O exponential O rate O . O The O interconnected B-KEY bulk I-KEY electric I-KEY systems I-KEY are O becoming O integrated O with O vast O networked B-KEY information I-KEY systems I-KEY . O This O article O discusses O the O skills O that O will O be O needed O by O future O power O engineers O to O keep O pace O with O these O developments O and O trends O A O spatial O rainfall O simulator O for O crop B-KEY production I-KEY modeling I-KEY in O Southern B-KEY Africa I-KEY This O paper O describes O a O methodology O for O simulating B-KEY rainfall I-KEY in O dekads O across O a O set O of O spatial O units O in O areas O where O long-term O meteorological O records O are O available O for O a O small O number O of O sites O only O . O The O work O forms O part O of O a O larger O simulation O model O of O the O food O system O in O a O district O of O Zimbabwe B-KEY , O which O includes O a O crop O production O component O for O yields O of O maize O , O small O grains O and O groundnuts O . O Only O a O limited O number O of O meteorological O stations O are O available O within O or O surrounding O the O district O that O have O long O time O series O of O rainfall B-KEY records I-KEY . O Preliminary O analysis O of O rainfall B-KEY data I-KEY for O these O stations O suggested O that O intra-seasonal O temporal O correlation O was O negligible O , O but O that O rainfall O at O any O given O station O was O correlated O with O rainfall O at O neighbouring O stations O . O This O spatial B-KEY correlation I-KEY structure O can O be O modeled O using O a O multivariate B-KEY normal I-KEY distribution I-KEY consisting O of O 30 O related O variables O , O representing O dekadly O rainfall O in O each O of O the O 30 O wards O . O For O each O ward O , O log-transformed O rainfall O for O each O of O the O 36 O dekads O in O the O year O was O characterized O by O a O mean O and O standard O deviation O , O which O were O interpolated O from O surrounding O meteorological O stations O . O A O covariance B-KEY matrix I-KEY derived O from O a O distance O measure O was O then O used O to O represent O the O spatial B-KEY correlation I-KEY between O wards O . O Sets O of O random O numbers O were O then O drawn O from O this O distribution O to O simulate B-KEY rainfall I-KEY across O the O wards O in O any O given O dekad O . O Cross-validation O of O estimated O rainfall O parameters O against O observed O parameters O for O the O one O meteorological O station O within O the O district O suggests O that O the O interpolation O process O works O well O . O The O methodology O developed O is O useful O in O situations O where O long-term O climatic O records O are O scarce O and O where O rainfall O shows O pronounced O spatial B-KEY correlation I-KEY , O but O negligible O temporal O correlation O Separation O and O tracking O of O multiple O broadband O sources O with O one O electromagnetic B-KEY vector I-KEY sensor I-KEY A O structure O for O adaptively O separating O , O enhancing O and O tracking O uncorrelated B-KEY sources I-KEY with O an O electromagnetic B-KEY vector I-KEY sensor I-KEY -LRB- O EMVS O -RRB- O is O presented O . O The O structure O consists O of O a O set O of O parallel B-KEY spatial I-KEY processors I-KEY , O one O for O each O individual O source O . O Two O stages O of O processing O are O involved O in O each O spatial O processor O . O The O first O preprocessing B-KEY stage I-KEY rejects O all O other O sources O except O the O one O of O interest O , O while O the O second O stage O is O an O adaptive O one O for O maximizing O the O signal-to-noise B-KEY ratio I-KEY -LRB- O SNR O -RRB- O and O tracking O the O desired O source O . O The O preprocessings O are O designed O using O the O latest O source O parameter O estimates O obtained O from O the O source O trackers O , O and O a O redesign O is O activated O periodically O or O whenever O any O source O has O been O detected O by O the O source O trackers O to O have O made O significant O movement O . O Compared O with O conventional O adaptive O beamforming O , O the O algorithm O has O the O advantage O that O no O a O priori O information O on O any O desired O signal O location O is O needed O , O the O sources O are O separated O at O maximum B-KEY SNR I-KEY , O and O their O locations O are O available O . O The O structure O is O also O well O suited O for O parallel B-KEY implementation I-KEY . O Numerical O examples O are O included O to O illustrate O the O capability O and O performance O of O the O algorithm O 2002 O in-house B-KEY fulfillment I-KEY systems I-KEY report O -LSB- O publishing O -RSB- O CM O 's O 13th O annual O survey B-KEY of O in-house B-KEY fulfillment I-KEY system I-KEY suppliers B-KEY brings O you O up O to O date O on O the O current O capabilities O of O the O leading O publication B-KEY software I-KEY packages I-KEY Complexity B-KEY transitions I-KEY in O global B-KEY algorithms I-KEY for O sparse B-KEY linear I-KEY systems I-KEY over O finite B-KEY fields I-KEY We O study O the O computational O complexity O of O a O very O basic O problem O , O namely O that O of O finding O solutions O to O a O very O large O set O of O random B-KEY linear I-KEY equations I-KEY in O a O finite B-KEY Galois I-KEY field I-KEY modulo O q. O Using O tools O from O statistical B-KEY mechanics I-KEY we O are O able O to O identify O phase O transitions O in O the O structure O of O the O solution O space O and O to O connect O them O to O the O changes O in O the O performance O of O a O global B-KEY algorithm I-KEY , O namely O Gaussian B-KEY elimination I-KEY . O Crossing O phase B-KEY boundaries I-KEY produces O a O dramatic O increase O in O memory O and O CPU O requirements O necessary O for O the O algorithms O . O In O turn O , O this O causes O the O saturation O of O the O upper O bounds O for O the O running O time O . O We O illustrate O the O results O on O the O specific O problem O of O integer B-KEY factorization I-KEY , O which O is O of O central O interest O for O deciphering O messages O encrypted B-KEY with O the O RSA B-KEY cryptosystem I-KEY Toward O an O Experimental B-KEY Timing I-KEY Standards I-KEY Lab I-KEY : O benchmarking B-KEY precision I-KEY in O the O real O world O Much O discussion O has O taken O place O over O the O relative O merits O of O various O platforms O and O operating B-KEY systems I-KEY for O real-time B-KEY data I-KEY collection I-KEY . O Most O would O agree O that O , O provided O great O care O is O taken O , O many O are O capable O of O millisecond B-KEY timing I-KEY precision I-KEY . O However O , O to O date O , O much O of O this O work O has O focused O on O the O theoretical O aspects O of O raw O performance O . O It O is O our O belief O that O researchers O would O be O better O informed O if O they O could O place O confidence O limits O on O their O own O specific O paradigms O in O situ O and O without O modification O . O To O this O end O , O we O have O developed O a O millisecond O precision O test O rig O that O can O control O and O time O experiments O on O a O second O presentation O machine O . O We O report O on O the O specialist O hardware O and O software O used O . O We O elucidate O the O importance O of O the O approach O in O relation O to O real-world O experimentation O The O evolution O of O information O systems O : O Their O impact O on O organizations O and O structures O Information O systems O and O organization O structures O have O been O highly O interconnected O with O each O other O . O Over O the O years O , O information B-KEY systems I-KEY architectures I-KEY as O well O as O organization O structures O have O evolved O from O centralized O to O more O decentralized O forms O . O This O research O looks O at O the O evolution O of O both O information O systems O and O organization O structures O . O In O the O process O , O it O looks O into O the O impact O of O computers O on O organizations O , O and O examines O the O ways O organization O structures O have O changed O , O in O association O with O changes O in O information B-KEY system I-KEY architectures I-KEY . O It O also O suggests O logical O linkages O between O information B-KEY system I-KEY architectures I-KEY and O their O `` O fit O '' O with O certain O organization O structures O and O strategies O . O It O concludes O with O some O implications O for O emerging O and O future O organizational O forms O , O and O provides O a O quick O review O of O the O effect O of O the O Internet O on O small O businesses O traditionally O using O stand-alone O computers O An O efficient O parallel B-KEY algorithm I-KEY for O the O calculation O of O canonical B-KEY MP2 I-KEY energies I-KEY We O present O the O parallel O version O of O a O previous O serial O algorithm O for O the O efficient O calculation O of O canonical B-KEY MP2 I-KEY energies I-KEY . O It O is O based O on O the O Saebo-Almlof B-KEY direct-integral I-KEY transformation I-KEY , O coupled O with O an O efficient O prescreening O of O the O AO B-KEY integrals I-KEY . O The O parallel B-KEY algorithm I-KEY avoids O synchronization B-KEY delays I-KEY by O spawning O a O second O set O of O slaves O during O the O bin-sort O prior O to O the O second B-KEY half-transformation I-KEY . O Results O are O presented O for O systems O with O up O to O 2000 O basis B-KEY functions I-KEY . O MP2 B-KEY energies I-KEY for O molecules O with O 400-500 O basis B-KEY functions I-KEY can O be O routinely O calculated O to O microhartree B-KEY accuracy I-KEY on O a O small O number O of O processors O -LRB- O 6-8 O -RRB- O in O a O matter O of O minutes O with O modern O PC-based B-KEY parallel I-KEY computers I-KEY Capturing O niche B-KEY markets I-KEY with O copper O For O `` O last-mile B-KEY access I-KEY '' O in O niche O applications O , O twisted B-KEY copper I-KEY pair I-KEY may O be O the O cable O of O best O option O to O gain O access O and O deliver O desired O services O . O The O article O discusses O how O operators O can O use O network B-KEY edge I-KEY devices I-KEY to O serve O new O customers O . O Niche B-KEY market I-KEY segments O represent O a O significant O opportunity O for O cable O TV O delivery O of O television O and O high-speed O Internet O signals O . O But O the O existing O telecommunications O infrastructure O in O those O developments O frequently O presents O unique O challenges O for O the O service O provider O to O overcome O On O the O use O of O neural B-KEY network I-KEY ensembles I-KEY in O QSAR B-KEY and O QSPR B-KEY Despite O their O growing O popularity O among O neural O network O practitioners O , O ensemble O methods O have O not O been O widely O adopted O in O structure-activity O and O structure-property B-KEY correlation I-KEY . O Neural O networks O are O inherently O unstable O , O in O that O small O changes O in O the O training B-KEY set I-KEY and/or O training B-KEY parameters I-KEY can O lead O to O large O changes O in O their O generalization B-KEY performance I-KEY . O Recent O research O has O shown O that O by O capitalizing O on O the O diversity O of O the O individual O models O , O ensemble O techniques O can O minimize O uncertainty B-KEY and O produce O more O stable O and O accurate O predictors O . O In O this O work O , O we O present O a O critical O assessment O of O the O most O common O ensemble O technique O known O as O bootstrap B-KEY aggregation I-KEY , O or O bagging B-KEY , O as O applied O to O QSAR B-KEY and O QSPR B-KEY . O Although O aggregation O does O offer O definitive O advantages O , O we O demonstrate O that O bagging B-KEY may O not O be O the O best O possible O choice O and O that O simpler O techniques O such O as O retraining B-KEY with O the O full O sample O can O often O produce O superior O results O . O These O findings O are O rationalized O using O Krogh O and O Vedelsby O 's O -LRB- O 1995 O -RRB- O decomposition O of O the O generalization O error O into O a O term O that O measures O the O average O generalization B-KEY performance I-KEY of O the O individual O networks O and O a O term O that O measures O the O diversity O among O them O . O For O networks O that O are O designed O to O resist O over-fitting O , O the O benefits O of O aggregation O are O clear O but O not O overwhelming O The O ubiquitous O provisioning O of O internet B-KEY services I-KEY to O portable O devices O Advances O in O mobile B-KEY telecommunications I-KEY and O device B-KEY miniaturization I-KEY call O for O providing O both O standard O and O novel O location O - O and O context-dependent O Internet B-KEY services I-KEY to O mobile B-KEY clients I-KEY . O Mobile B-KEY agents I-KEY are O dynamic O , O asynchronous O , O and O autonomous O , O making O the O MA O programming O paradigm O suitable O for O developing O novel O middleware B-KEY for O mobility-enabled B-KEY services I-KEY Choice O from O a O three-element B-KEY set I-KEY : O some O lessons O of O the O 2000 B-KEY presidential I-KEY campaign I-KEY in O the O United O States O We O consider O the O behavior O of O four O choice O rules O - O plurality B-KEY voting I-KEY , O approval B-KEY voting I-KEY , O Borda B-KEY count I-KEY , O and O self-consistent B-KEY choice I-KEY - O when O applied O to O choose O the O best O option O from O a O three-element B-KEY set I-KEY . O It O is O assumed O that O the O two O main O options O are O preferred O by O a O large O majority O of O the O voters O , O while O the O third O option O gets O a O very O small O number O of O votes O and O influences O the O election O outcome O only O when O the O two O main O options O receive O a O close O number O of O votes O . O When O used O to O rate O the O main O options O , O Borda B-KEY count I-KEY and O self-consistent B-KEY choice I-KEY contain O terms O that O allow O both O for O the O `` O strength O of O preferences O '' O of O the O voters O and O the O rating O of O the O main O candidates O by O voters O who O vote O for O the O third O option O . O In O this O way O , O it O becomes O possible O to O determine O more O reliably O the O winner O when O plurality B-KEY voting I-KEY or O approval B-KEY voting I-KEY produce O close O results O Color B-KEY plane I-KEY interpolation I-KEY using O alternating B-KEY projections I-KEY Most O commercial O digital B-KEY cameras I-KEY use O color B-KEY filter I-KEY arrays I-KEY to O sample O red O , O green O , O and O blue O colors O according O to O a O specific O pattern O . O At O the O location O of O each O pixel O only O one O color O sample O is O taken O , O and O the O values O of O the O other O colors O must O be O interpolated O using O neighboring O samples O . O This O color B-KEY plane I-KEY interpolation I-KEY is O known O as O demosaicing B-KEY ; O it O is O one O of O the O important O tasks O in O a O digital B-KEY camera I-KEY pipeline O . O If O demosaicing B-KEY is O not O performed O appropriately O , O images O suffer O from O highly O visible O color B-KEY artifacts I-KEY . O In O this O paper O we O present O a O new O demosaicing B-KEY technique O that O uses O inter-channel B-KEY correlation I-KEY effectively O in O an O alternating-projections O scheme O . O We O have O compared O this O technique O with O six O state-of-the-art O demosaicing B-KEY techniques O , O and O it O outperforms O all O of O them O , O both O visually O and O in O terms O of O mean O square O error O Synthetic B-KEY simultaneity I-KEY - O natural O and O artificial O In O control B-KEY loops I-KEY , O each O element O introduces O time B-KEY delays I-KEY . O If O those O time B-KEY delays I-KEY are O larger O than O the O critical B-KEY times I-KEY for O control O of O the O system O , O a O problem O exists O . O I O show O a O simple O approach O to O mitigating O this O problem O by O basing O the O controller O 's O decisions O not O on O the O observations B-KEY themselves O but O on O our O projections O as O to O what O the O observations B-KEY will O be O at O the O time O our O controls O reach O the O controlled O system O . O Finally O , O I O argue O that O synthetic B-KEY simultaneity I-KEY explains O Libet O 's O -LRB- O 1993 O -RRB- O results O better O than O Libet O 's O explanation O Online O masquerade O : O whose O e-mail B-KEY is O it O ? O E-mails B-KEY carrying O viruses B-KEY like O the O recent O Klez B-KEY worm I-KEY use O deceptively O simple O techniques O and O known O vulnerabilities B-KEY to O spread O from O one O computer O to O another O with O ease O Adaptive B-KEY filtering I-KEY for O noise B-KEY reduction I-KEY in O hue O saturation B-KEY intensity B-KEY color O space O Even O though O the O hue O saturation B-KEY intensity B-KEY -LRB- O HSI O -RRB- O color O model O has O been O widely O used O in O color B-KEY image I-KEY processing I-KEY and O analysis O , O the O conversion O formulas O from O the O RGB B-KEY color I-KEY model I-KEY to O HSI O are O nonlinear O and O complicated O in O comparison O with O the O conversion O formulas O of O other O color O models O . O When O an O RGB O image O is O degraded O by O random B-KEY Gaussian I-KEY noise I-KEY , O this O nonlinearity O leads O to O a O nonuniform B-KEY noise O distribution O in O HSI O , O making O accurate O image O analysis O more O difficult O . O We O have O analyzed O the O noise O characteristics O of O the O HSI O color O model O and O developed O an O adaptive B-KEY spatial I-KEY filtering I-KEY method I-KEY to O reduce O the O magnitude O of O noise O and O the O nonuniformity B-KEY of O noise B-KEY variance I-KEY in O the O HSI B-KEY color I-KEY space I-KEY . O With O this O adaptive B-KEY filtering I-KEY method O , O the O filter B-KEY kernel I-KEY for O each O pixel B-KEY is O dynamically O adjusted O , O depending O on O the O values O of O intensity B-KEY and O saturation B-KEY . O In O our O experiments O we O have O filtered O the O saturation B-KEY and O hue O components O and O generated B-KEY edge I-KEY maps I-KEY from O color B-KEY gradients I-KEY . O We O have O found O that O by O using O the O adaptive B-KEY filtering I-KEY method O , O the O minimum B-KEY error I-KEY rate I-KEY in O edge B-KEY detection I-KEY improves O by O approximately O 15 O % O Note O on O `` O Deterministic B-KEY inventory I-KEY lot-size I-KEY models I-KEY under O inflation B-KEY with O shortages O and O deterioration O for O fluctuating B-KEY demand I-KEY '' O by O Yang O et O al O For O original O paper O see O H.-L O . O Yang O et O al. O , O ibid. O , O vol O .48 O , O p.144-58 O -LRB- O 2001 O -RRB- O . O Yang O et O al. O extended O the O lot-size O models O to O allow O for O inflation B-KEY and O fluctuating B-KEY demand I-KEY . O For O this O model O they O proved O that O the O optimal B-KEY replenishment I-KEY schedule I-KEY exists O and O is O unique O . O They O also O proposed O an O algorithm O to O find O the O optimal O policy O . O The O present O paper O provides O examples O , O which O show O that O the O optimal B-KEY replenishment I-KEY schedule I-KEY and O consequently O the O overall O optimal O policy O may O not O exist O Industrial/sup O IT O / O for O performance O buildings O ABB B-KEY has O taken O a O close O look O at O how O buildings O are O used O and O has O come O up O with O a O radical O solution O for O the O technical B-KEY infrastructure I-KEY that O places O the O end-user O 's O processes O at O the O center O and O integrates O all O the O building O 's O systems O around O their O needs O . O The O new O solution O is O based O on O the O realization O that O tasks O like O setting O up O an O office O meeting O , O registering O a O hotel O guest O or O moving O a O patient O in O a O hospital O , O can O all O benefit O from O the O same O Industrial B-KEY IT I-KEY concepts I-KEY employed O by O ABB B-KEY to O optimize O manufacturing O , O for O example O in O the O automotive O industry O General O solution O of O a O density O functionally O gradient O piezoelectric O cantilever O and O its O applications O We O have O used O the O plane B-KEY strain I-KEY theory I-KEY of O transversely B-KEY isotropic I-KEY bodies I-KEY to O study O a O piezoelectric O cantilever O . O In O order O to O find O the O general O solution O of O a O density O functionally O gradient O piezoelectric O cantilever O , O we O have O used O the O inverse B-KEY method I-KEY -LRB- O i.e. O the O Airy B-KEY stress I-KEY function I-KEY method O -RRB- O . O We O have O obtained O the O stress O and O induction O functions O in O the O form O of O polynomials B-KEY as O well O as O the O general O solution O of O the O beam O . O Based O on O this O general O solution O , O we O have O deduced O the O solutions O of O the O cantilever O under O different O loading B-KEY conditions I-KEY . O Furthermore O , O as O applications O of O this O general O solution O in O engineering O , O we O have O studied O the O tip O deflection O and O blocking O force O of O a O piezoelectric B-KEY cantilever I-KEY actuator I-KEY . O Finally O , O we O have O addressed O a O method O to O determine O the O density B-KEY distribution I-KEY profile I-KEY for O a O given O piezoelectric B-KEY material I-KEY Limits O for O computational B-KEY electromagnetics I-KEY codes I-KEY imposed O by O computer B-KEY architecture I-KEY The O algorithmic B-KEY complexity I-KEY of O the O innermost B-KEY loops I-KEY that O determine O the O complexity O of O algorithms O in O computational O electromagnetics O -LRB- O CEM O -RRB- O codes O are O analyzed O according O to O their O operation B-KEY count I-KEY and O the O impact O of O the O underlying O computer B-KEY hardware I-KEY . O As O memory B-KEY chips I-KEY are O much O slower O than O arithmetic O processors O , O codes O that O involve O a O high O data B-KEY movement I-KEY compared O to O the O number O of O arithmetic O operations O are O executed O comparatively O slower O . O Hence O , O matrix-matrix B-KEY multiplications I-KEY are O much O faster O than O matrix-vector B-KEY multiplications I-KEY . O It O is O seen O that O it O is O not O sufficient O to O compare O only O the O complexity O , O but O also O the O actual O performance O of O algorithms O to O judge O on O faster O execution O . O Implications O involve O FDTD B-KEY loops I-KEY , O LU B-KEY factorizations I-KEY , O and O iterative B-KEY solvers I-KEY for O dense B-KEY matrices I-KEY . O Run O times O on O two O reference O platforms O , O namely O an O Athlon O 900 O MHz O and O an O HP O PA O 8600 O processor O , O verify O the O findings O Explanations O for O the O perpetration O of O and O reactions O to O deception O in O a O virtual B-KEY community I-KEY Cases O of O identity B-KEY deception I-KEY on O the O Internet B-KEY are O not O uncommon O . O Several O cases O of O a O revealed O identity B-KEY deception I-KEY have O been O reported O in O the O media O . O The O authors O examine O a O case O of O deception O in O an O online B-KEY community I-KEY composed O primarily O of O information B-KEY technology I-KEY professionals I-KEY . O In O this O case O , O an O established O community O member O -LRB- O DF O -RRB- O invented O a O character O -LRB- O Nowheremom O -RRB- O whom O he O fell O in O love O with O and O who O was O eventually O killed O in O a O tragic O accident O . O When O other O members O of O the O community O eventually O began O to O question O Nowheremom O 's O actual O identity O , O DF O admitted O that O he O invented O her O . O The O discussion O board O was O flooded O with O reactions O to O DF O 's O revelation O . O The O authors O propose O several O explanations O for O the O perpetration O of O identity B-KEY deception I-KEY , O including O psychiatric B-KEY illness I-KEY , O identity O play O , O and O expressions O of O true O self O . O They O also O analyze O the O reactions O of O community O members O and O propose O three O related O explanations O -LRB- O social O identity O , O deviance O , O and O norm O violation O -RRB- O to O account O for O their O reactions O . O It O is O argued O that O virtual B-KEY communities I-KEY ' O reactions O to O such O threatening O events O provide O invaluable O clues O for O the O study O of O group B-KEY processes I-KEY on O the O Internet B-KEY Integrating O building B-KEY management I-KEY system I-KEY and O facilities O management O on O the O Internet O Recently O , O it O is O of O great O interest O to O adopt O the O Internet/intranet O to O develop O building O management O systems O -LRB- O BMS O -RRB- O and O facilities O management O systems O -LRB- O FMS O -RRB- O . O This O paper O addresses O two O technical O issues O : O the O Web-based B-KEY access I-KEY -LRB- O including O database B-KEY integration I-KEY -RRB- O and O the O integration O of O BMS B-KEY and O FMS B-KEY . O These O should O be O addressed O for O accessing O BMS B-KEY remotely O via O the O Internet O , O integrating O control O networks O using O the O Internet B-KEY protocols I-KEY and O infrastructures O , O and O using O Internet/intranet O for O building O facilities O management O . O An O experimental O Internet-enabled O system O that O integrates O building O and O facilities B-KEY management I-KEY systems I-KEY has O been O developed O and O tested O . O This O system O integrated O open B-KEY control I-KEY networks I-KEY with O the O Internet O and O is O developed O utilizing O the O embedded B-KEY Web I-KEY server I-KEY , O the O PC B-KEY Web I-KEY server I-KEY and O the O Distributed B-KEY Component I-KEY Object I-KEY Model I-KEY -LRB- O DCOM B-KEY -RRB- O software B-KEY development I-KEY technology I-KEY on O the O platform O of O an O open B-KEY control I-KEY network I-KEY . O Three O strategies O for O interconnecting O BMS B-KEY local O networks O via O Internet/intranet O are O presented O and O analyzed O Causes O of O the O decline O of O the O business O school O management B-KEY science I-KEY course O The O business O school O management B-KEY science I-KEY course O is O suffering O serious O decline O . O The O traditional O model O - O and O algorithm-based O course O fails O to O meet O the O needs O of O MBA B-KEY programs I-KEY and O students O . O Poor O student O mathematical O preparation O is O a O reality O , O and O is O not O an O acceptable O justification O for O poor O teaching O outcomes O . O Management B-KEY science I-KEY Ph.D. O s O are O often O poorly O prepared O to O teach O in O a O general O management O program O , O having O more O experience O and O interest O in O algorithms O than O management O . O The O management B-KEY science I-KEY profession B-KEY as O a O whole O has O focused O its O attention O on O algorithms O and O a O narrow O subset O of O management O problems O for O which O they O are O most O applicable O . O In O contrast O , O MBA O 's O rarely O encounter O problems O that O are O suitable O for O straightforward O application O of O management B-KEY science I-KEY tools O , O living O instead O in O a O world O where O problems O are O ill-defined O , O data O is O scarce O , O time O is O short O , O politics O is O dominant O , O and O rational O `` O decision O makers O '' O are O non-existent O . O The O root O cause O of O the O profession B-KEY 's O failure O to O address O these O issues O seems O to O be O -LRB- O in O Russell O Ackoff O 's O words O -RRB- O a O habit O of O professional O introversion O that O caused O the O profession B-KEY to O be O uninterested O in O what O MBA O 's O really O do O on O the O job O and O how O management B-KEY science I-KEY can O help O them O Neighborhood B-KEY operator I-KEY systems I-KEY and O approximations O This O paper O presents O a O framework O for O the O study O of O generalizing O the O standard O notion O of O equivalence B-KEY relation I-KEY in O rough B-KEY set I-KEY approximation I-KEY space I-KEY with O various O categories O of O k-step B-KEY neighborhood I-KEY systems I-KEY . O Based O on O a O binary B-KEY relation I-KEY on O a O finite B-KEY universe I-KEY , O six O families O of O binary B-KEY relations I-KEY are O obtained O , O and O the O corresponding O six O classes O of O k-step B-KEY neighborhood I-KEY systems I-KEY are O derived O . O Extensions O of O Pawlak O 's O -LRB- O 1982 O -RRB- O rough O set O approximation O operators O based O on O such O neighborhood O systems O are O proposed O . O Properties O of O neighborhood B-KEY operator I-KEY systems I-KEY and O rough O set O approximation O operators O are O investigated O , O and O their O connections O are O examined O Psychology B-KEY and O the O Internet B-KEY This O article O presents O an O overview O of O the O way O that O the O Internet B-KEY is O being O used O to O assist O psychological B-KEY research O and O mediate O psychological O practice O . O It O shows O how O psychologists O are O using O the O Internet B-KEY to O examine O the O interactions O between O people O and O computers O , O and O highlights O some O of O the O ways O that O this O research O is O important O to O the O design O and O development O of O useable O and O acceptable O computer O systems O . O In O particular O , O this O introduction O reviews O the O research O presented O at O the O International O Conference O on O Psychology B-KEY and O the O Internet B-KEY held O in O the O United O Kingdom O . O The O final O part O introduces O the O eight O articles O in O this O special O edition O . O The O articles O are O representative O of O the O breadth O of O research O being O conducted O on O psychology B-KEY and O the O Internet B-KEY : O there O are O two O on O methodological B-KEY issues I-KEY , O three O on O group B-KEY processes I-KEY , O one O on O organizational B-KEY implications I-KEY , O and O two O on O social B-KEY implications I-KEY of O Internet B-KEY use O A O new O subspace B-KEY identification I-KEY approach I-KEY based O on O principal B-KEY component I-KEY analysis I-KEY Principal B-KEY component I-KEY analysis I-KEY -LRB- O PCA B-KEY -RRB- O has O been O widely O used O for O monitoring O complex O industrial O processes O with O multiple O variables O and O diagnosing O process O and O sensor O faults O . O The O objective O of O this O paper O is O to O develop O a O new O subspace O identification O algorithm O that O gives O consistent O model O estimates O under O the O errors-in-variables O -LRB- O EIV O -RRB- O situation O . O In O this O paper O , O we O propose O a O new O subspace B-KEY identification I-KEY approach I-KEY using O principal B-KEY component I-KEY analysis I-KEY . O PCA B-KEY naturally O falls O into O the O category O of O EIV O formulation O , O which O resembles O total O least O squares O and O allows O for O errors O in O both O process O input O and O output O . O We O propose O to O use O PCA B-KEY to O determine O the O system B-KEY observability I-KEY subspace I-KEY , O the O matrices O and O the O system O order O for O an O EIV O formulation O . O Standard O PCA B-KEY is O modified O with O instrumental O variables O in O order O to O achieve O consistent O estimates O of O the O system O matrices O . O The O proposed O subspace O identification O method O is O demonstrated O using O a O simulated O process O and O a O real O industrial O process O for O model O identification O and O order O determination O . O For O comparison O the O MOESP B-KEY algorithm I-KEY and O N4SID B-KEY algorithm I-KEY are O used O as O benchmarks O to O demonstrate O the O advantages O of O the O proposed O PCA B-KEY based O subspace B-KEY model I-KEY identification I-KEY -LRB- O SMI B-KEY -RRB- O algorithm O Much O ado O about O nothing O : O Win32.Perrun B-KEY JPEG B-KEY files I-KEY do O not O contain O any O executable O code O and O it O is O impossible O to O infect O such O files O . O The O author O takes O a O look O at O the O details O surrounding O the O Win32.Perrun B-KEY virus B-KEY and O make O clear O exactly O what O it O does O . O The O main O virus B-KEY feature O is O its O ability O to O affect O JPEG O image O files O -LRB- O compressed B-KEY graphic I-KEY images I-KEY -RRB- O and O to O spread O via O affected O JPEG B-KEY files I-KEY . O The O virus B-KEY affects O , O or O modifies O , O or O alters O JPEG B-KEY files I-KEY but O does O not O `` O infect O '' O them O Nonlinear B-KEY modeling I-KEY and O adaptive B-KEY fuzzy I-KEY control I-KEY of O MCFC B-KEY stack I-KEY To O improve O availability O and O performance O of O fuel B-KEY cells I-KEY , O the O operating O temperature O of O the O molten O carbonate O fuel B-KEY cells I-KEY -LRB- O MCFC O -RRB- O stack O should O be O controlled O within O a O specified O range O . O However O , O most O existing O models O of O MCFC O are O not O ready O to O be O applied O in O synthesis O . O In O the O paper O , O a O radial B-KEY basis I-KEY function I-KEY neural I-KEY networks I-KEY identification I-KEY model I-KEY of O a O MCFC B-KEY stack I-KEY is O developed O based O on O the O input-output B-KEY sampled I-KEY data I-KEY . O An O adaptive B-KEY fuzzy I-KEY control I-KEY procedure O for O the O temperature O of O the O MCFC B-KEY stack I-KEY is O also O developed O . O The O parameters O of O the O fuzzy O control O system O are O regulated O by O back-propagation O algorithm O , O and O the O rule B-KEY database I-KEY of O the O fuzzy O system O is O also O adaptively O adjusted O by O the O nearest-neighbor-clustering B-KEY algorithm I-KEY . O Finally O using O the O neural O networks O model O of O MCFC B-KEY stack I-KEY , O the O simulation O results O of O the O control O algorithm O are O presented O . O The O results O show O the O effectiveness O of O the O proposed O modeling O and O design O procedures O for O the O MCFC B-KEY stack I-KEY based O on O neural O networks O identification O and O the O novel O adaptive B-KEY fuzzy I-KEY control I-KEY Trusted O ... O or O ... O trustworthy O : O the O search O for O a O new O paradigm O for O computer O and O network B-KEY security I-KEY This O paper O sets O out O a O number O of O major O questions O and O challenges O which O include O : O -LRB- O a O -RRB- O just O what O is O meant O by O ` O trusted O ' O or O ` O trustworthy O ' O systems O after O 20 O years O of O experience O , O or O more O likely O , O lack O of O business O level O experience O , O with O the O ` O trusted O computer O system O ' O criteria O anyway O ; O -LRB- O b O -RRB- O does O anyone O really O care O about O the O adoption O of O international B-KEY standards I-KEY for O computer O system O security O evaluation O by O IT O product O and O system O manufacturers O and O suppliers O -LRB- O IS B-KEY 15408 I-KEY -RRB- O and O , O if O so O , O how O does O it O all O relate O to O business B-KEY risk I-KEY management I-KEY anyway O -LRB- O IS B-KEY 17799 I-KEY -RRB- O ; O -LRB- O c O -RRB- O with O the O explosion O of O adoption O of O the O microcomputer B-KEY and O personal B-KEY computer I-KEY some O 20 O years O ago O , O has O the O industry O abandoned O all O that O it O learnt O about O security O during O the O ` O mainframe O era O ' O ; O or O - O ` O whatever O happened O to O MULTICS B-KEY ' O and O its O lessons O ; O -LRB- O d O -RRB- O has O education B-KEY kept O up O with O security O requirements O by O industry O and O government O alike O in O the O need O for O safe O and O secure O operation O of O large O scale O and O networked O information O systems O on O national O and O international O bases O , O particularly O where O Web B-KEY or O Internet-based B-KEY information I-KEY services I-KEY are O being O proposed O as O the O major O ` O next O best O thing O ' O in O the O IT O industry O ; O -LRB- O e O -RRB- O has O the O ` O fourth O generation O ' O of O computer O professionals O inherited O the O spirit O of O information B-KEY systems I-KEY management I-KEY and O control O that O resided O by O necessity O with O the O last O ` O generation O ' O , O the O professionals O who O developed O and O created O the O applications O for O shared O mainframe O and O minicomputer O systems O ? O Teaching O modeling B-KEY in O management B-KEY science I-KEY This O essay O discusses O how O we O can O most O effectively O teach O Management B-KEY Science I-KEY to O students O in O MBA O or O similar O programs O who O will O be O , O at O best O , O part-time O practitioners O of O these O arts O . O I O take O as O a O working O hypothesis O the O radical O proposition O that O the O heart O of O Management B-KEY Science I-KEY itself O is O not O the O impressive O array O of O tools O that O have O been O built O up O over O the O years O -LRB- O optimization O , O simulation O , O decision B-KEY analysis I-KEY , O queuing O , O and O so O on O -RRB- O but O rather O the O art O of O reasoning O logically O with O formal B-KEY models I-KEY . O I O believe O it O is O necessary O with O this O group O of O students O to O teach O basic O modeling B-KEY skills O , O and O in O fact O it O is O only O when O such O students O have O these O basic O skills O as O a O foundation O that O they O are O prepared O to O acquire O the O more O sophisticated O skills O needed O to O employ O Management B-KEY Science I-KEY . O In O this O paper O I O present O a O hierarchy O of O modeling B-KEY skills O , O from O numeracy B-KEY skills I-KEY through O sophisticated O Management B-KEY Science I-KEY skills O , O as O a O framework O within O which O to O plan O courses O for O the O occasional O practitioner O Correlation O of O intuitionistic B-KEY fuzzy I-KEY sets I-KEY by O centroid B-KEY method I-KEY In O this O paper O , O we O propose O a O method O to O calculate O the O correlation B-KEY coefficient I-KEY of O intuitionistic B-KEY fuzzy I-KEY sets I-KEY by O means O of O `` O centroid O '' O . O This O value O obtained O from O our O formula O tell O us O not O only O the O strength O of O relationship O between O the O intuitionistic B-KEY fuzzy I-KEY sets I-KEY , O but O also O whether O the O intuitionistic B-KEY fuzzy I-KEY sets I-KEY are O positively O or O negatively O related O . O This O approach O looks O better O than O previous O methods O which O only O evaluate O the O strength O of O the O relation O . O Furthermore O , O we O extend O the O `` O centroid O '' O method O to O interval-valued O intuitionistic B-KEY fuzzy I-KEY sets I-KEY . O The O value O of O the O correlation B-KEY coefficient I-KEY between O interval-valued O intuitionistic B-KEY fuzzy I-KEY sets I-KEY lies O in O the O interval O -LSB- O -1 O , O 1 O -RSB- O , O as O computed O from O our O formula O Extended B-KEY depth-of-focus I-KEY imaging I-KEY of O chlorophyll B-KEY fluorescence I-KEY from O intact B-KEY leaves I-KEY Imaging O dynamic O changes O in O chlorophyll O a O fluorescence O provides O a O valuable O means O with O which O to O examine O localised O changes O in O photosynthetic O function O . O Microscope-based B-KEY systems I-KEY provide O excellent O spatial B-KEY resolution I-KEY which O allows O the O response O of O individual O cells O to O be O measured O . O However O , O such O systems O have O a O restricted O depth O of O focus O and O , O as O leaves O are O inherently O uneven O , O only O a O small O proportion O of O each O image O at O any O given O focal O plane O is O in O focus O . O In O this O report O we O describe O the O development O of O algorithms O , O specifically O adapted O for O imaging O chlorophyll B-KEY fluorescence I-KEY and O photosynthetic O function O in O living O plant O cells O , O which O allow O extended-focus O images O to O be O reconstructed O from O images O taken O in O different O focal O planes O . O We O describe O how O these O procedures O can O be O used O to O reconstruct O images O of O chlorophyll B-KEY fluorescence I-KEY and O calculated B-KEY photosynthetic I-KEY parameters I-KEY , O as O well O as O producing O a O map O of O leaf O topology O . O The O robustness O of O this O procedure O is O demonstrated O using O leaves O from O a O number O of O different O plant B-KEY species I-KEY Modelling O user O acceptance O of O building B-KEY management I-KEY systems I-KEY This O study O examines O user O acceptance O of O building B-KEY management I-KEY systems I-KEY -LRB- O BMS O -RRB- O using O a O questionnaire B-KEY survey I-KEY . O These O systems O are O crucial O for O optimising O building O performance O and O yet O it O has O been O widely O reported O that O users O are O not O making O full O use O of O their O systems O ' O facilities O . O Established O models O of O technology O acceptance O have O been O employed O in O this O research O , O and O the O positive O influence O of O user B-KEY perceptions I-KEY of O ease B-KEY of I-KEY use I-KEY and O compatibility B-KEY has O been O demonstrated O . O Previous O research O has O indicated O differing O levels O of O importance O of O perceived O ease B-KEY of I-KEY use I-KEY relative O to O other O factors O . O Here O , O perceived O ease B-KEY of I-KEY use I-KEY is O shown O generally O to O be O more O important O , O though O the O balance O between O this O and O compatibility B-KEY is O moderated O by O the O user B-KEY perceptions I-KEY of O voluntariness B-KEY Hybrid B-KEY simulation I-KEY of O space B-KEY plasmas I-KEY : O models O with O massless B-KEY fluid I-KEY representation I-KEY of O electrons O . O IV O . O Kelvin-Helmholtz B-KEY instability I-KEY For O pt.III O . O see O Prikl O . O Mat O . O Informatika O , O MAKS O Press O , O no. O 4 O , O p. O 5-56 O -LRB- O 2000 O -RRB- O . O This O is O a O survey O of O the O literature O on O hybrid B-KEY simulation I-KEY of O the O Kelvin-Helmholtz B-KEY instability I-KEY . O We O start O with O a O brief O review O of O the O theory O : O the O simplest O model O of O the O instability O - O a O transition B-KEY layer I-KEY in O the O form O of O a O tangential B-KEY discontinuity I-KEY ; O compressibility O of O the O medium O ; O finite O size O of O the O velocity O shear O region O ; O pressure B-KEY anisotropy I-KEY . O We O then O describe O the O electromagnetic B-KEY hybrid I-KEY model I-KEY -LRB- O ions O as O particles O and O electrons O as O a O massless O fluid O -RRB- O and O the O main O numerical O schemes O . O We O review O the O studies O on O two-dimensional O and O three-dimensional O hybrid B-KEY simulation I-KEY of O the O process O of O particle O mixing O across O the O magnetopause O shear O layer O driven O by O the O onset O of O a O Kelvin-Helmholtz O instability O . O The O article O concludes O with O a O survey O of O literature O on O hybrid B-KEY simulation I-KEY of O the O Kelvin-Helmholtz B-KEY instability I-KEY in O finite-size O objects O : O jets O moving O across O the O magnetic O field O in O the O middle O of O the O field B-KEY reversal I-KEY layer I-KEY ; O interaction O between O a O magnetized B-KEY plasma I-KEY flow I-KEY and O a O cylindrical B-KEY plasma I-KEY source I-KEY with O zero O own O magnetic O field O The O effects O of O asynchronous B-KEY computer-mediated I-KEY group I-KEY interaction I-KEY on O group B-KEY processes I-KEY This O article O reports O a O study O undertaken O to O investigate O some O of O the O social O psychological B-KEY processes O underlying O computer-supported O group O discussion O in O natural O computer-mediated O contexts O . O Based O on O the O concept O of O deindividuation B-KEY , O it O was O hypothesized O that O personal B-KEY identifiability I-KEY and O group B-KEY identity I-KEY would O be O important O factors O that O affect O the O perceptions O and O behavior O of O members O of O computer-mediated O groups O . O The O degree O of O personal B-KEY identifiability I-KEY and O the O strength O of O group B-KEY identity I-KEY were O manipulated O across O groups O of O geographically B-KEY dispersed I-KEY computer I-KEY users I-KEY who O took O part O in O e-mail B-KEY discussions I-KEY during O a O 2-week O period O . O The O results O do O not O support O the O association O between O deindividuation B-KEY and O uninhibited O behavior O cited O in O much O previous O research O . O Instead O , O the O data O provide O some O support O for O a O social O identity O perspective O of O computer-mediated O communication O , O which O explains O the O higher O levels O uninhibited O in O identifiable O computer-mediated O groups O . O However O , O predictions O based O on O social B-KEY identity I-KEY theory I-KEY regarding O group B-KEY polarization I-KEY and O group B-KEY cohesion I-KEY were O not O supported O . O Possible O explanations O for O this O are O discussed O and O further O research O is O suggested O to O resolve O these O discrepancies O Recording O quantum O properties O of O light O in O a O long-lived B-KEY atomic I-KEY spin I-KEY state I-KEY : O towards O quantum B-KEY memory I-KEY We O report O an O experiment O on O mapping O a O quantum O state O of O light O onto O the O ground B-KEY state I-KEY spin I-KEY of O an O ensemble B-KEY of O Cs B-KEY atoms O with O the O lifetime O of O 2 O ms. O Recording O of O one O of O the O two O quadrature O phase O operators O of O light O is O demonstrated O with O vacuum O and O squeezed O states O of O light O . O The O sensitivity O of O the O mapping B-KEY procedure I-KEY at O the O level O of O approximately O 1 O photon/sec O per O Hz O is O shown O . O The O results O pave O the O road O towards O complete O -LRB- O storing O both O quadrature O phase O observables O -RRB- O quantum B-KEY memory I-KEY for O Gaussian O states O of O light O . O The O experiment O also O sheds O new O light O on O fundamental O limits O of O sensitivity O of O the O magneto-optical O resonance O method O Optical B-KEY recognition I-KEY of O three-dimensional O objects O with O scale B-KEY invariance I-KEY using O a O classical O convergent O correlator O We O present O a O real-time B-KEY method I-KEY for O recognizing O three-dimensional O -LRB- O 3-D O -RRB- O objects O with O scale B-KEY invariance I-KEY . O The O 3-D B-KEY information I-KEY of O the O objects O is O codified O in O deformed B-KEY fringe I-KEY patterns I-KEY using O the O Fourier B-KEY transform I-KEY profilometry I-KEY technique I-KEY and O is O correlated O using O a O classical B-KEY convergent I-KEY correlator I-KEY . O The O scale B-KEY invariance I-KEY property O is O achieved O using O two O different O approaches O : O the O Mellin O radial O harmonic O decomposition O and O the O logarithmic O radial O harmonic O filter O . O Thus O , O the O method O is O invariant B-KEY for O changes O in O the O scale O of O the O 3-D O target O within O a O defined O interval O of O scale B-KEY factors I-KEY . O Experimental O results O show O the O utility O of O the O proposed O method O Designing O a O screening B-KEY experiment I-KEY for O highly B-KEY reliable I-KEY products I-KEY Within O a O reasonable O life-testing O time O , O how O to O improve O the O reliability O of O highly B-KEY reliable I-KEY products I-KEY is O one O of O the O great O challenges O . O By O using O a O resolution O III O experiment O together O with O degradation B-KEY test I-KEY , O Tseng O et O al. O -LRB- O 1995 O -RRB- O presented O a O case O study O of O improving O the O reliability O of O fluorescent B-KEY lamps I-KEY . O However O , O in O conducting O such O an O experiment O , O they O did O not O address O the O problem O of O how O to O choose O the O optimal O settings O of O variables O , O such O as O sample O size O , O inspection B-KEY frequency I-KEY , O and O termination B-KEY time I-KEY for O each O run O , O which O are O influential O to O the O correct O identification O of O significant O factors O and O the O experimental O cost O . O Assuming O that O the O product O 's O degradation O paths O satisfy O Wiener B-KEY processes I-KEY , O this O paper O proposes O a O systematic O approach O to O the O aforementioned O problem O . O First O , O an O identification B-KEY rule I-KEY is O proposed O . O Next O , O under O the O constraints O of O a O minimum B-KEY probability I-KEY of I-KEY correct I-KEY decision I-KEY and O a O maximum B-KEY probability I-KEY of I-KEY incorrect I-KEY decision I-KEY of O the O proposed O identification B-KEY rule I-KEY , O the O optimum O test O plan O can O be O obtained O by O minimizing O the O total O experimental O cost O . O An O example O is O provided O to O illustrate O the O proposed O method O Data O storage O : O re-format O . O Closely O tracking O a O fast-moving O sector O In O the O past O few O years O the O data B-KEY center I-KEY market O has O changed O dramatically O , O forcing O many O companies O into O consolidation O or O bankruptcy O . O Gone O are O the O days O when O companies O raised O millions O of O dollars O to O acquire O large O industrial O buildings O and O transform O them O into O glittering O , O high-tech O palaces O filled O with O the O latest O telecommunication O and O data O technology O . O Whereas O manufacturers O of O communication O technology O deliver O the O racked O equipment O in O these O , O often O mission-critical O , O facilities O , O ABB B-KEY focuses O mainly O on O the O building B-KEY infrastructure I-KEY . O Besides O the O very O important O redundant B-KEY power I-KEY supply I-KEY , O ABB B-KEY also O provides O the O redundant B-KEY air I-KEY conditioning I-KEY and O the O security B-KEY system I-KEY On O batch-constructing O B/sup O + O / O - O trees O : O algorithm O and O its O performance O evaluation O Efficient O construction O of O indexes O is O very O important O in O bulk-loading O a O database O or O adding O a O new O index O to O an O existing O database O since O both O of O them O should O handle O an O enormous O volume O of O data O . O In O this O paper O , O we O propose O an O algorithm O for O batch-constructing O the O B/sup O + O / O - O tree O , O the O most O widely O used O index B-KEY structure I-KEY in O database O systems O . O The O main O characteristic O of O our O algorithm O is O to O simultaneously O process O all O the O key O values O to O be O placed O on O each O B O + O - O tree O page O when O accessing O the O page O . O This O avoids O the O overhead O due O to O accessing O the O same O page O multiple O times O , O which O results O from O applying O the O B O + O - O tree O insertion O algorithm O repeatedly O . O For O performance O evaluation O , O we O have O analyzed O our O algorithm O in O terms O of O the O number O of O disk B-KEY accesses I-KEY . O The O results O show O that O the O number O of O disk B-KEY accesses I-KEY excluding O those O in O the O relocation B-KEY process I-KEY is O identical O to O the O number O of O pages O belonging O to O the O B/sup O + O / O - O tree O . O Considering O that O the O relocation B-KEY process I-KEY is O an O unavoidable O preprocessing O step O for O batch-constructing O of O B/sup O + O / O - O trees O , O our O algorithm O requires O just O one O disk B-KEY access I-KEY per O B O + O - O tree O page O , O and O therefore O turns O out O to O be O optimal O . O We O also O present O the O performance O tendency O in O relation O with O different O parameter O values O via O simulation B-KEY . O Finally O , O we O show O the O performance O enhancement O effect O of O our O algorithm O , O compared O with O the O one O using O repeated O insertions O through O experiments O Three-dimensional O optimum O design O of O the O cooling O lines O of O injection B-KEY moulds I-KEY based O on O boundary O element O design O sensitivity O analysis O A O three-dimensional O numerical O simulation O using O the O boundary B-KEY element I-KEY method I-KEY is O proposed O , O which O can O predict O the O cavity B-KEY temperature I-KEY distributions I-KEY in O the O cooling B-KEY stage I-KEY of O injection B-KEY moulding I-KEY . O Then O , O choosing O the O radii O and O positions O of O cooling O lines O as O design O variables O , O the O boundary O integral O sensitivity O formulations O are O deduced O . O For O the O optimum O design O of O cooling O lines O , O the O squared O difference O between O the O objective O temperature O and O temperature O of O the O cavity O is O taken O as O the O objective B-KEY function I-KEY . O Based O on O the O optimization B-KEY techniques O with O design O sensitivity O analysis O , O an O iterative B-KEY algorithm I-KEY to O reach O the O minimum O value O of O the O objective B-KEY function I-KEY is O introduced O , O which O leads O to O the O optimum O design O of O cooling O lines O at O the O same O time O Relativistic B-KEY constraints I-KEY on O the O distinguishability O of O orthogonal B-KEY quantum I-KEY states I-KEY The O constraints O imposed O by O special B-KEY relativity I-KEY on O the O distinguishability O of O quantum O states O are O discussed O . O An O explicit O expression O relating O the O probability O of O an O error O in O distinguishing O two O orthogonal B-KEY single-photon I-KEY states I-KEY to O their O structure O , O the O time O t O at O which O a O measurement O starts O , O and O the O interval O of O time O T O elapsed O from O the O start O of O the O measurement O until O the O time O at O which O the O outcome O is O obtained O by O an O observer B-KEY is O given O as O an O example O Geometrically B-KEY invariant I-KEY watermarking I-KEY using O feature B-KEY points I-KEY This O paper O presents O a O new O approach O for O watermarking O of O digital B-KEY images I-KEY providing O robustness O to O geometrical B-KEY distortions I-KEY . O The O weaknesses O of O classical O watermarking O methods O to O geometrical B-KEY distortions I-KEY are O outlined O first O . O Geometrical B-KEY distortions I-KEY can O be O decomposed O into O two O classes O : O global B-KEY transformations I-KEY such O as O rotations O and O translations O and O local O transformations O such O as O the O StirMark O attack O . O An O overview O of O existing O self-synchronizing B-KEY schemes I-KEY is O then O presented O . O Theses O schemes O can O use O periodical B-KEY properties I-KEY of O the O mark O , O invariant B-KEY properties I-KEY of O transforms B-KEY , O template B-KEY insertion I-KEY , O or O information O provided O by O the O original O image O to O counter O geometrical B-KEY distortions I-KEY . O Thereafter O , O a O new O class O of O watermarking O schemes O using O the O image B-KEY content I-KEY is O presented O . O We O propose O an O embedding B-KEY and O detection B-KEY scheme I-KEY where O the O mark O is O bound O with O a O content B-KEY descriptor I-KEY defined O by O salient O points O . O Three O different O types O of O feature B-KEY points I-KEY are O studied O and O their O robustness O to O geometrical O transformations B-KEY is O evaluated O to O develop O an O enhanced O detector O . O The O embedding B-KEY of O the O signature O is O done O by O extracting O feature B-KEY points I-KEY of O the O image O and O performing O a O Delaunay B-KEY tessellation I-KEY on O the O set O of O points O . O The O mark O is O embedded B-KEY using O a O classical O additive B-KEY scheme I-KEY inside O each O triangle O of O the O tessellation O . O The O detection O is O done O using O correlation B-KEY properties I-KEY on O the O different O triangles O . O The O performance O of O the O presented O scheme O is O evaluated O after O JPEG B-KEY compression I-KEY , O geometrical B-KEY attack I-KEY and O transformations B-KEY . O Results O show O that O the O fact O that O the O scheme O is O robust O to O these O different O manipulations O . O Finally O , O in O our O concluding O remarks O , O we O analyze O the O different O perspectives O of O such O content-based O watermarking O scheme O Fresh O voices O , O big O ideas O -LSB- O IBM O internship B-KEY program I-KEY -RSB- O IBM O is O matching O up O computer-science O and O MBA O students O with O its O business O managers O in O an O 11-week O summer O internship B-KEY program I-KEY and O challenging O them O to O develop O innovative O technology O ideas O Using O molecular B-KEY equivalence I-KEY numbers I-KEY to O visually O explore O structural B-KEY features I-KEY that O distinguish O chemical B-KEY libraries I-KEY A O molecular B-KEY equivalence I-KEY number I-KEY -LRB- O meqnum O -RRB- O classifies O a O molecule O with O respect O to O a O class O of O structural B-KEY features I-KEY or O topological B-KEY shapes I-KEY such O as O its O cyclic B-KEY system I-KEY or O its O set O of O functional B-KEY groups I-KEY . O Meqnums O can O be O used O to O organize O molecular O structures O into O nonoverlapping O , O yet O highly O relatable O classes O . O We O illustrate O the O construction O of O some O different O types O of O meqnums O and O present O via O examples O some O methods O of O comparing O diverse O chemical B-KEY libraries I-KEY based O on O meqnums O . O In O the O examples O we O compare O a O library O which O is O a O random O sample O from O the O MDL B-KEY Drug I-KEY Data I-KEY Report I-KEY -LRB- O MDDR O -RRB- O with O a O library O which O is O a O random O sample O from O the O Available B-KEY Chemical I-KEY Directory I-KEY -LRB- O ACD O -RRB- O . O In O our O analyses O , O we O discover O some O interesting O features O of O the O topological B-KEY shape I-KEY of O a O molecule O and O its O set O of O functional B-KEY groups I-KEY that O are O strongly O linked O with O compounds O occurring O in O the O MDDR O but O not O in O the O ACD O . O We O also O illustrate O the O utility O of O molecular B-KEY equivalence I-KEY indices I-KEY in O delineating O the O structural O domain O over O which O an O SAR O conclusion O is O valid O Integrating O virtual O and O physical O context O to O support O knowledge B-KEY workers I-KEY The O Kimura B-KEY system I-KEY augments O and O integrates O independent O tools O into O a O pervasive B-KEY computing I-KEY system O that O monitors O a O user O 's O interactions O with O the O computer O , O an O electronic B-KEY whiteboard I-KEY , O and O a O variety O of O networked B-KEY peripheral I-KEY devices I-KEY and O data B-KEY sources I-KEY An O inverse B-KEY problem I-KEY for O a O model O of O a O hierarchical B-KEY structure I-KEY We O consider O the O inverse B-KEY problem I-KEY for O the O identification O of O the O coefficient O in O a O parabolic B-KEY equation I-KEY . O The O model O is O applied O to O describe O the O functioning O of O a O hierarchical B-KEY structure I-KEY ; O it O is O also O relevant O for O heat-conduction B-KEY theory I-KEY . O Unique B-KEY solvability I-KEY of O the O inverse B-KEY problem I-KEY is O proved O Noise B-KEY effect I-KEY on O memory B-KEY recall I-KEY in O dynamical B-KEY neural I-KEY network I-KEY model I-KEY of O hippocampus B-KEY We O investigate O some O noise B-KEY effect I-KEY on O a O neural O network O model O proposed O by O Araki O and O Aihara O -LRB- O 1998 O -RRB- O for O the O memory B-KEY recall I-KEY of O dynamical B-KEY patterns I-KEY in O the O hippocampus B-KEY and O the O entorhinal B-KEY cortex I-KEY ; O the O noise B-KEY effect I-KEY is O important O since O the O release O of O transmitters O at O synaptic B-KEY clefts I-KEY , O the O operation O of O gate B-KEY of I-KEY ion I-KEY channels I-KEY and O so O on O are O known O as O stochastic B-KEY phenomena I-KEY . O We O consider O two O kinds O of O noise B-KEY effect I-KEY due O to O a O deterministic B-KEY noise I-KEY and O a O stochastic B-KEY noise I-KEY . O By O numerical B-KEY simulations I-KEY , O we O find O that O reasonable O values O of O noise O give O better O performance O on O the O memory B-KEY recall I-KEY of O dynamical B-KEY patterns I-KEY . O Furthermore O we O investigate O the O effect O of O the O strength O of O external O inputs O on O the O memory B-KEY recall I-KEY A O server-side B-KEY program I-KEY for O delivering O experiments O with O animations O A O server-side B-KEY program I-KEY for O animation O experiments O is O presented O . O The O program O is O capable O of O delivering O an O experiment O composed O of O discrete B-KEY animation I-KEY sequences I-KEY in O various O file B-KEY formats I-KEY , O collecting O a O discrete O or O continuous O response O from O the O observer O , O evaluating O the O appropriateness O of O the O response O , O and O ensuring O that O the O user O is O not O proceeding O at O an O unreasonable O rate O . O Most O parameters O of O the O program O are O controllable O by O experimenter-edited B-KEY text I-KEY files I-KEY or O simple O switches O in O the O program O code O , O thereby O minimizing O the O need O for O programming O to O create O new O experiments O . O A O simple O demonstration O experiment O is O discussed O and O is O freely O available O In O search O of O a O general B-KEY enterprise I-KEY model I-KEY Many O organisations O , O particularly O SMEs B-KEY , O are O reluctant O to O invest O time O and O money O in O models O to O support O decision B-KEY making I-KEY . O Such O reluctance O could O be O overcome O if O a O model O could O be O used O for O several O purposes O rather O than O using O a O traditional O `` O single O perspective O '' O model O . O This O requires O the O development O of O a O `` O general B-KEY enterprise I-KEY model I-KEY '' O -LRB- O GEM B-KEY -RRB- O , O which O can O be O applied O to O a O wide O range O of O problem B-KEY domains I-KEY with O unlimited O scope O . O Current O enterprise B-KEY modelling I-KEY frameworks I-KEY only O deal O effectively O with O nondynamic O modelling O issues O whilst O dynamic B-KEY modelling I-KEY issues I-KEY have O traditionally O only O been O addressed O at O the O operational B-KEY level I-KEY . O Although O the O majority O of O research O in O this O area O relates O to O manufacturing O companies O , O the O framework O for O a O GEM B-KEY must O be O equally O applicable O to O service O and O public B-KEY sector I-KEY organisations I-KEY . O The O paper O identifies O five O key O design O issues O that O need O to O be O considered O when O constructing O a O GEM B-KEY . O A O framework O for O such O a O GEM B-KEY is O presented O based O on O a O `` O plug O and O play O '' O methodology O and O demonstrated O by O a O simple O case B-KEY study I-KEY Pattern B-KEY recognition I-KEY strategies I-KEY for O molecular B-KEY surfaces I-KEY . O I. O Pattern B-KEY generation I-KEY using O fuzzy B-KEY set I-KEY theory I-KEY A O new O method O for O the O characterization O of O molecules O based O on O the O model B-KEY approach I-KEY of O molecular B-KEY surfaces I-KEY is O presented O . O We O use O the O topographical B-KEY properties I-KEY of O the O surface O as O well O as O the O electrostatic B-KEY potential I-KEY , O the O local B-KEY lipophilicity/hydrophilicity I-KEY , O and O the O hydrogen O bond O density O on O the O surface O for O characterization O . O The O definition O and O the O calculation O method O for O these O properties O are O reviewed O . O The O surface O is O segmented O into O overlapping B-KEY patches I-KEY with O similar O molecular B-KEY properties I-KEY . O These O patches O can O be O used O to O represent O the O characteristic O local B-KEY features I-KEY of O the O molecule O in O a O way O that O is O beyond O the O atomistic B-KEY resolution I-KEY but O can O nevertheless O be O applied O for O the O analysis O of O partial B-KEY similarities I-KEY of O different O molecules O as O well O as O for O the O identification O of O molecular B-KEY complementarity I-KEY in O a O very O general O sense O . O The O patch B-KEY representation I-KEY can O be O used O for O different O applications O , O which O will O be O demonstrated O in O subsequent O articles O An O algorithm O to O generate O all O spanning B-KEY trees I-KEY with O flow O Spanning B-KEY tree I-KEY enumeration O in O undirected B-KEY graphs I-KEY is O an O important O issue O and O task O in O many O problems O encountered O in O computer O network O and O circuit B-KEY analysis I-KEY . O This O paper O discusses O the O spanning B-KEY tree I-KEY with O flow O for O the O case O that O there O are O flow O requirements O between O each O node O pair O . O An O algorithm O based O on O minimal B-KEY paths I-KEY -LRB- O MPs O -RRB- O is O proposed O to O generate O all O spanning B-KEY trees I-KEY without O flow O . O The O proposed O algorithm O is O a O structured O approach O , O which O splits O the O system O into O structural O MPs O first O , O and O also O all O steps O in O it O are O easy O to O follow O Horizontal O waypoint O guidance O design O using O optimal O control O A O horizontal B-KEY waypoint I-KEY guidance I-KEY algorithm I-KEY is O proposed O by O applying O line-following B-KEY guidance I-KEY to O waypoint B-KEY line I-KEY segments I-KEY in O sequence O . O The O line-following B-KEY guidance I-KEY is O designed O using O an O LQR B-KEY -LRB- O linear B-KEY quadratic I-KEY regulator I-KEY -RRB- O . O Then O , O the O optimal B-KEY waypoint I-KEY changing I-KEY points I-KEY are O derived O by O minimizing O the O accelerations O required O for O changing O the O waypoint B-KEY line I-KEY segments I-KEY . O Also O derived O is O a O sufficient O condition O for O the O stability B-KEY bound I-KEY of O ground B-KEY speed I-KEY changes I-KEY based O on O the O Lyapunov B-KEY stability I-KEY theorem I-KEY . O Simulation O results O show O that O the O proposed O algorithm O can O effectively O guide O a O vehicle O along O the O sequence O of O waypoint B-KEY line I-KEY segments I-KEY Writing O the O fulfillment B-KEY RFP O -LSB- O publishing B-KEY -RSB- O For O the O uninitiated O , O writing O a O request B-KEY for I-KEY proposal I-KEY can O seem O both O mysterious O and O daunting O . O Here O 's O a O format O that O will O make O you O look O like O a O pro O the O first O time O out O New O tuning B-KEY method I-KEY for O PID B-KEY controller I-KEY In O this O paper O , O a O tuning B-KEY method I-KEY for O proportional-integral-derivative O -LRB- O PID O -RRB- O controller O and O the O performance O assessment O formulas O for O this O method O are O proposed O . O This O tuning B-KEY method I-KEY is O based O on O a O genetic B-KEY algorithm I-KEY based O PID B-KEY controller I-KEY design O method O . O For O deriving O the O tuning O formula O , O the O genetic B-KEY algorithm I-KEY based O design O method O is O applied O to O design O PID B-KEY controllers I-KEY for O a O variety O of O processes O . O The O relationship O between O the O controller O parameters O and O the O parameters O that O characterize O the O process B-KEY dynamics I-KEY are O determined O and O the O tuning O formula O is O then O derived O . O Using O simulation O studies O , O the O rules O for O assessing O the O performance O of O a O PID B-KEY controller I-KEY tuned O by O the O proposed O method O are O also O given O . O This O makes O it O possible O to O incorporate O the O capability O to O determine O if O the O PID B-KEY controller I-KEY is O well O tuned O or O not O into O an O autotuner B-KEY . O An O autotuner B-KEY based O on O this O new O tuning B-KEY method I-KEY and O the O corresponding O performance O assessment O rules O is O also O established O . O Simulations O and O real-time O experimental O results O are O given O to O demonstrate O the O effectiveness O and O usefulness O of O these O formulas O Deriving O model O parameters O from O field O test O measurements O -LSB- O generator O control B-KEY simulation I-KEY -RSB- O A O major O component O of O any O power B-KEY system I-KEY simulation I-KEY is O the O generating O plant O . O The O purpose O of O DeriveAssist B-KEY is O to O speed O up O the O parameter B-KEY derivation I-KEY process I-KEY and O to O allow O engineers O less O versed O in O parameter B-KEY matching I-KEY and O identification O to O get O involved O in O the O process O of O power O plant O electric O generator O modelling O Design O PID O controllers O for O desired O time-domain O or O frequency-domain B-KEY response I-KEY Practical O requirements O on O the O design O of O control O systems O , O especially O process B-KEY control I-KEY systems I-KEY , O are O usually O specified O in O terms O of O time-domain B-KEY response I-KEY , O such O as O overshoot B-KEY and O rise B-KEY time I-KEY , O or O frequency-domain B-KEY response I-KEY , O such O as O resonance B-KEY peak I-KEY and O stability B-KEY margin I-KEY . O Although O numerous O methods O have O been O developed O for O the O design O of O the O proportional-integral-derivative O -LRB- O PID O -RRB- O controller O , O little O work O has O been O done O in O relation O to O the O quantitative O time-domain O and O frequency-domain B-KEY responses I-KEY . O In O this O paper O , O we O study O the O following O problem O : O Given O a O nominal B-KEY stable I-KEY process I-KEY with O time O delay O , O we O design O a O suboptimal O PID O controller O to O achieve O the O required O time-domain B-KEY response I-KEY or O frequency-domain B-KEY response I-KEY for O the O nominal O system O or O the O uncertain O system O . O An O H/sub B-KEY infinity I-KEY / I-KEY PID I-KEY controller I-KEY is O developed O based O on O optimal B-KEY control I-KEY theory O and O the O parameters O are O derived O analytically O . O Its O properties O are O investigated O and O compared O with O that O of O two O developed O suboptimal B-KEY controllers I-KEY : O an O H/sub O 2 O / O PID O controller O and O a O Maclaurin B-KEY PID I-KEY controller I-KEY Adaptive O and O efficient O mutual O exclusion O The O paper O presents O adaptive B-KEY algorithms I-KEY for O mutual O exclusion O using O only O read O and O write B-KEY operations I-KEY ; O the O performance O of O the O algorithms O depends O only O on O the O point B-KEY contention I-KEY , O i.e. O , O the O number O of O processes O that O are O concurrently O active O during O algorithm B-KEY execution I-KEY -LRB- O and O not O on O n O , O the O total O number O of O processes O -RRB- O . O Our O algorithm O has O O O -LRB- O k O -RRB- O remote B-KEY step I-KEY complexity I-KEY and O O O -LRB- O log O k O -RRB- O system B-KEY response I-KEY time I-KEY , O where O k O is O the O point B-KEY contention I-KEY . O The O remote B-KEY step I-KEY complexity I-KEY is O the O maximal O number O of O steps O performed O by O a O process O where O a O wait O is O counted O as O one O step O . O The O system B-KEY response I-KEY time I-KEY is O the O time O interval O between O subsequent O entries O to O the O critical B-KEY section I-KEY , O where O one O time O unit O is O the O minimal B-KEY interval I-KEY in O which O every O active B-KEY process I-KEY performs O at O least O one O step O . O The O space B-KEY complexity I-KEY of O this O algorithm O is O O O -LRB- O N O log O n O -RRB- O , O where O N O is O the O range O of O process O names O . O We O show O how O to O make O the O space B-KEY complexity I-KEY of O our O algorithm O depend O solely O on O n O , O while O preserving O the O other O performance B-KEY measures I-KEY of O the O algorithm O Visual-word O identification O thresholds O for O the O 260 O fragmented O words O of O the O Snodgrass O and O Vanderwart O pictures O in O Spanish O Word B-KEY difficulty I-KEY varies O from O language O to O language O ; O therefore O , O normative O data O of O verbal B-KEY stimuli I-KEY can O not O be O imported O directly O from O another O language O . O We O present O mean B-KEY identification I-KEY thresholds I-KEY for O the O 260 O screen-fragmented B-KEY words I-KEY corresponding O to O the O total O set O of O Snodgrass O and O Vanderwart O -LRB- O 1980 O -RRB- O pictures O . O Individual O words O were O fragmented O in O eight O levels O using O Turbo B-KEY Pascal I-KEY , O and O the O resulting O program O was O implemented O on O a O PC B-KEY microcomputer I-KEY . O The O words O were O presented O individually O to O a O group O of O 40 O Spanish B-KEY observers O , O using O a O controlled B-KEY time I-KEY procedure I-KEY . O An O unspecific B-KEY learning I-KEY effect I-KEY was O found O showing O that O performance O improved O due O to O practice O with O the O task O . O Finally O , O of O the O 11 O psycholinguistic B-KEY variables I-KEY that O previous O researchers O have O shown O to O affect O word B-KEY identification I-KEY , O only O imagery O accounted O for O a O significant O amount O of O variance O in O the O threshold O values O Pervasive O computing O goes O to O work O : O interfacing O to O the O enterprise O The O paperless B-KEY office I-KEY is O an O idea O whose O time O has O come O , O and O come O , O and O come O again O . O To O see O how O pervasive O computing O applications O might O bring O some O substance O to O this O dream O , O the O author O spoke O recently O with O key O managers O and O technologists O at O McKesson O Corporation O -LRB- O San O Francisco O -RRB- O , O a O healthcare O supplier O , O service O , O and O technology O company O with O US$ O 50 O billion O in O sales O last O year O , O and O also O at O AvantGo O -LRB- O Hayward O , O Calif. O -RRB- O , O a O provider O of O mobile O infrastructure O software O and O services O . O For O the O past O several O years O , O McKesson O has O used O mobility O middleware O developed O by O AvantGo O to O deploy O major O supply O chain O applications O with O thousands O of O pervasive B-KEY clients I-KEY and O multiple B-KEY servers I-KEY that O replace O existing O paper-based O tracking O systems O . O According O to O McKesson O 's O managers O , O their O system O greatly O reduced O errors O and O associated O costs O caused O by O redelivery O or O loss O of O valuable O products O , O giving O McKesson O a O solid O return O on O its O investment O Four O factors O influencing O the O fair B-KEY market I-KEY value I-KEY of O out-of-print B-KEY books I-KEY .1 O Four O factors O -LRB- O edition O , O condition O , O dust O jacket O , O and O autograph O -RRB- O that O are O hypothesized O to O influence O the O value O of O books O are O identified O and O linked O to O basic O economic B-KEY principles I-KEY , O which O are O explained O . O A O sample O of O fifty-six O titles O is O qualitatively O examined O to O test O the O hypothesis O Fault-tolerant B-KEY Hamiltonian I-KEY laceability I-KEY of O hypercubes B-KEY It O is O known O that O every O hypercube B-KEY Q/sub O n O / O is O a O bipartite B-KEY graph I-KEY . O Assume O that O n O > O or O = O 2 O and O F O is O a O subset O of O edges O with O | O F O | O < O or O = O n-2 O . O We O prove O that O there O exists O a O Hamiltonian B-KEY path I-KEY in O Q/sub O n O / O - O F O between O any O two O vertices B-KEY of O different O partite B-KEY sets I-KEY . O Moreover O , O there O exists O a O path O of O length O 2/sup O n O / O -2 O between O any O two O vertices B-KEY of O the O same O partite B-KEY set I-KEY . O Assume O that O n O > O or O = O 3 O and O F O is O a O subset O of O edges O with O | O F O | O < O or O = O n-3 O . O We O prove O that O there O exists O a O Hamiltonian B-KEY path I-KEY in O Q/sub O n O / O - O -LCB- O v O -RCB- O - O F O between O any O two O vertices B-KEY in O the O partite B-KEY set I-KEY without O v. O Furthermore O , O all O bounds O are O tight O Information B-KEY architecture I-KEY for O bilingual O Web O sites O Creating O an O information B-KEY architecture I-KEY for O a O bilingual O Web O site O presents O particular O challenges O beyond O those O that O exist O for O single O and O multilanguage O sites O . O This O article O reports O work O in O progress O on O the O development O of O a O content-based B-KEY bilingual I-KEY Web I-KEY site I-KEY to O facilitate O the O sharing O of O resources O and O information O between O Speech O and O Language B-KEY Therapists I-KEY . O The O development O of O the O information B-KEY architecture I-KEY is O based O on O a O combination O of O two O aspects O : O an O abstract O structural O analysis O of O existing O bilingual O Web O designs O focusing O on O the O presentation O of O bilingual O material O , O and O a O bilingual B-KEY card-sorting I-KEY activity I-KEY conducted O with O potential O users O . O Issues O for O bilingual B-KEY developments I-KEY are O discussed O , O and O some O observations O are O made O regarding O the O use O of O card-sorting O activities O Mount B-KEY Sinai I-KEY Hospital I-KEY uses O integer B-KEY programming I-KEY to O allocate O operating O room O time O An O integer-programming O model O and O a O post-solution B-KEY heuristic I-KEY allocates O operating O room O time O to O the O five O surgical O divisions O at O Toronto B-KEY 's O Mount B-KEY Sinai I-KEY Hospital I-KEY . O The O hospital O has O used O this O approach O for O several O years O and O credits O it O with O both O administrative O savings O and O the O ability O to O produce O quickly O an O equitable O master O surgical O schedule O On O the O emergence O of O rules O in O neural B-KEY networks I-KEY A O simple O associationist B-KEY neural I-KEY network I-KEY learns O to O factor O abstract O rules O -LRB- O i.e. O , O grammars O -RRB- O from O sequences O of O arbitrary O input O symbols O by O inventing O abstract O representations O that O accommodate O unseen O symbol O sets O as O well O as O unseen O but O similar O grammars O . O The O neural B-KEY network I-KEY is O shown O to O have O the O ability O to O transfer O grammatical O knowledge O to O both O new O symbol O vocabularies O and O new O grammars O . O Analysis O of O the O state-space B-KEY shows O that O the O network O learns B-KEY generalized O abstract O structures O of O the O input O and O is O not O simply O memorizing O the O input O strings O . O These O representations O are O context O sensitive O , O hierarchical O , O and O based O on O the O state O variable O of O the O finite-state O machines O that O the O neural B-KEY network I-KEY has O learned B-KEY . O Generalization O to O new O symbol O sets O or O grammars O arises O from O the O spatial O nature O of O the O internal O representations O used O by O the O network O , O allowing O new O symbol O sets O to O be O encoded O close O to O symbol O sets O that O have O already O been O learned B-KEY in O the O hidden O unit O space O of O the O network O . O The O results O are O counter O to O the O arguments O that O learning B-KEY algorithms O based O on O weight O adaptation O after O each O exemplar O presentation O -LRB- O such O as O the O long O term O potentiation O found O in O the O mammalian O nervous O system O -RRB- O can O not O in O principle O extract O symbolic B-KEY knowledge I-KEY from O positive O examples O as O prescribed O by O prevailing O human O linguistic O theory O and O evolutionary O psychology O Discrete B-KEY output I-KEY feedback I-KEY sliding B-KEY mode I-KEY control I-KEY of O second O order O systems O - O a O moving B-KEY switching I-KEY line I-KEY approach O The O sliding B-KEY mode I-KEY control I-KEY systems O -LRB- O SMCS O -RRB- O for O which O the O switching B-KEY variable I-KEY is O designed O independent O of O the O initial O conditions O are O known O to O be O sensitive O to O parameter B-KEY variations I-KEY and O extraneous O disturbances O during O the O reaching O phase O . O For O second O order O systems O this O drawback O is O eliminated O by O using O the O moving B-KEY switching I-KEY line I-KEY technique O where O the O switching O line O is O initially O designed O to O pass O the O initial O conditions O and O is O subsequently O moved O towards O a O predetermined O switching O line O . O In O this O paper O , O we O make O use O of O the O above O idea O of O moving B-KEY switching I-KEY line I-KEY together O with O the O reaching O law O approach O to O design O a O discrete B-KEY output I-KEY feedback I-KEY sliding B-KEY mode I-KEY control I-KEY . O The O main O contributions O of O this O work O are O such O that O we O do O not O require O to O use O system O states O as O it O makes O use O of O only O the O output O samples O for O designing O the O controller O . O and O by O using O the O moving B-KEY switching I-KEY line I-KEY a O low O sensitivity O system O is O obtained O through O shortening O the O reaching O phase O . O Simulation O results O show O that O the O fast B-KEY output I-KEY sampling I-KEY feedback I-KEY guarantees O sliding O motion O similar O to O that O obtained O using O state B-KEY feedback I-KEY Aim O for O the O enterprise O : O Microsoft B-KEY Project I-KEY 2002 I-KEY A O long-time O favorite O of O project O managers O , O Microsoft B-KEY Project I-KEY 2002 I-KEY is O making O its O enterprise O debut O . O Its O new O Web-based B-KEY collaboration I-KEY tools I-KEY and O improved O scalability B-KEY with O OLAP B-KEY support I-KEY make O it O much O easier O to O manage O multiple O Web O projects O with O disparate O workgroups B-KEY and O budgets B-KEY Effective O moving B-KEY cast I-KEY shadow I-KEY detection O for O monocular O color O traffic O image O sequences O For O an O accurate B-KEY scene I-KEY analysis I-KEY using O monocular B-KEY color I-KEY traffic I-KEY image I-KEY sequences I-KEY , O a O robust B-KEY segmentation I-KEY of O moving B-KEY vehicles I-KEY from O the O stationary B-KEY background I-KEY is O generally O required O . O However O , O the O presence O of O moving B-KEY cast I-KEY shadow I-KEY may O lead O to O an O inaccurate O vehicle O segmentation O , O and O as O a O result O , O may O lead O to O further O erroneous O scene O analysis O . O We O propose O an O effective O method O for O the O detection O of O moving B-KEY cast I-KEY shadow I-KEY . O By O observing O the O characteristics O of O cast B-KEY shadow I-KEY in O the O luminance B-KEY , O chrominance B-KEY , O gradient B-KEY density I-KEY , O and O geometry B-KEY domains I-KEY , O a O combined B-KEY probability I-KEY map I-KEY , O called O a O shadow B-KEY confidence I-KEY score I-KEY -LRB- O SCS O -RRB- O , O is O obtained O . O From O the O edge O map O of O the O input B-KEY image I-KEY , O each O edge O pixel O is O examined O to O determine O whether O it O belongs O to O the O vehicle O region O based O on O its O neighboring O SCSs O . O The O cast B-KEY shadow I-KEY is O identified O as O those O regions O with O high O SCSs O , O which O are O outside O the O convex B-KEY hull I-KEY of O the O selected B-KEY vehicle I-KEY edge I-KEY pixels I-KEY . O The O proposed O method O is O tested O on O 100 O vehicle B-KEY images I-KEY taken O under O different O lighting B-KEY conditions I-KEY -LRB- O sunny B-KEY and O cloudy B-KEY -RRB- O , O viewing B-KEY angles I-KEY -LRB- O roadside O and O overhead O -RRB- O , O vehicle B-KEY sizes I-KEY -LRB- O small O , O medium O , O and O large O -RRB- O , O and O colors O -LRB- O similar O to O the O road O and O not O -RRB- O . O The O results O indicate O that O an O average B-KEY error I-KEY rate I-KEY of O around O 14 O % O is O obtained O while O the O lowest O error O rate O is O around O 3 O % O for O large O vehicles O The O impact O of O the O Internet B-KEY on O public B-KEY library I-KEY use O : O an O analysis O of O the O current O consumer O market O for O library O and O Internet B-KEY services O The O potential O impact O of O the O Internet B-KEY on O the O public O 's O demand O for O the O services O and O resources O of O public B-KEY libraries I-KEY is O an O issue O of O critical O importance O . O The O research O reported O in O this O article O provides O baseline B-KEY data I-KEY concerning O the O evolving O relationship O between O the O public O 's O use O of O the O library O and O its O use O of O the O Internet B-KEY . O The O authors O developed O a O consumer B-KEY model I-KEY of O the O American B-KEY adult I-KEY market I-KEY for O information O services O and O resources O , O segmented O by O use O -LRB- O or O nonuse O -RRB- O of O the O public B-KEY library I-KEY and O by O access O -LRB- O or O lack O of O access O -RRB- O to O , O and O use O -LRB- O or O nonuse O -RRB- O of O , O the O Internet B-KEY . O A O national B-KEY Random I-KEY Digit I-KEY Dialing I-KEY telephone I-KEY survey I-KEY collected O data O to O estimate O the O size O of O each O of O six O market O segments O , O and O to O describe O their O usage O choices O between O the O public B-KEY library I-KEY and O the O Internet B-KEY . O The O analyses O presented O in O this O article O provide O estimates O of O the O size O and O demographics O of O each O of O the O market O segments O ; O describe O why O people O are O currently O using O the O public B-KEY library I-KEY and O the O Internet B-KEY ; O identify O the O decision B-KEY criteria I-KEY people O use O in O their O choices O of O which O provider O to O use O ; O identify O areas O in O which O libraries O and O the O Internet B-KEY appear O to O be O competing O and O areas O in O which O they O appear O to O be O complementary O ; O and O identify O reasons O why O people O choose O not O to O use O the O public B-KEY library I-KEY and/or O the O Internet B-KEY . O The O data O suggest O that O some O differentiation O between O the O library O and O the O Internet B-KEY is O taking O place O , O which O may O very O well O have O an O impact O on O consumer O choices O between O the O two O . O Longitudinal B-KEY research I-KEY is O necessary O to O fully O reveal O trends O in O these O usage O choices O , O which O have O implications O for O all O types O of O libraries O in O planning O and O policy O development O Exploring O developments O in O Web B-KEY based I-KEY relationship I-KEY marketing I-KEY within O the O hotel B-KEY industry I-KEY This O paper O provides O a O content O analysis O study O of O the O application O of O World B-KEY Wide I-KEY Web I-KEY marketing I-KEY by O the O hotel B-KEY industry I-KEY . O There O is O a O lack O of O historical O perspective O on O industry O related O Web O marketing O applications O and O this O paper O attempts O to O resolve O this O with O a O two-year O follow-up O case O study O of O the O changing O use O of O the O Web O to O develop O different O types O of O relationships O . O Specifically O , O the O aims O are O : O -LRB- O 1 O -RRB- O to O identify O key O changes O in O the O way O hotels O are O using O the O Web O ; O -LRB- O 2 O -RRB- O to O look O for O evidence O of O the O adoption O of O a O relationship O marketing O -LRB- O RM O -RRB- O model O as O a O strategy O for O the O development O of O hotel B-KEY Web I-KEY sites I-KEY and O the O use O of O new O technologies O ; O and O , O -LRB- O 3 O -RRB- O To O investigate O the O use O of O multimedia B-KEY in O hotel B-KEY Web I-KEY sites I-KEY . O The O development O and O strategic O exploitation O of O the O Internet O has O transformed O the O basis O of O marketing O . O Using O the O evidence O from O a O Web B-KEY content I-KEY survey I-KEY this O study O reveals O the O way O relationships O are O being O created O and O managed O within O the O hotel B-KEY industry I-KEY by O its O use O of O the O Web O as O a O marketing O tool O . O The O authors O have O collected O evidence O by O means O of O a O descriptive O study O on O the O way O hotels O build O and O create O relationships O with O their O Web O presence O delivering O multimedia B-KEY information O as O well O as O channel O and O interactive O means O of O communication O . O In O addition O a O strategic O framework O is O offered O as O the O means O to O describe O the O mechanism O and O orientation O of O Web O based O marketing O by O hotels O . O The O study O utilizes O a O model O by O Gilbert O -LRB- O 1996 O -RRB- O as O a O means O of O developing O a O measurement O instrument O to O allow O a O content O analysis O of O the O current O approach O by O hotels O to O the O development O of O Web O sites O . O The O results O indicate O hotels O are O aware O of O the O new O uses O of O Web O technology O and O are O promoting O hotel O products O in O the O global B-KEY electronic I-KEY market I-KEY in O new O and O sophisticated O ways O System O embedding O . O Polynomial B-KEY equations I-KEY The O class O of O solutions O of O the O polynomial B-KEY equations I-KEY including O their O generalizations O in O the O form O of O the O Bezout B-KEY matrix I-KEY identities I-KEY was O constructed O analytically O using O the O technology O of O constructive B-KEY system I-KEY embedding I-KEY . O The O structure O of O a O solution O depends O on O the O number O of O steps O of O the O Euclidean B-KEY algorithm I-KEY and O is O obtained O explicitly O by O appropriate O substitutions O . O Illustrative O and O descriptive O examples O are O presented O Robust B-KEY fuzzy I-KEY controlled I-KEY photovoltaic I-KEY power I-KEY inverter I-KEY with O Taguchi B-KEY method I-KEY This O paper O presents O design O and O implementation O of O a O robust O fuzzy O controlled O photovoltaic O -LRB- O PV O -RRB- O power O inverter O with O Taguchi O tuned B-KEY scaling I-KEY factors I-KEY . O To O achieve O fast O transient B-KEY response I-KEY , O small O steady-state B-KEY error I-KEY and O system B-KEY robustness I-KEY , O a O robust O fuzzy O controller O is O adopted O , O in O which O its O input O and O output B-KEY scaling I-KEY factors I-KEY are O determined O efficiently O by O using O the O Taguchi-tuning O algorithm O . O The O proposed O system O can O operate O in O different O modes O , O grid-connection B-KEY mode I-KEY and O stand-alone B-KEY mode I-KEY , O and O can O accommodate O wide O load B-KEY variations I-KEY . O Simulation O results O and O hardware O measurements O obtained O from O a O prototype O with O a O microcontroller B-KEY -LRB- O Intel O 80196KC O -RRB- O are O presented O to O verify O the O theoretical O discussions O , O and O its O adaptivity B-KEY , O robustness O and O feasibility B-KEY Underground B-KEY poetry I-KEY , O collecting O poetry O , O and O the O librarian B-KEY A O powerful O encounter O with O underground B-KEY poetry I-KEY and O its O important O role O in O poetry O , O literature B-KEY , O and O culture B-KEY is O discussed O . O The O acquisitions O difficulties O encountered O in O the O unique O publishing B-KEY world O of O underground B-KEY poetry I-KEY are O introduced O . O Strategies O for O acquiring O underground B-KEY poetry I-KEY for O library B-KEY collections I-KEY are O proposed O , O including O total O immersion O and O local O focus O , O with O accompanying O action O Theoretical O and O experimental O investigations O on O coherence O of O traffic B-KEY noise I-KEY transmission I-KEY through O an O open B-KEY window I-KEY into O a O rectangular B-KEY room I-KEY in O high-rise B-KEY buildings I-KEY A O method O for O theoretically O calculating O the O coherence O between O sound B-KEY pressure I-KEY inside O a O rectangular B-KEY room I-KEY in O a O high-rise B-KEY building I-KEY and O that O outside O the O open B-KEY window I-KEY of O the O room O is O proposed O . O The O traffic O noise O transmitted O into O a O room O is O generally O dominated O by O low-frequency B-KEY components I-KEY , O to O which O active O noise O control O -LRB- O ANC O -RRB- O technology O may O find O an O application O . O However O , O good O coherence O between O reference O and O error O signals O is O essential O for O an O effective O noise O reduction O and O should O be O checked O first O . O Based O on O traffic B-KEY noise I-KEY prediction I-KEY methods I-KEY , O wave B-KEY theory I-KEY , O and O mode B-KEY coupling I-KEY theory I-KEY , O the O results O of O this O paper O enabled O one O to O determine O the O potentials O and O limitations O of O ANC O used O to O reduce O such O a O transmission O . O Experimental O coherence O results O are O shown O for O two O similar O , O empty O rectangular B-KEY rooms I-KEY located O on O the O 17th O and O 30th O floors O of O a O 34 O floor O high-rise B-KEY building I-KEY . O The O calculated O results O with O the O proposed O method O are O generally O in O good O agreement O with O the O experimental O results O and O demonstrate O the O usefulness O of O the O method O for O predicting O the O coherence O An O automated B-KEY parallel I-KEY image I-KEY registration I-KEY technique O based O on O the O correlation B-KEY of O wavelet B-KEY features I-KEY With O the O increasing O importance O of O multiple O multiplatform O remote B-KEY sensing I-KEY missions O , O fast O and O automatic O integration O of O digital O data O from O disparate O sources O has O become O critical O to O the O success O of O these O endeavors O . O Our O work O utilizes O maxima O of O wavelet O coefficients O to O form O the O basic O features O of O a O correlation-based O automatic B-KEY registration I-KEY algorithm I-KEY . O Our O wavelet-based O registration O algorithm O is O tested O successfully O with O data O from O the O National O Oceanic O and O Atmospheric O Administration O -LRB- O NOAA O -RRB- O Advanced O Very O High O Resolution O Radiometer O -LRB- O AVHRR B-KEY -RRB- O and O the O Landsat B-KEY Thematic I-KEY Mapper I-KEY -LRB- O TM O -RRB- O , O which O differ O by O translation O and/or O rotation O . O By O the O choice O of O high-frequency O wavelet B-KEY features I-KEY , O this O method O is O similar O to O an O edge-based O correlation B-KEY method O , O but O by O exploiting O the O multiresolution O nature O of O a O wavelet B-KEY decomposition I-KEY , O our O method O achieves O higher O computational O speeds O for O comparable O accuracies O . O This O algorithm O has O been O implemented O on O a O single-instruction O multiple-data O -LRB- O SIMD O -RRB- O massively O parallel O computer O , O the O MasPar O MP-2 O , O as O well O as O on O the O CrayT3D O , O the O Cray O T3E O , O and O a O Beowulf O cluster O of O Pentium O workstations O Evolution O of O litigation B-KEY support I-KEY systems I-KEY For O original O paper O see O ibid. O , O vol O . O 12 O , O no. O 6 O : O `` O The O E-mail B-KEY of O the O Species O '' O . O The O author O responds O to O that O paper O and O argues O that O printing O , O scanning O and O imaging O E-mails B-KEY or O other O electronic O -LRB- O rather O than O paper O -RRB- O documents O prior O to O listing O and O disclosure O seems O to O be O unnecessary O , O not O ` O proportionate O ' O -LRB- O from O a O costs O point O of O view O -RRB- O and O not O particularly O helpful O , O to O either O side O . O He O asks O how O litigation B-KEY support I-KEY systems I-KEY might O evolve O to O help O and O support O the O legal B-KEY team I-KEY in O their O task O Search O for O efficient O solutions O of O multi-criterion B-KEY problems I-KEY by O target-level B-KEY method I-KEY The O target-level B-KEY method I-KEY is O considered O for O solving O continuous B-KEY multi-criterion I-KEY maximization I-KEY problems I-KEY . O In O the O first O step O , O the O decision-maker O specifies O a O target-level B-KEY point I-KEY -LRB- O the O desired O criterion O values O -RRB- O ; O then O in O the O set O of O vector O evaluations O we O seek O points O that O are O closest O to O the O target O point O in O the O Chebyshev B-KEY metric I-KEY . O The O vector O evaluations O obtained O in O this O way O are O in O general O weakly O efficient O . O To O identify O the O efficient O evaluations O , O the O second O step O maximizes O the O sum O of O the O criteria O on O the O set O generated O in O step O 1 O . O We O prove O the O relationship O between O the O evaluations O and O decisions O obtained O by O the O proposed O procedure O , O on O the O one O hand O , O and O the O efficient O -LRB- O weakly O efficient O -RRB- O evaluations O and O decisions O , O on O the O other O hand O . O If O the O Edgeworth-Pareto B-KEY hull I-KEY of O the O set O of O vector O evaluations O is O convex O , O the O set O of O efficient O vector O evaluations O can O be O approximated O by O the O proposed O method O A O new O method O of O systemological B-KEY analysis I-KEY coordinated O with O the O procedure O of O object-oriented B-KEY design I-KEY . O II O For O pt.I O . O see O Vestn O . O KhGPU O , O no. O 81 O , O p.15-18 O -LRB- O 2000 O -RRB- O . O The O paper O presents O the O results O of O development O of O an O object-oriented O systemological O method O used O to O design O complex O systems O . O A O formal B-KEY system I-KEY representation I-KEY , O as O well O as O an O axiomatics B-KEY of O the O calculus O of O systems O as O functional B-KEY flow-type I-KEY objects I-KEY based O on O a O Node-Function-Object O class O hierarchy O are O proposed O . O A O formalized B-KEY NFO/UFO I-KEY analysis I-KEY algorithm I-KEY and O CASE B-KEY tools I-KEY used O to O support O it O are O considered O Do O n't O always O believe O what O you O Reed O -LSB- O optimisation B-KEY techniques I-KEY for O Web B-KEY sites I-KEY and O trade B-KEY mark I-KEY infringement I-KEY -RSB- O On O 20 O May O 2002 O , O Mr O Justice O Pumfrey O gave O judgment O in O the O case O of O -LRB- O 1 O -RRB- O Reed B-KEY Executive I-KEY Plc I-KEY -LRB- O 2 O -RRB- O Reed B-KEY Solutions I-KEY Plc I-KEY versus O -LRB- O 1 O -RRB- O Reed B-KEY Business I-KEY Information I-KEY Limited I-KEY -LRB- O 2 O -RRB- O Reed O Elsevier O -LRB- O UK O -RRB- O Limited O -LRB- O 3 O -RRB- O totaljobs.com B-KEY Limited I-KEY . O The O case O explored O for O the O first O time O in O any O detail O the O extent O to O which O the O use O of O various O optimisation B-KEY techniques I-KEY for O Web B-KEY sites I-KEY could O give O rise O to O new O forms O of O trade B-KEY mark I-KEY infringement I-KEY and O passing B-KEY off I-KEY . O The O author O reports O on O the O case O and O offers O his O comments O Presentation B-KEY media I-KEY , O information B-KEY complexity I-KEY , O and O learning B-KEY outcomes I-KEY Multimedia B-KEY computing I-KEY provides O a O variety O of O information B-KEY presentation I-KEY modality I-KEY combinations I-KEY . O Educators B-KEY have O observed O that O visuals O enhance O learning O which O suggests O that O multimedia B-KEY presentations I-KEY should O be O superior O to O text-only O and O text O with O static B-KEY pictures I-KEY in O facilitating O optimal B-KEY human I-KEY information I-KEY processing I-KEY and O , O therefore O , O comprehension O . O The O article O reports O the O findings O from O a O 3 O -LRB- O text-only O , O overhead B-KEY slides I-KEY , O and O multimedia B-KEY presentation I-KEY -RRB- O * O 2 O -LRB- O high O and O low O information B-KEY complexity I-KEY -RRB- O factorial O experiment O . O Subjects O read O a O text B-KEY script I-KEY , O viewed O an O acetate O overhead B-KEY slide I-KEY presentation O , O or O viewed O a O multimedia O presentation O depicting O the O greenhouse O effect O -LRB- O low O complexity O -RRB- O or O photocopier O operation O -LRB- O high O complexity O -RRB- O . O Multimedia O was O superior O to O text-only O and O overhead B-KEY slides I-KEY for O comprehension O . O Information B-KEY complexity I-KEY diminished O comprehension O and O perceived O presentation O quality O . O Multimedia O was O able O to O reduce O the O negative O impact O of O information B-KEY complexity I-KEY on O comprehension O and O increase O the O extent O of O sustained B-KEY attention I-KEY to O the O presentation O . O These O findings O suggest O that O multimedia B-KEY presentations I-KEY invoke O the O use O of O both O the O verbal O and O visual B-KEY working I-KEY memory I-KEY channels I-KEY resulting O in O a O reduction O of O the O cognitive B-KEY load I-KEY imposed O by O increased O information B-KEY complexity I-KEY . O Moreover O , O multimedia B-KEY superiority I-KEY in O facilitating O comprehension O goes O beyond O its O ability O to O increase O sustained B-KEY attention I-KEY ; O the O quality O and O effectiveness O of O information O processing O attained O -LRB- O i.e. O , O use O of O verbal O and O visual O working O memory O -RRB- O is O also O significant O Mobile B-KEY computing I-KEY `` O Killer O app O '' O competition O Design B-KEY competitions I-KEY offer O students O an O excellent O way O to O gain O hands-on O experience O in O engineering O and O computer O science O courses O . O The O University O of O Florida O , O in O partnership O with O Motorola B-KEY , O has O held O two O mobile B-KEY computing I-KEY design B-KEY competitions I-KEY . O In O Spring O and O Fall O 2001 O , O students O in O Abdelsalam O Helal O 's O Mobile B-KEY Computing I-KEY class O designed O killer O apps O for O a O Motorola B-KEY smart B-KEY phone I-KEY Diffraction B-KEY limit I-KEY for O a O circular B-KEY mask I-KEY with O a O periodic O rectangular O apertures O array O A O mask B-KEY with O periodic B-KEY apertures I-KEY imaging O system O is O adopted O very O widely O and O plays O a O leading O role O in O modern O technology O for O uses O such O as O pinhole B-KEY cameras I-KEY , O coded B-KEY imaging I-KEY systems I-KEY , O optical B-KEY information I-KEY processing I-KEY , O etc. O because O of O its O high B-KEY resolution I-KEY , O its O infinite B-KEY depth I-KEY of I-KEY focus I-KEY , O and O its O usefulness O over O a O broad B-KEY frequency I-KEY spectra I-KEY ranging O from O visible B-KEY light I-KEY to O X-rays O and O gamma B-KEY rays I-KEY . O While O the O masks B-KEY with O periodic B-KEY apertures I-KEY investigated O in O the O literature O are O limited O only O to O far-field B-KEY diffraction I-KEY , O they O do O not O take O the O shift O of O apertures O within O the O mask B-KEY into O consideration O . O Therefore O the O derivation O of O the O far-field B-KEY diffraction I-KEY for O a O single B-KEY aperture I-KEY can O not O be O applied O to O a O mask B-KEY with O periodic B-KEY apertures I-KEY . O The O far-field B-KEY diffraction I-KEY formula O modified O for O a O multiaperture O mask O has O been O proposed O in O the O past O , O the O analysis O remains O too O complicated O to O offer O some O practical O guidance O for O mask O design O . O We O study O a O circular B-KEY mask I-KEY with O periodic O rectangular O apertures O and O develop O an O easier O way O to O interpret O it O . O First O , O the O near-field B-KEY diffraction I-KEY intensity O of O a O circular O aperture O is O calculated O by O means O of O Lommel O 's O function O . O Then O the O convolution B-KEY of O the O circular B-KEY mask I-KEY diffraction O with O periodic O rectangular O apertures O is O put O together O , O and O we O can O present O a O simple O mathematical O tool O to O analyze O the O mask O properties O including O the O intensity O distribution O , O blurring O aberration O , O and O the O criterion O of O defining O the O far O - O or O near-field O diffraction O . O This O concept O can O also O be O expanded O to O analyze O different O types O of O masks B-KEY with O the O arbitrarily B-KEY shaped I-KEY apertures I-KEY Integration O is O key O - O an O introduction O to O enterprise B-KEY application I-KEY integration I-KEY -LRB- O EAI O -RRB- O technology O Over O the O past O few O years O , O numerous O organisations O have O invested O in O the O latest O software O applications O to O drive O their O business O forward O . O But O many O are O now O finding O that O these O systems O are O becoming O redundant O on O their O own O . O The O key O to O staying O ahead O of O the O competition O in O today O 's O current O climate O is O now O to O integrate O all O of O these O systems O , O says O Justin O Opie O , O Portfolio O Director O at O Imark B-KEY Communications I-KEY A O digital-to-analog B-KEY converter I-KEY based O on O differential-quad B-KEY switching I-KEY A O high-conversion-rate O high-resolution O oversampling O digital-to-analog B-KEY converter I-KEY -LRB- O DAC O -RRB- O for O direct B-KEY digital I-KEY modulation I-KEY is O addressed O in O this O paper O . O A O new O type O of O switching O scheme O , O called O differential-quad B-KEY switching I-KEY , O is O presented O . O To O verify O the O feasibility O of O this O scheme O , O essential O parts O with O some O auxiliary O circuitry O for O interfacing O were O fabricated O in O a O 0.8 O - O mu O m O CMOS B-KEY technology I-KEY . O Measured O results O show O that O the O switching O scheme O provides O 11-b O resolution O at O 100 O MSamples/s O and O 6-b O at O 1 O GSamples/s O . O The O degradation O in O signal-to-noise B-KEY ratio I-KEY is O not O observed O for O the O variation O of O the O supply O voltage O down O to O 1.5 B-KEY V I-KEY , O which O means O the O proposed O scheme O is O suitable O for O low-voltage O applications O Modeling O daily B-KEY realized I-KEY futures I-KEY volatility I-KEY with O singular B-KEY spectrum I-KEY analysis I-KEY Using O singular B-KEY spectrum I-KEY analysis I-KEY -LRB- O SSA B-KEY -RRB- O , O we O model O the O realized O volatility O and O logarithmic B-KEY standard I-KEY deviations I-KEY of O two O important O futures O return B-KEY series I-KEY . O The O realized O volatility O and O logarithmic B-KEY standard I-KEY deviations I-KEY are O constructed O following O the O methodology O of O Andersen O et O al. O -LSB- O J. O Am O . O Stat O . O Ass O . O 96 O -LRB- O 2001 O -RRB- O 42-55 O -RSB- O using O intra-day O transaction O data O . O We O find O that O SSA B-KEY decomposes O the O volatility O series O quite O well O and O effectively O captures O both O the O market B-KEY trend I-KEY -LRB- O accounting O for O about O 34-38 O % O of O the O total O variance O in O the O series O -RRB- O and O , O more O importantly O , O a O number O of O underlying O market B-KEY periodicities I-KEY . O Reliable O identification O of O any O periodicities O is O extremely O important O for O options B-KEY pricing I-KEY and O risk B-KEY management I-KEY and O we O believe O that O SSA B-KEY can O be O a O useful O addition O to O the O financial B-KEY practitioners I-KEY ' O toolbox O Incremental B-KEY motion I-KEY control I-KEY of O linear B-KEY synchronous I-KEY motor I-KEY In O this O study O a O particular O incremental B-KEY motion I-KEY control I-KEY problem O , O which O is O specified O by O the O trapezoidal B-KEY velocity I-KEY profile I-KEY using O multisegment B-KEY sliding I-KEY mode I-KEY control I-KEY -LRB- O MSSMC O -RRB- O , O is O proposed O to O control O a O permanent O magnet O linear B-KEY synchronous I-KEY motor I-KEY -LRB- O PMLSM O -RRB- O servo B-KEY drive I-KEY system I-KEY . O First O , O the O structure O and O operating O principle O of O the O PMLSM O are O described O in O detail O . O Second O , O a O field-oriented B-KEY control I-KEY PMLSM O servo O drive O is O introduced O . O Then O , O each O segment O of O the O multisegment B-KEY switching I-KEY surfaces I-KEY is O designed O to O match O the O corresponding O part O of O the O trapezoidal B-KEY velocity I-KEY profile I-KEY , O thus O the O motor B-KEY dynamics I-KEY on O the O specified-segment O switching O surface O have O the O desired O velocity O or O acceleration O corresponding O part O of O the O trapezoidal B-KEY velocity I-KEY profile I-KEY . O In O addition O , O the O proposed O control O system O is O implemented O in O a O PC-based O computer O control O system O . O Finally O , O the O effectiveness O of O the O proposed O PMLSM O servo B-KEY drive I-KEY system I-KEY is O demonstrated O by O some O simulated O and O experimental O results O Diagnosis O of O the O technical O state O of O heat O systems O A O step-by-step O approach O to O the O diagnosis O of O the O technical O state O of O heat O systems O is O stated O . O The O class O of O physical O defects O is O supplemented O by O the O behavioral O defects O of O objects O , O which O are O related O to O the O disturbance O of O the O modes O of O their O operation O . O The O implementation O of O the O approach O is O illustrated O by O an O example O of O the O solution O of O a O specific O problem O of O the O diagnosis O of O a O closed O heat O consumption O system O Accurate O modeling O of O lossy B-KEY nonuniform I-KEY transmission I-KEY lines I-KEY by O using O differential B-KEY quadrature I-KEY methods I-KEY This O paper O discusses O an O efficient O numerical B-KEY approximation I-KEY technique I-KEY , O called O the O differential B-KEY quadrature I-KEY method I-KEY -LRB- O DQM O -RRB- O , O which O has O been O adapted O to O model O lossy O uniform O and O nonuniform O transmission O lines O . O The O DQM O can O quickly O compute O the O derivative O of O a O function O at O any O point O within O its O bounded O domain O by O estimating O a O weighted O linear O sum O of O values O of O the O function O at O a O small O set O of O points O belonging O to O the O domain O . O Using O the O DQM O , O the O frequency-domain O Telegrapher O 's O partial B-KEY differential I-KEY equations I-KEY for O transmission O lines O can O be O discretized O into O a O set O of O easily O solvable O algebraic B-KEY equations I-KEY . O DQM O reduces O interconnects B-KEY into O multiport B-KEY models I-KEY whose O port O voltages O and O currents O are O related O by O rational O formulas O in O the O frequency O domain O . O Although O the O rationalization B-KEY process I-KEY in O DQM O is O comparable O with O the O Pade O approximation O of O asymptotic O waveform O evaluation O -LRB- O AWE O -RRB- O applied O to O transmission O lines O , O the O derivation O mechanisms O in O these O two O disparate O methods O are O significantly O different O . O Unlike O AWE O , O which O employs O a O complex O moment-matching O process O to O obtain O rational O approximation O , O the O DQM O requires O no O approximation O of O transcendental O functions O , O thereby O avoiding O the O process O of O moment O generation O and O moment O matching O . O Due O to O global O sampling O of O points O in O the O DQM O approximation O , O it O requires O far O fewer O grid O points O in O order O to O build O accurate O discrete O models O than O other O numerical O methods O do O . O The O DQM-based O time-domain B-KEY model I-KEY can O be O readily O integrated O in O a O circuit O simulator O like O SPICE O Power B-KEY electronics I-KEY spark O new O simulation B-KEY challenges I-KEY This O article O discusses O some O of O the O changes O that O have O taken O place O in O power O systems O and O explores O some O of O the O inherent O requirements O for O simulation B-KEY technologies I-KEY in O order O to O keep O up O with O this O rapidly O changing O environment O . O The O authors O describe O how O energy O utilities O are O realizing O that O , O with O the O appropriate O tools O , O they O can O train O and O sustain O engineers O who O can O maintain O a O great O insight O into O system O dynamics O Putting O pen O to O screen O on O Tablet B-KEY PCs I-KEY With O the O release O of O the O first O Tablet B-KEY PCs I-KEY produced O to O Microsoft B-KEY Corp. O 's O general O specifications O , O handheld O computers B-KEY may I-KEY be O about O to O leap O into O the O ring O with O today O 's O laptops O . O They O will O be O about O the O size O of O the O smaller O laptops O , O will O be O at O least O as O powerful O , O and O maybe O their O biggest O selling O point-will O be O able O to O handle O handwritten B-KEY text I-KEY . O The O Tablet B-KEY PCs I-KEY will O be O amply O configured O , O general-purpose O machines O with O more O than O enough O power O to O run O the O full-blown O Windows B-KEY XP I-KEY operating I-KEY system I-KEY . O In O particular O , O they O will O allow O handwritten B-KEY text I-KEY to O be O entered O onto O a O digitizing B-KEY tablet I-KEY and O recognized O , O a O functionality O that O 's O called O pen-based B-KEY computing I-KEY . O The O Tablet B-KEY PC I-KEY will O far O outpace O the O computing O power O of O existing O small O devices O such O as O PDAs O -LRB- O personal O digital O assistants O -RRB- O , O including O those O variants O based O on O Microsoft B-KEY 's O own O Pocket O PC O operating O system O All-optical B-KEY logic I-KEY NOR I-KEY gate I-KEY using O two-cascaded B-KEY semiconductor I-KEY optical I-KEY amplifiers I-KEY The O authors O present O a O novel O all-optical B-KEY logic I-KEY NOR I-KEY gate I-KEY using O two-cascaded O semiconductor O optical O . O amplifiers O -LRB- O SOAs B-KEY -RRB- O in O a O counterpropagating B-KEY feedback I-KEY configuration I-KEY . O This O configuration O accentuates O the O gain B-KEY nonlinearity I-KEY due O to O the O mutual B-KEY gain I-KEY modulation I-KEY of O the O two O SOAs B-KEY . O The O all-optical O NOR O gate O feasibility O has O been O demonstrated O delivering O an O extinction B-KEY ratio I-KEY higher O than O 12 O dB O over O a O wide O range O of O wavelength O Licensing O experiences O in O the O Netherlands B-KEY The O licensing B-KEY strategy I-KEY of O university B-KEY libraries I-KEY in O the O Netherlands B-KEY is O closely O connected O with O university B-KEY policies I-KEY to O develop O document B-KEY servers I-KEY and O to O make O research B-KEY publications I-KEY available O on O the O Web B-KEY . O National O agreements O have O been O made O with O major O publishers O , O such O as O Elsevier B-KEY Science I-KEY and O Kluwer B-KEY Academic I-KEY , O to O provide O access O to O a O wide O range O of O scientific B-KEY information I-KEY and O to O experiment O with O new O ways O of O providing O information O and O new O business B-KEY models I-KEY Using O NetCloak B-KEY to O develop O server-side B-KEY Web-based I-KEY experiments I-KEY without O writing O CGI B-KEY programs I-KEY Server-side O experiments O use O the O Web B-KEY server I-KEY , O rather O than O the O participant O 's O browser O , O to O handle O tasks O such O as O random B-KEY assignment I-KEY , O eliminating O inconsistencies O with O Java B-KEY and O other O client-side B-KEY applications I-KEY . O Heretofore O , O experimenters O wishing O to O create O server-side O experiments O have O had O to O write O programs O to O create O common O gateway O interface O -LRB- O CGI O -RRB- O scripts O in O programming O languages O such O as O Perl B-KEY and O C++ O . O NetCloak B-KEY uses O simple O , O HTML-like O commands O to O create O CGIs O . O We O used O NetCloak B-KEY to O implement O an O experiment O on O probability B-KEY estimation I-KEY . O Measurements O of O time O on O task O and O participants O ' O IP B-KEY addresses I-KEY assisted O quality B-KEY control I-KEY . O Without O prior O training O , O in O less O than O 1 O month O , O we O were O able O to O use O NetCloak B-KEY to O design O and O create O a O Web-based O experiment O and O to O help O graduate B-KEY students I-KEY create O three O Web-based O experiments O of O their O own O Union O outreach O - O a O pilgrim O 's O progress O As O the O American B-KEY labor I-KEY movement I-KEY continues O on O its O path O toward O reorganization O and O rejuvenation O , O archivists B-KEY are O challenged O to O ensure O that O the O organizational O , O political O , O and O cultural B-KEY changes I-KEY labor B-KEY unions I-KEY are O experiencing O are O fully O documented O . O The O article O examines O the O need O for O labor B-KEY archivists I-KEY to O reach O out O actively O to O unions O and O the O problems O they O face O in O getting O their O message O across O , O not O only O to O union O leadership O but O also O to O union O members O . O Outreach O by O labor B-KEY archivists I-KEY is O vital O on O three O critical O fronts O : O the O need O to O secure O union O funding O in O support O of O labor O archival O programs O ; O obtaining O union O cooperation O in O reviewing O and O amending O obsolete O deposit O agreements O ; O and O coordinating O efforts O with O unions O to O save O the O records O of O closing O district O and O local O union O offices O . O Attempting O to O resolve O these O outstanding O issues O , O labor B-KEY archivists I-KEY are O pulled O between O two O distinct O institutional O cultures O -LRB- O one O academic O in O nature O , O the O other O enmeshed O in O a O union O bureaucracy O -RRB- O and O often O have O their O own O labor O archival O programs O compromised O by O the O internal O dynamics O and O politics O inherent O in O administering O large O academic O libraries O and O unions O . O If O labor B-KEY archivists I-KEY are O to O be O successful O , O they O must O find O their O collective O voice O within O the O labor O movement O and O establish O their O relevancy O to O unions O during O a O period O of O momentous O change O and O restructuring O . O Moreover O , O archivists B-KEY need O to O give O greater O thought O to O designing O and O implementing O outreach O programs O that O bridge O the O fundamental O `` O disconnect O '' O between O union B-KEY bureaucracies I-KEY and O the O rank O and O file O , O and O unions O and O the O public O Centroid B-KEY detection O based O on O optical O correlation O We O propose O three O correlation-based B-KEY methods I-KEY to O simultaneously O detect O the O centroids B-KEY of O multiple B-KEY objects I-KEY in O an O input B-KEY scene I-KEY . O The O first O method O is O based O on O the O modulus O of O the O moment O function O , O the O second O method O is O based O on O squaring O the O moment O function O , O and O the O third O method O works O with O a O single B-KEY intensity I-KEY filter I-KEY . O These O methods O are O invariant O to O changes O in O the O position B-KEY , O orientation B-KEY , O and O scale B-KEY of O the O object O and O result O in O good O noise-smoothing B-KEY performance I-KEY . O We O use O spatial B-KEY light I-KEY modulators I-KEY -LRB- O SLMs O -RRB- O to O directly O implement O the O input O of O the O image O and O filter O information O for O the O purpose O of O these O approaches O . O We O present O results O showing O simulations O from O different O approaches O and O provide O comparisons O between O optical-correlation O - O and O digital-moment-based B-KEY methods I-KEY . O Experimental O results O corresponding O to O an O optical B-KEY correlator I-KEY using O SLMs O for O the O centroid B-KEY detection O are O also O presented O Organization B-KEY design I-KEY : O The O continuing O influence O of O information B-KEY technology I-KEY Drawing O from O an O information B-KEY processing I-KEY perspective I-KEY , O this O paper O examines O how O information B-KEY technology I-KEY -LRB- O IT O -RRB- O has O been O a O catalyst O in O the O development O of O new O forms O of O organizational B-KEY structures I-KEY . O The O article O draws O a O historical O linkage O between O the O relative O stability O of O an O organization O 's O task O environment O starting O after O the O Second O World O War O to O the O present O environmental B-KEY instability I-KEY that O now O characterizes O many O industries O . O Specifically O , O the O authors O suggest O that O advances O in O IT O have O enabled O managers O to O adapt O existing O forms O and O create O new O models O for O organizational O design O that O better O fit O requirements O of O an O unstable O environment O . O Time O has O seemingly O borne O out O this O hypothesis O as O the O bureaucratic O structure O evolved O to O the O matrix O to O the O network O and O now O to O the O emerging O shadow O structure O . O IT O has O gone O from O a O support O mechanism O to O a O substitute O for O organizational B-KEY structures I-KEY in O the O form O of O the O shadow O structure O . O The O article O suggests O that O the O evolving O and O expanding O role O of O IT O will O continue O for O organizations O that O face O unstable O environments O Fitting O mixed-effects O models O for O repeated B-KEY ordinal I-KEY outcomes I-KEY with O the O NLMIXED B-KEY procedure I-KEY This O paper O presents O an O analysis O of O repeated B-KEY ordinal I-KEY outcomes I-KEY arising O from O two O psychological B-KEY studies I-KEY . O The O first O case O is O a O repeated B-KEY measures I-KEY analysis I-KEY of I-KEY variance I-KEY ; O the O second O is O a O mixed-effects B-KEY regression I-KEY . O in O a O longitudinal B-KEY design I-KEY . O In O both O , O the O subject-specific O variation O is O modeled O by O including O random B-KEY effects I-KEY in O the O linear B-KEY predictor I-KEY -LRB- O inside O a O link O function O -RRB- O of O a O generalized B-KEY linear I-KEY model I-KEY . O The O NLMIXED B-KEY procedure I-KEY in O SAS O is O used O to O fit O the O mixed-effects O models O for O the O categorical B-KEY response I-KEY data I-KEY . O The O presentation O emphasizes O the O parallel O between O the O model O . O specifications O and O the O SAS O statements O . O The O purpose O of O this O paper O is O to O facilitate O the O use O of O mixed-effects O models O in O the O analysis O of O repeated B-KEY ordinal I-KEY outcomes I-KEY Defining O electronic B-KEY librarianship I-KEY : O a O content B-KEY analysis I-KEY of O job B-KEY advertisements I-KEY Advances O in O technology O create O dramatic O changes O within O libraries O . O The O complex O issues O surrounding O this O new O electronic O , O end-user O environment O have O major O ramifications O and O require O expert O knowledge O . O Electronic B-KEY services I-KEY librarians I-KEY and O electronic B-KEY resources I-KEY librarians I-KEY are O two O specialized O titles O that O have O recently O emerged O within O the O field O of O librarianship O to O fill O this O niche O . O Job B-KEY advertisements I-KEY listed O in O American B-KEY Libraries I-KEY from O January O 1989 O to O December O 1998 O were O examined O to O identify O responsibilities B-KEY , O qualifications B-KEY , O organizational O and O salary B-KEY information I-KEY relating O to O the O newly O emerging O role O of O electronic O librarian O Data B-KEY management I-KEY in O location-dependent B-KEY information I-KEY services I-KEY Location-dependent B-KEY information I-KEY services I-KEY have O great O promise O for O mobile O and O pervasive B-KEY computing I-KEY environments O . O They O can O provide O local O and O nonlocal O news B-KEY , O weather B-KEY , O and O traffic B-KEY reports I-KEY as O well O as O directory B-KEY services I-KEY . O Before O they O can O be O implemented O on O a O large O scale O , O however O , O several O research O issues O must O be O addressed O Improving O the O predicting O power O of O partial O order O based O QSARs O through O linear B-KEY extensions I-KEY Partial B-KEY order I-KEY theory I-KEY -LRB- O POT O -RRB- O is O an O attractive O and O operationally O simple O method O that O allows O ordering O of O compounds O , O based O on O selected O structural O and/or O electronic B-KEY descriptors I-KEY -LRB- O modeled B-KEY order I-KEY -RRB- O , O or O based O on O their O end B-KEY points I-KEY , O e.g. O , O solubility B-KEY -LRB- O experimental O order O -RRB- O . O If O the O modeled B-KEY order I-KEY resembles O the O experimental O order O , O compounds O that O are O not O experimentally O investigated O can O be O assigned O a O position O in O the O model O that O eventually O might O lead O to O a O prediction O of O an O end-point O value O . O However O , O in O the O application O of O POT O in O quantitative B-KEY structure-activity I-KEY relationship I-KEY modeling O , O only O the O compounds O directly O comparable O to O the O noninvestigated O compounds O are O applied O . O To O explore O the O possibilities O of O improving O the O methodology O , O the O theory O is O extended O by O application O of O the O so-called O linear B-KEY extensions I-KEY of O the O model B-KEY order I-KEY . O The O study O show O that O partial O ordering O combined O with O linear B-KEY extensions I-KEY appears O as O a O promising O tool O providing O probability O distribution O curves O in O the O range O of O possible O end-point O values O for O compounds O not O being O experimentally O investigated O A O comparison O of O computational B-KEY color I-KEY constancy I-KEY algorithms I-KEY . O I O : O Methodology O and O experiments O with O synthesized B-KEY data I-KEY We O introduce O a O context O for O testing O computational O color O constancy O , O specify O our O approach O to O the O implementation O of O a O number O of O the O leading O algorithms O , O and O report O the O results O of O three O experiments O using O synthesized B-KEY data I-KEY . O Experiments O using O synthesized B-KEY data I-KEY are O important O because O the O ground O truth O is O known O , O possible O confounds O due O to O camera O characterization O and O pre-processing O are O absent O , O and O various O factors O affecting O color O constancy O can O be O efficiently O investigated O because O they O can O be O manipulated O individually O and O precisely O . O The O algorithms O chosen O for O close O study O include O two O gray B-KEY world I-KEY methods I-KEY , O a O limiting O case O of O a O version O of O the O Retinex B-KEY method I-KEY , O a O number O of O variants O of O Forsyth O 's O -LRB- O 1990 O -RRB- O gamut-mapping B-KEY method I-KEY , O Cardei O et O al. O 's O -LRB- O 2000 O -RRB- O neural B-KEY net I-KEY method I-KEY , O and O Finlayson O et O al. O 's O color B-KEY by I-KEY correlation I-KEY method I-KEY -LRB- O Finlayson O et O al. O 1997 O , O 2001 O ; O Hubel O and O Finlayson O 2000 O -RRB- O . O We O investigate O the O ability O of O these O algorithms O to O make O estimates O of O three O different O color O constancy O quantities O : O the O chromaticity B-KEY of O the O scene B-KEY illuminant I-KEY , O the O overall O magnitude O of O that O illuminant O , O and O a O corrected O , O illumination O invariant O , O image O . O We O consider O algorithm B-KEY performance I-KEY as O a O function O of O the O number O of O surfaces O in O scenes O generated O from O reflectance B-KEY spectra I-KEY , O the O relative O effect O on O the O algorithms O of O added O specularities B-KEY , O and O the O effect O of O subsequent O clipping B-KEY of O the O data O . O All O data O is O available O on-line O at O http://www.cs.sfu.ca/~color/data O , O and O implementations O for O most O of O the O algorithms O are O also O available O -LRB- O http://www.cs.sfu.ca/~color/code O -RRB- O A O design B-KEY to I-KEY cost I-KEY system I-KEY for O innovative B-KEY product I-KEY development I-KEY Presents O a O prototype O object-oriented O and O rule-based O system O for O product B-KEY cost I-KEY modelling I-KEY and O design B-KEY for I-KEY automation I-KEY at O an O early O design O stage O . O The O developed O system O comprises O a O computer O aided O design O -LRB- O CAD O -RRB- O solid O modelling O system O , O a O material B-KEY selection I-KEY module I-KEY , O a O knowledge-based B-KEY system I-KEY -LRB- O KBS O -RRB- O , O a O process B-KEY optimization I-KEY module I-KEY , O a O design B-KEY for I-KEY assembly I-KEY module I-KEY , O a O cost B-KEY estimation I-KEY module I-KEY and O a O user B-KEY interface I-KEY . O Two O manufacturing O processes O , O namely O machining B-KEY and O injection B-KEY moulding I-KEY processes O , O were O considered O in O the O developed O system O . O The O main O function O of O the O system O , O besides O estimating O the O product O cost O , O is O to O generate O initial O process B-KEY planning I-KEY , O including O the O generation O and O selection O of O machining B-KEY processes O , O their O sequence O and O their O machining B-KEY parameters O , O and O to O recommend O the O most O economical O assembly O technique O for O a O product O and O provide O design O improvement O suggestions O based O on O a O design O feasibility O technique O . O In O addition O , O a O feature-by-feature B-KEY cost I-KEY estimation I-KEY report I-KEY is O generated O using O the O proposed O system O to O highlight O the O features O of O high O manufacturing O cost O . O Two O case O studies O were O used O to O validate O the O developed O system O Self-organizing B-KEY feature I-KEY maps I-KEY predicting O sea O levels O In O this O paper O , O a O new O method O for O predicting O sea O levels O employing O self-organizing B-KEY feature I-KEY maps I-KEY is O introduced O . O For O that O purpose O the O maps O are O transformed O from O an O unsupervised O learning O procedure O to O a O supervised O one O . O Two O concepts O , O originally O developed O to O solve O the O problems O of O convergence O of O other O network O types O , O are O proposed O to O be O applied O to O Kohonen B-KEY networks I-KEY : O a O functional O relationship O between O the O number O of O neurons B-KEY and O the O number O of O learning O examples O and O a O criterion O to O break O off O learning O . O The O latter O one O can O be O shown O to O be O conform O with O the O process O of O self-organization O by O using O U-matrices B-KEY for O visualization B-KEY of O the O learning O procedure O . O The O predictions O made O using O these O neural O models O are O compared O for O accuracy O with O observations O and O with O the O prognoses O prepared O using O six O models O : O two O hydrodynamic B-KEY models I-KEY , O a O statistical B-KEY model I-KEY , O a O nearest B-KEY neighbor I-KEY model I-KEY , O the O persistence B-KEY model I-KEY , O and O the O verbal B-KEY forecasts I-KEY that O are O broadcast O and O kept O on O record O by O the O Sea B-KEY Level I-KEY Forecast I-KEY Service I-KEY of O the O Federal B-KEY Maritime I-KEY and I-KEY Hydrography I-KEY Agency I-KEY -LRB- O BSH O -RRB- O in O Hamburg O . O Before O training O the O maps O , O the O meteorological O and O oceanographic B-KEY situation I-KEY has O to O be O condensed O as O well O as O possible O , O and O the O weight O and O learning B-KEY vectors I-KEY have O to O be O made O as O small O as O possible O . O The O self-organizing B-KEY feature I-KEY maps I-KEY predict O sea O levels O better O than O all O six O models O of O comparison O How O to O avoid O merger B-KEY pitfalls O Paul O Diamond O of O consultancy B-KEY KPMG B-KEY explains O why O careful O IT B-KEY asset I-KEY management I-KEY is O crucial O to O the O success O of O mergers B-KEY The O ultimate B-KEY control I-KEY group I-KEY Empirical O research O on O the O organization O of O firms O requires O that O firms O be O classified O on O the O basis O of O their O control O structures O . O This O should O be O done O in O a O way O that O can O potentially O be O made O operational O . O It O is O easy O to O identify O the O ultimate O controller O of O a O hierarchical B-KEY organization I-KEY , O and O the O literature O has O largely O focused O on O this O case O . O However O , O many O organizational B-KEY structures I-KEY mix O hierarchy O with O collective O choice O procedures O such O as O voting O , O or O use O circular O structures O under O which O superiors O are O accountable O to O their O subordinates O . O The O author O develops O some O analytic O machinery O that O can O be O used O to O map O the O authority B-KEY structures I-KEY of O such O organizations O , O and O show O that O under O mild O restrictions O there O is O a O well-defined O ultimate B-KEY control I-KEY group I-KEY . O The O results O are O consistent O with O intuitions O about O the O nature O of O control O in O familiar O economic O settings O Strain B-KEY contouring I-KEY using O Gabor B-KEY filters I-KEY : O principle O and O algorithm B-KEY Moire B-KEY interferometry I-KEY is O a O powerful O technique O for O high B-KEY sensitivity I-KEY in-plane I-KEY deformation I-KEY contouring I-KEY . O However O , O from O an O engineering O viewpoint O , O the O derivatives O of O displacement B-KEY , O i.e. O , O strain O , O are O the O desired O parameter O . O Thus O there O is O a O need O to O differentiate B-KEY the O displacement B-KEY field O . O Optical O and O digital B-KEY methods I-KEY have O been O proposed O for O this O differentiation B-KEY . O Optical B-KEY methods I-KEY provide O contours O that O still O need O to O be O quantified O , O while O digital B-KEY methods I-KEY suffer O from O drawbacks O inherent O in O the O digital O differentiation B-KEY process O . O We O describe O a O novel O approach O of O strain B-KEY segmentation I-KEY for O the O moire O pattern O using O a O multichannel B-KEY Gabor I-KEY filter I-KEY . O Appropriate O filter B-KEY design I-KEY allows O for O user-specific B-KEY segmentation I-KEY , O which O is O essentially O in O engineering B-KEY design I-KEY and O analysis O Shaping O the O future O . O BendWizard O : O a O tool O for O off-line O programming O of O robotic B-KEY tending I-KEY systems I-KEY Setting O up O a O robot O to O make O metal B-KEY cabinets I-KEY or O cases O for O desktop O computers O can O be O a O complex O operation O . O For O instance O , O one O expert O might O be O required O to O carry O out O a O feasibility B-KEY study I-KEY , O and O then O another O to O actually O program O the O robot O . O Understandably O , O the O need O for O so O much O expertise O , O and O the O time O that O 's O required O , O generally O limits O the O usefulness O of O automation O to O high-volume B-KEY production I-KEY . O Workshops B-KEY producing O parts O in O batches O smaller O than O 50 O or O so O , O or O which O rely O heavily O on O semiskilled O operators O , O are O therefore O often O discouraged O from O investing O in O automation O , O and O so O miss O out O on O its O many O advantages O . O What O is O needed O is O a O software O tool O that O operators O without O special O knowledge O of O robotics O , O or O with O no O more O than O rudimentary O CAD B-KEY skills I-KEY , O can O use O . O One O which O allows O easy O offline O programming O and O simulation O of O the O work O cell O on O a O PC O Dynamical B-KEY transition I-KEY to O periodic B-KEY motions I-KEY of O a O recurrent B-KEY bus I-KEY induced O by O nonstops B-KEY We O study O the O dynamical O behavior O of O a O recurrent B-KEY bus I-KEY on O a O circular B-KEY route I-KEY with O many O bus O stops O when O the O recurrent B-KEY bus I-KEY passes O some O bus O stops O without O stopping O . O The O recurrent B-KEY time I-KEY -LRB- O one O period O -RRB- O is O described O in O terms O of O a O nonlinear B-KEY map I-KEY . O It O is O shown O that O the O recurrent B-KEY bus I-KEY exhibits O the O complex B-KEY periodic I-KEY behaviors I-KEY . O The O dynamical B-KEY transitions I-KEY to O periodic B-KEY motions I-KEY occur O by O increasing O nonstops B-KEY . O The O periodic B-KEY motions I-KEY depend O on O the O property O of O an O attractor B-KEY of O the O nonlinear B-KEY map I-KEY . O The O period O n O of O the O attractor B-KEY varies O sensitively O with O the O number O of O nonstops B-KEY Building O a O better O game O through O dynamic B-KEY programming I-KEY : O a O Flip B-KEY analysis I-KEY Flip O is O a O solitaire B-KEY board I-KEY game I-KEY produced O by O craft B-KEY woodworkers I-KEY . O We O analyze O Flip O and O suggest O modifications O to O the O rules O to O make O the O game O more O marketable O . O In O addition O to O being O an O interesting O application O of O dynamic B-KEY programming I-KEY , O this O case O shows O the O use O of O operations B-KEY research I-KEY in O managerial B-KEY decision I-KEY making I-KEY A O self-adjusting B-KEY quality I-KEY of I-KEY service I-KEY control I-KEY scheme I-KEY We O propose O and O analyze O a O self-adjusting O Quality O of O Service O -LRB- O QoS O -RRB- O control O scheme O with O the O goal O of O optimizing O the O system O reward O as O a O result O of O servicing O different O priority B-KEY clients I-KEY with O varying O workload O , O QoS O and O reward/penalty O requirements O . O Our O scheme O is O based O on O resource B-KEY partitioning I-KEY and O designated O `` O degrade O QoS O areas O '' O such O that O system O resources O are O partitioned O into O priority O areas O each O of O which O is O reserved O specifically O to O serve O only O clients O in O a O corresponding O class O with O no O QoS O degradation O , O plus O one O `` O degraded O QoS O area O '' O into O which O all O clients O can O be O admitted O with O QoS O adjustment O being O applied O only O to O the O lowest O priority B-KEY clients I-KEY . O We O show O that O the O best O partition O is O dictated O by O the O workload O and O the O reward/penalty O characteristics O of O clients O in O difference O priority O classes O . O The O analysis O results O can O be O used O by O a O QoS O manager O to O optimize O the O system O total O reward O dynamically O in O response O to O changing O workloads O at O run O time O . O We O demonstrate O the O validity O of O our O scheme O by O means O of O simulation B-KEY and O comparing O the O proposed O QoS O self-adjusting O scheme O with O those O that O do O not O use O resource B-KEY partitioning I-KEY or O designated O degraded O QoS O areas O Optimization B-KEY of O planning O an O advertising O campaign O of O goods O and O services O A O generalization O of O the O mathematical O model O and O operations B-KEY research I-KEY problems O formulated O on O its O basis O , O which O were O presented O by O Belenky O -LRB- O 2001 O -RRB- O in O the O framework O of O an O approach O to O planning O an O advertising O campaign O of O goods O and O services O , O is O considered O , O and O corresponding O nonlinear B-KEY programming I-KEY problems O with O linear O constraints O are O formulated O New O lower B-KEY bounds I-KEY of O the O size O of O error-correcting B-KEY codes I-KEY for O the O Z-channel B-KEY Optimization B-KEY problems I-KEY on O graphs B-KEY are O formulated O to O obtain O new O lower B-KEY bounds I-KEY of O the O size O of O error-correcting B-KEY codes I-KEY for O the O Z-channel B-KEY Teaching O management B-KEY science I-KEY with O spreadsheets B-KEY : O From O decision O models O to O decision O support O The O 1990s O were O a O decade O of O enormous O change O for O management B-KEY science I-KEY -LRB- O MS O -RRB- O educators O . O While O the O outlook O at O the O beginning O of O the O decade O was O somewhat O bleak O , O the O renaissance O in O MS B-KEY education I-KEY brought O about O by O the O use O of O spreadsheets B-KEY as O the O primary O delivery O vehicle O for O quantitative B-KEY modeling I-KEY techniques O has O resulted O in O a O much O brighter O future O . O This O paper O takes O inventory O of O the O current O state O of O MS B-KEY education I-KEY and O suggests O some O promising O new O directions O in O the O area O of O decision B-KEY support I-KEY systems I-KEY for O MS B-KEY educators I-KEY to O consider O for O the O future O Optimization O of O the O characteristics O of O computational B-KEY processes I-KEY in O scalable B-KEY resources I-KEY The O scalableness O of O resources O is O taken O to O mean O the O possibility O of O the O prior O change O in O the O obtained O dynamic B-KEY characteristics I-KEY of O computational B-KEY processes I-KEY for O a O certain O basic O set O of O processors O and O the O communication B-KEY medium I-KEY in O an O effort O to O optimize O the O dynamics O of O software B-KEY applications I-KEY . O A O method O is O put O forward O for O the O generation O of O optimal O strategies-a O set O of O the O versions O of O the O fulfillment O of O programs O on O the O basis O of O a O vector B-KEY criterion I-KEY . O The O method O is O urgent O for O the O effective O use O of O resources O of O computational B-KEY clusters I-KEY and O metacomputational B-KEY media I-KEY and O also O for O dynamic B-KEY control I-KEY of O processes O in O real O time O on O the O basis O of O the O static B-KEY scaling I-KEY New O paradigms O for O interactive B-KEY 3D I-KEY volume I-KEY segmentation I-KEY We O present O a O new O virtual O reality-based O interaction B-KEY metaphor I-KEY for O semi-automatic O segmentation O of O medical O 3D O volume O data O . O The O mouse-based O , O manual O initialization O of O deformable B-KEY surfaces I-KEY in O 3D O represents O a O major O bottleneck O in O interactive B-KEY segmentation I-KEY . O In O our O multi-modal B-KEY system I-KEY we O enhance O this O process O with O additional O sensory B-KEY feedback I-KEY . O A O 3D B-KEY haptic I-KEY device I-KEY is O used O to O extract O the O centreline O of O a O tubular B-KEY structure I-KEY . O Based O on O the O obtained O path O a O cylinder O with O varying O diameter O is O generated O , O which O in O turn O is O used O as O the O initial O guess O for O a O deformable B-KEY surface I-KEY On-line O Homework/Quiz/Exam O applet O : O freely B-KEY available I-KEY Java I-KEY software I-KEY for O evaluating O performance O on O line O The O Homework/Quiz/Exam O applet O is O a O freely O available O Java O program O that O can O be O used O to O evaluate O student O performance O on O line O for O any O content O authored O by O a O teacher O . O It O has O database B-KEY connectivity I-KEY so O that O student O scores O are O automatically O recorded O . O It O allows O several O different O types O of O questions O . O Each O question O can O be O linked O to O images B-KEY and O detailed B-KEY story I-KEY problems I-KEY . O Three O levels O of O feedback B-KEY are O provided O to O student O responses O . O It O allows O teachers O to O randomize O the O sequence O of O questions O and O to O randomize O which O of O several O options O is O the O correct O answer O in O multiple-choice B-KEY questions I-KEY . O The O creation O and O editing O of O questions O involves O menu B-KEY selections I-KEY , O button B-KEY presses I-KEY , O and O the O typing O of O content O ; O no O programming O knowledge O is O required O . O The O code O is O open O source O in O order O to O encourage O modifications O that O will O meet O individual B-KEY pedagogical I-KEY needs I-KEY System B-KEY embedding I-KEY . O Control O with O reduced O observer O Two O interrelated O problems-design O of O the O reduced O observer O of O plant O state O separately O and O together O with O its O control O system-were O considered O from O the O standpoint O of O designing O the O multivariable B-KEY linear I-KEY systems I-KEY from O the O desired O matrix B-KEY transfer I-KEY functions I-KEY . O The O matrix O equations O defining O the O entire O constructive O class O of O solutions O of O the O posed O problems O were O obtained O using O the O system B-KEY embedding I-KEY technology O . O As O was O demonstrated O , O control O based O on O the O reduced O observer O is O capable O to O provide O the O desired O response O to O the O control O input O , O as O well O as O the O response O to O the O nonzero O initial O conditions O , O only O for O the O directly O measurable O part O of O the O components O of O the O state B-KEY vector I-KEY . O An O illustrative O example O was O presented O A O method O of O determining O a O sequence O of O the O best B-KEY solutions I-KEY to O the O problems O of O optimization B-KEY on O finite B-KEY sets I-KEY and O the O problem O of O network B-KEY reconstruction I-KEY A O method O of O determining O a O sequence O of O the O best B-KEY solutions I-KEY to O the O problems O of O optimization B-KEY on O finite B-KEY sets I-KEY was O proposed O . O Its O complexity B-KEY was O estimated O by O a O polynomial O of O the O dimension O of O problem O input O , O given O number O of O sequence O terms O , O and O complexity B-KEY of O completing O the O design O of O the O original O extremal O problem O . O The O technique O developed O was O applied O to O the O typical O problem O of O network B-KEY reconstruction I-KEY with O the O aim O of O increasing O its O throughput O under O restricted O reconstruction O costs O Automated B-KEY breath I-KEY detection I-KEY on O long-duration B-KEY signals I-KEY using O feedforward B-KEY backpropagation I-KEY artificial I-KEY neural I-KEY networks I-KEY A O new O breath-detection O algorithm O is O presented O , O intended O to O automate O the O analysis O of O respiratory O data O acquired O during O sleep O . O The O algorithm O is O based O on O two O independent O artificial O neural O networks O -LRB- O ANN/sub O insp O / O and O ANN/sub O expi O / O -RRB- O that O recognize O , O in O the O original O signal O , O windows O of O interest O where O the O onset O of O inspiration B-KEY and O expiration B-KEY occurs O . O Postprocessing B-KEY consists O in O finding O inside O each O of O these O windows O of O interest O minimum O and O maximum O corresponding O to O each O inspiration B-KEY and O expiration B-KEY . O The O ANN/sub O insp O / O and O ANN/sub O expi O / O correctly O determine O respectively O 98.0 O % O and O 98.7 O % O of O the O desired O windows O , O when O compared O with O 29 O 820 O inspirations B-KEY and O 29 O 819 O expirations B-KEY detected O by O a O human B-KEY expert I-KEY , O obtained O from O three O entire-night B-KEY recordings I-KEY . O Postprocessing B-KEY allowed O determination O of O inspiration B-KEY and O expiration B-KEY onsets O with O a O mean O difference O with O respect O to O the O same O human B-KEY expert I-KEY of O -LRB- O mean O + O or O - O SD O -RRB- O 34 O + O or O - O 71 O ms O for O inspiration B-KEY and O 5 O + O or O - O 46 O ms O for O expiration B-KEY . O The O method O proved O to O be O effective O in O detecting O the O onset O of O inspiration B-KEY and O expiration B-KEY in O full O night O continuous O recordings O . O A O comparison O of O five O human B-KEY experts I-KEY performing O the O same O classification O task O yielded O that O the O automated B-KEY algorithm I-KEY was O undifferentiable O from O these O human B-KEY experts I-KEY , O failing O within O the O distribution O of O human B-KEY expert I-KEY results O . O Besides O being O applicable O to O adult B-KEY respiratory I-KEY volume I-KEY data I-KEY , O the O presented O algorithm O was O also O successfully O applied O to O infant B-KEY sleep I-KEY data I-KEY , O consisting O of O uncalibrated B-KEY rib I-KEY cage I-KEY and O abdominal B-KEY movement I-KEY recordings I-KEY . O A O comparison O with O two O previously O published O algorithms O for O breath O detection O in O respiratory O volume O signal O shows O that O the O presented O algorithm O has O a O higher O specificity O , O while O presenting O similar O or O higher O positive O predictive O values O Streaming B-KEY , O disruptive B-KEY interference I-KEY and O power-law B-KEY behavior I-KEY in O the O exit B-KEY dynamics I-KEY of O confined B-KEY pedestrians I-KEY We O analyze O the O exit B-KEY dynamics I-KEY of O pedestrians O who O are O initially O confined O in O a O room O . O Pedestrians O are O modeled O as O cellular B-KEY automata I-KEY and O compete O to O escape O via O a O known O exit O at O the O soonest O possible O time O . O A O pedestrian O could O move O forward O , O backward O , O left O or O right O within O each O iteration B-KEY time I-KEY depending O on O adjacent B-KEY cell I-KEY vacancy I-KEY and O in O accordance O with O simple O rules O that O determine O the O compulsion O to O move O and O physical O capability O relative O to O his O neighbors O . O The O arching B-KEY signatures I-KEY of O jamming B-KEY were O observed O and O the O pedestrians O exited O in O bursts O of O various O sizes O . O Power-law B-KEY behavior I-KEY is O found O in O the O burst-size B-KEY frequency I-KEY distribution I-KEY for O exit O widths O w O greater O than O one O cell O dimension O -LRB- O w O > O 1 O -RRB- O . O The O slope O of O the O power-law O curve O varies O with O w O from O -1.3092 O -LRB- O w O = O 2 O -RRB- O to O -1.0720 O -LRB- O w O = O 20 O -RRB- O . O Streaming B-KEY which O is O a O diffusive O behavior O , O arises O in O large O burst O sizes O and O is O more O likely O in O a O single-exit O room O with O w O = O 1 O and O leads O to O a O counterintuitive O result O wherein O an O average O exit O throughput O Q O is O obtained O that O is O higher O than O with O w O = O 2 O , O 3 O , O or O 4 O . O For O a O two-exit O room O -LRB- O w O = O 1 O -RRB- O , O Q O is O not O greater O than O twice O the O yield O of O a O single-exit O room O . O If O the O doors O are O not O separated O far O enough O -LRB- O < O 4w O -RRB- O , O Q O becomes O even O significantly O less O due O to O a O collective B-KEY slow-down I-KEY that O emerges O among O pedestrians O crossing O in O each O other O 's O path O -LRB- O disruptive B-KEY interference I-KEY effect O -RRB- O . O For O the O same O w O and O door O number O , O Q O is O also O higher O with O relaxed O pedestrians O than O with O anxious O ones O Windows B-KEY XP I-KEY fast I-KEY user I-KEY switching I-KEY The O Windows O NT O family O of O operating B-KEY systems I-KEY has O always O supported O the O concept O of O multiple B-KEY user I-KEY accounts I-KEY , O but O they O 've O taken O the O concept O a O step O further O with O Windows O XP O 's O Fast O User O Switching O feature O . O Fast O User O Switching O is O a O new O feature O of O Windows O XP O that O allows O multiple O users O to O log O on O to O the O same O machine O and O quickly O switch O between O the O logged O on O accounts O . O Fast O User O Switching O is O implemented O using O some O of O the O built-in O capabilities O of O Terminal B-KEY Services I-KEY . O Terminal B-KEY Server I-KEY has O been O around O for O a O while O but O is O much O more O feature O rich O and O integrated O in O Windows O XP O . O A O machine O with O the O terminal B-KEY services I-KEY -LRB- O Remote B-KEY Desktop I-KEY -RRB- O client O can O log O on O to O and O run O applications O on O a O remote O machine O running O the O terminal B-KEY server I-KEY Personality B-KEY research I-KEY on O the O Internet B-KEY : O a O comparison O of O Web-based O and O traditional O instruments O in O take-home O and O in-class O settings O Students O , O faculty O , O and O researchers O have O become O increasingly O comfortable O with O the O Internet B-KEY , O and O many O of O them O are O interested O in O using O the O Web O to O collect O data O . O Few O published O studies O have O investigated O the O differences O between O Web-based O data O and O data B-KEY collected I-KEY with O more O traditional O methods O . O In O order O to O investigate O these O potential O differences O , O two O important O factors O were O crossed O in O this O study O : O whether O the O data O were O collected O on O line O or O not O and O whether O the O data O were O collected O in O a O group O setting O at O a O fixed O time O or O individually O at O a O time O of O the O respondent O 's O choosing O . O The O Visions B-KEY of I-KEY Morality I-KEY scale I-KEY -LRB- O Shelton O and O McAdams O , O 1990 O -RRB- O was O used O , O and O the O participants O were O assigned O to O one O of O four O conditions O : O in-class B-KEY Web I-KEY survey I-KEY , O in-class B-KEY paper-and-pencil I-KEY survey I-KEY ; O take-home B-KEY Web I-KEY survey I-KEY , O and O take-home B-KEY paper-and-pencil I-KEY survey I-KEY . O No O significant O differences O in O scores O were O found O for O any O condition O ; O however O , O response B-KEY rates I-KEY were O affected O by O the O type O of O survey O administered O , O with O the O take-home O Web-based B-KEY instrument I-KEY having O the O lowest O response B-KEY rate I-KEY . O Therefore O , O researchers O need O to O be O aware O that O different O modes O of O administration B-KEY may O affect O subject B-KEY attrition I-KEY and O may O , O therefore O , O confound O investigations O of O other O independent O variables O Recommendations O for O implementing O Internet B-KEY inquiry I-KEY projects I-KEY The O purpose O of O the O study O presented O was O to O provide O recommendations O to O teachers B-KEY who O are O interested O in O implementing O Internet B-KEY inquiry I-KEY projects I-KEY . O Four O classes O of O ninth O - O and O tenth-grade O honors B-KEY students I-KEY -LRB- O N O = O 100 O -RRB- O participated O in O an O Internet B-KEY inquiry I-KEY project I-KEY in O which O they O were O presented O with O an O ecology B-KEY question I-KEY that O required O them O to O make O a O decision O based O on O information O that O they O gathered O , O analyzed O , O and O synthesized O from O the O Internet O and O their O textbook O . O Students O then O composed O papers O with O a O rationale O for O their O decision O . O Students O in O one O group O had O access O to O pre-selected B-KEY relevant I-KEY Web I-KEY sites I-KEY , O access O to O the O entire O Internet O , O and O were O provided O with O less O online B-KEY support I-KEY . O Students O in O the O other O group O had O access O to O only O pre-selected B-KEY relevant I-KEY Web I-KEY sites I-KEY , O but O were O provided O with O more O online B-KEY support I-KEY . O Two O of O the O most O important O recommendations O were O : O 1 O -RRB- O to O provide O students O with O more O online B-KEY support I-KEY ; O and O 2 O -RRB- O to O provide O students O with O pre-selected B-KEY relevant I-KEY Web I-KEY sites I-KEY and O allow O them O to O search O the O Internet O for O information O On O the O Beth B-KEY properties I-KEY of O some O intuitionistic B-KEY modal I-KEY logics I-KEY Let O L O be O one O of O the O intuitionistic B-KEY modal I-KEY logics I-KEY . O As O in O the O classical O modal O case O , O we O define O two O different O forms O of O the O Beth B-KEY property I-KEY for O L O , O which O are O denoted O by O B1 O and O B2 O ; O in O this O paper O we O study O the O relation O among O B1 O , O B2 O and O the O interpolation B-KEY properties I-KEY C1 O and O C2 O . O It O turns O out O that O C1 O implies O B1 O , O but O contrary O to O the O boolean O case O , O is O not O equivalent O to O B1 O . O It O is O shown O that O B2 O and O C2 O are O independent O , O and O moreover O it O comes O out O that O , O in O contrast O to O classical O case O , O there O exists O an O extension O of O the O intuitionistic B-KEY modal I-KEY logic I-KEY of O S/sub O 4 O / O - O type O , O that O has O not O the O property O B2 O . O Finally O we O give O two O algebraic O properties O , O that O characterize O respectively O B1 O and O B2 O Binocular B-KEY model I-KEY for O figure-ground B-KEY segmentation I-KEY in O translucent O and O occluding B-KEY images I-KEY A O Fourier-based B-KEY solution I-KEY to O the O problem O of O figure-ground B-KEY segmentation I-KEY in O short O baseline O binocular O image B-KEY pairs O is O presented O . O Each O image B-KEY is O modeled O as O an O additive O composite O of O two O component B-KEY images I-KEY that O exhibit O a O spatial O shift O due O to O the O binocular O parallax O . O The O segmentation O is O accomplished O by O decoupling O each O Fourier O component O in O one O of O the O resultant O additive O images B-KEY into O its O two O constituent O phasors B-KEY , O allocating O each O to O its O appropriate O object-specific B-KEY spectrum I-KEY , O and O then O reconstructing O the O foreground B-KEY and O background B-KEY using O the O inverse B-KEY Fourier I-KEY transform I-KEY . O It O is O shown O that O the O foreground B-KEY and O background B-KEY shifts O can O be O computed O from O the O differences O of O the O magnitudes O and O phases O of O the O Fourier O transform O of O the O binocular O image B-KEY pair O . O While O the O model O is O based O on O translucent B-KEY objects I-KEY , O it O also O works O with O occluding B-KEY objects I-KEY Nonlinear B-KEY extrapolation I-KEY algorithm I-KEY for O realization O of O a O scalar B-KEY random I-KEY process I-KEY A O method O of O construction O of O a O nonlinear B-KEY extrapolation I-KEY algorithm I-KEY is O proposed O . O This O method O makes O it O possible O to O take O into O account O any O nonlinear B-KEY random I-KEY dependences I-KEY that O exist O in O an O investigated O process O and O are O described O by O mixed B-KEY central I-KEY moment I-KEY functions I-KEY . O The O method O is O based O on O the O V. O S. O Pugachev O canonical B-KEY decomposition I-KEY apparatus I-KEY . O As O an O example O , O the O problem O of O nonlinear O extrapolation O is O solved O for O a O moment B-KEY function I-KEY of O third O order O A O humanist O 's O legacy O in O medical B-KEY informatics I-KEY : O visions O and O accomplishments O of O Professor B-KEY Jean-Raoul I-KEY Scherrer I-KEY The O objective O is O to O report O on O the O work O of O Prof. O Jean-Raoul O Scherrer O , O and O show O how O his O humanist O vision O , O medical O skills O and O scientific O background O have O enabled O and O shaped O the O development O of O medical B-KEY informatics I-KEY over O the O last O 30 O years O . O Starting O with O the O mainframe-based O patient-centred O hospital O information O system O DIOGENE O in O the O 70s O , O Prof. O Scherrer O developed O , O implemented O and O evolved O innovative O concepts O of O man-machine B-KEY interfaces I-KEY , O distributed O and O federated O environments O , O leading O the O way O with O information O systems O that O obstinately O focused O on O the O support O of O care O providers O and O patients O . O Through O a O rigorous O design O of O terminologies O and O ontologies O , O the O DIOGENE O data O would O then O serve O as O a O basis O for O the O development O of O clinical O research O , O data B-KEY mining I-KEY , O and O lead O to O innovative O natural B-KEY language I-KEY processing I-KEY techniques O . O In O parallel O , O Prof. O Scherrer O supported O the O development O of O medical B-KEY image I-KEY management I-KEY , O ranging O from O a O distributed O picture O archiving O and O communication O systems O -LRB- O PACS B-KEY -RRB- O to O molecular O imaging O of O protein O electrophoreses O . O Recognizing O the O need O for O improving O the O quality O and O trustworthiness O of O medical O information O of O the O Web O , O Prof. O Scherrer O created O the O Health-On-the O Net O -LRB- O HON O -RRB- O foundation O . O These O achievements O , O made O possible O thanks O to O his O visionary O mind O , O deep O humanism O , O creativity O , O generosity O and O determination O , O have O made O of O Prof. O Scherrer O a O true O pioneer O and O leader O of O the O human-centered O , O patient-oriented O application O of O information O technology O for O improving O healthcare O High-density B-KEY remote I-KEY storage I-KEY : O the O Ohio B-KEY State I-KEY University I-KEY Libraries I-KEY depository O The O article O describes O a O high-density B-KEY off-site I-KEY book I-KEY storage I-KEY facility I-KEY operated O by O the O Ohio B-KEY State I-KEY University I-KEY Libraries I-KEY . O Opened O in O 1995 O , O it O has O the O capacity O to O house O nearly O 1.5 O million O items O in O only O 9000 O square O feet O by O shelving B-KEY books O by O size O on O 30-foot O tall O shelving B-KEY . O A O sophisticated O climate B-KEY control I-KEY system I-KEY extends O the O life O of O stored B-KEY materials I-KEY up O to O 12 O times O . O An O online B-KEY catalog I-KEY record I-KEY for O each O item O informs O patrons B-KEY that O the O item O is O located O in O a O remote B-KEY location I-KEY . O Regular O courier B-KEY deliveries I-KEY from O the O storage O facility O bring O requested O materials O to O patrons B-KEY with O minimal O delay O Adaptive B-KEY digital I-KEY watermarking I-KEY using O fuzzy B-KEY logic I-KEY techniques I-KEY Digital O watermarking O has O been O proposed O for O copyright B-KEY protection I-KEY in O our O digital B-KEY society I-KEY . O We O propose O an O adaptive B-KEY digital I-KEY watermarking I-KEY scheme O based O on O the O human B-KEY visual I-KEY system I-KEY model I-KEY and O a O fuzzy B-KEY logic I-KEY technique I-KEY . O The O fuzzy O logic O approach O is O employed O to O obtain O the O different O strengths O and O lengths O of O a O watermark O by O the O local B-KEY characteristics I-KEY of O the O image O in O our O proposed O scheme O . O In O our O experiments O , O this O scheme O provides O a O more O robust O and O imperceptible B-KEY watermark I-KEY Reconfigurable B-KEY context-sensitive I-KEY middleware I-KEY for O pervasive O computing O Context-sensitive B-KEY applications I-KEY need O data O from O sensors O , O devices O , O and O user O actions O , O and O might O need O ad O hoc O communication O support O to O dynamically O discover O new O devices O and O engage O in O spontaneous O information O exchange O . O Reconfigurable B-KEY Context-Sensitive I-KEY Middleware I-KEY facilitates O the O development O and O runtime O operations O of O context-sensitive O pervasive O computing O software O Nissan O v. O Nissan O -LSB- O trademark B-KEY dispute I-KEY -RSB- O Is O a O trademark B-KEY dispute I-KEY a O case O of O David O v. O Goliath O or O a O corporation O fending O off O a O greedy O opportunist O ? O This O paper O discusses O the O case O of O Uzi B-KEY Nissan I-KEY , O who O is O locked O in O a O multimillion-dollar O legal O battle O over O whether O or O not O his O use O of O the O nissan.com B-KEY Internet I-KEY domain I-KEY name I-KEY infringes O upon O Japan O 's O Nissan O Motor O Co. O 's O trademark O . O At O the O heart O of O the O matter O is O the O impact O of O the O global B-KEY Internet I-KEY on O trademark B-KEY law I-KEY , O which O traditionally O has O been O strongly O influenced O by O geographic O considerations O . O The O paper O discusses O the O background O to O the O case O from O both O sides O and O the O issues O involved O Control O in O active O systems O based O on O criteria O and O motivation O For O active O systems O where O the O principal O varies O the O agents O ' O goal B-KEY functions I-KEY by O adding O to O them O appropriately O weighted O goal B-KEY functions I-KEY of O other O agents O or O a O balanced O system O of O inter-agent B-KEY transfers I-KEY , O the O paper O formulated O and O solved O the O problems O of O control O based O on O criteria O and O motivation O . O Linear B-KEY active I-KEY systems I-KEY were O considered O by O way O of O example O Emotion B-KEY and O self-control B-KEY A O biology-based O model O of O choice O is O used O to O examine O time-inconsistent B-KEY preferences I-KEY and O the O problem O of O self-control B-KEY . O Emotion B-KEY is O shown O to O be O the O biological O substrate O of O choice O , O in O that O emotional B-KEY systems O assign O value O to O ` O goods O ' O in O the O environment O and O also O facilitate O the O learning B-KEY of O expectations O regarding O alternative O options O for O acquiring O those O goods O . O A O third O major O function O of O the O emotional B-KEY choice O systems O is O motivation O . O Self-control B-KEY is O shown O to O be O the O result O of O a O problem O with O the O inhibition B-KEY of O the O motive O force O of O emotion B-KEY , O where O this O inhibition B-KEY is O necessary O for O higher O level O deliberation O Matched-filter O template O generation O via O spatial B-KEY filtering I-KEY : O application O to O fetal O biomagnetic O recordings O We O have O developed O a O two-step O procedure O for O signal O processing O of O fetal O biomagnetic O recordings O that O removes O cardiac O interference O and O noise O . O First O , O a O modified B-KEY matched I-KEY filter I-KEY -LRB- O MF O -RRB- O is O applied O to O remove O maternal B-KEY cardiac I-KEY interference I-KEY ; O then O , O a O simple B-KEY signal I-KEY space I-KEY projection I-KEY -LRB- O SSP O -RRB- O is O applied O to O remove O noise O . O The O key O difference O between O our O MF O and O a O conventional O one O is O that O the O interference B-KEY template I-KEY and O the O template B-KEY scaling I-KEY are O derived O from O a O signal O that O has O been O spatially B-KEY filtered I-KEY to O isolate O the O interference O , O rather O than O from O the O raw B-KEY signal I-KEY . O Unlike O conventional O MFs O , O ours O is O able O to O separate O maternal O and O fetal O cardiac O complexes O , O even O when O they O have O similar O morphology O and O overlap O strongly O . O When O followed O by O a O SSP O that O preserves O only O the O signal O subspace O , O the O noise O is O reduced O to O a O low O level O Performance B-KEY comparison I-KEY between O PID O and O dead-time B-KEY compensating I-KEY controllers O This O paper O is O intended O to O answer O the O question O : O `` O When O can O a O simple O dead-time B-KEY compensator I-KEY be O expected O to O perform O better O than O a O PID O ? O '' O . O The O performance B-KEY criterion I-KEY used O is O the O integrated B-KEY absolute I-KEY error I-KEY -LRB- O IAE B-KEY -RRB- O . O It O is O compared O for O PI O and O PID B-KEY controllers I-KEY and O a O simple O dead-time B-KEY compensator I-KEY -LRB- O DTC B-KEY -RRB- O when O a O step B-KEY load I-KEY disturbance I-KEY is O applied O at O the O plant O input O . O Both O stable O and O integrating B-KEY processes I-KEY are O considered O . O For O a O fair O comparison O the O controllers O should O provide O equal B-KEY robustness I-KEY in O some O sense O . O Here O , O as O a O measure O of O robustness O , O the O H/sub O infinity O / O norm O of O the O sum O of O the O absolute O values O of O the O sensitivity O function O and O the O complementary B-KEY sensitivity I-KEY function I-KEY is O used O . O Performance O of O the O DTC B-KEY 's O is O given O also O as O a O function O of O dead-time B-KEY margin I-KEY -LRB- O D/sub O M O / O -RRB- O Lossy B-KEY SPICE I-KEY models I-KEY produce O realistic B-KEY averaged I-KEY simulations I-KEY In O previous O averaged O models O , O the O state-space B-KEY averaging I-KEY technique I-KEY or O switch B-KEY waveforms I-KEY analysis I-KEY were O usually O applied O over O perfect O elements O , O non-inclusive O of O the O ohmic B-KEY losses I-KEY . O However O , O if O these O elements O play O an O active O role O in O the O DC B-KEY transfer I-KEY function I-KEY , O they O affect O the O small-signal O AC O analysis O by O introducing O various O damping B-KEY effects I-KEY . O A O model O is O introduced O in O a O boost B-KEY voltage-mode I-KEY application I-KEY Adaptive B-KEY image I-KEY denoising I-KEY using O scale O and O space B-KEY consistency I-KEY This O paper O proposes O a O new O method O for O image O denoising O with O edge B-KEY preservation I-KEY , O based O on O image B-KEY multiresolution I-KEY decomposition I-KEY by O a O redundant B-KEY wavelet I-KEY transform I-KEY . O In O our O approach O , O edges O are O implicitly O located O and O preserved O in O the O wavelet O domain O , O whilst O image O noise O is O filtered O out O . O At O each O resolution O level O , O the O image B-KEY edges I-KEY are O estimated O by O gradient B-KEY magnitudes I-KEY -LRB- O obtained O from O the O wavelet O coefficients O -RRB- O , O which O are O modeled O probabilistically O , O and O a O shrinkage B-KEY function I-KEY is O assembled O based O on O the O model O obtained O . O Joint O use O of O space O and O scale B-KEY consistency I-KEY is O applied O for O better O preservation O of O edges O . O The O shrinkage B-KEY functions I-KEY are O combined O to O preserve O edges O that O appear O simultaneously O at O several O resolutions O , O and O geometric B-KEY constraints I-KEY are O applied O to O preserve O edges O that O are O not O isolated O . O The O proposed O technique O produces O a O filtered O version O of O the O original O image O , O where O homogeneous O regions O appear O separated O by O well-defined O edges O . O Possible O applications O include O image O presegmentation O , O and O image O denoising O Unsafe O at O any O speed O ? O While O Sun O prides O itself O on O Java O 's O secure O sandbox O programming O model O , O Microsoft O takes O a O looser O approach O . O Its O C# O language O incorporates O C-like B-KEY concepts I-KEY , O including O pointers B-KEY and O memory B-KEY management I-KEY . O But O is O unsafe O code O really O a O boon O to O programmers O , O or O is O it O a O step O backward O ? O Information B-KEY architecture I-KEY for O the O Web O : O The O IA O matrix O approach O to O designing O children O 's O portals O The O article O presents O a O matrix O that O can O serve O as O a O tool O for O designing O the O information B-KEY architecture I-KEY of O a O Web O portal O in O a O logical O and O systematic O manner O . O The O information O architect O begins O by O inputting O the O portal O 's O objective O , O target B-KEY user I-KEY , O and O target B-KEY content I-KEY . O The O matrix O then O determines O the O most O appropriate O information B-KEY architecture I-KEY attributes O for O the O portal O by O filling O in O the O Applied O Information B-KEY Architecture I-KEY portion O of O the O matrix O . O The O article O discusses O how O the O matrix O works O using O the O example O of O a O children O 's O Web O portal O to O provide O access O to O museum B-KEY information I-KEY Learning B-KEY weights O for O the O quasi-weighted B-KEY means I-KEY We O study O the O determination O of O weights O for O quasi-weighted B-KEY means I-KEY -LRB- O also O called O quasi-linear B-KEY means I-KEY -RRB- O when O a O set O of O examples O is O given O . O We O consider O first O a O simple O case O , O the O learning B-KEY of O weights O for O weighted O means O , O and O then O we O extend O the O approach O to O the O more O general O case O of O a O quasi-weighted B-KEY mean I-KEY . O We O consider O the O case O of O a O known O arbitrary O generator O f O . O The O paper O finishes O considering O the O use O of O parametric B-KEY functions I-KEY that O are O suitable O when O the O values O to O aggregate O are O measure B-KEY values I-KEY or O ratio O Preintegration B-KEY lateral I-KEY inhibition I-KEY enhances O unsupervised B-KEY learning I-KEY A O large O and O influential O class O of O neural B-KEY network I-KEY architectures O uses O postintegration O lateral O inhibition O as O a O mechanism O for O competition O . O We O argue O that O these O algorithms O are O computationally O deficient O in O that O they O fail O to O generate O , O or O learn O , O appropriate O perceptual O representations O under O certain O circumstances O . O An O alternative O neural B-KEY network I-KEY architecture O is O presented O here O in O which O nodes O compete O for O the O right O to O receive O inputs O rather O than O for O the O right O to O generate O outputs O . O This O form O of O competition B-KEY , O implemented O through O preintegration B-KEY lateral I-KEY inhibition I-KEY , O does O provide O appropriate O coding O properties O and O can O be O used O to O learn O such O representations O efficiently O . O Furthermore O , O this O architecture O is O consistent O with O both O neuroanatomical O and O neuropsychological O data O . O We O thus O argue O that O preintegration B-KEY lateral I-KEY inhibition I-KEY has O computational O advantages O over O conventional O neural B-KEY network I-KEY architectures O while O remaining O equally O biologically O plausible O The O maximum O possible O EVPI O In O this O paper O we O calculate O the O maximum O expected B-KEY value I-KEY of I-KEY perfect I-KEY information I-KEY -LRB- O EVPI O -RRB- O for O any O probability B-KEY distribution I-KEY for O the O states O of O the O world O . O This O maximum O EVPI O is O an O upper O bound O for O the O EVPI O with O given O probabilities O and O thus O an O upper O bound O for O any O partial O information O about O the O states O of O the O world O In O search O of O strategic O operations O research/management O science O We O define O strategic B-KEY OR/MS I-KEY as O `` O OR/MS O work O that O leads O to O a O sustainable O competitive O advantage O . O '' O We O found O evidence O of O strategic B-KEY OR/MS I-KEY in O the O literature O of O strategic B-KEY information I-KEY systems I-KEY -LRB- O SIS B-KEY -RRB- O and O OR/MS O . O We O examined O 30 O early O examples O of O SIS B-KEY , O many O of O which O contained O OR/MS O work O . O Many O of O the O most O successful O had O high O OR/MS O content O , O while O the O least O successful O contained O none O . O The O inclusion O of O OR/MS O work O may O be O a O key O to O sustaining O an O advantage O from O information O technology O . O We O also O examined O the O Edelman O Prize O finalist O articles O published O between O 1990 O and O 1999 O . O We O found O that O 13 O of O the O 42 O private O sector O applications O meet O our O definition O of O strategic B-KEY OR/MS I-KEY Extinction B-KEY cross I-KEY sections I-KEY of O realistic B-KEY raindrops I-KEY : O data-bank B-KEY established O using O T-matrix B-KEY method I-KEY and O nonlinear O fitting O technique O A O new O computer B-KEY program I-KEY is O developed O based O on O the O T-matrix B-KEY method I-KEY to O generate O a O large O number O of O total O -LRB- O extinction O -RRB- O cross O sections O -LRB- O TCS O -RRB- O values O of O the O realistic B-KEY raindrops I-KEY that O are O deformed O due O to O a O balance O of O the O forces O that O act O on O a O drop O failing O under O gravity B-KEY , O and O were O described O in O shape O by O Pruppacher O and O Pitter O -LRB- O 1971 O -RRB- O . O These O data O for O various O dimensions O of O the O raindrops O -LRB- O mean B-KEY effective I-KEY radius I-KEY from O 0 B-KEY to I-KEY 3.25 I-KEY mm I-KEY -RRB- O , O frequencies O -LRB- O 10 B-KEY to I-KEY 80 I-KEY GHz I-KEY -RRB- O , O -LRB- O horizontal O and O vertical O -RRB- O polarizations O , O and O temperatures B-KEY -LRB- O 0 O , O 10 O and O 20 O degrees O C O -RRB- O are O stored O to O establish O a O data O bank O . O Furthermore O , O a O curve O fitting O technique O , O i.e. O , O interpolation B-KEY of O order O 3 O , O is O implemented O for O the O TCS O values O in O the O data O bank O . O Therefore O , O the O interpolated B-KEY TCS O results O can O be O obtained O readily O from O the O interpolation B-KEY process O with O negligible O or O even O null O computational O time O and O efforts O . O Error B-KEY analysis I-KEY is O carried O out O to O show O the O high O accuracy O of O the O present O analysis O and O applicability O of O the O interpolation B-KEY . O At O three O operating B-KEY frequencies I-KEY of O 15 O , O 21.225 O , O and O 38 B-KEY GHz I-KEY locally O used O in O Singapore B-KEY , O some O new O TCS O values O are O obtained O from O the O new O fast O and O efficient O interpolation B-KEY with O a O good O accuracy O Edit B-KEY distance I-KEY of O run-length B-KEY encoded I-KEY strings I-KEY Let O X O and O Y O be O two O run-length B-KEY encoded I-KEY strings I-KEY , O of O encoded B-KEY lengths I-KEY k O and O l O , O respectively O . O We O present O a O simple O O O -LRB- O | O X O | O l O + O | O Y O | O k O -RRB- O time O algorithm B-KEY that O computes O their O edit B-KEY distance I-KEY Perspectives O on O scholarly B-KEY online I-KEY books I-KEY : O the O Columbia B-KEY University I-KEY Online I-KEY Books I-KEY Evaluation I-KEY Project I-KEY The O Online O Books O Evaluation O Project O at O Columbia O University O studied O the O potential O for O scholarly B-KEY online I-KEY books I-KEY from O 1995 O to O 1999 O . O Issues O included O scholars O ' O interest O in O using O online O books O , O the O role O they O might O play O in O scholarly O life O , O features O that O scholars O and O librarians O sought O in O online O books O , O the O costs B-KEY of O producing O and O owning O print O and O online O books O , O and O potential O marketplace B-KEY arrangements I-KEY . O Scholars O see O potential O for O online O books O to O make O their O research B-KEY , O learning B-KEY , O and O teaching O more O efficient O and O effective O . O Librarians O see O potential O to O serve O their O scholars O better O . O Librarians O may O face O lower O costs B-KEY if O they O can O serve O their O scholars O with O online O books O instead O of O print B-KEY books I-KEY . O Publishers O may O be O able O to O offer O scholars O greater O opportunities O to O use O their O books O while O enhancing O their O own O profitability O Building O 3D B-KEY anatomical I-KEY scenes I-KEY on O the O Web O We O propose O a O new O service O for O building O user-defined B-KEY 3D I-KEY anatomical I-KEY structures I-KEY on O the O Web O . O The O Web B-KEY server I-KEY is O connected O to O a O database B-KEY storing O more O than O 1000 O 3D B-KEY anatomical I-KEY models I-KEY reconstructed O from O the O Visible B-KEY Human I-KEY . O Users O may O combine O existing O models O as O well O as O planar B-KEY oblique I-KEY slices I-KEY in O order O to O create O their O own O structured B-KEY anatomical I-KEY scenes I-KEY . O Furthermore O , O they O may O record O sequences O of O scene B-KEY construction I-KEY and O visualization B-KEY actions O . O These O actions O enable O the O server O to O construct O high-quality B-KEY video I-KEY animations I-KEY , O downloadable O by O the O user O . O Professionals O and O students O in O anatomy O , O medicine O and O related O disciplines O are O invited O to O use O the O server O and O create O their O own O anatomical O scenes O A O Web-accessible B-KEY database I-KEY of O characteristics O of O the O 1,945 O basic B-KEY Japanese I-KEY kanji I-KEY In O 1981 O , O the O Japanese O government O published O a O list O of O the O 1,945 O basic B-KEY Japanese I-KEY kanji I-KEY -LRB- O Jooyoo B-KEY Kanji-hyo I-KEY -RRB- O , O including O specifications O of O pronunciation B-KEY . O This O list O was O established O as O the O standard O for O kanji O usage O in O print O . O The O database O for O 1,945 O basic B-KEY Japanese I-KEY kanji I-KEY provides O 30 O cells B-KEY that O explain O in O detail O the O various O characteristics O of O kanji O . O Means B-KEY , O standard B-KEY deviations I-KEY , O distributions B-KEY , O and O information O related O to O previous O research O concerning O these O kanji O are O provided O in O this O paper O . O The O database O is O saved O as O a O Microsoft B-KEY Excel I-KEY 2000 I-KEY file I-KEY for I-KEY Windows I-KEY . O This O kanji O database O is O accessible O on O the O Web O site O of O the O Oxford O Text O Archive O , O Oxford O University O -LRB- O http://ota.ahds.ac.uk O -RRB- O . O Using O this O database O , O researchers O and O educators O will O be O able O to O conduct O planned O experiments O and O organize O classroom B-KEY instruction I-KEY on O the O basis O of O the O known O characteristics O of O selected O kanji O Improvements O and O critique O on O Sugeno O 's O and O Yasukawa O 's O qualitative B-KEY modeling I-KEY Investigates O Sugeno O 's O and O Yasukawa O 's O -LRB- O 1993 O -RRB- O qualitative O fuzzy B-KEY modeling I-KEY approach O . O We O propose O some O easily O implementable O solutions O for O the O unclear O details O of O the O original O paper O , O such O as O trapezoid B-KEY approximation I-KEY of O membership B-KEY functions I-KEY , O rule B-KEY creation I-KEY from O sample O data O points O , O and O selection O of O important O variables O . O We O further O suggest O an O improved O parameter B-KEY identification I-KEY algorithm I-KEY to O be O applied O instead O of O the O original O one O . O These O details O are O crucial O concerning O the O method O 's O performance O as O it O is O shown O in O a O comparative O analysis O and O helps O to O improve O the O accuracy O of O the O built-up O model O . O Finally O , O we O propose O a O possible O further O rule B-KEY base I-KEY reduction I-KEY which O can O be O applied O successfully O in O certain O cases O . O This O improvement O reduces O the O time O requirement O of O the O method O by O up O to O 16 O % O in O our O experiments O Adaptive B-KEY neural/fuzzy I-KEY control I-KEY for O interpolated B-KEY nonlinear I-KEY systems I-KEY Adaptive O control O for O nonlinear O time-varying B-KEY systems I-KEY is O of O both O theoretical O and O practical O importance O . O We O propose O an O adaptive O control O methodology O for O a O class O of O nonlinear O systems O with O a O time-varying O structure O . O This O class O of O systems O is O composed O of O interpolations O of O nonlinear O subsystems O which O are O input-output O feedback O linearizable O . O Both O indirect O and O direct O adaptive O control O methods O are O developed O , O where O the O spatially B-KEY localized I-KEY models I-KEY -LRB- O in O the O form O of O Takagi-Sugeno B-KEY fuzzy I-KEY systems I-KEY or O radial B-KEY basis I-KEY function I-KEY neural I-KEY networks I-KEY -RRB- O are O used O as O online B-KEY approximators I-KEY to O learn O the O unknown B-KEY dynamics I-KEY of O the O system O . O Without O assumptions O on O rate O of O change O of O system O dynamics O , O the O proposed O adaptive O control O methods O guarantee O that O all O internal O signals O of O the O system O are O bounded O and O the O tracking B-KEY error I-KEY is O asymptotically O stable O . O The O performance O of O the O adaptive O controller O is O demonstrated O using O a O jet B-KEY engine I-KEY control I-KEY problem O Project B-KEY Euclid I-KEY and O the O role O of O research B-KEY libraries I-KEY in O scholarly B-KEY publishing I-KEY Project B-KEY Euclid I-KEY , O a O joint B-KEY electronic I-KEY journal I-KEY publishing I-KEY initiative I-KEY of O Cornell B-KEY University I-KEY Library I-KEY and O Duke B-KEY University I-KEY Press I-KEY is O discussed O in O the O broader O contexts O of O the O changing O patterns O of O scholarly B-KEY communication I-KEY and O the O publishing O scene O of O mathematics B-KEY . O Specific O aspects O of O the O project O such O as O partnerships B-KEY and O the O creation O of O an O economic B-KEY model I-KEY are O presented O as O well O as O what O it O takes O to O be O a O publisher O . O Libraries O have O gained O important O and O relevant O experience O through O the O creation O and O management O of O digital O libraries O , O but O they O need O to O develop O further O skills O if O they O want O to O adopt O a O new O role O in O the O life O cycle O of O scholarly B-KEY communication I-KEY A O survey O of O interactive O mesh-cutting O techniques O and O a O new O method O for O implementing O generalized B-KEY interactive I-KEY mesh I-KEY cutting I-KEY using O virtual B-KEY tools I-KEY In O our O experience O , O mesh-cutting O methods O can O be O distinguished O by O how O their O solutions O address O the O following O major O issues O : O definition O of O the O cut O path O , O primitive O removal O and O re-meshing B-KEY , O number O of O new O primitives O created O , O when O re-meshing B-KEY is O performed O , O and O representation O of O the O cutting B-KEY tool I-KEY . O Many O researchers O have O developed O schemes O for O interactive O mesh O cutting O with O the O goals O of O reducing O the O number O of O new O primitives O created O , O creating O new O primitives O with O good O aspect O ratios O , O avoiding O a O disconnected B-KEY mesh I-KEY structure I-KEY between O primitives O in O the O cut O path O , O and O representing O the O path O traversed O by O the O tool O as O accurately O as O possible O . O The O goal O of O this O paper O is O to O explain O how O , O by O using O a O very O simple O framework O , O one O can O build O a O generalized O cutting O scheme O . O This O method O allows O for O any O arbitrary O cut O to O be O made O within O a O virtual B-KEY object I-KEY , O and O can O simulate O cutting O surface O , O layered B-KEY surface I-KEY or O tetrahedral B-KEY objects I-KEY using O a O virtual O scalpel O , O scissors O , O or O loop O cautery O tool O . O This O method O has O been O implemented O in O a O real-time O , O haptic-rate B-KEY surgical I-KEY simulation I-KEY system I-KEY allowing O arbitrary O cuts O to O be O made O on O high-resolution B-KEY patient-specific I-KEY models I-KEY Full-screen B-KEY ultrafast I-KEY video I-KEY modes I-KEY over-clocked O by O simple O VESA O routines O and O registers B-KEY reprogramming I-KEY under O MS-DOS B-KEY Fast O full-screen O presentation O of O stimuli O is O necessary O in O psychological B-KEY research I-KEY . O Although O Spitczok O von O Brisinski O -LRB- O 1994 O -RRB- O introduced O a O method O that O achieved O ultrafast O display O by O reprogramming O the O registers O , O he O could O not O produce O an O acceptable O full-screen O display O . O In O this O report O , O the O author O introduces O a O new O method O combining O VESA B-KEY routine I-KEY calling I-KEY with O register B-KEY reprogramming I-KEY that O can O yield O a O display O at O 640 O * O 480 O resolution O , O with O a O refresh O rate O of O about O 150 O Hz O Vendor O qualifications O for O IT B-KEY staff I-KEY and O networking O In O some O cases O , O vendor-run B-KEY accreditation I-KEY schemes I-KEY can O offer O an O objective O measure O of O a O job B-KEY applicant I-KEY 's O skills O , O but O they O do O not O always O indicate O the O true O extent O of O practical B-KEY abilities I-KEY An O efficient B-KEY retrieval I-KEY selection I-KEY algorithm I-KEY for O video B-KEY servers I-KEY with O random B-KEY duplicated I-KEY assignment I-KEY storage I-KEY technique I-KEY Random O duplicated O assignment O -LRB- O RDA O -RRB- O is O an O approach O in O which O video O data O is O stored O by O assigning O a O number O of O copies B-KEY of O each O data B-KEY block I-KEY to O different O , O randomly B-KEY chosen I-KEY disks I-KEY . O It O has O been O shown O that O this O approach O results O in O smaller O response B-KEY times I-KEY and O lower O disk O and O RAM B-KEY costs I-KEY compared O to O the O well-known O disk O stripping O techniques O . O Based O on O this O storage O approach O , O one O has O to O determine O , O for O each O given O batch O of O data B-KEY blocks I-KEY , O from O which O disk O each O of O the O data B-KEY blocks I-KEY is O to O be O retrieved O . O This O is O to O be O done O in O such O a O way O that O the O maximum B-KEY load I-KEY of O the O disks O is O minimized O . O The O problem O is O called O the O retrieval O selection O problem O -LRB- O RSP O -RRB- O . O In O this O paper O , O we O propose O a O new O efficient O algorithm O for O RSP O . O This O algorithm O is O based O on O the O breadth-first B-KEY search I-KEY approach O and O is O able O to O guarantee O optimal B-KEY solutions I-KEY for O RSP O in O O O -LRB- O n/sup O 2 O / O + O mn O -RRB- O , O where O m O and O n O correspond O to O the O number O of O data B-KEY blocks I-KEY and O the O number O of O disks O , O respectively O . O We O show O that O our O proposed O algorithm O has O a O lower O time B-KEY complexity I-KEY than O an O existing O algorithm O , O called O the O MFS O algorithm O Correction O to O construction O of O panoramic B-KEY image I-KEY mosaics I-KEY with O global O and O local B-KEY alignment I-KEY For O original O paper O see O ibid. O , O vol O . O 36 O , O no. O 2 O , O p. O 101-30 O -LRB- O 2000 O -RRB- O . O The O authors O had O given O a O method O for O the O construction O of O panoramic B-KEY image I-KEY mosaics I-KEY with O global O and O local B-KEY alignment I-KEY . O Unfortunately O a O mistake O had O led O to O an O incorrect O equation O which O whilst O making O little O difference O in O many O cases O , O for O faster O -LRB- O and O assured O -RRB- O convergence O , O the O correct O formulae O given O here O should O be O used O An O object-oriented B-KEY version I-KEY of O SIMLIB B-KEY -LRB- O a O simple O simulation O package O -RRB- O This O paper O introduces O an O object-oriented B-KEY version I-KEY of O SIMLIB B-KEY -LRB- O an O easy-to-understand O discrete-event B-KEY simulation I-KEY package O -RRB- O . O The O object-oriented B-KEY version I-KEY is O preferable O to O the O original O procedural O language O versions O of O SIMLIB B-KEY in O that O it O is O easier O to O understand O and O teach B-KEY simulation I-KEY from O an O object O point O of O view O . O A O single-server O queue O simulation O is O demonstrated O using O the O object-oriented O SIMLIB B-KEY Student B-KEY consulting I-KEY projects I-KEY benefit O faculty O and O industry O Student B-KEY consulting I-KEY projects I-KEY require O students O to O apply O OR/MS B-KEY tools I-KEY to O obtain O insight O into O the O activities O of O firms O in O the O community O . O These O projects O benefit O faculty O by O providing O clear O feedback O on O the O real O capabilities O of O students O , O a O broad O connection O to O local O industry O , O and O material O for O case O studies O and O research O . O They O benefit O companies O by O stimulating O new O thinking O regarding O their O activities O and O delivering O results O they O can O use O . O Projects O provide O insights O into O the O end-user O modeling O mode O of O OR/MS O practice O . O Projects O support O continuous O improvement O as O the O lessons O gained O from O a O crop O of O projects O enable O better O teaching O during O the O next O course O offering O , O which O in O turn O leads O to O better O projects O and O further O insights O into O teaching O A O formal B-KEY model I-KEY of O computing B-KEY with I-KEY words I-KEY Classical O automata O are O formal B-KEY models I-KEY of O computing O with O values O . O Fuzzy B-KEY automata I-KEY are O generalizations O of O classical O automata O where O the O knowledge O about O the O system O 's O next O state O is O vague O or O uncertain O . O It O is O worth O noting O that O like O classical O automata O , O fuzzy B-KEY automata I-KEY can O only O process O strings O of O input O symbols O . O Therefore O , O such O fuzzy B-KEY automata I-KEY are O still O -LRB- O abstract O -RRB- O devices O for O computing O with O values O , O although O a O certain O vagueness O or O uncertainty O are O involved O in O the O process O of O computation O . O We O introduce O a O new O kind O of O fuzzy B-KEY automata I-KEY whose O inputs O are O instead O strings O of O fuzzy B-KEY subsets I-KEY of O the O input B-KEY alphabet I-KEY . O These O new O fuzzy B-KEY automata I-KEY may O serve O as O formal B-KEY models I-KEY of O computing B-KEY with I-KEY words I-KEY . O We O establish O an O extension B-KEY principle I-KEY from O computing O with O values O to O computing B-KEY with I-KEY words I-KEY . O This O principle O indicates O that O computing B-KEY with I-KEY words I-KEY can O be O implemented O with O computing O with O values O with O the O price O of O a O big O amount O of O extra O computations O Debugging O Web O applications O The O author O considers O how O one O can O save O time O tracking O down O bugs O in O Web-based O applications O by O arming O yourself O with O the O right O tools O and O programming B-KEY practices O . O A O wide O variety O of O debugging O tools O have O been O written O with O Web O developers O in O mind O Information O architecture O : O notes O toward O a O new O curriculum O There O are O signs O that O information O architecture O is O coalescing O into O a O field O of O professional B-KEY practice I-KEY . O However O , O if O it O is O to O become O a O profession O , O it O must O develop O a O means O of O educating O new O information B-KEY architects I-KEY . O Lessons O from O other O fields O suggest O that O professional B-KEY education I-KEY typically O evolves O along O a O predictable O path O , O from O apprenticeships O to O trade O schools O to O college O - O and O university-level O education O . O Information B-KEY architecture I-KEY education I-KEY may O develop O more O quickly O to O meet O the O growing O demands O of O the O information O society O . O Several O pedagogical B-KEY approaches I-KEY employed O in O other O fields O may O be O adopted O for O information B-KEY architecture I-KEY education I-KEY , O as O long O as O the O resulting O curricula O provide O an O interdisciplinary O approach O and O balance O instruction O in O technical O and O design O skills O with O consideration O of O theoretical O concepts O . O Key O content O areas O are O information B-KEY organization I-KEY , O graphic O . O design O , O computer B-KEY science I-KEY , O user O and O usability B-KEY studies I-KEY , O and O communication O . O Certain O logistics O must O be O worked O out O , O including O where O information O architecture O studies O should O be O housed O and O what O kinds O of O degrees O should O be O offered O and O at O what O levels O . O The O successful O information O architecture O curriculum O will O be O flexible O and O adaptable O in O order O to O meet O the O changing O needs O of O students O and O the O marketplace O A O friction B-KEY compensator I-KEY for O pneumatic B-KEY control I-KEY valves I-KEY A O procedure O that O compensates O for O static O friction O -LRB- O stiction O -RRB- O in O pneumatic B-KEY control I-KEY valves I-KEY is O presented O . O The O compensation O is O obtained O by O adding O pulses O to O the O control O signal O . O The O characteristics O of O the O pulses O are O determined O from O the O control O action O . O The O compensator O is O implemented O in O industrial B-KEY controllers I-KEY and O control O systems O , O and O the O industrial O experiences O show O that O the O procedure O reduces O the O control O error O during O stick-slip B-KEY motion I-KEY significantly O compared O to O standard B-KEY control I-KEY without O stiction B-KEY compensation I-KEY CAD/CAE B-KEY software I-KEY aids O converter O design O -LSB- O DC/DC O power O conversion O -RSB- O Typically O , O power B-KEY supply I-KEY design I-KEY involves O electronic O and O magnetic B-KEY components I-KEY . O In O this O paper O , O the O authors O describe O , O using O a O flyback O converter O example O , O how O CAD/CAE O tools O can O aid O the O power O supply O engineer O in O both O areas O , O reducing O prototyping B-KEY costs I-KEY and O providing O insights O into O system O performance O Tracking O nonparameterized B-KEY object I-KEY contours I-KEY in O video B-KEY We O propose O a O new O method O for O contour B-KEY tracking I-KEY in O video B-KEY . O The O inverted B-KEY distance I-KEY transform I-KEY of O the O edge B-KEY map I-KEY is O used O as O an O edge B-KEY indicator I-KEY function I-KEY for O contour O detection O . O Using O the O concept O of O topographical B-KEY distance I-KEY , O the O watershed B-KEY segmentation I-KEY can O be O formulated O as O a O minimization B-KEY . O This O new O viewpoint O gives O a O way O to O combine O the O results O of O the O watershed O algorithm O on O different O surfaces O . O In O particular O , O our O algorithm O determines O the O contour O as O a O combination O of O the O current O edge B-KEY map I-KEY and O the O contour O , O predicted O from O the O tracking O result O in O the O previous O frame O . O We O also O show O that O the O problem O of O background B-KEY clutter I-KEY can O be O relaxed O by O taking O the O object B-KEY motion I-KEY into O account O . O The O compensation O with O object B-KEY motion I-KEY allows O to O detect O and O remove O spurious O edges O in O background O . O The O experimental O results O confirm O the O expected O advantages O of O the O proposed O method O over O the O existing O approaches O From O a O biological O to O a O computational B-KEY model I-KEY for O the O autonomous B-KEY behavior I-KEY of O an O animat B-KEY Endowing O an O autonomous B-KEY system I-KEY like O a O robot B-KEY with O intelligent B-KEY behavior I-KEY is O difficult O for O several O reasons O . O First O , O behavior O is O such O a O wide O topic O that O a O general O framework O paradigm O of O inspiration O must O be O chosen O in O order O to O obtain O a O consistent O model O . O Such O a O framework O can O be O , O for O example O , O biological B-KEY modeling I-KEY or O an O artificial O intelligence O approach O . O Second O , O a O general O framework O is O not O sufficient O to O determine O a O fully O specified O program O to O be O implemented O in O a O robot B-KEY . O Many O choices O , O tuning B-KEY and O tests B-KEY must O be O carried O out O before O obtaining O a O robust B-KEY system I-KEY . O A O biological B-KEY model I-KEY is O presented O , O based O on O the O definition O of O cortex-like B-KEY automata I-KEY , O representing O elementary B-KEY functions I-KEY in O the O perceptive O , O motor O or O associative B-KEY domain I-KEY . O These O automata O are O connected O in O a O network O whose O architecture B-KEY , O functioning O and O learning B-KEY rules I-KEY are O described O in O a O cortical O framework O . O Second O , O the O computational B-KEY model I-KEY derived O from O that O biological B-KEY model I-KEY is O specified O . O The O way O units O exchange O and O compute O variables O through O links B-KEY is O explained O , O with O reference O to O corresponding O biological O elements O . O It O is O then O easier O to O report O experiments O allowing O an O autonomous B-KEY system I-KEY to O learn O regularities O of O a O simple B-KEY environment I-KEY and O to O exploit O them O to O satisfy O some O internal B-KEY drives I-KEY . O Even O if O additional O biological O hints O can O be O added O , O this O model O allow O us O to O better O understand O how O a O biological B-KEY model I-KEY can O be O implemented O and O how O biological O properties O can O emerge O from O a O distributed O set O of O units O Flexibility B-KEY analysis I-KEY of O complex B-KEY technical I-KEY systems I-KEY under O uncertainty O An O important O problem O in O designing O technical O systems O under O partial B-KEY uncertainty I-KEY of O the O initial O physical O , O chemical O , O and O technological O data O is O the O determination O of O a O design O in O which O the O technical O system O is O flexible O , O i.e. O , O its O control B-KEY system I-KEY is O capable O of O guaranteeing O that O the O constraints O hold O even O under O changes O in O external O and O internal O factors O and O application O of O fuzzy B-KEY mathematical I-KEY models I-KEY in O its O design O . O Three O flexibility O problems O , O viz. O , O the O flexibility O of O a O technical O system O of O given O structure O , O structural B-KEY flexibility I-KEY of O a O technical O system O , O and O the O optimal B-KEY design I-KEY guaranteeing O the O flexibility O of O a O technical O system O , O are O studied O . O Two O approaches O to O these O problems O are O elaborated O . O Results O of O a O computation O experiment O are O given O The O effects O of O emotions B-KEY on O bounded B-KEY rationality I-KEY : O a O comment O on O Kaufman O Bruce O Kaufman O 's O article O -LRB- O 1999 O -RRB- O , O `` O Emotional B-KEY arousal O as O a O source O of O bounded B-KEY rationality I-KEY '' O , O objective O is O to O present O an O additional O source O of O bounded B-KEY rationality I-KEY , O one O that O is O not O due O to O cognitive O constraints O , O but O to O high O emotional B-KEY arousal O . O In O doing O so O , O Kaufman O is O following O a O long O tradition O of O thinkers O who O have O contrasted O emotion B-KEY with O reason O , O claiming O , O for O the O most O part O , O that O emotions B-KEY are O a O violent O force O hindering O rational B-KEY thinking I-KEY . O This O paper O aims O to O challenge O Kaufman O 's O unidimensional O idea O regarding O the O connection O between O high O emotional B-KEY arousal O and O decision B-KEY making I-KEY Design O and O implementation O of O a O brain-computer B-KEY interface I-KEY with I-KEY high I-KEY transfer I-KEY rates I-KEY This O paper O presents O a O brain-computer O interface O -LRB- O BCI O -RRB- O that O can O help O users O to O input O phone O numbers O . O The O system O is O based O on O the O steady-state B-KEY visual I-KEY evoked I-KEY potential I-KEY -LRB- O SSVEP O -RRB- O . O Twelve O buttons O illuminated O at O different O rates O were O displayed O on O a O computer B-KEY monitor I-KEY . O The O buttons O constituted O a O virtual B-KEY telephone I-KEY keypad I-KEY , O representing O the O ten O digits O 0-9 O , O BACKSPACE O , O and O ENTER O . O Users O could O input O phone O number O by O gazing O at O these O buttons O . O The O frequency-coded B-KEY SSVEP I-KEY was O used O to O judge O which O button O the O user O desired O . O Eight O of O the O thirteen O subjects O succeeded O in O ringing O the O mobile O phone O using O the O system O . O The O average O transfer O rate O over O all O subjects O was O 27.15 O bits/min O . O The O attractive O features O of O the O system O are O noninvasive O signal O recording O , O little O training O required O for O use O , O and O high O information O transfer O rate O . O Approaches O to O improve O the O performance O of O the O system O are O discussed O Why O your O Web B-KEY strategy I-KEY is O , O err O , O wrong O An O awkward O look O at O a O few O standard O views O from O the O author O , O who O thinks O that O most O people O have O got O it O , O err O , O wrong O . O Like O every O other O investment O , O when O the O time O comes O to O sign O the O contract O , O the O question O that O should O be O asked O is O not O whether O it O is O a O good O investment O , O but O whether O it O is O the O best O investment O the O firm O can O make O with O the O money O . O the O author O argues O that O he O would O be O surprised O if O any O law B-KEY firm I-KEY Web I-KEY site I-KEY he O has O seen O yet O would O jump O that O particular O hurdle O Hours O of O operation O and O service O in O academic O libraries O : O toward O a O national O standard O In O an O effort O toward O establishing O a O standard O for O academic B-KEY library I-KEY hours I-KEY , O the O article O surveys O and O compares O hours O of O operation O and O service O for O ARL B-KEY libraries I-KEY and O IPEDS B-KEY survey I-KEY respondents I-KEY . O The O article O ranks O the O ARL O -LRB- O Association B-KEY for I-KEY Research I-KEY Libraries I-KEY -RRB- O libraries O according O to O hours O of O operation O and O reference O hours O and O then O briefly O discusses O such O issues O as O libraries O offering O twenty-four O access O and O factors O affecting O service O hour O decisions O Optical B-KEY encoding I-KEY of O color B-KEY three-dimensional I-KEY correlation I-KEY Three-dimensional O -LRB- O 3D O -RRB- O correlation O of O color B-KEY images I-KEY , O considering O the O color B-KEY distribution I-KEY as O the O third O dimension O , O has O been O shown O to O be O useful O for O color B-KEY pattern I-KEY recognition I-KEY tasks I-KEY . O Nevertheless O , O 3D B-KEY correlation I-KEY can O not O be O directly O performed O on O an O optical B-KEY correlator I-KEY , O that O can O only O process O two-dimensional O -LRB- O 2D O -RRB- O signals O . O We O propose O a O method O to O encode O 3D O functions O onto O 2D O ones O in O such O a O way O that O the O Fourier B-KEY transform I-KEY and O correlation O of O these O signals O , O that O can O be O optically O performed O , O encode O the O 3D B-KEY Fourier I-KEY transform I-KEY and O correlation O of O the O 3D O signals O . O The O theory O for O the O encoding O is O given O and O experimental O results O obtained O in O an O optical B-KEY correlator I-KEY are O shown O Activity O and O location O recognition O using O wearable B-KEY sensors I-KEY Using O measured B-KEY acceleration I-KEY and O angular B-KEY velocity I-KEY data O gathered O through O inexpensive O , O wearable B-KEY sensors I-KEY , O this O dead-reckoning B-KEY method I-KEY can O determine O a O user O 's O location O , O detect O transitions B-KEY between O preselected B-KEY locations I-KEY , O and O recognize O and O classify O sitting B-KEY , O standing B-KEY , O and O walking B-KEY behaviors O . O Experiments O demonstrate O the O proposed O method O 's O effectiveness O A O new O approach O to O the O decomposition O of O Boolean O functions O by O the O method O of O q-partitions B-KEY . O II O . O Repeated O decomposition O For O pt.I O . O see O Upr O . O Sist O . O Mash. O , O no. O 6 O , O p. O 29-42 O -LRB- O 1999 O -RRB- O . O A O new O approach O to O the O decomposition O of O Boolean O , O functions O that O depend O on O n O variables O and O are O represented O in O various O forms O is O considered O . O The O approach O is O based O on O the O method O of O q-partitioning B-KEY of O minterms B-KEY and O on O the O introduced O concept O of O a O decomposition B-KEY clone I-KEY . O The O theorem O on O simple O disjunctive B-KEY decomposition I-KEY of O full O and O partial B-KEY functions I-KEY is O formulated O . O The O approach O proposed O is O illustrated O by O examples O Implications O of O document-level B-KEY literacy I-KEY skills I-KEY for O Web O site O design O The O proliferation O of O World O Wide O Web O -LRB- O Web O -RRB- O sites O and O the O low O cost O of O publishing O information O on O the O Web O have O placed O a O tremendous O amount O of O information O at O the O fingertips O of O millions O of O people O . O Although O most O of O this O information O is O at O least O intended O to O be O accurate O , O there O is O much O that O is O rumor B-KEY , O innuendo B-KEY , O urban B-KEY legend I-KEY , O and O outright O falsehood B-KEY . O This O raises O problems O especially O for O students B-KEY -LRB- O of O all O ages O -RRB- O trying O to O do O research O or O learn O about O some O topic O . O Finding O accurate O , O credible O information O requires O document O level O literacy O skills O , O such O as O integration B-KEY , O sourcing B-KEY , O corroboration B-KEY , O and O search B-KEY . O This O paper O discusses O these O skills O and O offers O a O list O of O simple O ways O that O designers O of O educational O Web O sites O can O help O their O visitors O utilize O these O skills O Alien B-KEY Rescue I-KEY : O a O problem-based B-KEY hypermedia I-KEY learning I-KEY environment I-KEY for O middle B-KEY school I-KEY science O The O article O describes O an O innovative O hypermedia O product O for O sixth B-KEY graders I-KEY in O space B-KEY science I-KEY : O Alien B-KEY Rescue I-KEY . O Using O a O problem-based O learning O approach O that O is O highly O interactive O , O Alien B-KEY Rescue I-KEY engages O students O in O scientific B-KEY investigations I-KEY aimed O at O finding O solutions O to O complex O and O meaningful O problems O . O Problem-based O learning O -LRB- O PBL B-KEY -RRB- O is O an O instructional B-KEY strategy I-KEY proven O to O be O effective O in O medical O and O business B-KEY fields I-KEY , O and O it O is O increasingly O popular O in O education O . O However O , O using O PBL B-KEY in O K-12 B-KEY classrooms I-KEY is O challenging O and O requires O access O to O rich B-KEY knowledge I-KEY bases I-KEY and O cognitive B-KEY tools I-KEY . O Alien B-KEY Rescue I-KEY is O designed O to O provide O such O cognitive B-KEY support I-KEY for O successful O use O of O PBL B-KEY in O sixth-grade O classrooms O . O The O design O and O development O of O Alien B-KEY Rescue I-KEY is O guided O by O current O educational B-KEY research I-KEY . O Research O is O an O integral O part O of O this O project O . O Results O of O formative B-KEY evaluation I-KEY and O research O studies O are O being O integrated O into O the O development O and O improvement O of O the O program O . O Alien B-KEY Rescue I-KEY is O designed O in O accordance O with O the O National O Science O Standards O and O the O Texas O Essential O Knowledge O and O Skills O -LRB- O TEKS O -RRB- O for O science O . O So O far O Alien B-KEY Rescue I-KEY has O been O field-tested O by O approximately O 1400 O sixth B-KEY graders I-KEY . O More O use O in O middle B-KEY schools I-KEY is O in O progress O and O more O research O on O its O use O is O planned O Challenges B-KEY and O trends B-KEY in O discrete B-KEY manufacturing I-KEY Over O 50 O years O ago O , O the O 100,000 O workers O at O Ford O 's O Rouge O automobile B-KEY factory I-KEY turned O out O 1200 O cars O per O day O . O Nowadays O , O Ford O 's O plant O on O that O same O site O still O produces O 800 O cars O each O day O but O with O just O 3000 O workers O . O Similar O stories O abound O in O the O manufacturing O industries O ; O technology B-KEY revolution I-KEY and O evolution O ; O a O shift O from O vertical O integration O , O better O business O and O production B-KEY practices I-KEY and O improved O industrial O relations-all O have O changed O manufacturing O beyond O recognition O . O So O what O are O the O current O challenges B-KEY and O trends B-KEY in O manufacturing O ? O Certainly O , O the O relentless O advance O of O technology O will O continue O , O as O will O user O pressure O for O more O customized O design O or O improved O environmental O friendliness O . O Some O trends B-KEY are O already O with O us O and O more O , O as O yet O indiscernible O , O will O come O . O But O one O major O , O fundamental O shift O now O resounding O throughout O industry O is O the O way O in O which O information O involving O every O single O aspect O of O the O manufacturing O process O is O being O integrated O into O one O seamless O system O Multispectral B-KEY color I-KEY image I-KEY capture I-KEY using O a O liquid B-KEY crystal I-KEY tunable I-KEY filter I-KEY We O describe O the O experimental O setup O of O a O multispectral O color O image O acquisition B-KEY system I-KEY consisting O of O a O professional O monochrome O CCD O camera O and O a O tunable O filter O in O which O the O spectral O transmittance O can O be O controlled O electronically O . O We O perform O a O spectral B-KEY characterization I-KEY of O the O acquisition B-KEY system I-KEY taking O into O account O the O acquisition B-KEY noise I-KEY . O To O convert O the O camera B-KEY output I-KEY signals O to O device-independent O color O data O , O two O main O approaches O are O proposed O and O evaluated O . O One O consists O in O applying O regression B-KEY methods I-KEY to O convert O from O the O K O camera B-KEY outputs I-KEY to O a O device-independent O color O space O such O as O CIEXYZ O or O CIELAB O . O Another O method O is O based O on O a O spectral B-KEY model I-KEY of O the O acquisition B-KEY system I-KEY . O By O inverting O the O model O using O a O principal B-KEY eigenvector I-KEY approach I-KEY , O we O estimate O the O spectral B-KEY reflectance I-KEY of O each O pixel B-KEY of O the O imaged B-KEY surface I-KEY The O influence O of O tollbooths B-KEY on O highway B-KEY traffic I-KEY We O study O the O effects O of O tollbooths B-KEY on O the O traffic O flow O . O The O highway B-KEY traffic I-KEY is O simulated O by O the O Nagel-Schreckenberg B-KEY model I-KEY . O Various O types O of O toll B-KEY collection I-KEY are O examined O , O which O can O be O characterized O either O by O a O waiting B-KEY time I-KEY or O a O reduced B-KEY speed I-KEY . O A O first-order B-KEY phase I-KEY transition I-KEY is O observed O . O The O phase O separation O results O a O saturated B-KEY flow I-KEY , O which O is O observed O as O a O plateau O region O in O the O fundamental O diagram O . O The O effects O of O lane B-KEY expansion I-KEY near O the O tollbooth B-KEY are O examined O . O The O full O capacity O of O a O highway O can O be O restored O . O The O emergence O of O vehicle B-KEY queuing I-KEY is O studied O . O Besides O the O numerical O results O , O we O also O obtain O analytical O expressions O for O various O quantities O . O The O numerical B-KEY simulations I-KEY can O be O well O described O by O the O analytical O formulas O . O We O also O discuss O the O influence O on O the O travel O time O and O its O variance O . O The O tollbooth B-KEY increases O the O travel O time O but O decreases O its O variance O . O The O differences O between O long O - O and O short-distance O travelers O are O also O discussed O Generating O code O at O run O time O with O Reflection.Emit O The O . O NET O framework O SDK O includes O several O tools O that O convert O source O code O into O executable O code-the O C# O and O VB.NET O compilers O get O most O of O the O attention O , O but O there O are O others O . O The O Regex B-KEY class I-KEY -LRB- O in O the O System.Text.RegularExpressions O namespace O -RRB- O has O the O ability O to O compile O favorite O regular O expressions O into O a O . O NET O assembly B-KEY . O In O fact O , O the O NET O Common O Language O Runtime O -LRB- O CLR O -RRB- O contains O a O whole O namespace O full O of O classes O to O help O us O build O assemblies B-KEY , O define O types B-KEY , O and O emit O their O implementations O , O all O at O run O time O . O These O classes O , O which O comprise O the O System.Reflection.Emit O namespace O , O are O known O collectively O as O Reflection O . O Emit O Stabilization B-KEY of O a O linear O object O by O frequency-modulated B-KEY pulsed I-KEY signals I-KEY A O control B-KEY system I-KEY consisting O of O an O unstable O continuous O linear O part O and O a O pulse-frequency O modulator O in O the O feedback B-KEY circuit I-KEY is O studied O . O Conditions O for O the O boundedness O of O the O solutions O of O the O system O under O any O initial O data O are O determined O Model B-KEY selection I-KEY in O electromagnetic B-KEY source I-KEY analysis I-KEY with O an O application O to O VEFs B-KEY In O electromagnetic B-KEY source I-KEY analysis I-KEY , O it O is O necessary O to O determine O how O many O sources O are O required O to O describe O the O electroencephalogram O or O magnetoencephalogram O adequately O . O Model B-KEY selection I-KEY procedures O -LRB- O MSPs O -RRB- O or O goodness O of O fit O procedures O give O an O estimate O of O the O required O number O of O sources O . O Existing O and O new O MSPs O are O evaluated O in O different O source O and O noise B-KEY settings I-KEY : O two O sources O which O are O close O or O distant O and O noise O which O is O uncorrelated O or O correlated O . O The O commonly O used O MSP O residual B-KEY variance I-KEY is O seen O to O be O ineffective O , O that O is O it O often O selects O too O many O sources O . O Alternatives O like O the O adjusted O Hotelling O 's O test O , O Bayes O information O criterion O and O the O Wald B-KEY test I-KEY on O source O amplitudes O are O seen O to O be O effective O . O The O adjusted O Hotelling O 's O test O is O recommended O if O a O conservative O approach O is O taken O and O MSPs O such O as O Bayes O information O criterion O or O the O Wald B-KEY test I-KEY on O source O amplitudes O are O recommended O if O a O more O liberal O approach O is O desirable O . O The O MSPs O are O applied O to O empirical B-KEY data I-KEY -LRB- O visual B-KEY evoked I-KEY fields I-KEY -RRB- O State-of-the-art O in O orthopaedic B-KEY surgical I-KEY navigation I-KEY with O a O focus O on O medical B-KEY image I-KEY modalities I-KEY This O paper O presents O a O review O of O surgical O navigation O systems O in O orthopaedics O and O categorizes O these O systems O according O to O the O image O modalities O that O are O used O for O the O visualization O of O surgical O action O . O Medical O images O used O to O be O an O essential O part O of O surgical B-KEY education I-KEY and O documentation O as O well O as O diagnosis O and O operation O planning O over O many O years O . O With O the O recent O introduction O of O navigation O techniques O in O orthopaedic O surgery O , O a O new O field O of O application O has O been O opened O . O Today O surgical O navigation O systems O - O also O known O as O image-guided B-KEY surgery I-KEY systems I-KEY - O are O available O for O various O applications O in O orthopaedic O surgery O . O They O visualize O the O position O and O orientation O of O surgical B-KEY instruments I-KEY as O graphical B-KEY overlays I-KEY onto O a O medical O image O of O the O operated O anatomy O on O a O computer B-KEY monitor I-KEY . O Preoperative O image O data O such O as O computed B-KEY tomography I-KEY scans I-KEY or O intra B-KEY operatively I-KEY generated I-KEY images I-KEY -LRB- O for O example O , O ultrasonic O , O endoscopic O or O fluoroscopic O images O -RRB- O are O suitable O for O this O purpose O . O A O new O category O of O medical O images O termed O ` O surgeon-defined B-KEY anatomy I-KEY ' O has O been O developed O that O exclusively O relies O upon O the O usage O of O navigation O technology O . O Points O on O the O anatomy O are O digitized O interactively O by O the O surgeon O and O are O used O to O build O up O an O abstract B-KEY geometrical I-KEY model I-KEY of O the O bony B-KEY structures I-KEY to O be O operated O on O . O This O technique O may O be O used O when O no O other O image O data O is O available O or O appropriate O for O a O given O application O WEXTOR B-KEY : O a O Web-based B-KEY tool I-KEY for O generating O and O visualizing O experimental O designs O and O procedures O WEXTOR B-KEY is O a O Javascript-based B-KEY experiment I-KEY generator I-KEY and O teaching B-KEY tool I-KEY on O the O World B-KEY Wide I-KEY Web I-KEY that O can O be O used O to O design O laboratory O and O Web O experiments O in O a O guided O step-by-step O process O . O It O dynamically O creates O the O customized B-KEY Web I-KEY pages I-KEY and O Javascripts O needed O for O the O experimental O procedure O and O provides O experimenters O with O a O print-ready B-KEY visual I-KEY display I-KEY of O their O experimental O design O . O WEXTOR B-KEY flexibly O supports O complete O and O incomplete O factorial B-KEY designs I-KEY with O between-subjects O , O within-subjects O , O and O quasi-experimental O factors O , O as O well O as O mixed O designs O . O The O software O implements O client-side B-KEY response I-KEY time I-KEY measurement I-KEY and O contains O a O content B-KEY wizard I-KEY for O creating O interactive O materials O , O as O well O as O dependent O measures O -LRB- O graphical O scales O , O multiple-choice O items O , O etc. O -RRB- O , O on O the O experiment O pages O . O However O , O it O does O not O aim O to O replace O a O full-fledged O HTML B-KEY editor O . O Several O methodological O features O specifically O needed O in O Web O experimental O design O have O been O implemented O in O the O Web-based B-KEY tool I-KEY and O are O described O in O this O paper O . O WEXTOR B-KEY is O platform O independent O . O The O created O Web O pages O can O be O uploaded O to O any O type O of O Web B-KEY server I-KEY in O which O data O may O be O recorded O in O logfiles B-KEY or O via O a O database B-KEY . O The O current O version O of O WEXTOR B-KEY is O freely O available O for O educational O and O noncommercial O purposes O . O Its O Web O address O is O http://www.genpsylab.unizh.ch/wextor/index.html O Strong B-KEY active I-KEY solution I-KEY in O non-cooperative O games O For O the O non-cooperative O games O and O the O problems O of O accepting O or O rejecting O a O proposal O , O a O new O notion O of O equilibrium O was O proposed O , O its O place O among O the O known O basic O equilibria O was O established O , O and O its O application O to O the O static O and O dynamic B-KEY game I-KEY problems I-KEY was O demonstrated O Blitzograms B-KEY - O interactive O histograms B-KEY As O computers O become O ever O faster O , O more O and O more O procedures O that O were O once O viewed O as O iterative O will O continue O to O become O instantaneous O . O The O blitzogram B-KEY is O the O application O of O this O trend O to O histograms B-KEY , O which O the O author O hopes O will O lead O to O a O better O tacit O understanding O of O probability B-KEY distributions I-KEY among O both O students O and O managers O . O And O this O is O not O just O an O academic O exercise O . O Commercial O Monte O Carlo O simulation O packages O like O @RISK O and O Crystal O Ball O , O and O my O INSIGHT.xla O are O widely O available O The O p-p B-KEY rearrangement I-KEY and O failure-tolerance B-KEY of O double B-KEY p-ary I-KEY multirings I-KEY and O generalized B-KEY hypercubes I-KEY It O is O shown O that O an O arbitrary O grouped O p-element B-KEY permutation I-KEY can O be O implemented O in O a O conflict-free O way O through O the O commutation B-KEY of O channels O on O the O double B-KEY p-ary I-KEY multiring I-KEY or O the O double O p-ary O hypercube O . O It O is O revealed O that O in O arbitrary O single-element B-KEY permutations I-KEY , O these O commutators B-KEY display O the O property O of O the O -LRB- O p-1 O -RRB- O - O nodal O failure-tolerance B-KEY and O the O generalized B-KEY hypercube I-KEY displays O in O addition O the O property O of O the O -LRB- O p-1 O -RRB- O - O channel O failure-tolerance B-KEY Descriptological B-KEY foundations I-KEY of O programming B-KEY Descriptological B-KEY foundations I-KEY of O programming B-KEY are O constructed O . O An O explication O of O the O concept O of O a O descriptive B-KEY process I-KEY is O given O . O The O operations O of O introduction O and O elimination O of O abstraction O at O the O level O of O processes O are O refined O . O An O intensional B-KEY concept I-KEY of O a O bipolar B-KEY function I-KEY is O introduced O . O An O explication O of O the O concept O of O introduction O and O extraction O of O abstraction O at O the O bipole B-KEY level I-KEY is O given O . O On O this O basis O , O a O complete O set O of O descriptological O operations O is O constructed O Three-dimensional B-KEY geometrical I-KEY optics I-KEY code O for O indoor B-KEY propagation I-KEY This O paper O presents O a O program O , O GO O 3D O , O for O computing O the O fields O of O a O transmitter B-KEY in O an O indoor O environment O using O geometrical O optics O . O The O program O uses O an O `` O image O tree O '' O data O structure O to O construct O the O images O needed O to O compute O all O the O rays O carrying O fields O above O a O preset O `` O threshold O '' O value O , O no O matter O how O many O reflections O are O needed O . O The O paper O briefly O describes O the O input O file O required O to O define O wall B-KEY construction I-KEY , O the O floor B-KEY plan I-KEY , O the O transmitter B-KEY , O and O the O receiver B-KEY locations I-KEY . O A O case O study O consisting O of O a O long O corridor O with O a O small O room O on O one O side O is O used O to O demonstrate O the O features O of O the O GO O 3D O program O Lower B-KEY bounds I-KEY on O the O information B-KEY rate I-KEY of O secret B-KEY sharing I-KEY schemes I-KEY with O homogeneous B-KEY access I-KEY structure I-KEY We O present O some O new O lower B-KEY bounds I-KEY on O the O optimal B-KEY information I-KEY rate I-KEY and O on O the O optimal O average O information O rate O of O secret O sharing O schemes O with O homogeneous O access O structure O . O These O bounds O are O found O by O using O some O covering O constructions O and O a O new O parameter O , O the O k-degree B-KEY of O a O participant O , O that O is O introduced O in O this O paper O . O Our O bounds O improve O the O previous O ones O in O almost O all O cases O All-optical O XOR O gate O using O semiconductor B-KEY optical I-KEY amplifiers I-KEY without O additional O input O beam O The O novel O design B-KEY of O an O all-optical O XOR O gate O by O using O cross-gain B-KEY modulation I-KEY of O semiconductor B-KEY optical I-KEY amplifiers I-KEY has O been O suggested O and O demonstrated O successfully O at O 10 O Gb/s O . O Boolean O AB O and O AB O of O the O two O input O signals O A O and O B O have O been O obtained O and O combined O to O achieve O the O all-optical O XOR O gate O . O No O additional O input O beam O such O as O a O clock O signal O or O continuous O wave O light O is O used O in O this O new O design B-KEY , O which O is O required O in O other O all-optical O XOR O gates O The O two O populations B-KEY ' O cellular B-KEY automata I-KEY model I-KEY with O predation B-KEY based O on O the O Penna B-KEY model I-KEY In O Penna O 's O -LRB- O 1995 O -RRB- O single-species B-KEY asexual I-KEY bit-string I-KEY model I-KEY of O biological B-KEY ageing I-KEY , O the O Verhulst B-KEY factor I-KEY has O too O strong O a O restraining B-KEY effect I-KEY on O the O development O of O the O population B-KEY . O Danuta O Makowiec O gave O an O improved O model O based O on O the O lattice B-KEY , O where O the O restraining O factor O of O the O four O neighbours O take O the O place O of O the O Verhulst B-KEY factor I-KEY . O Here O , O we O discuss O the O two O populations B-KEY ' O Penna B-KEY model I-KEY with O predation B-KEY on O the O planar O lattice B-KEY of O two O dimensions O . O A O cellular B-KEY automata I-KEY model I-KEY containing O movable O wolves B-KEY and O sheep B-KEY has O been O built O . O The O results O show O that O both O the O quantity O of O the O wolves B-KEY and O the O sheep B-KEY fluctuate B-KEY in O accordance O with O the O law O that O one O quantity O increases O while O the O other O one O decreases O Novel O denoising B-KEY algorithm I-KEY for O obtaining O a O superresolved B-KEY position I-KEY estimation I-KEY We O present O a O new O algorithm O that O uses O the O randomness O of O the O noise O pattern O to O achieve O high B-KEY positioning I-KEY accuracy I-KEY by O applying O a O modified B-KEY averaging I-KEY operation I-KEY . O Using O the O suggested O approach O , O noise B-KEY sensitivity I-KEY of O the O positioning O accuracy O can O be O significantly O reduced O . O This O new O improved O algorithm O can O improve O the O performances O of O tracking B-KEY systems I-KEY used O for O military O as O well O as O civil B-KEY applications I-KEY . O The O concept O is O demonstrated O theoretically O as O well O as O by O optical B-KEY experiment I-KEY Pane O relief O . O Robotic O solutions O for O car O windshield O assembly O Just O looking O through O a O car O 's O windshield O does O n't O give O us O much O reason O to O wonder O about O how O it O 's O made O . O The O idea O that O special O manufacturing B-KEY expertise I-KEY might O be O required O can O hardly O occur O to O anyone O , O but O that O 's O exactly O what O is O needed O to O ensure O crystal-clear O visibility O , O not O to O mention O a O perfect O fit O every O time O one O is O pressed O into O place O on O a O car O production B-KEY line O . O Comprising O two O thin O glass O sheets O joined O by O a O vinyl O interlayer O , O windshields O are O assembled-usually O manually-to O very O precise O product B-KEY and O environmental O specifications O . O To O make O sure O this O is O done O as O perfectly O as O possible O , O the O industry O invests O heavily O in O the O equipment O used O for O their O fabrication O . O ABB B-KEY has O now O developed O a O robot-based O Compact B-KEY Assembling I-KEY System I-KEY for O the O automatic O assembly O of O laminated O windshields O that O speeds O up O production B-KEY and O increases O cost B-KEY efficiency I-KEY Re-examining O the O machining B-KEY frictional I-KEY boundary I-KEY conditions I-KEY using O fractals B-KEY Presents O experimental O evidence O for O the O existence O of O non-Euclidean O contact B-KEY geometry I-KEY at O the O tool-chip B-KEY interface I-KEY in O the O machining O of O aluminium B-KEY alloy I-KEY , O which O challenges O conventional O assumptions O . O The O geometry O of O contact O at O the O tool B-KEY rake I-KEY face I-KEY is O modelled O using O fractals B-KEY and O a O dimension O is O computed O for O its O description O . O The O variation O in O the O fractal B-KEY dimension O with O the O cutting B-KEY speed I-KEY is O explored O MACLP O : O multi B-KEY agent I-KEY constraint I-KEY logic I-KEY programming I-KEY Multi B-KEY agent I-KEY systems I-KEY -LRB- O MAS O -RRB- O have O become O the O key O technology O for O decomposing O complex O problems O in O order O to O solve O them O more O efficiently O , O or O for O problems O distributed O in O nature O . O However O , O many O industrial O applications O , O besides O their O distributed O nature O , O also O involve O a O large O number O of O parameters B-KEY and O constraints O , O i.e. O they O are O combinatorial O . O Solving O such O particularly O hard B-KEY problems I-KEY efficiently O requires O programming O tools O that O combine O MAS O technology O with O a O programming O schema O that O facilitates O the O modeling O and O solution O of O constraints O . O This O paper O presents O MACLP O -LRB- O multi B-KEY agent I-KEY constraint I-KEY logic I-KEY programming I-KEY -RRB- O , O a O logic O programming O platform O for O building O , O in O a O declarative O way O , O multi B-KEY agent I-KEY systems I-KEY with O constraint-solving O capabilities O . O MACLP O extends O CSPCONS O , O a O logic O programming O system O that O permits O distributed B-KEY program I-KEY execution I-KEY through O communicating B-KEY sequential I-KEY Prolog I-KEY processes I-KEY with O constraints O , O by O providing O all O the O necessary O facilities O for O communication O between O agents O . O These O facilities O abstract O from O the O programmer O all O the O low-level O details O of O the O communication O and O allow O him O to O focus O on O the O development O of O the O agent O itself O Modeling O the O labor O market O as O an O evolving O institution O : O model O ARTEMIS O A O stylized O French B-KEY labor I-KEY market I-KEY is O modeled O as O an O endogenously B-KEY evolving I-KEY institution I-KEY . O Boundedly O rational O firms O and O individuals O strive O to O decrease O the O cost O or O increase O utility O . O The O labor O market O is O coordinated O by O a O search O process O and O decentralized O setting O of O hiring O standards O , O but O intermediaries O can O speed O up O matching O . O The O model O reproduces O the O dynamics O of O the O gross O flows O and O spectacular B-KEY changes I-KEY in O mobility B-KEY patterns I-KEY of O some O demographic B-KEY groups I-KEY when O the O oil O crisis O in O the O 1970 O 's O occurred O , O notably O the O sudden O decline O of O the O integration O in O good O jobs B-KEY . O The O internal O labor O markets O of O large O firms O are O shown O to O increase O unemployment O if O the O secondary O -LRB- O temporary O or O bad O -RRB- O jobs B-KEY do O not O exist O A O comparison O of O computational B-KEY color I-KEY constancy I-KEY Algorithms I-KEY . O II O . O Experiments O with O image B-KEY data O For O pt.I O see O ibid. O , O vol O . O 11 O , O no. O 9 O , O p.972-84 O -LRB- O 2002 O -RRB- O . O We O test O a O number O of O the O leading O computational B-KEY color I-KEY constancy I-KEY algorithms I-KEY using O a O comprehensive O set O of O images B-KEY . O These O were O of O 33 O different O scenes O under O 11 O different O sources O representative O of O common O illumination B-KEY conditions I-KEY . O The O algorithms O studied O include O two O gray B-KEY world I-KEY methods I-KEY , O a O version O of O the O Retinex B-KEY method I-KEY , O several O variants O of O Forsyth O 's O -LRB- O 1990 O -RRB- O gamut-mapping B-KEY method I-KEY , O Cardei O et O al. O 's O -LRB- O 2000 O -RRB- O neural B-KEY net I-KEY method I-KEY , O and O Finlayson O et O al. O 's O color B-KEY by I-KEY correlation I-KEY method I-KEY -LRB- O Finlayson O et O al. O 1997 O , O 2001 O ; O Hubel O and O Finlayson O 2000 O -RRB- O . O We O discuss O a O number O of O issues O in O applying O color O constancy O ideas O to O image B-KEY data O , O and O study O in O depth O the O effect O of O different O preprocessing O strategies O . O We O compare O the O performance O of O the O algorithms O on O image B-KEY data O with O their O performance O on O synthesized O data O . O All O data O used O for O this O study O are O available O online O at O http://www.cs.sfu.ca/~color/data O , O and O implementations O for O most O of O the O algorithms O are O also O available O -LRB- O http://www.cs.sfu.ca/~color/code O -RRB- O . O Experiments O with O synthesized B-KEY data I-KEY -LRB- O part O one O of O this O paper O -RRB- O suggested O that O the O methods O which O emphasize O the O use O of O the O input B-KEY data I-KEY statistics I-KEY , O specifically O color O by O correlation O and O the O neural O net O algorithm O , O are O potentially O the O most O effective O at O estimating O the O chromaticity B-KEY of O the O scene B-KEY illuminant I-KEY . O Unfortunately O , O we O were O unable O to O realize O comparable O performance O on O real O images B-KEY . O Here O exploiting O pixel B-KEY intensity I-KEY proved O to O be O more O beneficial O than O exploiting O the O details O of O image B-KEY chromaticity B-KEY statistics O , O and O the O three-dimensional O -LRB- O 3-D O -RRB- O gamut-mapping O algorithms O gave O the O best O performance O Teaching O psychology O as O a O laboratory B-KEY science I-KEY in O the O age O of O the O Internet B-KEY For O over O 30 O years O , O psychologists O have O relied O on O computers B-KEY to O teach O experimental O psychology O . O With O the O advent O of O experiment O generators O , O students O can O create O well-designed B-KEY experiments I-KEY and O can O test O sophisticated O hypotheses O from O the O start O of O their O undergraduate B-KEY training I-KEY . O Characteristics O of O new O Net-based B-KEY experiment I-KEY generators I-KEY are O discussed O and O compared O with O traditional O stand-alone B-KEY generators I-KEY . O A O call O is O made O to O formally O evaluate O the O instructional B-KEY effectiveness I-KEY of O the O wide O range O of O experiment O generators O now O available O . O Specifically O , O software B-KEY should O be O evaluated O in O terms O of O known B-KEY learning I-KEY outcomes I-KEY , O using O appropriate O control B-KEY groups I-KEY . O The O many O inherent O differences O between O any O two O software B-KEY programs O should O be O made O clear O . O The O teacher O 's O instructional O method O should O be O fully O described O and O held O constant O between O comparisons O . O Finally O , O the O often O complex O interaction O between O the O teacher O 's O instructional O method O and O the O pedagogical B-KEY details I-KEY of O the O software B-KEY must O be O considered O Customer B-KEY in-reach I-KEY and O library B-KEY strategic I-KEY systems I-KEY : O the O case O of O ILLiad B-KEY Libraries O have O walls O . O Recognizing O this O fact O , O the O Interlibrary B-KEY Loan I-KEY Department I-KEY at O Virginia B-KEY Tech I-KEY is O creating O systems O and O services O that O enable O our O customers O to O reach O past O our O walls O at O anytime O from O anywhere O . O Customer B-KEY in-reach I-KEY enables O Virginia B-KEY Tech I-KEY faculty O , O students O , O and O staff O anywhere O in O the O world O to O obtain O information O and O services O heretofore O available O only O to O our O on-campus O customers O . O ILLiad B-KEY , O Virginia B-KEY Tech I-KEY 's O interlibrary B-KEY borrowing I-KEY system I-KEY , O is O the O library B-KEY strategic I-KEY system I-KEY that O attains O this O goal O . O The O principles O that O guided O development O of O ILLiad B-KEY are O widely O applicable O Modeling O privacy B-KEY control O in O context-aware O systems O Significant O complexity O issues O challenge O designers O of O context-aware B-KEY systems I-KEY with O privacy B-KEY control O . O Information O spaces O provide O a O way O to O organize O information O , O resources O , O and O services O around O important O privacy-relevant O contextual O factors O . O In O this O article O , O we O describe O a O theoretical O model O for O privacy B-KEY control O in O context-aware O systems O based O on O a O core O abstraction O of O information O spaces O . O We O have O previously O focused O on O deriving O socially O based O privacy B-KEY objectives O in O pervasive B-KEY computing I-KEY environments O . O Building O on O Ravi O Sandhu O 's O four-layer O OM-AM O -LRB- O objectives O , O models O , O architectures O , O and O mechanisms O -RRB- O idea O , O we O aim O to O use O information O spaces O to O construct O a O model O for O privacy B-KEY control O that O supports O our O socially O based O privacy O objectives O . O We O also O discuss O how O we O can O introduce O decentralization O , O a O desirable O property O for O many O pervasive B-KEY computing I-KEY systems O , O into O our O information O space O model O , O using O unified O privacy B-KEY tagging O Assessment O of O the O macrocyclic B-KEY effect I-KEY for O the O complexation B-KEY of O crown-ethers B-KEY with O alkali B-KEY cations I-KEY using O the O substructural B-KEY molecular I-KEY fragments I-KEY method I-KEY The O Substructural B-KEY Molecular I-KEY Fragments I-KEY method I-KEY -LRB- O Solov O ` O ev O , O V. O P. O ; O Varnek O , O A. O A. O ; O Wipff O , O G. O J. O Chem O . O Inf O . O Comput O . O Sci O . O 2000 O , O 40 O , O 847-858 O -RRB- O was O applied O to O assess O stability B-KEY constants I-KEY -LRB- O logK O -RRB- O of O the O complexes B-KEY of O crown-ethers B-KEY , O polyethers O , O and O glymes O with O Na/sup O + O / O , O K/sup O + O / O , O and O Cs/sup O + O / O in O methanol O . O One O hundred O forty-seven O computational B-KEY models I-KEY including O different B-KEY fragment I-KEY sets I-KEY coupled O with O linear O or O nonlinear B-KEY fitting I-KEY equations I-KEY were O applied O for O the O data O sets O containing O 69 O -LRB- O Na/sup O + O / O -RRB- O , O 123 O -LRB- O K/sup O + O / O -RRB- O , O and O 31 O -LRB- O Cs/sup O + O / O -RRB- O compounds O . O To O account O for O the O `` O macrocyclic B-KEY effect I-KEY '' O for O crown-ethers B-KEY , O an O additional O `` O cyclicity O '' O descriptor O was O used O . O `` O Predicted O '' O stability B-KEY constants I-KEY both O for O macrocyclic O compounds O and O for O their O open-chain B-KEY analogues I-KEY are O in O good O agreement O with O the O experimental O data O reported O earlier O and O with O those O studied O experimentally O in O this O work O . O The O macrocyclic B-KEY effect I-KEY as O a O function O of O cation O and O ligand O is O quantitatively O estimated O for O all O studied O crown-ethers B-KEY Open B-KEY courseware I-KEY and O shared B-KEY knowledge I-KEY in O higher B-KEY education I-KEY Most O college B-KEY and O university B-KEY campuses O in O the O United O States O and O much O of O the O developed O world O today O maintain O one O , O two O , O or O several O learning B-KEY management I-KEY systems I-KEY -LRB- O LMSs O -RRB- O , O which O are O courseware O products O that O provide O students O and O faculty O with O Web-based O tools O to O manage O course-related O applications O . O Since O the O mid-1990s O , O two O predominant O models O of O Web B-KEY courseware I-KEY management I-KEY systems I-KEY have O emerged O : O commercial O and O noncommercial O . O Some O of O the O commercial B-KEY products I-KEY available O today O were O created O in O academia O as O noncommercial O but O have O since O become O commercially O encumbered O . O Other O products O remain O noncommercial O but O are O struggling O to O survive O in O a O world O of O fierce O commercial O competition O . O This O article O argues O for O an O ethics B-KEY of O pedagogy O in O higher B-KEY education I-KEY that O would O be O based O on O the O guiding O assumptions O of O the O non-proprietary O , O peer-to-peer O , O open-source B-KEY software I-KEY movement O Prospecting O virtual B-KEY collections I-KEY Virtual B-KEY collections I-KEY are O a O distinct O sub-species O of O digital B-KEY collections O and O digital O archives O . O Archivists B-KEY and O curators B-KEY as O archivists B-KEY and O curators B-KEY do O not O construct O virtual B-KEY collections I-KEY ; O rather O they O enable O virtual B-KEY collections I-KEY through O the O application O of O descriptive O and O other O standards O . O Virtual B-KEY collections I-KEY are O constructed O by O end B-KEY users I-KEY Block O truncation O image B-KEY bit I-KEY plane I-KEY coding I-KEY Block B-KEY truncation I-KEY coding I-KEY -LRB- O BTC O -RRB- O is O a O successful O image B-KEY compression I-KEY technique I-KEY due O to O its O simple O and O fast O computational O burden O . O The O bit B-KEY rate I-KEY is O fixed O to O 2.0 O bits/pixel O , O whose O performance B-KEY is O moderate O in O terms O of O compression B-KEY ratio I-KEY compared O to O other O compression O schemes O such O as O discrete O cosine O transform O -LRB- O DCT O -RRB- O , O vector O quantization O -LRB- O VQ O -RRB- O , O wavelet O transform O coding O -LRB- O WTC O -RRB- O , O etc. O . O Two O kinds O of O overheads O are O required O for O BTC O coding O : O bit O plane O and O quantization B-KEY values I-KEY , O respectively O . O A O new O technique O is O presented O to O reduce O the O bit B-KEY plane I-KEY overhead I-KEY . O Conventional O bit B-KEY plane I-KEY overhead I-KEY is O 1.0 O bits/pixel O ; O we O decrease O it O to O 0.734 O bits/pixel O while O maintaining O the O same O decoded B-KEY quality I-KEY as O absolute B-KEY moment I-KEY BTC I-KEY -LRB- O AMBTC B-KEY -RRB- O does O for O the O `` O Lena O '' O image O . O Compared O to O other O published O bit O plane O coding O strategies O , O the O proposed O method O outperforms O all O of O the O existing O methods O Knowledge-based B-KEY structures I-KEY and O organisational B-KEY commitment I-KEY Organisational B-KEY commitment I-KEY , O the O emotional B-KEY attachment I-KEY of O an O employee O to O the O employing O organisation O , O has O attracted O a O substantial O body O of O literature O , O relating O the O concept O to O various O antecedents O , O including O organisational O structure O , O and O to O a O range O of O consequences O , O including O financially O important O performance B-KEY factors I-KEY such O as O productivity B-KEY and O staff B-KEY turnover I-KEY . O The O new O areas O of O knowledge O management O and O learning O organisations O offer O substantial O promise O as O imperatives O for O the O organisation O of O business O enterprises O . O As O organisations O in O the O contemporary O environment O adopt O knowledge-based B-KEY structures I-KEY to O improve O their O competitive O position O , O there O is O value O in O examining O these O structures O against O other O performance O related O factors O . O Theoretical O knowledge-based B-KEY structures I-KEY put O forward O by O R. O Miles O et O al. O -LRB- O 1997 O -RRB- O and O J. O Quinn O et O al. O -LRB- O 1996 O -RRB- O and O an O existing O implementation O are O examined O to O determine O common O features O inherent O in O these O approaches O . O These O features O are O posited O as O a O typical O form O and O their O impact O on O organisational B-KEY commitment I-KEY and O hence O on O individual O and O organisational O performance O is O examined O Prospects O for O quantitative B-KEY computed I-KEY tomography I-KEY imaging I-KEY in O the O presence O of O foreign B-KEY metal I-KEY bodies I-KEY using O statistical B-KEY image I-KEY reconstruction I-KEY X-ray O computed O tomography O -LRB- O CT O -RRB- O images O of O patients O bearing O metal O intracavitary O applicators O or O other O metal O foreign O objects O exhibit O severe O artifacts O including O streaks O and O aliasing O . O We O have O systematically O evaluated O via O computer O simulations O the O impact O of O scattered B-KEY radiation O , O the O polyenergetic O spectrum O , O and O measurement O noise B-KEY on O the O performance O of O three O reconstruction O algorithms O : O conventional O filtered B-KEY backprojection I-KEY -LRB- O FBP O -RRB- O , O deterministic B-KEY iterative I-KEY deblurring I-KEY , O and O a O new O iterative B-KEY algorithm I-KEY , O alternating B-KEY minimization I-KEY -LRB- O AM O -RRB- O , O based O on O a O CT B-KEY detector I-KEY model I-KEY that O includes O noise B-KEY , O scatter B-KEY , O and O polyenergetic B-KEY spectra I-KEY . O Contrary O to O the O dominant O view O of O the O literature O , O FBP O streaking O artifacts O are O due O mostly O to O mismatches O between O FBP O 's O simplified O model O of O CT O detector O response O and O the O physical O process O of O signal O acquisition O . O Artifacts O on O AM O images O are O significantly O mitigated O as O this O algorithm O substantially O reduces O detector-model O mismatches O . O However O , O metal O artifacts O are O reduced O to O acceptable O levels O only O when O prior O knowledge O of O the O metal O object O in O the O patient O , O including O its O pose O , O shape O , O and O attenuation O map O , O are O used O to O constrain O AM O 's O iterations O . O AM O image O reconstruction O , O in O combination O with O object-constrained B-KEY CT I-KEY to O estimate O the O pose O of O metal O objects O in O the O patient O , O is O a O promising O approach O for O effectively O mitigating O metal O artifacts O and O making O quantitative O estimation O of O tissue O attenuation O coefficients O a O clinical B-KEY possibility I-KEY International B-KEY library I-KEY consortia I-KEY : O positive O starts O , O promising O futures O Library O consortia O have O grown O substantially O over O the O past O ten O years O , O both O within O North O America O and O globally O . O As O this O resurgent O consortial O movement O has O begun O to O mature O , O and O as O publishers O and O vendors O have O begun O to O adapt O to O consortial B-KEY purchasing I-KEY models I-KEY , O consortia O have O expanded O their O agendas O for O action O . O The O movement O to O globalize O consortia O is O traced O -LRB- O including O the O development O and O current O work O of O the O International O Coalition O of O Library O Consortia-ICOLC O -RRB- O . O A O methodology O is O explored O to O classify O library O consortia O by O articulating O the O key O factors O that O affect O and O distinguish O consortia O as O organizations O within O three O major O areas O : O strategic O , O tactical O , O and O practical O -LRB- O or O managerial O -RRB- O concerns O . O Common O consortial O values O are O examined O , O and O a O list O of O known O international B-KEY library I-KEY consortia I-KEY is O presented O Verifying O resonant O grounding O in O distribution O systems O The O authors O describe O RESFAL O , O a O software O tool O that O can O check O on O the O behavior O of O distribution O network O resonant B-KEY grounding I-KEY systems I-KEY with O regard O to O compensation B-KEY coil I-KEY tuning I-KEY and O to O fault B-KEY detection I-KEY Quantum B-KEY computing I-KEY with O solids O Science O and O technology O could O be O revolutionized O by O quantum B-KEY computers I-KEY , O but O building O them O from O solid-state B-KEY devices I-KEY will O not O be O easy O . O The O author O outlines O the O challenges O in O scaling O up O the O technology O from O lab O experiments O to O practical O devices O Lung B-KEY metastasis I-KEY detection I-KEY and O visualization O on O CT B-KEY images I-KEY : O a O knowledge-based O method O A O solution O to O the O problem O of O lung B-KEY metastasis I-KEY detection I-KEY on O computed B-KEY tomography I-KEY -LRB- O CT O -RRB- O scans O of O the O thorax B-KEY is O presented O . O A O knowledge-based B-KEY top-down I-KEY approach I-KEY for O image B-KEY interpretation I-KEY is O used O . O The O method O is O inspired O by O the O manner O in O which O a O radiologist O and O radiotherapist O interpret O CT B-KEY images I-KEY before O radiotherapy O is O planned O . O A O two-dimensional O followed O by O a O three-dimensional B-KEY analysis I-KEY is O performed O . O The O algorithm O first O detects O the O thorax B-KEY contour O , O the O lungs O and O the O ribs O , O which O further O help O the O detection O of O metastases O . O Thus O , O two O types O of O tumors O are O detected O : O nodules O and O metastases O located O at O the O lung O extremities O . O A O method O to O visualize O the O anatomical O structures O segmented O is O also O presented O . O The O system O was O tested O on O 20 O patients O -LRB- O 988 O total O images O -RRB- O from O the O Oncology B-KEY Department O of O La O Chaux-de-Fonds O Hospital O and O the O results O show O that O the O method O is O reliable O as O a O computer-aided B-KEY diagnostic I-KEY tool I-KEY for O clinical O purpose O in O an O oncology B-KEY department O Automation O of O the O recovery O of O efficiency O of O complex B-KEY structure I-KEY systems I-KEY Basic O features O are O set O forth O of O the O method O for O automation O of O the O serviceability B-KEY recovery I-KEY of O systems O of O complex O structures O in O real O time O without O the O interruption O of O operation O . O Specific O features O of O the O method O are O revealed O in O an O important O example O of O the O system O of O control O of O hardware B-KEY components I-KEY of O ships B-KEY Who O wants O to O see O a O $ O million O error O ? O Inspired O by O the O popular O television O show O `` O Who O Wants O to O Be O a O Millionaire O ? O '' O , O this O case O discusses O the O monetary O decisions O contestants O face O on O a O game O consisting O of O 15 O increasingly O difficult O multiple O choice O questions O . O Since O the O game O continues O as O long O as O a O contestant O answers O correctly O , O this O case O , O at O its O core O , O is O one O of O sequential O decision B-KEY analysis I-KEY , O amenable O to O analysis O via O stochastic B-KEY dynamic I-KEY programming I-KEY . O The O case O is O also O suitable O for O a O course O dealing O with O single O decision B-KEY analysis I-KEY , O allowing O for O discussion O of O utility O theory O and O Bayesian O probability O revision O . O In O developing O a O story O line O for O the O case O , O the O author O has O sprinkled O in O much O background O material O on O probability O and O statistics B-KEY . O This O material O is O placed O in O a O historical O context O , O illuminating O some O of O the O influential O scholars O involved O in O the O development O of O these O subjects O as O well O as O the O birth O of O operations B-KEY research I-KEY and O the O management O sciences O ISCSI B-KEY poised O to O lower O SAN B-KEY costs I-KEY IT O managers O building O storage B-KEY area I-KEY networks I-KEY or O expanding O their O capacity O may O be O able O to O save O money O by O using O iSCSI B-KEY and O IP B-KEY systems I-KEY rather O than O Fibre O Channel O technologies O Waiting O for O the O wave O to O crest O -LSB- O wavelength B-KEY services I-KEY -RSB- O Wavelength B-KEY services I-KEY have O been O hyped O ad O nauseam O for O years O . O But O despite O their O quick O turn-up O time O and O impressive O margins O , O such O services O have O yet O to O live O up O to O the O industry O 's O expectations O . O The O reasons O for O this O lukewarm O reception O are O many O , O not O the O least O of O which O is O the O confusion O that O still O surrounds O the O technology O , O but O most O industry O observers O are O still O convinced O that O wavelength B-KEY services I-KEY with O ultimately O flourish O Precoded B-KEY OFDM I-KEY with O adaptive B-KEY vector I-KEY channel I-KEY allocation I-KEY for O scalable B-KEY video I-KEY transmission I-KEY over O frequency-selective B-KEY fading I-KEY channels I-KEY Orthogonal B-KEY frequency I-KEY division I-KEY multiplexing I-KEY -LRB- O OFDM O -RRB- O has O been O applied O in O broadband O wireline O and O wireless O systems O for O high O data O rate O transmission O where O severe O intersymbol O interference O -LRB- O ISI O -RRB- O always O occurs O . O The O conventional O OFDM O system O provides O advantages O through O conversion O of O an O ISI B-KEY channel I-KEY into O ISI-free O subchannels O at O multiple O frequency O bands O . O However O , O it O may O suffer O from O channel B-KEY spectral I-KEY nulls I-KEY and O heavy B-KEY data I-KEY rate I-KEY overhead I-KEY due O to O cyclic O prefix O insertion O . O Previously O , O a O new O OFDM O framework O , O the O precoded B-KEY OFDM I-KEY , O has O been O proposed O to O mitigate O the O above O two O problems O through O precoding O and O conversion O of O an O ISI B-KEY channel I-KEY into O ISI-free B-KEY vector I-KEY channels I-KEY . O In O this O paper O , O we O consider O the O application O of O the O precoded B-KEY OFDM I-KEY system O to O efficient O scalable B-KEY video I-KEY transmission I-KEY . O We O propose O to O enhance O the O precoded B-KEY OFDM I-KEY system O with O adaptive B-KEY vector I-KEY channel I-KEY allocation I-KEY to O provide O stronger O protection O against O errors O to O more O important O layers O in O the O layered B-KEY bit I-KEY stream I-KEY structure I-KEY of O scalable O video O . O The O more O critical B-KEY layers I-KEY , O or O equivalently O , O the O lower B-KEY layers I-KEY , O are O allocated O vector O channels O of O higher O transmission O quality O . O The O channel B-KEY quality I-KEY is O characterized O by O Frobenius B-KEY norm I-KEY metrics I-KEY ; O based O on O channel B-KEY estimation I-KEY at O the O receiver O . O The O channel B-KEY allocation I-KEY information I-KEY is O fed O back O periodically O to O the O transmitter O through O a O control B-KEY channel I-KEY . O Simulation O results O have O demonstrated O the O robustness B-KEY of O the O proposed O scheme O to O noise O and O fading O inherent O in O wireless O channels O Trust O in O online O advice O Many O people O are O now O influenced O by O the O information O and O advice O they O find O on O the O Internet B-KEY , O much O of O it O of O dubious O quality O . O This O article O describes O two O studies O concerned O with O those O factors O capable O of O influencing O people O 's O response O to O online O advice O . O The O first O study O is O a O qualitative O account O of O a O group O of O house-hunters O attempting O to O find O worthwhile O information O online O . O The O second O study O describes O a O survey B-KEY of O more O than O 2,500 O people O who O had O actively O sought O advice O over O the O Internet B-KEY . O A O framework O for O understanding O trust O in O online O advice O is O proposed O in O which O first O impressions O are O distinguished O from O more O detailed O evaluations O . O Good O Web B-KEY design I-KEY can O influence O the O first O process O , O but O three O key O factors-source O credibility O , O personalization O , O and O predictability-are O shown O to O predict O whether O people O actually O follow O the O advice O given O A O generalized B-KEY PERT/CPM I-KEY implementation I-KEY in O a O spreadsheet B-KEY This O paper O describes O the O implementation O of O the O traditional O PERT/CPM O algorithm O for O finding O the O critical B-KEY path I-KEY in O a O project O network O in O a O spreadsheet B-KEY . O The O problem O is O of O importance O due O to O the O recent O shift O of O attention O to O using O the O spreadsheet B-KEY environment O as O a O vehicle O for O delivering O management O science/operations O research O -LRB- O MS/OR O -RRB- O techniques O to O end-users O Estimating O long-range B-KEY dependence I-KEY : O finite B-KEY sample I-KEY properties I-KEY and O confidence B-KEY intervals I-KEY A O major O issue O in O financial B-KEY economics I-KEY is O the O behavior O of O asset B-KEY returns I-KEY over O long B-KEY horizons I-KEY . O Various O estimators O of O long-range B-KEY dependence I-KEY have O been O proposed O . O Even O though O some O have O known O asymptotic B-KEY properties I-KEY , O it O is O important O to O test O their O accuracy O by O using O simulated O series O of O different O lengths O . O We O test O R/S O analysis B-KEY , I-KEY detrended I-KEY fluctuation O analysis B-KEY and I-KEY periodogram I-KEY regression O methods O on O samples O drawn B-KEY from I-KEY Gaussian I-KEY white O noise O . O The O DFA O statistics O turns O out O to O be O the O unanimous O winner O . O Unfortunately O , O no O asymptotic O distribution O theory O has O been O derived O for O this O statistics O so O far O . O We O were O able O , O however O , O to O construct O empirical O -LRB- O i.e. O approximate O -RRB- O confidence B-KEY intervals I-KEY for O all O three O methods O . O The O obtained O values O differ O largely O from O heuristic B-KEY values I-KEY proposed O by O some O authors O for O the O R/S O statistics O and O are O very O close O to O asymptotic O values O for B-KEY the I-KEY periodogram I-KEY regression O method O Scale-invariant B-KEY segmentation I-KEY of O dynamic B-KEY contrast-enhanced I-KEY perfusion I-KEY MR I-KEY images I-KEY with O inherent B-KEY scale I-KEY selection I-KEY Selection O of O the O best O set O of O scales O is O problematic O when O developing O signal-driven O approaches O for O pixel-based B-KEY image I-KEY segmentation I-KEY . O Often O , O different O possibly O conflicting O criteria O need O to O be O fulfilled O in O order O to O obtain O the O best O trade-off O between O uncertainty O -LRB- O variance O -RRB- O and O location O accuracy O . O The O optimal O set O of O scales O depends O on O several O factors O : O the O noise B-KEY level I-KEY present O in O the O image O material O , O the O prior O distribution O of O the O different O types O of O segments O , O the O class-conditional B-KEY distributions I-KEY associated O with O each O type O of O segment O as O well O as O the O actual O size O of O the O -LRB- O connected O -RRB- O segments O . O We O analyse O , O theoretically O and O through O experiments B-KEY , O the O possibility O of O using O the O overall O and O class-conditional B-KEY error I-KEY rates I-KEY as O criteria O for O selecting O the O optimal B-KEY sampling I-KEY of O the O linear O and O morphological O scale O spaces O . O It O is O shown O that O the O overall O error O rate O is O optimized O by O taking O the O prior O class O distribution O in O the O image O material O into O account O . O However O , O a O uniform O -LRB- O ignorant O -RRB- O prior O distribution O ensures O constant O class-conditional B-KEY error I-KEY rates I-KEY . O Consequently O , O we O advocate O for O a O uniform O prior O class O distribution O when O an O uncommitted O , O scale-invariant B-KEY segmentation I-KEY approach O is O desired O . O Experiments B-KEY with O a O neural B-KEY net I-KEY classifier I-KEY developed O for O segmentation O of O dynamic O magnetic O resonance O -LRB- O MR O -RRB- O images O , O acquired O with O a O paramagnetic B-KEY tracer I-KEY , O support O the O theoretical O results O . O Furthermore O , O the O experiments B-KEY show O that O the O addition O of O spatial O features O to O the O classifier O , O extracted O from O the O linear O or O morphological O scale O spaces O , O improves O the O segmentation O result O compared O to O a O signal-driven O approach O based O solely O on O the O dynamic O MR O signal O . O The O segmentation O results O obtained O from O the O two O types O of O features O are O compared O using O two O novel O quality B-KEY measures I-KEY that O characterize O spatial O properties O of O labelled B-KEY images I-KEY Nuts O and O bolts O : O implementing O descriptive B-KEY standards I-KEY to O enable O virtual B-KEY collections I-KEY To O date O , O online B-KEY archival I-KEY information I-KEY systems I-KEY have O relied O heavily O on O legacy O finding O aids O for O data O to O encode O and O provide O to O end O users O , O despite O fairly O strong O indications O in O the O archival O literature O that O such O legacy O data O is O problematic O even O as O a O mediated O access O tool O . O Archivists B-KEY have O only O just O begun O to O study O the O utility O of O archival B-KEY descriptive I-KEY data I-KEY for O end B-KEY users I-KEY in O unmediated O settings O such O as O via O the O Web O . O The O ability O of O future O archival B-KEY information I-KEY systems I-KEY to O respond O to O the O expectations O and O needs O of O end B-KEY users I-KEY is O inextricably O linked O to O archivists B-KEY getting O their O collective B-KEY data I-KEY house I-KEY in O order O . O The O General B-KEY International I-KEY Standard I-KEY Archival I-KEY Description I-KEY -LRB- O ISAD B-KEY -LRB- O G O -RRB- O -RRB- O offers O the O profession O a O place O from O which O to O start O extricating O ourselves O from O the O idiosyncracies O of O our O legacy B-KEY data I-KEY and O description O practices O Uncertainty B-KEY bounds I-KEY and O their O use O in O the O design O of O interval B-KEY type-2 I-KEY fuzzy I-KEY logic I-KEY systems I-KEY We O derive O inner O - O and O outer-bound B-KEY sets I-KEY for O the O type-reduced B-KEY set I-KEY of O an O interval B-KEY type-2 I-KEY fuzzy I-KEY logic I-KEY system I-KEY -LRB- O FLS O -RRB- O , O based O on O a O new O mathematical O interpretation O of O the O Karnik-Mendel B-KEY iterative I-KEY procedure I-KEY for O computing O the O type-reduced B-KEY set I-KEY . O The O bound O sets O can O not O only O provide O estimates O about O the O uncertainty O contained O in O the O output O of O an O interval O type-2 O FLS O , O but O can O also O be O used O to O design O an O interval O type-2 O FLS O . O We O demonstrate O , O by O means O of O a O simulation O experiment O , O that O the O resulting O system O can O operate O without O type-reduction O and O can O achieve O similar O performance O to O one O that O uses O type-reduction O . O Therefore O , O our O new O design O method O , O based O on O the O bound O sets O , O can O relieve O the O computation O burden O of O an O interval O type-2 O FLS O during O its O operation O , O which O makes O an O interval O type-2 O FLS O useful O for O real-time B-KEY applications I-KEY Noninvasive O myocardial O activation B-KEY time I-KEY imaging I-KEY : O a O novel O inverse O algorithm O applied O to O clinical O ECG O mapping O data O Linear O approaches O like O the O minimum-norm O least-square O algorithm O show O insufficient O performance O when O it O comes O to O estimating O the O activation O time O map O on O the O surface O of O the O heart O from O electrocardiographic O -LRB- O ECG O -RRB- O mapping O data O . O Additional O regularization O has O to O be O considered O leading O to O a O nonlinear O problem O formulation O . O The O Gauss-Newton B-KEY approach I-KEY is O one O of O the O standard O mathematical O tools O capable O of O solving O this O kind O of O problem O . O To O our O experience O , O this O algorithm O has O specific O drawbacks O which O are O caused O by O the O applied O regularization B-KEY procedure I-KEY . O In O particular O , O under O clinical B-KEY conditions I-KEY the O amount O of O regularization O can O not O be O determined O clearly O . O For O this O reason O , O we O have O developed O an O iterative O algorithm O solving O this O nonlinear O problem O by O a O sequence O of O regularized O linear O problems O . O At O each O step O of O iteration O , O an O individual O L-curve O is O computed O . O Subsequent O iteration B-KEY steps I-KEY are O performed O with O the O individual B-KEY optimal I-KEY regularization I-KEY parameter I-KEY . O This O novel O approach O is O compared O with O the O standard O Gauss-Newton B-KEY approach I-KEY . O Both O methods O are O applied O to O simulated O ECG O mapping O data O as O well O as O to O single O beat O sinus O rhythm O data O from O two O patients O recorded O in O the O catheter B-KEY laboratory I-KEY . O The O proposed O approach O shows O excellent O numerical O and O computational O performance O , O even O under O clinical B-KEY conditions I-KEY at O which O the O Gauss-Newton B-KEY approach I-KEY begins O to O break O down O A O study O on O meaning B-KEY processing I-KEY of O dialogue O with O an O example O of O development O of O travel O consultation O system O This O paper O describes O an O approach O to O processing O meaning O instead O of O processing O information O in O computing O . O Human B-KEY intellectual I-KEY activity I-KEY is O supported O by O linguistic B-KEY activities I-KEY in O the O brain O . O Therefore O , O processing O the O meaning O of O language O instead O of O processing O information O should O allow O us O to O realize O human O intelligence O on O a O computer O . O As O an O example O of O the O proposed O framework O for O processing O meaning O , O we O build O a O travel B-KEY consultation I-KEY dialogue I-KEY system I-KEY which O can O understand O utterance O by O a O user O and O retrieve O information O through O dialogue O . O Through O a O simulation O example O of O the O system O , O we O show O that O both O information B-KEY processing I-KEY and O language B-KEY processing I-KEY are O integrated O Evaluation O of O combined O dispatching O and O routeing O strategies O for O a O flexible B-KEY manufacturing I-KEY system I-KEY This O paper O deals O with O the O evaluation O of O combined O dispatching O and O routeing O strategies O on O the O performance O of O a O flexible B-KEY manufacturing I-KEY system I-KEY . O Three O routeing O policies O - O no O alternative B-KEY routings I-KEY , O alternative B-KEY routeing I-KEY dynamics O and O alternative B-KEY routeing I-KEY plans O - O are O considered O with O four O dispatching B-KEY rules I-KEY with O finite B-KEY buffer I-KEY capacity I-KEY . O In O addition O , O the O effect O of O changing O part B-KEY mix I-KEY ratios I-KEY is O also O discussed O . O The O performance O measures O considered O are O makespan O , O average O machine O utilization O , O average B-KEY flow I-KEY time I-KEY and O average O delay O at O local O input O buffers O . O Simulation O results O indicate O that O the O alternative B-KEY routings I-KEY dynamic O policy O gives O the O best O results O in O three O performance O measures O except O for O average O delay O at O local O input O buffers O . O Further O , O the O effect O of O changing O part B-KEY mix I-KEY ratios I-KEY is O not O significant O Multilayered O image B-KEY representation I-KEY : O application O to O image B-KEY compression I-KEY The O main O contribution O of O this O work O is O a O new O paradigm O for O image B-KEY representation I-KEY and O image B-KEY compression I-KEY . O We O describe O a O new O multilayered B-KEY representation I-KEY technique O for O images O . O An O image O is O parsed O into O a O superposition O of O coherent O layers O : O piecewise B-KEY smooth I-KEY regions I-KEY layer I-KEY , O textures B-KEY layer I-KEY , O etc. O . O The O multilayered B-KEY decomposition I-KEY algorithm I-KEY consists O in O a O cascade O of O compressions O applied O successively O to O the O image O itself O and O to O the O residuals O that O resulted O from O the O previous O compressions O . O During O each O iteration O of O the O algorithm O , O we O code O the O residual B-KEY part I-KEY in O a O lossy O way O : O we O only O retain O the O most O significant O structures O of O the O residual B-KEY part I-KEY , O which O results O in O a O sparse B-KEY representation I-KEY . O Each O layer O is O encoded O independently O with O a O different O transform O , O or O basis O , O at O a O different O bitrate O , O and O the O combination O of O the O compressed O layers O can O always O be O reconstructed O in O a O meaningful O way O . O The O strength O of O the O multilayer O approach O comes O from O the O fact O that O different O sets O of O basis B-KEY functions I-KEY complement O each O others O : O some O of O the O basis B-KEY functions I-KEY will O give O reasonable O account O of O the O large O trend O of O the O data O , O while O others O will O catch O the O local O transients O , O or O the O oscillatory O patterns O . O This O multilayered B-KEY representation I-KEY has O a O lot O of O beautiful O applications O in O image O understanding O , O and O image O and O video O coding O . O We O have O implemented O the O algorithm O and O we O have O studied O its O capabilities O Exact O controllability B-KEY of O shells B-KEY in O minimal B-KEY time I-KEY We O prove O an O exact O controllability B-KEY result O for O thin B-KEY cups I-KEY using O the O Fourier B-KEY method I-KEY and O recent O improvements O of O Ingham O -LRB- O 1936 O -RRB- O type O theorems O Prediction O of O ultraviolet O spectral O absorbance O using O quantitative B-KEY structure-property I-KEY relationships I-KEY High B-KEY performance I-KEY liquid I-KEY chromatography I-KEY -LRB- O HPLC O -RRB- O with O ultraviolet O -LRB- O UV O -RRB- O spectrophotometric O detection O is O a O common O method O for O analyzing O reaction B-KEY products I-KEY in O organic B-KEY chemistry I-KEY . O This O procedure O would O benefit O from O a O computational B-KEY model I-KEY for O predicting O the O relative B-KEY response I-KEY of O organic O molecules O . O Models O are O now O reported O for O the O prediction O of O the O integrated O UV O absorbance O for O a O diverse O set O of O organic O compounds O using O a O quantitative B-KEY structure-property I-KEY relationship I-KEY -LRB- O QSPR O -RRB- O approach O . O A O seven-descriptor B-KEY linear I-KEY correlation I-KEY with O a O squared B-KEY correlation I-KEY coefficient I-KEY -LRB- O R/sup O 2 O / O -RRB- O of O 0.815 O is O reported O for O a O data O set O of O 521 O . O compounds O . O Using O the O sum O of O ZINDO B-KEY oscillator I-KEY strengths I-KEY in O the O integration O range O as O an O additional O descriptor O allowed O reduction O in O the O number O of O descriptors O producing O a O robust O model O for O 460 O compounds O with O five O descriptors O and O a O squared B-KEY correlation I-KEY coefficient I-KEY 0.857 O . O The O descriptors O used O in O the O models O are O discussed O with O respect O to O the O physical O nature O of O the O UV O absorption O process O ConChat B-KEY : O a O context-aware B-KEY chat I-KEY program I-KEY ConChat B-KEY is O a O context-aware B-KEY chat I-KEY program I-KEY that O enriches O electronic O communication O by O providing O contextual B-KEY information I-KEY and O resolving O potential O semantic B-KEY conflicts I-KEY between O users.ConChat O uses O contextual O information O to O improve O electronic O communication O . O Using O contextual B-KEY cues I-KEY , O users O can O infer O during O a O conversation O what O the O other O person O is O doing O and O what O is O happening O in O his O or O her O immediate O surroundings O . O For O example O , O if O a O user O learns O that O the O other O person O is O talking O with O somebody O else O or O is O involved O in O some O urgent O activity O , O he O or O she O knows O to O expect O a O slower O response O . O Conversely O , O if O the O user O learns O that O the O other O person O is O sitting O in O a O meeting O directly O related O to O the O conversation O , O he O or O she O then O knows O to O respond O more O quickly O . O Also O , O by O informing O users O about O the O other O person O 's O context O and O tagging O potentially O ambiguous O chat O messages O , O ConChat B-KEY explores O how O context O can O improve O electronic O communication O by O reducing O semantic B-KEY conflicts I-KEY Guidelines O , O the O Internet O , O and O personal B-KEY health I-KEY : O insights O from O the O Canadian O HEALNet O experience O The O objectives O are O to O summarize O the O insights O gained O in O collaborative B-KEY research I-KEY in O a O Canadian B-KEY Network I-KEY of I-KEY Centres I-KEY of I-KEY Excellence I-KEY , O devoted O to O the O promotion O of O evidence-based B-KEY practice I-KEY , O and O to O relate O this O experience O to O Internet B-KEY support I-KEY of O health B-KEY promotion I-KEY and O consumer B-KEY health I-KEY informatics I-KEY . O A O subjective O review O of O insights O is O undertaken O . O Work O directed O the O development O of O systems O incorporating O guidelines O , O care O maps O , O etc. O , O for O use O by O professionals O met O with O limited O acceptance O . O Evidence-based O tools O for O health O care O consumers O are O a O desirable O complement O but O require O radically O different O content O and O delivery O modes O . O In O addition O to O evidence-based O material O offered O by O professionals O , O a O wide O array O of O Internet-based O products O and O services O provided O by O consumers O for O consumers O emerged O and O proved O a O beneficial O complement O . O The O consumer-driven O products O and O services O provided O via O the O Internet O are O a O potentially O important O and O beneficial O complement O of O traditional O health O services O . O They O affect O the O health B-KEY consumer-provider I-KEY roles I-KEY and O require O changes O in O healthcare O practices O Improving O computer B-KEY security I-KEY for O authentication O of O users O : O influence O of O proactive B-KEY password I-KEY restrictions I-KEY Entering O a O user O name-password O combination O is O a O widely O used O procedure O for O identification O and O authentication O in O computer O systems O . O However O , O it O is O a O notoriously O weak O method O , O in O that O the O passwords O adopted O by O many O users O are O easy O to O crack O . O In O an O attempt O to O , O improve O security O , O proactive B-KEY password I-KEY checking I-KEY may O be O used O , O in O which O passwords O must O meet O several O criteria O to O be O more O resistant O to O cracking O . O In O two O experiments O , O we O examined O the O influence O of O proactive B-KEY password I-KEY restrictions I-KEY on O the O time O that O it O took O to O generate O an O acceptable O password O and O to O use O it O subsequently O to O log O in O . O The O required O length O was O a O minimum O of O five O characters O in O experiment O I O and O eight O characters O in O experiment O 2 O . O In O both O experiments O , O one O condition O had O only O the O length B-KEY restriction I-KEY , O and O the O other O had O additional O restrictions O . O The O additional O restrictions O greatly O increased O the O time O it O took O to O generate O the O password O but O had O only O a O small O effect O on O the O time O it O took O to O use O it O subsequently O to O log O in O . O For O the O five-character B-KEY passwords I-KEY , O 75 O % O were O cracked O when O no O other O restrictions O were O imposed O , O and O this O was O reduced O to O 33 O % O with O the O additional O restrictions O . O For O the O eight-character B-KEY passwords I-KEY , O 17 O % O were O cracked O with O no O other O restrictions O , O and O 12.5 O % O with O restrictions O . O The O results O indicate O that O increasing O the O minimum O character O length O reduces O crackability O and O increases O security O , O regardless O of O whether O additional O restrictions O are O imposed O Standard O protocol O for O exchange O of O health-checkup O data O based O on O SGML B-KEY : O the O Health-checkup B-KEY Data I-KEY Markup I-KEY Language I-KEY -LRB- O HDML O -RRB- O The O objectives O are O to O develop O a O health/medical O data B-KEY interchange I-KEY model I-KEY for O efficient O electronic O exchange O of O data O among O health-checkup O facilities O . O A O Health-checkup B-KEY Data I-KEY Markup I-KEY Language I-KEY -LRB- O HDML O -RRB- O was O developed O on O the O basis O of O the O Standard O Generalized O Markup O Language O -LRB- O SGML B-KEY -RRB- O , O and O a O feasibility O study O carried O out O , O involving O data O exchange O between O two O health O checkup O facilities O . O The O structure O of O HDML O is O described O . O The O transfer O of O numerical B-KEY lab I-KEY data I-KEY , O summary B-KEY findings I-KEY and O health B-KEY status I-KEY assessment I-KEY was O successful O . O HDML O is O an O improvement O to O laboratory O data O exchange O . O Further O work O has O to O address O the O exchange O of O qualitative O and O textual O data O K-12 B-KEY instruction I-KEY and O digital B-KEY access I-KEY to O archival B-KEY materials I-KEY Providing O K-12 O schools O with O digital B-KEY access I-KEY to O archival B-KEY materials I-KEY can O strengthen O both O student B-KEY learning I-KEY and O archival B-KEY practice I-KEY , O although O it O can O not O replace O direct B-KEY physical I-KEY access I-KEY to O records O . O The O article O compares O a O variety O of O electronic O and O nonelectronic B-KEY projects I-KEY to O promote O teaching O with O primary B-KEY source I-KEY materials I-KEY . O The O article O also O examines O some O of O the O different O historiographical O and O pedagogical B-KEY approaches I-KEY used O in O archival B-KEY Web I-KEY sites O geared O for O K-12 B-KEY instruction I-KEY , O focusing O on O differences O between O the O educational B-KEY sites I-KEY sponsored O by O the O Library B-KEY of I-KEY Congress I-KEY and O the O National B-KEY Archives I-KEY and I-KEY Records I-KEY Administration I-KEY Web-based B-KEY experiments I-KEY controlled O by O JavaScript B-KEY : O an O example O from O probability B-KEY learning O JavaScript B-KEY programs O can O be O used O to O control O Web O experiments O . O This O technique O is O illustrated O by O an O experiment O that O tested O the O effects O of O advice B-KEY on O performance O in O the O classic O probability-learning O paradigm O . O Previous O research O reported O that O people O tested O via O the O Web O or O in O the O lab O tended O to O match O the O probabilities B-KEY of O their O responses O to O the O probabilities B-KEY that O those O responses O would O be O reinforced O . O The O optimal O strategy O , O however O , O is O to O consistently O choose O the O more O frequent O event O ; O probability B-KEY matching O produces O suboptimal O performance O . O We O investigated O manipulations O we O reasoned O should O improve O performance O . O A O horse O race O scenario O in O which O participants O predicted O the O winner O in O each O of O a O series O of O races O between O two O horses O was O compared O with O an O abstract O scenario O used O previously O . O Ten O groups O of O learners O received O different O amounts O of O advice B-KEY , O including O all O combinations O of O -LRB- O 1 O -RRB- O explicit B-KEY instructions I-KEY concerning O the O optimal O strategy O , O -LRB- O 2 O -RRB- O explicit B-KEY instructions I-KEY concerning O a O monetary O sum O to O maximize O , O and O -LRB- O 3 O -RRB- O accurate O information O concerning O the O probabilities B-KEY of O events O . O The O results O showed O minimal O effects O of O horse O race O versus O abstract O scenario O . O Both O advice B-KEY concerning O the O optimal O strategy O and O probability B-KEY information O contributed O significantly O to O performance O in O the O task O . O This O paper O includes O a O brief O tutorial O on O JavaScript B-KEY , O explaining O with O simple O examples O how O to O assemble O a O browser-based B-KEY experiment I-KEY Compatibility O of O systems O of O linear B-KEY constraints I-KEY over O the O set B-KEY of I-KEY natural I-KEY numbers I-KEY Criteria O of O compatibility O of O a O system O of O linear B-KEY Diophantine I-KEY equations I-KEY , O strict B-KEY inequations I-KEY , O and O nonstrict B-KEY inequations I-KEY are O considered O . O Upper B-KEY bounds I-KEY for O components O of O a O minimal O set O of O solutions O and O algorithms O of O construction O of O minimal B-KEY generating I-KEY sets I-KEY of O solutions O for O all O types O of O systems O are O given O . O These O criteria O and O the O corresponding O algorithms O for O constructing O a O minimal O supporting O set O of O solutions O can O be O used O in O solving O all O the O considered O types O of O systems O and O systems O of O mixed O types O The O UK O 's O National B-KEY Electronic I-KEY Site I-KEY Licensing I-KEY Initiative I-KEY -LRB- O NESLI B-KEY -RRB- O In O 1998 O the O UK O created O the O National B-KEY Electronic I-KEY Site I-KEY Licensing I-KEY Initiative I-KEY -LRB- O NESLI B-KEY -RRB- O to O increase O and O improve O access O to O electronic B-KEY journals I-KEY and O to O negotiate O license B-KEY agreements I-KEY on O behalf O of O academic B-KEY libraries I-KEY . O The O use O of O a O model O license B-KEY agreement I-KEY and O the O success O of O site O licensing O is O discussed O . O Highlights O from O an O interim O evaluation O by O the O Joint B-KEY Information I-KEY Systems I-KEY Committee I-KEY -LRB- O JISC B-KEY -RRB- O are O noted O and O key O issues O and O questions O arising O from O the O evaluation O are O identified O Matching O PET O and O CT O scans O of O the O head B-KEY and O neck B-KEY area O : O Development O of O method O and O validation O Positron O emission O tomography O -LRB- O PET O -RRB- O provides O important O information O on O tumor B-KEY biology I-KEY , O but O lacks O detailed O anatomical B-KEY information I-KEY . O Our O aim O in O the O present O study O was O to O develop O and O validate O an O automatic B-KEY registration I-KEY method I-KEY for O matching O PET O and O CT O scans O of O the O head B-KEY and O neck B-KEY . O Three O difficulties O in O achieving O this O goal O are O -LRB- O 1 O -RRB- O nonrigid B-KEY motions I-KEY of O the O neck B-KEY can O hamper O the O use O of O automatic B-KEY ridged I-KEY body I-KEY transformations I-KEY ; O -LRB- O 2 O -RRB- O emission O scans O contain O too O little O anatomical B-KEY information I-KEY to O apply O standard B-KEY image I-KEY fusion I-KEY methods I-KEY ; O and O -LRB- O 3 O -RRB- O no O objective O way O exists O to O quantify O the O quality O of O the O match O results O . O These O problems O are O solved O as O follows O : O accurate O and O reproducible O positioning O of O the O patient B-KEY was O achieved O by O using O a O radiotherapy B-KEY treatment I-KEY mask I-KEY . O The O proposed O method O makes O use O of O the O transmission O rather O than O the O emission O scan O . O To O obtain O sufficient O -LRB- O anatomical O -RRB- O information O for O matching O , O two O bed B-KEY positions I-KEY for O the O transmission B-KEY scan I-KEY were O included O in O the O protocol O . O A O mutual B-KEY information-based I-KEY algorithm I-KEY was O used O as O a O registration B-KEY technique I-KEY . O PET O and O CT O data O were O obtained O in O seven O patients B-KEY . O Each O patient B-KEY had O two O CT O scans O and O one O PET O scan O . O The O datasets O were O used O to O estimate O the O consistency O by O matching O PET O to O CT/sub O 1 O / O , O CT/sub O 1 O / O to O CT/sub O 2 O / O , O and O CT/sub O 2 O / O to O PET O using O the O full B-KEY circle I-KEY consistency I-KEY test I-KEY . O It O was O found O that O using O our O method O , O consistency O could O be O obtained O of O 4 O mm O and O 1.3 O degrees O on O average O . O The O PET O voxels O used O for O registration O were O 5.15 O mm O , O so O the O errors B-KEY compared O quite O favorably O with O the O voxel O size O . O Cropping O the O images O -LRB- O removing O the O scanner B-KEY bed I-KEY from O images O -RRB- O did O not O improve O the O consistency O of O the O algorithm O . O The O transmission B-KEY scan I-KEY , O however O , O could O potentially O be O reduced O to O a O single O position O using O this O approach O . O In O conclusion O , O the O represented O algorithm O and O validation O technique O has O several O features O that O are O attractive O from O both O theoretical O and O practical O point O of O view O , O it O is O a O user-independent O , O automatic O validation O technique O for O matching O CT O and O PET O scans O of O the O head B-KEY and O neck B-KEY , O which O gives O the O opportunity O to O compare O different O image B-KEY enhancements I-KEY Reachability B-KEY sets I-KEY of O a O class O of O multistep B-KEY control I-KEY processes I-KEY : O their O design O An O upper B-KEY estimate I-KEY and O an O iterative O `` O restriction O '' O algorithm O for O the O reachability B-KEY set I-KEY for O determining O the O optimal B-KEY control I-KEY for O a O class O of O multistep B-KEY control I-KEY processes I-KEY are O designed O A O better O ballot B-KEY box I-KEY ? O Election O officials O are O examining O technologies O to O address O a O wide O range O of O voting O issues O . O The O problems O observed O in O the O November O 2000 O US O election O accelerated O existing O trends O to O get O rid O of O lever O machines O , O punch-cards O , O and O hand-counted O paper O ballots O and O replace O them O with O mark-sense B-KEY balloting I-KEY , O Internet O , O and O automatic O teller O machine O -LRB- O ATM O -RRB- O kiosk O style O computer-based O systems O . O An O estimated O US O $ O 2 O - O $ O 4 O billion O will O be O spent O in O the O United O States O and O Canada O to O update O voting O systems O during O the O next O decade O . O Voting O online O might O enable O citizens O to O vote O even O if O they O are O unable O to O get O to O the O polls O . O Yet O making O these O methods O work O right O turns O out O to O be O considerably O more O difficult O than O originally O thought O . O New O electronic B-KEY voting I-KEY systems O pose O risks O as O well O as O solutions O . O As O it O turns O out O , O many O of O the O voting O products O currently O for O sale O provide O less O accountability O , O poorer O reliability O , O and O greater O opportunity O for O widespread O fraud O than O those O already O in O use O . O This O paper O discusses O the O technology O available O and O how O to O ensure O accurate O ballots O . O NET O obfuscation O and O intellectual B-KEY property I-KEY The O author O considers O obfuscation O options O for O protecting O . O NET O code O . O Many O programs O wo O n't O need O obfuscation O because O the O loss O caused O by O reverse B-KEY engineering I-KEY will O be O nonexistent O . O Numerous O obfuscators O are O already O available O for O the O . O NET O platform O , O ranging O from O a O basic O renaming O obfuscator O to O a O fully O functional O obfuscator O that O handles O mixed O IL/native O code O assemblies O created O in O any O managed O language O , O including O Microsoft O 's O C++ O with O Managed O Extensions O . O An O obfuscator O simply O makes O your O application O harder O to O reverse B-KEY engineer I-KEY . O It O does O not O prevent O reverse B-KEY engineering I-KEY . O However O , O the O cost O of O obfuscation O is O insignificant O when O compared O to O the O cost O of O a O typical O software O development O project O . O If O you O feel O like O an O obfuscator O provides O you O any O benefit O at O all O , O it O 's O probably O worth O the O price O Optimal B-KEY linear I-KEY control I-KEY in O stabilizer O design O The O most O common O method O of O improving O stability O of O the O power O system O is O the O synthesis O of O the O turbine O and O generator O control O systems O , O because O of O the O high O effectiveness O and O relatively O low O cost O of O these O elements O . O The O synthesis O and O construction O of O the O effective O synchronous O generator O and O turbine O controller O is O a O very O difficult O task O . O This O paper O describes O the O seven O step O mu O - O synthesis O approach O to O PSS B-KEY design I-KEY enabling O the O synchronous O generator O to O remain O stable O over O a O wide O range O of O system O operating O conditions O Analysis O and O efficient O implementation O of O a O linguistic O fuzzy O c-means O The O paper O is O concerned O with O a O linguistic O fuzzy O c-means O -LRB- O FCM O -RRB- O algorithm O with O vectors O of O fuzzy B-KEY numbers I-KEY as O inputs O . O This O algorithm O is O based O on O the O extension B-KEY principle I-KEY and O the O decomposition B-KEY theorem I-KEY . O It O turns O out O that O using O the O extension B-KEY principle I-KEY to O extend O the O capability O of O the O standard O membership O update O equation O to O deal O with O a O linguistic B-KEY vector I-KEY has O a O huge O computational B-KEY complexity I-KEY . O In O order O to O cope O with O this O problem O , O an O efficient O method O based O on O fuzzy B-KEY arithmetic I-KEY and O optimization B-KEY has O been O developed O and O analyzed O . O We O also O carefully O examine O and O prove O that O the O algorithm O behaves O in O a O way O similar O to O the O FCM O in O the O degenerate O linguistic O case O . O Synthetic O data O sets O and O the O iris O data O set O have O been O used O to O illustrate O the O behavior O of O this O linguistic O version O of O the O FCM O Measuring O keyboard O response O delays O by O comparing O keyboard O and O joystick B-KEY inputs I-KEY The O response O characteristics O of O PC B-KEY keyboards I-KEY have O to O be O identified O when O they O are O used O as O response O devices O in O psychological B-KEY experiments I-KEY . O In O the O past O , O the O proposed O method O has O been O to O check B-KEY the O characteristics O independently O by O means O of O external O measurement O equipment O . O However O , O with O the O availability O of O different O PC O models O and O the O rapid O pace O of O model B-KEY change I-KEY , O there O is O an O urgent O need O for O the O development O of O convenient O and O accurate O methods O of O checking B-KEY . O The O method O proposed O consists O of O raising O the O precision O of O the O PC O 's O clock O to O the O microsecond O level O and O using O a O joystick O connected O to O the O MIDI B-KEY terminal I-KEY of O a O sound B-KEY board I-KEY to O give O the O PC O an O independent B-KEY timing I-KEY function I-KEY . O Statistical O processing O of O the O data O provided O by O this O method O makes O it O possible O to O estimate O accurately O the O keyboard B-KEY scanning I-KEY interval I-KEY time I-KEY and O the O average B-KEY keyboard I-KEY delay I-KEY time I-KEY . O The O results O showed O that O measured O keyboard O delay O times O varied O from O 11 O to O 73 O msec O , O depending O on O the O keyboard O model O , O with O most O values O being O less O than O 30 O msec O BioOne O : O a O new O model O for O scholarly O publishing O This O article O describes O a O unique O electronic B-KEY journal I-KEY publishing I-KEY project I-KEY involving O the O University B-KEY of I-KEY Kansas I-KEY , O the O Big B-KEY 12 I-KEY Plus I-KEY Libraries I-KEY Consortium I-KEY , O the O American O Institute O of O Biological B-KEY Sciences I-KEY , O Allen O Press O , O and O SPARC O , O the O Scholarly O Publishing O and O Academic O Resources O Coalition O . O This O partnership O has O created O BioOne O , O a O database O of O 40 O full-text O society O journals O in O the O biological O and O environmental B-KEY sciences I-KEY , O which O was O launched O in O April O , O 2001 O . O The O genesis O and O development O of O the O project O is O described O and O financial O , O technical O , O and O intellectual B-KEY property I-KEY models I-KEY for O the O project O are O discussed O . O Collaborative B-KEY strategies I-KEY for O the O project O are O described O Solutions O for O cooperative B-KEY games I-KEY A O new O concept O of O the O characteristic B-KEY function I-KEY is O defined O . O It O matches O cooperative B-KEY games I-KEY far O better O than O the O classical O characteristic B-KEY function I-KEY and O is O useful O in O reducing O the O number O of O decisions B-KEY that O can O be O used O as O the O unique B-KEY solution I-KEY of O a O game O Optimal B-KEY online I-KEY algorithm I-KEY for O scheduling O on O two O identical O machines O with O machine B-KEY availability I-KEY constraints I-KEY This O paper O considers O the O online O scheduling O on O two O identical O machines O with O machine B-KEY availability I-KEY constraints I-KEY for O minimizing O makespan O . O We O assume O that O machine O M/sub O j O / O is O unavailable O during O period O from O s/sub O j O / O to O t/sub O j O / O -LRB- O 0 O < O or O = O s/sub O j O / O < O t/sub O j O / O -RRB- O , O j O = O 1 O , O 2 O , O and O the O unavailable O periods O of O two O machines O do O not O overlap O . O We O show O that O the O competitive O ratio O of O list B-KEY scheduling I-KEY is O 3 O . O We O further O give O an O optimal O algorithm O with O a O competitive O ratio O 5/2 O Evolution O of O the O high-end O computing O market O in O the O USA B-KEY This O paper O focuses O on O the O technological O change O in O the O high-end O computing O market O . O The O discussion O combines O historical B-KEY analysis I-KEY with O strategic B-KEY analysis I-KEY to O provide O a O framework O to O analyse O a O key O component O of O the O computer B-KEY industry I-KEY . O This O analysis O begins O from O the O perspective O of O government B-KEY research I-KEY and O development B-KEY spending I-KEY ; O then O examines O the O confusion O around O the O evolution O of O the O high-end O computing O market O in O the O context O of O standard O theories O of O technology B-KEY strategy I-KEY and O new B-KEY product I-KEY innovation I-KEY . O Rather O than O the O high-end O market O being O ` O dead O ' O , O one O should O view O the O market O as O changing O due O to O increased O capability O and O competition B-KEY from O the O low-end B-KEY personal I-KEY computer I-KEY market I-KEY . O The O high-end O market O is O also O responding O to O new B-KEY product I-KEY innovation I-KEY from O the O introduction O of O new O parallel B-KEY computing I-KEY architectures I-KEY . O In O the O conclusion O , O key O leverage O points O in O the O market O are O identified O and O the O trends O in O high-end O computing O are O highlighted O with O implications O Option B-KEY pricing I-KEY from O path B-KEY integral I-KEY for O non-Gaussian O fluctuations O . O Natural B-KEY martingale I-KEY and O application O to O truncated B-KEY Levy I-KEY distributions I-KEY Within O a O path B-KEY integral I-KEY formalism O for O non-Gaussian O price O fluctuations O , O we O set O up O a O simple O stochastic B-KEY calculus I-KEY and O derive O a O natural B-KEY martingale I-KEY for O option B-KEY pricing I-KEY from O the O wealth O balance O of O options O , O stocks B-KEY , O and O bonds B-KEY . O The O resulting O formula O is O evaluated O for O truncated B-KEY Levy I-KEY distributions I-KEY From O revenue B-KEY management I-KEY concepts I-KEY to O software B-KEY systems I-KEY In O 1999 O , O after O developing O and O installing O over O 170 O revenue O management O -LRB- O RM O -RRB- O systems O for O more O than O 70 O airlines O , O PROS B-KEY Revenue I-KEY Management I-KEY , O Inc. B-KEY had O the O opportunity O to O develop O RM O systems B-KEY for I-KEY three O companies O in O nonairline O industries O . O PROS O research O and O design O department O designed O the O opportunity B-KEY analysis I-KEY study I-KEY -LRB- O OAS B-KEY -RRB- O , O a O mix O of O OR/MS B-KEY , O consulting O , O and O software B-KEY development I-KEY practices I-KEY to O determine O the O applicability O of O RM O in O new O business O situations O . O PROS O executed O OASs O with O the O three O companies O . O In O all O three O cases O , O the O OAS B-KEY supported O the O value O of O RM O and O led O to O contracts O for O implementation O of O RM B-KEY systems I-KEY Estimation O of O error O in O curvature O computation O on O multi-scale O free-form O surfaces O A O novel O technique O for O multi-scale B-KEY curvature I-KEY computation I-KEY on O a O free-form O 3-D O surface O is O presented O . O This O is O achieved O by O convolving O local B-KEY parametrisations I-KEY of O the O surface O with O 2-D O Gaussian O filters O iteratively O . O In O our O technique O , O semigeodesic B-KEY coordinates I-KEY are O constructed O at O each O vertex O of O the O mesh O . O Smoothing O results O are O shown O for O 3-D O surfaces O with O different O shapes O indicating O that O surface B-KEY noise I-KEY is O eliminated O and O surface O details O are O removed O gradually O . O A O number O of O evolution B-KEY properties I-KEY of O 3-D O surfaces O are O described O . O Next O , O the O surface O Gaussian O and O mean B-KEY curvature I-KEY values I-KEY are O estimated O accurately O at O multiple O scales O which O are O then O mapped O to O colours O and O displayed O directly O on O the O surface O . O The O performance O of O the O technique O when O selecting O different O directions O as O an O arbitrary O direction O for O the O geodesic O at O each O vertex O are O also O presented O . O The O results O indicate O that O the O error O observed O for O the O estimation O of O Gaussian O and O mean O curvatures O is O quite O low O after O only O one O iteration O . O Furthermore O , O as O the O surface O is O smoothed O iteratively O , O the O error O is O further O reduced O . O The O results O also O show O that O the O estimation O error O of O Gaussian O curvature O is O less O than O that O of O mean O curvature O . O Our O experiments O demonstrate O that O estimation O of O smoothed O surface O curvatures O are O very O accurate O and O not O affected O by O the O arbitrary O direction O of O the O first O geodesic O line O when O constructing O semigeodesic B-KEY coordinates I-KEY . O Our O technique O is O independent O of O the O underlying B-KEY triangulation I-KEY and O is O also O more O efficient O than O volumetric B-KEY diffusion I-KEY techniques I-KEY since O 2-D O rather O than O 3-D O convolutions B-KEY are O employed O . O Finally O , O the O method O presented O here O is O a O generalisation O of O the O Curvature B-KEY Scale I-KEY Space I-KEY method I-KEY for O 2-D O contours O . O The O CSS O method O has O outperformed O comparable O techniques O within O the O MPEG-7 B-KEY evaluation I-KEY framework I-KEY . O As O a O result O , O it O has O been O selected O for O inclusion O in O the O MPEG-7 O package O of O standards O Fuzzy B-KEY modeling I-KEY based O on O generalized B-KEY conjunction I-KEY operations I-KEY An O approach O to O fuzzy B-KEY modeling I-KEY based O on O the O tuning B-KEY of O parametric O conjunction O operations O is O proposed O . O First O , O some O methods O for O the O construction O of O parametric O generalized B-KEY conjunction I-KEY operations I-KEY simpler O than O the O known O parametric O classes O of O conjunctions O are O considered O and O discussed O . O Second O , O several O examples O of O function B-KEY approximation I-KEY by O fuzzy B-KEY models I-KEY , O based O on O the O tuning B-KEY of O the O parameters O of O the O new O conjunction O operations O , O are O given O and O their O approximation B-KEY performances I-KEY are O compared O with O the O approaches O based O on O a O tuning B-KEY of O membership B-KEY functions I-KEY and O other O approaches O proposed O in O the O literature O . O It O is O seen O that O the O tuning B-KEY of O the O conjunction O operations O can O be O used O for O obtaining O fuzzy B-KEY models I-KEY with O a O sufficiently O good O performance O when O the O tuning B-KEY of O membership B-KEY functions I-KEY is O not O possible O or O not O desirable O Twenty O years O of O the O literature O on O acquiring O out-of-print B-KEY materials I-KEY This O article O reviews O the O last O two-and-a-half O decades O of O literature O on O acquiring O out-of-print B-KEY materials I-KEY to O assess O recurring B-KEY issues I-KEY and O identify O changing B-KEY practices I-KEY . O The O out-of-print O literature O is O uniform O in O its O assertion O that O libraries O need O to O acquire O o.p. O materials O to O replace O worn O or O damaged O copies O , O to O replace O missing O copies O , O to O duplicate O copies O of O heavily O used O materials O , O to O fill O gaps O in O collections O , O to O strengthen O weak O collections O , O to O continue O to O develop O strong O collections O , O and O to O provide O materials O for O new O courses O , O new O programs O , O and O even O entire O new O libraries O Real-time B-KEY enterprise I-KEY solutions I-KEY for O discrete B-KEY manufacturing I-KEY and O consumer B-KEY goods I-KEY Customer B-KEY satisfaction I-KEY and O a O focus O on O core B-KEY competencies I-KEY have O dominated O the O thinking O of O a O whole O host O of O industries O in O recent O years O . O However O , O one O outcome O , O the O outsourcing O of O noncore O activities O , O has O made O the O production O of O goods-from O order O entry O to O final O delivery-more O and O more O complex O . O Suppliers O , O subsuppliers O , O producers O and O customers O are O therefore O busy O adopting O a O new O , O more O collaborative O approach O . O This O is O mainly O taking O the O form O of O order-driven B-KEY planning I-KEY and O scheduling O of O production O , O but O it O is O also O being O steered O by O a O need O to O reduce O inventories O and O working O capital O as O well O as O a O desire O to O increase O throughput O and O optimize O production O ePsych B-KEY : O interactive B-KEY demonstrations I-KEY and O experiments O in O psychology O ePsych B-KEY -LRB- O http://epsych.msstate.edu O -RRB- O , O a O new O Web B-KEY site I-KEY currently O under O active O development O , O is O intended O to O teach B-KEY students O about O the O discipline O of O psychology O . O The O site O presumes O little O prior O knowledge O about O the O field O and O so O may O be O used O in O introductory O classes O , O but O it O incorporates O sufficient O depth O of O coverage O to O be O useful O in O more O advanced O classes O as O well O . O Numerous O interactive O and O dynamic O elements O are O incorporated O into O various O modules O , O orientations O , O and O guidebooks O . O These O elements O include O Java-based B-KEY experiments I-KEY and O demonstrations O , O video B-KEY clips I-KEY , O and O animated B-KEY diagrams I-KEY . O Rapid O access O to O all O material O is O provided O through O a O layer-based B-KEY navigation I-KEY system I-KEY that O allows O users O to O visit O various O `` O Worlds B-KEY of I-KEY the I-KEY Mind I-KEY . O '' O Active B-KEY learning I-KEY is O encouraged O , O by O challenging O students O with O puzzles O and O problems O and O by O providing O the O opportunity O to O `` O dig O deeper O '' O to O learn O more O about O the O phenomena O at O hand O The O culture O of O usability O Now O that O most O of O us O agree O that O usability O testing O is O an O integral O investment O in O site O development O , O it O 's O time O to O recognize O that O the O standard O approach O falls O short O . O It O is O possible O to O do O less O work O and O get O better O results O while O spending O less O money O . O By O bringing O usability O testing O in-house O and O breaking O tests O into O more O manageable O sessions O , O you O can O vastly O improve O your O online O offering O without O affecting O your O profit O margin O Real-time B-KEY implementation I-KEY of O a O new O low-memory O SPIHT O image O coding O algorithm O using O DSP B-KEY chip I-KEY Among O all O algorithms O based O on O wavelet B-KEY transform I-KEY and O zerotree B-KEY quantization I-KEY , O Said O and O Pearlman O 's O -LRB- O 1996 O -RRB- O set B-KEY partitioning I-KEY in I-KEY hierarchical I-KEY trees I-KEY -LRB- O SPIHT O -RRB- O algorithm O is O well-known O for O its O simplicity O and O efficiency O . O This O paper O deals O with O the O real-time B-KEY implementation I-KEY of O SPIHT B-KEY algorithm I-KEY using O DSP B-KEY chip I-KEY . O In O order O to O facilitate O the O implementation O and O improve O the O codec B-KEY 's O performance O , O some O relative O issues O are O thoroughly O discussed O , O such O as O the O optimization O of O program O structure O to O speed O up O the O wavelet B-KEY decomposition I-KEY . O SPIHT O 's O high O memory O requirement O is O a O major O drawback O for O hardware O implementation O . O In O this O paper O , O we O modify O the O original O SPIHT B-KEY algorithm I-KEY by O presenting O two O new O concepts-number O of O error O bits O and O absolute B-KEY zerotree I-KEY . O Consequently O , O the O memory O cost O is O significantly O reduced O . O We O also O introduce O a O new O method O to O control O the O coding O process O by O number B-KEY of I-KEY error I-KEY bits I-KEY . O Our O experimental O results O show O that O the O implementation O meets O common O requirement O of O real-time O video B-KEY coding I-KEY and O is O proven O to O be O a O practical O and O efficient O DSP O solution O Using O virtual B-KEY reality I-KEY to O teach O disability O awareness O A O desktop O virtual B-KEY reality I-KEY -LRB- O VR O -RRB- O program O was O designed O and O evaluated O to O teach O children B-KEY about O the O accessibility B-KEY and O attitudinal O barriers O encountered O by O their O peers O with O mobility B-KEY impairments I-KEY . O Within O this O software O , O children B-KEY sitting O in O a O virtual B-KEY wheelchair I-KEY experience O obstacles O such O as O stairs O , O narrow O doors O , O objects O too O high O to O reach O , O and O attitudinal O barriers O such O as O inappropriate O comments O . O Using O a O collaborative B-KEY research I-KEY methodology I-KEY , O 15 O youth O with O mobility B-KEY impairments I-KEY assisted O in O developing O and O beta-testing O the O software O . O The O effectiveness O of O the O program O was O then O evaluated O with O 60 O children B-KEY in O Grades O 4-6 O using O a O controlled O pretest/posttest O design O . O The O results O indicated O that O the O program O was O effective O for O increasing O children B-KEY 's O knowledge O of O accessibility B-KEY barriers O . O Attitudes O , O grade O level O , O familiarity O with O individuals O with O a O disability O , O and O gender B-KEY were O also O investigated O Brightness-independent B-KEY start-up I-KEY routine I-KEY for O star B-KEY trackers I-KEY Initial B-KEY attitude I-KEY acquisition I-KEY by O a O modern O star B-KEY tracker I-KEY is O investigated O here O . O Criteria O for O efficient O organization O of O the O on-board B-KEY database I-KEY are O discussed O with O reference O to O a O brightness-independent O initial O acquisition O algorithm O . O Star B-KEY catalog I-KEY generation I-KEY preprocessing I-KEY is O described O , O with O emphasis O on O the O identification O of O minimum B-KEY star I-KEY brightness I-KEY for O detection O by O a O sensor O based O on O a O charge O coupled O device O -LRB- O CCD O -RRB- O photodetector O . O This O is O a O crucial O step O for O proper O evaluation O of O the O attainable O sky O coverage O when O selecting O the O stars O to O be O included O in O the O on-board O catalog O . O Test O results O are O also O reported O , O both O for O reliability B-KEY and O accuracy O , O even O if O the O former O is O considered O to O be O the O primary O target O . O Probability O of O erroneous O solution O is O 0.2 O % O in O the O case O of O single O runs O of O the O procedure O , O while O attitude O determination O accuracy O is O in O the O order O of O 0.02 O degrees O in O the O average O for O the O computation O of O the O inertial O pointing O of O the O boresight B-KEY axis I-KEY A O comparison O of O the O discounted B-KEY utility I-KEY model I-KEY and O hyperbolic B-KEY discounting I-KEY models I-KEY in O the O case O of O social O and O private O intertemporal B-KEY preferences I-KEY for O health O Whilst O there O is O substantial O evidence O that O hyperbolic B-KEY discounting I-KEY models I-KEY describe O intertemporal B-KEY preferences I-KEY for O monetary O outcomes O better O than O the O discounted O utility O -LRB- O DU O -RRB- O model O , O there O is O only O very O limited O evidence O in O the O context O of O health B-KEY outcomes I-KEY . O This O study O elicits O private O and O social O intertemporal B-KEY preferences I-KEY for O non-fatal O changes O in O health O . O Specific O functional O forms O of O the O DU O model O and O three O hyperbolic O models O are O fitted O . O The O results O show O that O the O stationarity O axiom O is O violated O , O and O that O the O hyperbolic O models O fit O the O data O better O than O the O DU O model O . O Intertemporal B-KEY preferences I-KEY for O private O and O social B-KEY decisions I-KEY are O found O to O be O very O similar O Layer-based B-KEY machining I-KEY : O recent O development O and O support B-KEY structure I-KEY design I-KEY There O is O growing O interest O in O additive O and O subtractive B-KEY shaping I-KEY theories I-KEY that O are O synthesized O to O integrate O the O layered B-KEY manufacturing I-KEY process I-KEY and O material B-KEY removal I-KEY process I-KEY . O Layer-based B-KEY machining I-KEY has O emerged O as O a O promising O method O for O integrated O additive O and O subtractive B-KEY shaping I-KEY theory I-KEY . O In O the O paper O , O major O layer-based B-KEY machining I-KEY systems O are O reviewed O and O compared O according O to O characteristics O of O stock B-KEY layers I-KEY , O numerical B-KEY control I-KEY machining I-KEY configurations I-KEY , O stacking B-KEY operations I-KEY , O input B-KEY format I-KEY and O raw B-KEY materials I-KEY . O Support O structure O , O a O major O issue O in O machining-based O systems O which O has O seldom O been O addressed O in O previous O research O , O is O investigated O in O the O paper O with O considerations O of O four O situations O : O floating B-KEY overhang I-KEY , O cantilever B-KEY , O vaulted B-KEY overhang I-KEY and O ceiling B-KEY . O Except O for O the O floating B-KEY overhang I-KEY where O a O support O structure O should O not O be O overlooked O , O the O necessity O for O support O structures O for O the O other O three O situations O is O determined O by O stress B-KEY and O deflection B-KEY analysis I-KEY . O This O is O demonstrated O by O the O machining O of O a O large O castle O model O A O fuzzy B-KEY logic I-KEY adaptation I-KEY circuit I-KEY for O control B-KEY systems I-KEY of O deformable B-KEY space I-KEY vehicles I-KEY : O its O design O A O fuzzy-logic O adaptation O algorithm O is O designed O for O adjusting O the O discreteness B-KEY period I-KEY of O a O control B-KEY system I-KEY for O ensuring O the O stability B-KEY and O quality O of O control O process O with O regard O to O the O elastic B-KEY structural I-KEY vibrations I-KEY of O a O deformable B-KEY space I-KEY vehicle I-KEY . O Its O performance O is O verified O by O digital B-KEY modeling I-KEY of O a O discrete O control B-KEY system I-KEY with O two O objects O Elimination O of O zero-order O diffraction O in O digital B-KEY holography I-KEY A O simple O method O to O suppress O the O zero-order O diffraction O in O the O reconstructed B-KEY image I-KEY of O digital B-KEY holography I-KEY is O presented O . O In O this O method O , O the O Laplacian B-KEY of O a O detected B-KEY hologram I-KEY is O used O instead O of O the O hologram O itself O for O numerical O reconstruction O by O computing O the O discrete B-KEY Fresnel I-KEY integral I-KEY . O This O method O can O significantly O improve O the O image B-KEY quality I-KEY and O give O better O resolution O and O higher O accuracy B-KEY of O the O reconstructed B-KEY image I-KEY . O The O main O advantages O of O this O method O are O its O simplicity O in O experimental O requirements O and O convenience O in O data B-KEY processing I-KEY Computer B-KEY mediated I-KEY communication I-KEY and O university B-KEY international I-KEY students I-KEY The O design O for O the O preliminary O study O presented O was O based O on O the O experiences O of O the O international O students O and O faculty B-KEY members I-KEY of O a O small B-KEY southwest I-KEY university I-KEY being O surveyed O and O interviewed O . O The O data B-KEY collection I-KEY procedure I-KEY blends O qualitative O and O quantitative B-KEY data I-KEY . O A O strong O consensus O was O found O that O supports O the O study O 's O premise O that O there O is O an O association O between O the O use O of O computer B-KEY mediated I-KEY communication I-KEY -LRB- O CMC B-KEY -RRB- O and O teaching B-KEY and O learning B-KEY performance I-KEY of O international O students O . O Both O groups O believe O CMC B-KEY to O be O an O effective O teaching B-KEY and O learning O tool O by O : O increasing O the O frequency O and O quality O of O communication O between O students O and O instructors B-KEY ; O improving O language B-KEY skills I-KEY through O increased O writing O and O communication B-KEY opportunities I-KEY ; O allowing O students O and O instructors B-KEY to O stay O current O and O to O compete O effectively O ; O providing O alternative O teaching B-KEY and O learning O methods O to O increase O students O ' O confidence O in O their O ability O to O communicate O effectively O with O peers B-KEY and O instructors B-KEY ; O and O improving O the O instructors B-KEY ' O pedagogical B-KEY focus I-KEY and O questioning B-KEY techniques I-KEY Using O the O Web O to O answer O legal B-KEY reference I-KEY questions I-KEY In O an O effort O to O help O non-law O librarians O with O basic O legal B-KEY reference I-KEY questions I-KEY , O the O author O highlights O three O basic O legal O Web O sites O and O outlines O useful O subject-specific O Web O sites O that O focus O on O statutes O and O regulations O , O case B-KEY law I-KEY and O attorney B-KEY directories I-KEY 7 O key O tests O in O choosing O your O Web B-KEY site I-KEY firm O Most O legal B-KEY firms I-KEY now O have O a O Web B-KEY site I-KEY and O are O starting O to O evaluate O the O return O on O their O investment O . O The O paper O looks O at O factors O involved O when O choosing O a O firm O to O help O set O up O or O improve O a O Web B-KEY site I-KEY . O -LRB- O 1 O -RRB- O Look O for O a O company O that O combines O technical B-KEY skills I-KEY and O business B-KEY experience I-KEY . O -LRB- O 2 O -RRB- O Look O for O a O company O that O offers O excellent O customer B-KEY service I-KEY . O -LRB- O 3 O -RRB- O Check O that O the O Web B-KEY site I-KEY firm O is O committed O to O developing O and O proactively B-KEY updating I-KEY the O Web B-KEY site I-KEY . O -LRB- O 4 O -RRB- O Make O sure O the O firm O has O a O proven O track O record O and O a O good O portfolio O . O -LRB- O 5 O -RRB- O Look O for O a O company O with O both O a O breadth O as O well O as O depth O of O skills O . O -LRB- O 6 O -RRB- O Make O sure O the O firm O can O deliver O work O on O target O , O in O budget O and O to O specification O . O -LRB- O 7 O -RRB- O Ensure O that O you O will O enjoy O working O and O feel O comfortable O with O the O Web B-KEY site I-KEY firm O staff O Identification O of O states O of O complex O systems O with O estimation O of O admissible B-KEY measurement I-KEY errors I-KEY on O the O basis O of O fuzzy O information O The O problem O of O identification O of O states O of O complex O systems O on O the O basis O of O fuzzy O values O of O informative B-KEY attributes I-KEY is O considered O . O Some O estimates O of O a O maximally O admissible O degree O of O measurement B-KEY error I-KEY are O obtained O that O make O it O possible O , O using O the O apparatus O of O fuzzy B-KEY set I-KEY theory I-KEY , O to O correctly O identify O the O current O state O of O a O system O Iterative B-KEY regularized I-KEY least-mean I-KEY mixed-norm I-KEY image I-KEY restoration I-KEY We O develop O a O regularized O mixed-norm O image O restoration O algorithm O to O deal O with O various O types O of O noise B-KEY . O A O mixed-norm B-KEY functional I-KEY is O introduced O , O which O combines O the O least O mean O square O -LRB- O LMS O -RRB- O and O the O least O mean O fourth O -LRB- O LMF O -RRB- O functionals O , O as O well O as O a O smoothing B-KEY functional I-KEY . O Two O regularization B-KEY parameters I-KEY are O introduced O : O one O to O determine O the O relative O importance O of O the O LMS O and O LMF O functionals O , O which O is O a O function O of O the O kurtosis B-KEY , O and O another O to O determine O the O relative O importance O of O the O smoothing B-KEY functional I-KEY . O The O two O parameters O are O chosen O in O such O a O way O that O the O proposed O functional O is O convex O , O so O that O a O unique B-KEY minimizer I-KEY exists O . O An O iterative B-KEY algorithm I-KEY is O utilized O for O obtaining O the O solution O , O and O its O convergence B-KEY is O analyzed O . O The O novelty O of O the O proposed O algorithm O is O that O no O knowledge O of O the O noise B-KEY distribution O is O required O , O and O the O relative O contributions O of O the O LMS O , O the O LMF O , O and O the O smoothing O functionals O are O adjusted O based O on O the O partially O restored O image O . O Experimental O results O demonstrate O the O effectiveness O of O the O proposed O algorithm O IT O as O a O key O enabler O to O law B-KEY firm I-KEY competitiveness O Professional B-KEY services I-KEY firms I-KEY have O traditionally O been O able O to O thrive O in O virtually O any O market O conditions O . O They O have O been O consistently O successful O for O several O decades O without O ever O needing O to O reexamine O or O change O their O basic O operating O model O . O However O , O gradual O but O inexorable O change O in O client B-KEY expectations I-KEY and O the O business B-KEY environment I-KEY over O recent O years O now O means O that O more O of O the O same O is O no O longer O enough O . O In O future O , O law B-KEY firms I-KEY will O increasingly O need O to O exploit O IT O more O effectively O in O order O to O remain O competitive O . O To O do O this O , O they O will O need O to O ensure O that O all O their O information B-KEY systems I-KEY function O as O an O integrated O whole O and O are O available O to O their O staff O , O clients O and O business O partners O . O The O authors O set O out O the O lessons O to O be O learned O for O law B-KEY firms I-KEY in O the O light O of O the O recent O PA O Consulting O survey O Entrepreneurs B-KEY in I-KEY Action I-KEY : O a O Web-case B-KEY model I-KEY Much O of O the O traditional B-KEY schooling I-KEY in O America B-KEY is O built O around O systems O of O compliance O and O control O , O characteristics O which O stifle O the O creative O and O entrepreneurial B-KEY instincts I-KEY of O the O children O who O are O subjected O to O these O tactics O . O The O article O explores O a O different O approach O to O education O , O one O that O involves O capturing O the O interest O of O the O student O through O the O use O of O problem O and O project-based B-KEY instruction I-KEY delivered O via O the O Internet B-KEY . O Called O Entrepreneurs B-KEY in I-KEY Action I-KEY , O this O program O seeks O to O involve O students O in O a O problem O at O the O outset O and O to O promote O the O learning O of O traditional B-KEY subject I-KEY areas I-KEY as O a O process O of O the O problem-solving B-KEY activities I-KEY that O are O undertaken O . O The O program O 's O details O are O explained O , O from O elementary B-KEY school I-KEY through O university B-KEY level I-KEY courses I-KEY , O and O the O authors O outline O their O plans O to O test O the O efficacy O of O the O program O at O each O level O A O 0.8-V O 128-kb O four-way O set-associative O two-level B-KEY CMOS I-KEY cache I-KEY memory I-KEY using O two-stage O wordline/bitline-oriented B-KEY tag-compare I-KEY -LRB- O WLOTC/BLOTC O -RRB- O scheme O This O paper O reports O a O 0.8-V O 128-kb O four-way O set-associative O two-level B-KEY CMOS I-KEY cache I-KEY memory I-KEY using O a O novel O two-stage O wordline/bitline-oriented B-KEY tag-compare I-KEY -LRB- O WLOTC/BLOTC O -RRB- O and O sense O wordline/bitline O -LRB- O SWL/SBL O -RRB- O tag-sense B-KEY amplifiers I-KEY with O an O eight-transistor O -LRB- O 8-T O -RRB- O tag O cell O in O Level O 2 O -LRB- O L2 O -RRB- O and O a O 10-T O shrunk O logic O swing O -LRB- O SLS O -RRB- O memory O cell O . O with O the O ground/floating O -LRB- O G/F O -RRB- O data O sense O amplifier O in O Level O 1 O -LRB- O L1 O -RRB- O for O high-speed B-KEY operation I-KEY for O low-voltage O low-power B-KEY VLSI I-KEY system I-KEY applications I-KEY . O Owing O to O the O reduced O loading O at O the O SWL O in O the O new O 11-T O tag O cell O using O the O WLOTC O scheme O , O the O 10-T O SLS O memory O cell O with O G/F O sense O amplifier O in O L1 O , O and O the O split O comparison O of O the O index O signal O in O the O 8-T O tag O cells O with O SWL/SBL O tag O sense O amplifiers O in O L2 O , O this O 0.8-V O cache O memory O implemented O in O a O 1.8-V O 0.18 O - O mu O m O CMOS O technology O has O a O measured O L1/L2 O hit O time O of O 11.6 O / O 20.5 B-KEY ns I-KEY at O the O average O dissipation O of O 0.77 B-KEY mW I-KEY at O 50 B-KEY MHz I-KEY The O Bagsik B-KEY Oscillator I-KEY without O complex O numbers O We O argue O that O the O analysis O of O the O so-called O Bagsik B-KEY Oscillator I-KEY , O recently O published O by O Piotrowski O and O Sladkowski O -LRB- O 2001 O -RRB- O , O is O erroneous O due O to O : O -LRB- O 1 O -RRB- O the O incorrect B-KEY banking I-KEY data I-KEY used O and O -LRB- O 2 O -RRB- O the O application O of O statistical B-KEY mechanism I-KEY apparatus I-KEY to O processes O that O are O totally O deterministic O Time-varying B-KEY properties I-KEY of O renal B-KEY autoregulatory I-KEY mechanisms I-KEY In O order O to O assess O the O possible O time-varying B-KEY properties I-KEY of O renal O autoregulation O , O time-frequency O and O time-scaling O methods O were O applied O to O renal O blood O flow O under O broad-band B-KEY forced I-KEY arterial I-KEY blood I-KEY pressure I-KEY fluctuations I-KEY and O single-nephron B-KEY renal O blood O flow O with O spontaneous O oscillations O obtained O from O normotensive O -LRB- O Sprague-Dawley O , O Wistar O , O and O Long-Evans O -RRB- O rats O , O and O spontaneously O hypertensive O rats O . O Time-frequency O analyses O of O normotensive O and O hypertensive O blood O flow O data O obtained O from O either O the O whole B-KEY kidney I-KEY or O the O single-nephron B-KEY show O that O indeed O both O the O myogenic O and O tubuloglomerular O feedback O -LRB- O TGF O -RRB- O mechanisms O have O time-varying O characteristics O . O Furthermore O , O we O utilized O the O Renyi B-KEY entropy I-KEY to O measure O the O complexity O of O blood-flow O dynamics O in O the O time-frequency O plane O in O an O effort O to O discern O differences O between O normotensive O and O hypertensive O recordings O . O We O found O a O clear O difference O in O Renyi B-KEY entropy I-KEY between O normotensive O and O hypertensive O blood O flow O recordings O at O the O whole B-KEY kidney I-KEY level O for O both O forced O -LRB- O p O < O 0.037 O -RRB- O and O spontaneous B-KEY arterial I-KEY pressure I-KEY fluctuations I-KEY -LRB- O p O < O 0.033 O -RRB- O , O and O at O the O single-nephron B-KEY level O -LRB- O p O < O 0.008 O -RRB- O . O Especially O at O the O single-nephron B-KEY level O , O the O mean O Renyi B-KEY entropy I-KEY is O significantly O larger O for O hypertensive O than O normotensive B-KEY rats I-KEY , O suggesting O more O complex O dynamics O in O the O hypertensive O condition O . O To O further O evaluate O whether O or O not O the O separation O of O dynamics O between O normotensive O and O hypertensive B-KEY rats I-KEY is O found O in O the O prescribed O frequency O ranges O of O the O myogenic O and O TGF O mechanisms O , O we O employed O multiresolution O wavelet O transform O . O Our O analysis O revealed O that O exclusively O over O scale O ranges O corresponding O to O the O frequency O intervals O of O the O myogenic O and O TGF O mechanisms O , O the O widths O of O the O blood O flow O wavelet O coefficients O fall O into O disjoint O sets O for O normotensive O and O hypertensive B-KEY rats I-KEY . O The O separation O of O the O scales O at O the O myogenic O and O TGF O frequency O ranges O is O distinct O and O obtained O with O 100 O % O accuracy O . O However O , O this O observation O remains O valid O only O for O the O whole B-KEY kidney I-KEY blood O pressure/flow O data O . O The O results O suggest O that O understanding O of O the O time-varying B-KEY properties I-KEY of O the O two O mechanisms O is O required O for O a O complete O description O of O renal O autoregulation O The O Open B-KEY Archives I-KEY Initiative I-KEY : O realizing O simple O and O effective O digital B-KEY library I-KEY interoperability I-KEY The O Open B-KEY Archives I-KEY Initiative I-KEY -LRB- O OAI O -RRB- O is O dedicated O to O solving O problems O of O digital B-KEY library I-KEY interoperability I-KEY . O Its O focus O has O been O on O defining O simple O protocols B-KEY , O most O recently O for O the O exchange O of O metadata O from O archives O . O The O OAI O evolved O out O of O a O need O to O increase O access O to O scholarly B-KEY publications I-KEY by O supporting O the O creation O of O interoperable O digital O libraries O . O As O a O first O step O towards O such O interoperability O , O a O metadata B-KEY harvesting I-KEY protocol I-KEY was O developed O to O support O the O streaming O of O metadata O from O one O repository O to O another O , O ultimately O to O a O provider O of O user O services O such O as O browsing O , O searching O , O or O annotation O . O This O article O provides O an O overview O of O the O mission O , O philosophy O , O and O technical O framework O of O the O OAI O Linear B-KEY models O of O circuits O based O on O the O multivalued O components O Linearization B-KEY and O planarization B-KEY of O the O circuit O models O is O pivotal O to O the O submicron B-KEY technologies I-KEY . O On O the O other O hand O , O the O characteristics O of O the O VLSI B-KEY circuits I-KEY can O be O sometimes O improved O by O using O the O multivalued O components O . O It O was O shown O that O any O l-level O circuit O based O on O the O multivalued O components O is O representable O as O an O algebraic O model O based O on O l O linear B-KEY arithmetic O polynomials O mapped O correspondingly O into O l O decision O diagrams O that O are O linear O and O planar O by O nature O . O Complexity O of O representing O a O circuit O as O the O linear B-KEY decision O diagram O was O estimated O as O O O -LRB- O G O -RRB- O with O G O for O the O number O of O multivalued O components O in O the O circuit O . O The O results O of O testing O the O LinearDesignMV B-KEY algorithm I-KEY on O circuits O of O more O than O 8000 O LGSynth B-KEY 93 I-KEY multivalued I-KEY components I-KEY were O presented O Modularity B-KEY in O technology B-KEY and O organization B-KEY The O paper O is O an O attempt O to O raid O both O the O literature O on O modular B-KEY design O and O the O literature O on O property B-KEY rights I-KEY to O create O the O outlines O of O a O modularity B-KEY theory O of O the O firm O . O Such O a O theory O will O look O at O firms O , O and O other O organizations B-KEY , O in O terms O of O the O partitioning O of O rights-understood O as O protected O spheres O of O authority-among O cooperating B-KEY parties I-KEY . O It O will O assert O that O organizations B-KEY reflect O nonmodular B-KEY structures I-KEY , O that O is O , O structures O in O which O decision B-KEY rights I-KEY , O rights B-KEY of I-KEY alienation I-KEY , O and O residual O claims O to O income O do O not O all O reside O in O the O same O hands O The O use O of O the O SPSA O method O in O ECG O analysis O The O classification O , O monitoring O , O and O compression O of O electrocardiogram O -LRB- O ECG O -RRB- O signals O recorded O of O a O single O patient O over O a O relatively O long O period O of O time O is O considered O . O The O particular O application O we O have O in O mind O is O high-resolution O ECG O analysis O , O such O as O late O potential O analysis O , O morphology O changes O in O QRS O during O arrythmias O , O T-wave O alternants O , O or O the O study O of O drug O effects O on O ventricular O activation O . O We O propose O to O apply O a O modification O of O a O classical O method O of O cluster B-KEY analysis I-KEY or O vector O quantization O . O The O novelty O of O our O approach O is O that O we O use O a O new O distortion B-KEY measure I-KEY to O quantify O the O distance O of O two O ECG B-KEY cycles I-KEY , O and O the O class-distortion O measure O is O defined O using O a O min-max O criterion O . O The O new O class-distortion-measure B-KEY is O much O more O sensitive O to O outliers O than O the O usual O distortion B-KEY measures I-KEY using O average-distance O . O The O price O of O this O practical O advantage O is O that O computational O complexity O is O significantly O increased O . O The O resulting O nonsmooth B-KEY optimization I-KEY problem I-KEY is O solved O by O an O adapted O version O of O the O simultaneous O perturbation O stochastic O approximation O -LRB- O SPSA O -RRB- O method O of O J. O Spall O -LRB- O IEEE O Trans O . O Automat O . O Contr. O , O vol O . O 37 O , O p. O 332-41 O , O Mar. O 1992 O -RRB- O . O The O main O idea O is O to O generate O a O smooth O approximation O by O a O randomization B-KEY procedure I-KEY . O The O viability O of O the O method O is O demonstrated O on O both O simulated O and O real O data O . O An O experimental O comparison O with O the O widely O used O correlation B-KEY method I-KEY is O given O on O real O data O Content B-KEY standards I-KEY for O electronic B-KEY books I-KEY : O the O OEBF B-KEY publication I-KEY structure I-KEY and O the O role O of O public B-KEY interest I-KEY participation I-KEY In O the O emerging O world O of O electronic B-KEY publishing I-KEY how O we O create O , O distribute O , O and O read O books O will O be O in O a O large O part O determined O by O an O underlying O framework O of O content B-KEY standards I-KEY that O establishes O the O range O of O technological O opportunities O and O constraints O for O publishing O and O reading O systems O . O But O efforts O to O develop O content B-KEY standards I-KEY based O on O sound O engineering O models O must O skillfully O negotiate O competing O and O sometimes O apparently O irreconcilable O objectives O if O they O are O to O produce O results O relevant O to O the O rapidly O changing O course O of O technology O . O The O Open O eBook O Forum O 's O Publication O Structure O , O an O XML-based B-KEY specification I-KEY for O electronic B-KEY books I-KEY , O is O an O example O of O the O sort O of O timely O and O innovative O problem O solving O required O for O successful O real-world O standards O development O . O As O a O result O of O this O effort O , O the O electronic B-KEY book I-KEY industry O will O not O only O happen O sooner O and O on O a O larger O scale O than O it O would O have O otherwise O , O but O the O electronic B-KEY books I-KEY it O produces O will O be O more O functional O , O more O interoperable O , O and O more O accessible O to O all O readers O . O Public B-KEY interest I-KEY participants I-KEY have O a O critical O role O in O this O process O A O new O approach O to O the O problem O of O structural B-KEY identification I-KEY . O II O The O subject O under O discussion O is O a O new O approach O to O the O problem O of O structural B-KEY identification I-KEY , O which O relies O on O the O recognition O of O a O decisive O role O of O the O human B-KEY factor I-KEY in O the O process O of O structural B-KEY identification I-KEY . O Potential O possibilities O of O the O suggested O approach O are O illustrated O by O the O statement O of O a O new O mathematical O problem O of O structural B-KEY identification I-KEY Learning O spatial B-KEY relations I-KEY using O an O inductive B-KEY logic I-KEY programming I-KEY system I-KEY The O ability O to O learn O spatial B-KEY relations I-KEY is O a O prerequisite O for O performing O many O relevant O tasks O such O as O those O associated O with O motion O , O orientation O , O navigation O , O etc. O . O This O paper O reports O on O using O an O Inductive O Logic O Programming O -LRB- O ILP O -RRB- O system O for O learning O function-free B-KEY Horn-clause I-KEY descriptions I-KEY of O spatial O knowledge O . O Its O main O contribution O , O however O , O is O to O show O that O an O existing O relation O between O two O reference O systems-the O speaker-relative O and O the O absolute-can O be O automatically O learned O by O an O ILP O system O , O given O the O proper O background O knowledge O and O positive O examples O The O variance O of O firm B-KEY growth I-KEY rates I-KEY : O the O ` O scaling O ' O puzzle O Recent O evidence O suggests O that O a O power-law B-KEY relationship O exists O between O a O firm O 's O size O and O the O variance O of O its O growth O rate O . O The O flatness B-KEY of O the O relation O is O regarded O as O puzzling O , O in O that O it O suggests O that O large O firms O are O not O much O more O stable O than O small O firms O . O It O has O been O suggested O that O the O powerlaw O nature O of O the O relationship O reflects O the O presence O of O some O form O of O correlation B-KEY of O growth O rates O across O the O firm O 's O constituent B-KEY businesses I-KEY . O Here O , O it O is O shown O that O a O model O of O independent O businesses O which O allows O for O the O fact O that O these O businesses O vary O in O size O , O as O modelled O by O a O simple O ` O partitions O of O integers O ' O model O , O provides O a O good O representation O of O what O is O observed O empirically O Motion B-KEY estimation I-KEY using O modified B-KEY dynamic I-KEY programming I-KEY A O new O method O for O computing O precise B-KEY estimates I-KEY of O the O motion B-KEY vector I-KEY field I-KEY of O moving B-KEY objects I-KEY in O a O sequence O of O images O is O proposed O . O Correspondence O vector-field B-KEY computation I-KEY is O formulated O as O a O matching B-KEY optimization I-KEY problem I-KEY for O multiple B-KEY dynamic I-KEY images I-KEY . O The O proposed O method O is O a O heuristic B-KEY modification I-KEY of O dynamic B-KEY programming I-KEY applied O to O the O 2-D B-KEY optimization I-KEY problem I-KEY . O Motion-vector-field O estimates O using O real B-KEY movie I-KEY images I-KEY demonstrate O good O performance O of O the O algorithm B-KEY in O terms O of O dynamic B-KEY motion I-KEY analysis I-KEY More O constructions O for O Boolean B-KEY algebras I-KEY We O construct O Boolean B-KEY algebras I-KEY with O prescribed B-KEY behaviour I-KEY concerning O depth O for O the O free B-KEY product I-KEY of O two O Boolean B-KEY algebras I-KEY over O a O third O , O in O ZFC B-KEY using O pcf O ; O assuming O squares O we O get O results O on O ultraproducts B-KEY . O We O also O deal O with O the O family O of O cardinalities O and O topological O density O of O homomorphic B-KEY images I-KEY of O Boolean B-KEY algebras I-KEY -LRB- O you O can O translate O it O to O topology-on O the O cardinalities O of O closed O subspaces O -RRB- O ; O and O lastly O we O deal O with O inequalities O between O cardinal B-KEY invariants I-KEY , O mainly O d O -LRB- O B O -RRB- O / O sup O kappa O / O < O | O B O | O implies O ind O -LRB- O B O -RRB- O > O / O sup O kappa O / O V O Depth O -LRB- O B O -RRB- O > O or O = O log O -LRB- O | O B O | O -RRB- O Factors O contributing O to O preservice O teachers O ' O discomfort O in O a O Web-based B-KEY course I-KEY structured O as O an O inquiry O A O report O is O given O of O a O qualitative B-KEY emergent I-KEY design I-KEY study I-KEY of O a O Science O , O Technology O , O Society O Interaction O -LRB- O STS B-KEY -RRB- O Web-enhanced B-KEY course I-KEY . O Students O ' O discomfort O during O the O pilot O test O provided O insight O into O the O intellectual B-KEY scaffolding I-KEY that O preservice B-KEY secondary I-KEY science I-KEY teachers I-KEY needed O to O optimize O their O performance O when O required O to O develop O understanding O through O open-ended B-KEY inquiry I-KEY in O a O Web B-KEY environment I-KEY . O Eight O factors O identified O contributed O to O student B-KEY discomfort I-KEY : O computer B-KEY skills I-KEY , O paradigm B-KEY shifts I-KEY , O trust B-KEY , O time B-KEY management I-KEY , O thinking B-KEY about O their O own O thinking B-KEY , O systematic B-KEY inquiry I-KEY , O self-assessment B-KEY , O and O scientific B-KEY discourse I-KEY . O These O factors O suggested O developing O understanding O through O inquiry O by O conducting O a O self-designed O , O open-ended O , O systematic B-KEY inquiry I-KEY required O autonomous B-KEY learning I-KEY involving O metacognitive B-KEY skills I-KEY and O time B-KEY management I-KEY skills O . O To O the O extent O in O which O students O either O came O into O the O course O with O this O scaffolding O , O or O developed O it O during O the O course O , O they O were O successful O in O learning O about O STS B-KEY and O its O relationship O to O science B-KEY teaching I-KEY . O Changes O in O the O Web O site O made O to O accommodate O learners O ' O needs O as O they O surfaced O are O described O Computational O finite-element O schemes O for O optimal O control O of O an O elliptic O system O with O conjugation B-KEY conditions I-KEY New O optimal B-KEY control I-KEY problems I-KEY are O considered O for O distributed B-KEY systems I-KEY described O by O elliptic B-KEY equations I-KEY with O conjugate B-KEY conditions I-KEY and O a O quadratic B-KEY minimized I-KEY function I-KEY . O Highly O accurate O computational B-KEY discretization I-KEY schemes I-KEY are O constructed O for O the O case O where O a O feasible O control O set O u/sub O delta O / O coincides O with O the O full O Hilbert O space O u O of O controls O Efficient O two-level O image B-KEY thresholding I-KEY method O based O on O Bayesian O formulation O and O the O maximum O entropy O principle O An O efficient O method O for O two-level O thresholding O is O proposed O based O on O the O Bayes O formula O and O the O maximum O entropy B-KEY principle O , O in O which O no O assumptions O of O the O image O histogram O are O made O . O An O alternative O criterion O is O derived O based O on O maximizing O entropy B-KEY and O used O for O speeding O up O the O searching B-KEY algorithm I-KEY . O Five O forms O of O conditional O probability O distributions-simple O , O linear O , O parabola B-KEY concave I-KEY , O parabola B-KEY convex I-KEY , O and O S-function-are O employed O and O compared O to O each O other O for O optimal O threshold O determination O . O The O effect O of O precision O on O optimal B-KEY threshold I-KEY determination I-KEY is O discussed O and O a O trade-off B-KEY precision I-KEY epsilon O = O 0.001 O is O selected O experimentally O . O Our O experiments O demonstrate O that O the O proposed O method O achieves O a O significant O improvement O in O speed O from O 26 O to O 57 O times O faster O than O the O exhaustive O search O method O Novel O ZE-isomerism B-KEY descriptors I-KEY derived O from O molecular O topology O and O their O application O to O QSAR B-KEY analysis I-KEY We O introduce O several O series O of O novel O ZE-isomerism B-KEY descriptors I-KEY derived O directly O from O two-dimensional B-KEY molecular I-KEY topology I-KEY . O These O descriptors O make O use O of O a O quantity O named O ZE-isomerism B-KEY correction I-KEY , O which O is O added O to O the O vertex B-KEY degrees I-KEY of O atoms O connected O by O double O bonds O in O Z O and O E O configurations O . O This O approach O is O similar O to O the O one O described O previously O for O topological O chirality O descriptors O -LRB- O Golbraikh O , O A. O , O et O al. O . O J. O Chem O . O Inf O . O Comput O . O Sci O . O 2001 O , O 41 O , O 147-158 O -RRB- O . O The O ZE-isomerism B-KEY descriptors I-KEY include O modified B-KEY molecular I-KEY connectivity I-KEY indices I-KEY , O overall B-KEY Zagreb I-KEY indices I-KEY , O extended B-KEY connectivity I-KEY , O overall B-KEY connectivity I-KEY , O and O topological B-KEY charge I-KEY indices I-KEY . O They O can O be O either O real O or O complex B-KEY numbers I-KEY . O Mathematical O properties O of O different O subgroups O of O ZE-isomerism B-KEY descriptors I-KEY are O discussed O . O These O descriptors O circumvent O the O inability O of O conventional O topological O indices O to O distinguish O between O Z O and O E O isomers O . O The O applicability O of O ZE-isomerism B-KEY descriptors I-KEY to O QSAR B-KEY analysis I-KEY is O demonstrated O in O the O studies O of O a O series O of O 131 O anticancer B-KEY agents I-KEY inhibiting O tubulin B-KEY polymerization I-KEY The O service B-KEY side I-KEY of O systems B-KEY librarianship I-KEY Describes O the O role O of O a O systems O librarian O at O a O small B-KEY academic I-KEY library I-KEY . O Although O online B-KEY catalogs I-KEY and O the O Internet B-KEY are O making O library O accessibility O more O convenient O , O the O need O for O library O buildings O and O professionals O has O not O diminished O . O Typical O duties O of O a O systems O librarian O and O the O effects O of O new O technology O on O librarianship O are O discussed O . O Services O provided O to O other O constituencies O on O campus O and O the O blurring O relationship O between O the O library O and O computer O services O are O also O presented O Spam O solution O ? O The O author O describes O a O solution O to O spam B-KEY E-mails I-KEY : O disposable B-KEY E-mail I-KEY addresses I-KEY -LRB- O DEA O -RRB- O . O Mailshell B-KEY 's O free O trial O Web-based B-KEY E-mail I-KEY service O allows O you O , O if O you O start O getting O spammed O on O that O DEA O , O just O to O delete O the O DEA O in O Mailshell B-KEY , O and O all O E-mail O thereafter O sent O to O that O address O will O automatically O be O junked O -LRB- O though O you O can O later O restore O that O address O if O you O want O -RRB- O . O Mailshell B-KEY allows O any O number O of O DEA O Multiple B-KEY model I-KEY adaptive I-KEY estimation I-KEY with O filter B-KEY spawning I-KEY Multiple B-KEY model I-KEY adaptive I-KEY estimation I-KEY -LRB- O MMAE B-KEY -RRB- O with O filter B-KEY spawning I-KEY is O used O to O detect O and O estimate O partial B-KEY actuator I-KEY failures I-KEY on O the O VISTA B-KEY F-16 I-KEY . O The O truth B-KEY model I-KEY is O a O full O six-degree-of-freedom B-KEY simulation I-KEY provided O by O Calspan B-KEY and O General B-KEY Dynamics I-KEY . O The O design O models O are O chosen O as O 13-state O linearized B-KEY models I-KEY , O including O first O order O actuator O models O . O Actuator O failures O are O incorporated O into O the O truth B-KEY model I-KEY and O design O model O assuming O a O `` O failure O to O free O stream O . O '' O Filter B-KEY spawning I-KEY is O used O to O include O additional O filters O with O partial B-KEY actuator I-KEY failure I-KEY hypotheses O into O the O MMAE B-KEY bank O . O The O spawned O filters O are O based O on O varying O degrees O of O partial B-KEY failures I-KEY -LRB- O in O terms O of O effectiveness O -RRB- O associated O with O the O complete-actuaton-failure O hypothesis O with O the O highest O conditional B-KEY probability I-KEY of O correctness O at O the O current O time O . O Thus O , O a O blended O estimate O of O the O failure O effectiveness O is O found O using O the O filters O ' O estimates O based O upon O a O no-failure B-KEY hypothesis I-KEY , O a O complete O actuator O failure O hypothesis O , O and O the O spawned O filters O ' O partial-failure O hypotheses O . O This O yields O substantial O precision O in O effectiveness O estimation O , O compared O with O what O is O possible O without O spawning O additional O filters O , O making O partial B-KEY failure I-KEY adaptation O a O viable O methodology O Product O and O process O innovations O in O the O life O cycle O of O an O industry O Filson O -LRB- O 2001 O -RRB- O uses O industry-level O data O on O firm O numbers O , O price O , O quantity O and O quality O along O with O an O equilibrium B-KEY model I-KEY of O industry B-KEY evolution I-KEY to O estimate O the O nature O and O effects O of O quality O and O cost O improvements O in O the O personal O computer O industry O and O four O other O new O industries O . O This O paper O studies O the O personal O computer O industry O in O more O detail O and O shows O that O the O model O explains O some O peculiar O patterns O that O can O not O be O explained O by O previous O life-cycle B-KEY models I-KEY . O The O model O estimates O are O evaluated O using O historical O studies O of O the O evolution O of O the O personal O computer O industry O and O patterns O that O require O further O model O development O are O described O World O 's O biggest O battery O helps O to O stabilise O Alaska O In O this O paper O , O the O author O describes O a O battery B-KEY energy I-KEY storage I-KEY system I-KEY which O is O under O construction O to O provide O voltage B-KEY compensation I-KEY in O support O of O Alaska O 's O 138 B-KEY kV I-KEY Northern O Intertie O `` O Hidden B-KEY convexity I-KEY '' O of O finite-dimensional B-KEY stationary I-KEY linear I-KEY discrete-time I-KEY systems I-KEY under O conical B-KEY constraints I-KEY New O properties O of O finite-dimensional O linear O discrete-time O systems O under O conical O control B-KEY constraints I-KEY that O are O similar O to O the O `` O hidden B-KEY convexity I-KEY '' O of O continuous-time O systems O are O studied O Efficient O computation O of O local O geometric O moments O Local O moments O have O attracted O attention O as O local B-KEY features I-KEY in O applications O such O as O edge B-KEY detection I-KEY and O texture B-KEY segmentation I-KEY . O The O main O reason O for O this O is O that O they O are O inherently O integral-based B-KEY features I-KEY , O so O that O their O use O reduces O the O effect O of O uncorrelated O noise O . O The O computation O of O local O moments O , O when O viewed O as O a O neighborhood B-KEY operation I-KEY , O can O be O interpreted O as O a O convolution O of O the O image O with O a O set O of O masks O . O Nevertheless O , O moments O computed O inside O overlapping B-KEY windows I-KEY are O not O independent O and O convolution O does O not O take O this O fact O into O account O . O By O introducing O a O matrix B-KEY formulation I-KEY and O the O concept O of O accumulation B-KEY moments I-KEY , O this O paper O presents O an O algorithm O which O is O computationally O much O more O efficient O than O convolving O and O yet O as O simple O Effects O of O white O space O in O learning O via O the O Web O This O study O measured O the O effect O of O specific O white B-KEY space I-KEY features I-KEY on O learning O from O instructional O Web O materials O . O The O study O also O measured O learners O ' O beliefs O regarding O Web-based B-KEY instruction I-KEY . O Prior O research O indicated O that O small O changes O in O the O handling O of O presentation B-KEY elements O can O affect O learning O . O Achievement O results O from O this O study O indicated O that O in O on-line O materials O , O when O content O and O overall O structure O are O sound O , O minor O differences O regarding O table B-KEY borders I-KEY and O vertical O spacing O in O text O do O not O hinder O learning O . O Beliefs O regarding O Web-based B-KEY instruction I-KEY and O instructors O who O use O it O did O not O differ O significantly O between O treatment O groups O . O Implications O of O the O study O and O cautions O regarding O generalizing O from O the O results O are O discussed O Press B-KEY shop I-KEY . O Industrial B-KEY IT I-KEY solutions I-KEY for O the O press B-KEY shop I-KEY Globalization O of O the O world O 's O markets O is O challenging O the O traditional O limits O of O manufacturing B-KEY efficiency I-KEY . O The O competitive O advantage O belongs O to O those O who O understand O the O new O requirements O and O opportunities O , O and O who O commit O to O integrated O solutions O that O span O the O value O chain O all O the O way O from O demand O to O production O . O ABB O 's O automation B-KEY and O IT O expertise O and O the O process O know-how O gained O from O its O long O involvement O with O the O automotive O industry O , O have O been O brought O together O in O new O , O state-of-the-art B-KEY software B-KEY solutions I-KEY for O press B-KEY shops I-KEY . O Integrated O into O Industrial O IT O architecture O , O they O allow O the O full O potential O of O the O shops O to O be O realized O , O with O advantages O at O every O step O in O the O supply B-KEY chain I-KEY Information O architecture O without O internal B-KEY theory I-KEY : O an O inductive B-KEY design I-KEY process I-KEY This O article O suggests O that O Information O Architecture O -LRB- O IA O -RRB- O design O is O primarily O an O inductive O process O . O Although O top-level O goals O , O user O attributes O and O available O content O are O periodically O considered O , O the O process O involves O bottom-up B-KEY design I-KEY activities I-KEY . O IA O is O inductive O partly O because O it O lacks O internal B-KEY theory I-KEY , O and O partly O because O it O is O an O activity O that O supports O emergent B-KEY phenomena I-KEY -LRB- O user B-KEY experiences I-KEY -RRB- O from O basic O design O components O . O The O nature O of O IA O design O is O well O described O by O Constructive B-KEY Induction I-KEY -LRB- O CI O -RRB- O , O a O design O process O that O involves O locating O the O best O representational O framework O for O the O design O problem O , O identifying O a O solution O within O that O framework O and O translating O it O back O to O the O design O problem O at O hand O . O The O future O of O IA O , O if O it O remains O inductive O or O develops O a O body O of O theory O -LRB- O or O both O -RRB- O , O is O considered O What O you O get O is O what O you O see O -LSB- O Web B-KEY performance I-KEY monitoring O -RSB- O To O get O the O best O possible O performance O from O your O Web B-KEY infrastructure I-KEY , O you O 'll O need O a O complete O view O . O Do O n't O neglect O the O big O picture O because O you O 're O too O busy O concentrating O on O details O . O The O increasing O complexity O of O Web B-KEY sites I-KEY and O the O content O they O provide O has O consequently O increased O the O complexity O of O the O infrastructure O that O supports O them O . O But O with O some O knowledge O of O networking B-KEY , O a O handful O of O useful O tools O , O and O the O insight O that O those O tools O provide O , O designing O and O operating O for O optimal O performance O and O reliability B-KEY is O within O your O grasp O Identification B-KEY of O evolving O fuzzy O rule-based O models O An O approach O to O identification B-KEY of O evolving O fuzzy O rule-based O -LRB- O eR O -RRB- O models O is O proposed O . O eR O models O implement O a O method O for O the O noniterative B-KEY update I-KEY of O both O the O rule-base B-KEY structure I-KEY and O parameters O by O incremental B-KEY unsupervised I-KEY learning I-KEY . O The O rule-base O evolves O by O adding O more O informative O rules O than O those O that O previously O formed O the O model O . O In O addition O , O existing O rules O can O be O replaced O with O new O rules O based O on O ranking B-KEY using O the O informative B-KEY potential I-KEY of O the O data O . O In O this O way O , O the O rule-base B-KEY structure I-KEY is O inherited O and O updated O when O new O informative O data O become O available O , O rather O than O being O completely O retrained O . O The O adaptive O nature O of O these O evolving O rule-based O models O , O in O combination O with O the O highly O transparent O and O compact O form O of O fuzzy B-KEY rules I-KEY , O makes O them O a O promising O candidate O for O modeling O and O control O of O complex B-KEY processes I-KEY , O competitive O to O neural O networks O . O The O approach O has O been O tested O on O a O benchmark O problem O and O on O an O air-conditioning B-KEY component I-KEY modeling I-KEY application O using O data O from O an O installation O serving O a O real O building O . O The O results O illustrate O the O viability O and O efficiency O of O the O approach O Baseball O , O optimization B-KEY , O and O the O World B-KEY Wide I-KEY Web I-KEY The O competition O for O baseball O play-off O spots-the O fabled O pennant O race-is O one O of O the O most O closely O watched O American O sports O traditions O . O While O play-off B-KEY race I-KEY statistics I-KEY , O such O as O games B-KEY back I-KEY and O magic B-KEY number I-KEY , O are O informative O , O they O are O overly O conservative O and O do O not O account O for O the O remaining O schedule O of O games O . O Using O optimization B-KEY techniques O , O one O can O model O schedule O effects O explicitly O and O determine O precisely O when O a O team O has O secured O a O play-off O spot O or O has O been O eliminated O from O contention O . O The O RIOT B-KEY Baseball I-KEY Play-off I-KEY Races I-KEY Web I-KEY site I-KEY developed O at O the O University O of O California O , O Berkeley O , O provides O automatic O updates O of O new O , O optimization-based O play-off B-KEY race I-KEY statistics I-KEY each O day O of O the O major O league O baseball O season O . O In O developing O the O site O , O we O found O that O we O could O determine O the O first-place O elimination O status O of O all O teams O in O a O division O using O a O single O linear-programming O formulation O , O since O a O minimum B-KEY win I-KEY threshold I-KEY for O teams O finishing O in O first O place O applies O to O all O teams O in O a O division O . O We O identified O a O similar O -LRB- O but O weaker O -RRB- O result O for O the O problem O of O play-off O elimination O with O wildcard O teams O Plenoptic B-KEY image I-KEY editing I-KEY This O paper O presents O a O new O class O of O interactive B-KEY image I-KEY editing I-KEY operations I-KEY designed O to O maintain O consistency O between O multiple B-KEY images I-KEY of O a O physical B-KEY 3D I-KEY scene I-KEY . O The O distinguishing O feature O of O these O operations O is O that O edits O to O any O one O image O propagate O automatically O to O all O other O images O as O if O the O -LRB- O unknown O -RRB- O 3D O scene O had O itself O been O modified O . O The O modified B-KEY scene I-KEY can O then O be O viewed O interactively O from O any O other O camera B-KEY viewpoint I-KEY and O under O different O scene O illuminations O . O The O approach O is O useful O first O as O a O power-assist O that O enables O a O user O to O quickly O modify O many O images O by O editing O just O a O few O , O and O second O as O a O means O for O constructing O and O editing O image-based B-KEY scene I-KEY representations I-KEY by O manipulating O a O set O of O photographs O . O The O approach O works O by O extending O operations O like O image B-KEY painting I-KEY , O scissoring B-KEY , O and O morphing B-KEY so O that O they O alter O a O scene O 's O plenoptic B-KEY function I-KEY in O a O physically-consistent O way O , O thereby O affecting O scene O appearance O from O all O viewpoints O simultaneously O . O A O key O element O in O realizing O these O operations O is O a O new O volumetric B-KEY decomposition I-KEY technique I-KEY for O reconstructing O an O scene O 's O plenoptic B-KEY function I-KEY from O an O incomplete O set O of O camera B-KEY viewpoints I-KEY Quantum B-KEY market I-KEY games I-KEY We O propose O a O quantum-like O description O of O markets O and O economics B-KEY . O The O approach O has O roots O in O the O recently O developed O quantum B-KEY game I-KEY theory I-KEY Location O of O transport B-KEY nets I-KEY on O a O heterogeneous B-KEY territory I-KEY The O location O of O transport B-KEY routes I-KEY on O a O heterogeneous B-KEY territory I-KEY is O studied O . O The O network O joins O a O given O set O of O terminal B-KEY points I-KEY and O a O certain O number O of O additional O -LRB- O branch O -RRB- O points O . O The O problem O is O formulated O , O properties O of O the O optimal O solution O for O a. O tree-like B-KEY network I-KEY , O and O the O number O of O branch B-KEY points I-KEY are O studied O . O A O stepwise B-KEY optimization I-KEY algorithm I-KEY for O a. O network O with O given O adjacency B-KEY matrix I-KEY based O on O an O algorithm O for O constructing O minimal-cost O routes O is O designed O There O is O no O optimal B-KEY routing I-KEY policy I-KEY for O the O torus B-KEY A O routing O policy O is O the O method O used O to O select O a O specific O output O channel O for O a O message O from O among O a O number O of O acceptable O output O channels O . O An O optimal B-KEY routing I-KEY policy I-KEY is O a O policy O that O maximizes O the O probability O of O a O message O reaching O its O destination O without O delays O . O Optimal B-KEY routing I-KEY policies I-KEY have O been O proposed O for O several O regular O networks O , O including O the O mesh O and O the O hypercube B-KEY . O An O open O problem O in O interconnection O network O research O has O been O the O identification O of O an O optimal B-KEY routing I-KEY policy I-KEY for O the O torus B-KEY . O In O this O paper O , O we O show O that O there O is O no O optimal B-KEY routing I-KEY policy I-KEY for O the O torus B-KEY . O Our O result O is O demonstrated O by O presenting O a O detailed O example O in O which O the O best O choice O of O output O channel O is O dependent O on O the O probability O of O each O channel O being O available O . O This O result O settles O , O in O the O negative O , O a O conjecture O by O J. O Wu O -LRB- O 1996 O -RRB- O concerning O an O optimal B-KEY routing I-KEY policy I-KEY for O the O torus B-KEY A O conceptual O framework O for O evaluation O of O information B-KEY technology I-KEY investments I-KEY The O decision O to O acquire O a O new O information O technology O poses O a O number O of O serious O evaluation O and O selection O problems O to O technology B-KEY managers I-KEY , O because O the O new O system O must O not O only O meet O current O information B-KEY requirements I-KEY of O the O organisation O , O but O also O the O needs O for O future O expansion O . O Tangible O and O intangible B-KEY benefits I-KEY factors O , O as O well O as O risks B-KEY factors I-KEY , O must O be O identified O and O evaluated O . O The O paper O provides O a O review O of O ten O major O evaluation B-KEY categories I-KEY and O available O models O , O which O fall O under O each O category O , O showing O their O advantages O and O disadvantages O in O handling O the O above O difficulties O . O This O paper O describes O strategic O implications O involved O in O the O selection B-KEY decision I-KEY , O and O the O inherent O difficulties O in O : O -LRB- O 1 O -RRB- O choosing O or O developing O a O model O , O -LRB- O 2 O -RRB- O obtaining O realistic O inputs O for O the O model O , O and O -LRB- O 3 O -RRB- O making O tradeoffs B-KEY among O the O conflicting O factors O . O It O proposes O a O conceptual O framework O to O help O the O decision B-KEY maker I-KEY in O choosing O the O most O appropriate O methodology O in O the O evaluation O process O . O It O also O offers O a O new O model O , O called O GAHP O , O for O the O evaluation O problem O combining O integer O goal O linear O programming O and O analytic B-KEY hierarchy I-KEY process I-KEY -LRB- O AHP O -RRB- O in O a O single O hybrid B-KEY multiple I-KEY objective I-KEY multi-criteria I-KEY model I-KEY . O A O goal B-KEY programming I-KEY methodology I-KEY , O with O zero-one B-KEY integer I-KEY variables I-KEY and O mixed B-KEY integer I-KEY constraints I-KEY , O is O used O to O set O goal B-KEY target I-KEY values I-KEY against O which O information B-KEY technology I-KEY alternatives I-KEY are O evaluated O and O selected O . O AHP O is O used O to O structure O the O evaluation O process O providing O pairwise B-KEY comparison I-KEY mechanisms I-KEY to O quantify O subjective O , O nonmonetary O , O intangible B-KEY benefits I-KEY and O risks B-KEY factors I-KEY , O in O deriving O data O for O the O model O . O A O case O illustration O is O provided O showing O how O GAHP O can O be O formulated O and O solved O Computer B-KEY program I-KEY to O generate O operant O schedules O A O computer B-KEY program I-KEY for O programming O schedules O of O reinforcement O is O described O . O Students O can O use O the O program O to O experience O schedules O of O reinforcement O that O are O typically O used O with O nonhuman B-KEY subjects I-KEY . O Accumulative O recording O of O a O student O 's O response O can O be O shown O on O the O screen O and/or O printed O with O the O computer O 's O printer O . O The O program O can O also O be O used O to O program O operant O schedules O for O animal B-KEY subjects I-KEY . O The O program O was O tested O with O human B-KEY subjects I-KEY experiencing O fixed O ratio O , O variable O ratio O , O fixed O interval O , O and O variable B-KEY interval I-KEY schedules I-KEY . O Performance O for O human B-KEY subjects I-KEY on O a O given O schedule O was O similar O to O performance O for O nonhuman B-KEY subjects I-KEY on O the O same O schedule O The O California B-KEY Digital I-KEY Library I-KEY and O the O eScholarship B-KEY program I-KEY The O eScholarship B-KEY program I-KEY was O launched O in O 2000 O to O foster O faculty-led B-KEY innovation I-KEY in O scholarly B-KEY publishing I-KEY . O An O initiative O of O the O University B-KEY of I-KEY California I-KEY -LRB- O UC O -RRB- O and O a O program O of O the O California B-KEY Digital I-KEY Library I-KEY , O the O eScholarship B-KEY program I-KEY has O stimulated O significant O interest O in O its O short O life O . O Its O modest O but O visible O accomplishments O garner O praise O from O many O quarters O , O within O and O beyond O the O University B-KEY of I-KEY California I-KEY . O In O perhaps O the O best O indication O of O its O timeliness O and O momentum O , O there O are O more O proposals O submitted O to O eScholarship O today O than O the O CDL O can O manage O . O This O early O success O is O due O in O part O to O the O sheer O power O of O an O idea O whose O time O has O come O , O but O also O to O the O unique O approach O on O which O CDL O was O founded O and O the O eScholarship O initiative O was O first O launched O Fuzzy O control O of O multivariable B-KEY process I-KEY by O modified B-KEY error I-KEY decoupling I-KEY In O this O paper O , O a O control O concept O for O the O squared O -LRB- O equal O number O of O inputs O and O outputs O -RRB- O multivariable B-KEY process I-KEY systems O is O given O . O The O proposed O control O system O consists O of O two O parts O , O single O loop O fuzzy O controllers O in O each O loop O and O a O centralized B-KEY decoupling I-KEY unit I-KEY . O The O fuzzy O control O system O uses O feedback B-KEY control I-KEY to O minimize O the O error O in O the O loop O and O the O decoupler O uses O an O adaptive O technique O to O mitigate O loop O interactions O . O The O decoupler O predicts O the O interacting O loop O changes O and O modifies O the O input O -LRB- O error O -RRB- O of O the O loop O controller O . O The O controller O was O tested O on O the O simulation O model O of O `` O single O component O vaporizer O '' O process O Lossy O to O lossless B-KEY object-based I-KEY coding I-KEY of O 3-D B-KEY MRI I-KEY data I-KEY We O propose O a O fully O three-dimensional O -LRB- O 3-D O -RRB- O object-based O coding O system O exploiting O the O diagnostic B-KEY relevance I-KEY of O the O different O regions O of O the O volumetric B-KEY data I-KEY for O rate B-KEY allocation I-KEY . O The O data O are O first O decorrelated O via O a O 3-D B-KEY discrete I-KEY wavelet I-KEY transform I-KEY . O The O implementation O via O the O lifting B-KEY steps I-KEY scheme I-KEY allows O to O map O integer-to-integer B-KEY values I-KEY , O enabling O lossless O coding O , O and O facilitates O the O definition O of O the O object-based B-KEY inverse I-KEY transform I-KEY . O The O coding O process O assigns O disjoint B-KEY segments I-KEY of O the O bitstream B-KEY to O the O different O objects O , O which O can O be O independently O accessed O and O reconstructed O at O any O up-to-lossless O quality O . O Two O fully O 3-D O coding O strategies O are O considered O : O embedded B-KEY zerotree I-KEY coding I-KEY -LRB- O EZW-3D B-KEY -RRB- O and O multidimensional B-KEY layered I-KEY zero I-KEY coding I-KEY -LRB- O MLZC O -RRB- O , O both O generalized O for O region O of O interest O -LRB- O ROI O -RRB- O - O based O processing O . O In O order O to O avoid O artifacts O along O region B-KEY boundaries I-KEY , O some O extra O coefficients O must O be O encoded O for O each O object O . O This O gives O rise O to O an O overheading O of O the O bitstream B-KEY with O respect O to O the O case O where O the O volume O is O encoded O as O a O whole O . O The O amount O of O such O extra O information O depends O on O both O the O filter B-KEY length I-KEY and O the O decomposition B-KEY depth I-KEY . O The O system O is O characterized O on O a O set O of O head B-KEY magnetic I-KEY resonance I-KEY images I-KEY . O Results O show O that O MLZC O and O EZW-3D B-KEY have O competitive O performances O . O In O particular O , O the O best O MLZC O mode O outperforms O the O others O state-of-the-art O techniques O on O one O of O the O datasets O for O which O results O are O available O in O the O literature O The O role O of O CAUL O -LRB- O Council O of O Australian O Libraries O -RRB- O in O consortial B-KEY purchasing I-KEY The O Council B-KEY of I-KEY Australian I-KEY University I-KEY Librarians I-KEY , O constituted O in O 1965 O for O the O purposes O of O cooperative B-KEY action I-KEY and O the O sharing O of O information O , O assumed O the O role O of O consortial B-KEY purchasing I-KEY agent O in O 1996 O on O behalf O of O its O members O and O associate O organisations O in O Australia B-KEY and O New B-KEY Zealand I-KEY . O This O role O continues O to O grow O in O tandem O with O the O burgeoning O of O electronic B-KEY publication I-KEY and O the O acceptance O of O publishers O of O the O advantages O of O dealing O with O consortia O . O The O needs O of O the O Australian O university O community O overlap O significantly O with O consortia O in O North B-KEY America I-KEY and O Europe B-KEY , O but O important O differences O are O highlighted O Fresh O tracks O -LSB- O food B-KEY processing I-KEY -RSB- O Bar B-KEY code I-KEY labels I-KEY and O wireless B-KEY terminals I-KEY linked O to O a O centralized O database O accurately O track O meat O products O from O receiving O to O customers O for O Farmland B-KEY Foods I-KEY Generalized B-KEY confidence I-KEY sets I-KEY for O a O statistically B-KEY indeterminate I-KEY random I-KEY vector I-KEY A O problem O is O considered O for O the O construction O of O confidence O sets O for O a O random O vector O , O the O information O on O distribution B-KEY parameters I-KEY of O which O is O incomplete O . O To O obtain O exact O estimates O and O a O detailed O analysis O of O the O problem O , O the O notion O is O introduced O of O a O generalized B-KEY confidence I-KEY set I-KEY for O a O statistically B-KEY indeterminate I-KEY random I-KEY vector I-KEY . O Properties O of O generalized B-KEY confidence I-KEY sets I-KEY are O studied O . O It O is O shown O that O the O standard O method O of O estimation O , O which O relies O on O the O unification O of O confidence O sets O , O leads O in O many O cases O to O wider O confidence O estimates O . O For O a O normally B-KEY distributed I-KEY random I-KEY vector I-KEY with O an O inaccurately O known O mean O value O , O generalized B-KEY confidence I-KEY sets I-KEY are O built O tip O and O the O dependence O of O sizes O of O a O generalized B-KEY confidence I-KEY set I-KEY on O the O forms O and O parameters O of O a O set O of O possible O mean O values O is O examined O Virtual O borders O , O real O laws O -LSB- O Internet B-KEY activity I-KEY and O treaties O -RSB- O National B-KEY governments I-KEY are O working O to O tame O activity O on O the O Internet O . O They O have O worked O steadily O to O extend O control O over O online B-KEY activities I-KEY that O they O believe O affect O their O interests O , O even O when O the O activities O occur O outside O their O borders O . O These O usually O involve O what O governments O regard O as O their O domain O : O protecting O public O order O , O enforcing O commercial O laws O , O and O , O occasionally O , O protecting O consumer O interests O . O Methods O have O included O assertions O or O legal B-KEY jurisdiction I-KEY based O on O where O material O is O accessible O instead O of O where O it O originates O , O and O the O blocking O of O sites O , O service O providers O , O or O entire O high O level O domains O from O access O by O citizens O . O Such O instances O are O mentioned O in O this O article O . O Whilst O larger O companies O are O able O to O defend O themselves O against O overseas O lawsuits B-KEY , O individuals O and O smaller O organizations O lack O the O resources O to O defend O what O are O often O normal O business O activities O at O home O , O but O could O violate O the O laws O of O local O jurisdictions O in O countries O around O the O world O . O The O problems O of O libel O are O discussed O as O are O the O blocking O of O certain O sites O by O certain O countries O . O Efforts O to O draw O up O Internet B-KEY treaties I-KEY are O also O mentioned O A O method O for O solution O of O systems O of O linear B-KEY algebraic I-KEY equations I-KEY with O m-dimensional O lambda O - O matrices O A O system O of O linear B-KEY algebraic I-KEY equations I-KEY with O m-dimensional O lambda O - O matrices O is O considered O . O The O proposed O method O of O searching O for O the O solution O of O this O system O lies O in O reducing O it O to O a O numerical B-KEY system I-KEY of O a O special O kind O Development O of O a O health B-KEY guidance I-KEY support I-KEY system I-KEY for O lifestyle B-KEY improvement I-KEY The O objective O is O to O provide O automated O advice O for O lifestyle O adjustment O based O on O an O assessment O of O the O results O of O a O questionnaire B-KEY and O medical B-KEY examination I-KEY or O health B-KEY checkup I-KEY data I-KEY . O A O system O was O developed O that O gathers O data O based O on O questions O regarding O weight B-KEY gain I-KEY , O exercise B-KEY , O smoking B-KEY , O sleep B-KEY , O eating B-KEY habits I-KEY , O salt B-KEY intake I-KEY , O animal B-KEY fat I-KEY intake I-KEY , O snacks B-KEY , O alcohol B-KEY , O and O oral B-KEY hygiene I-KEY , O body B-KEY mass I-KEY index I-KEY , O resting B-KEY blood I-KEY pressure I-KEY , O fasting B-KEY blood I-KEY sugar I-KEY , O total B-KEY cholesterol I-KEY , O triglycerides B-KEY , O uric B-KEY acid I-KEY and O liver B-KEY function I-KEY tests I-KEY . O Based O on O the O relationships O between O the O lifestyle O data O and O the O health B-KEY checkup I-KEY data I-KEY , O a O health O assessment O sheet O was O generated O for O persons O being O allocated O to O a O multiple-risk O factor O syndrome O group O . O Health O assessment O and O useful O advice O for O lifestyle B-KEY improvement I-KEY were O automatically O extracted O with O the O system O , O toward O the O high O risk O group O for O life O style O related O diseases O . O The O system O is O operational O . O In O comparison O with O conventional O , O limited O advice O methods O , O we O developed O a O practical O system O that O defined O the O necessity O for O lifestyle B-KEY improvement I-KEY more O clearly O , O and O made O giving O advice O easier O The O impact O of O EAD B-KEY adoption I-KEY on O archival B-KEY programs I-KEY : O a O pilot O survey O of O early O implementers O The O article O reports O the O results O of O a O survey O conducted O to O assess O the O impact O that O the O implementation O of O Encoded B-KEY Archival I-KEY Description I-KEY -LRB- O EAD O -RRB- O has O on O archival B-KEY programs I-KEY . O By O gathering O data O related O to O the O funding B-KEY , O staffing B-KEY , O and O evaluation O of O EAD B-KEY programs I-KEY and O about O institutional B-KEY goals I-KEY for O EAD B-KEY implementation I-KEY , O the O study O explored O how O EAD O has O affected O the O operations O of O the O institutions O which O are O utilizing O it O and O the O extent O to O which O EAD O has O become O a O part O of O regular B-KEY repository I-KEY functions I-KEY Using O latent B-KEY semantic I-KEY analysis I-KEY to O assess O reader O strategies O We O tested O a O computer-based B-KEY procedure I-KEY for O assessing O reader O strategies O that O was O based O on O verbal B-KEY protocols I-KEY that O utilized O latent B-KEY semantic I-KEY analysis I-KEY -LRB- O LSA O -RRB- O . O Students O were O given O self-explanation-reading B-KEY training I-KEY -LRB- O SERT O -RRB- O , O which O teaches O strategies O that O facilitate O self-explanation O during O reading O , O such O as O elaboration B-KEY based O on O world B-KEY knowledge I-KEY and O bridging O between O text O sentences O . O During O a O computerized O version O of O SERT O practice O , O students O read O texts O and O typed O self-explanations O into O a O computer O after O each O sentence O . O The O use O of O SERT O strategies O during O this O practice O was O assessed O by O determining O the O extent O to O which O students O used O the O information O in O the O current O sentence O versus O the O prior O text O or O world B-KEY knowledge I-KEY in O their O self-explanations O . O This O assessment O was O made O on O the O basis O of O human B-KEY judgments I-KEY and O LSA O . O Both O human B-KEY judgments I-KEY and O LSA O were O remarkably O similar O and O indicated O that O students O who O were O not O complying O with O SERT O tended O to O paraphrase O the O text O sentences O , O whereas O students O who O were O compliant O with O SERT O tended O to O explain O the O sentences O in O terms O of O what O they O knew O about O the O world O and O of O information O provided O in O the O prior O text O context O . O The O similarity O between O human B-KEY judgments I-KEY and O LSA O indicates O that O LSA O will O be O useful O in O accounting O for O reading O strategies O in O a O Web-based O version O of O SERT O MTD-PLS O : O a O PLS-based B-KEY variant I-KEY of O the O MTD O method O . O II O . O Mapping O ligand-receptor O interactions O . O Enzymatic B-KEY acetic I-KEY acid I-KEY esters I-KEY hydrolysis I-KEY The O PLS O variant O of O the O MTD O method O -LRB- O T.I. O Oprea O et O al. O , O SAR O QSAR O Environ O . O Res O . O 2001 O , O 12 O , O 75-92 O -RRB- O was O applied O to O a O series O of O 25 O acetylcholinesterase B-KEY hydrolysis I-KEY substrates I-KEY . O Statistically O significant O MTD-PLS B-KEY models I-KEY -LRB- O q/sup O 2 O / O between O 0.7 O and O 0.8 O -RRB- O are O in O agreement O with O previous O MTD O models O , O with O the O advantage O that O local O contributions O are O understood O beyond O the O occupancy/nonoccupancy O interpretation O in O MTD O . O A O `` O chemically O intuitive O '' O approach O further O forces O MTD-PLS O coefficients O to O assume O only O negative O -LRB- O or O zero O -RRB- O values O for O fragmental B-KEY volume I-KEY descriptors I-KEY and O positive O -LRB- O or O zero O -RRB- O values O for O fragmental B-KEY hydrophobicity I-KEY descriptors I-KEY . O This O further O separates O the O various O kinds O of O local O interactions O at O each O vertex O of O the O MTD O hypermolecule B-KEY , O making O this O method O suitable O for O medicinal B-KEY chemistry I-KEY synthesis I-KEY planning I-KEY A O context-aware O decision B-KEY engine I-KEY for O content B-KEY adaptation I-KEY Building O a O good O content B-KEY adaptation I-KEY service O for O mobile B-KEY devices I-KEY poses O many O challenges O . O To O meet O these O challenges O , O this O quality-of-service-aware B-KEY decision B-KEY engine I-KEY automatically O negotiates O for O the O appropriate O adaptation B-KEY decision I-KEY for O synthesizing O an O optimal B-KEY content I-KEY version I-KEY Medicine B-KEY in O the O 21 O st O century O : O global O problems O , O global O solutions O The O objectives O are O to O discuss O application O areas O of O information O , O technology O in O medicine B-KEY and O health B-KEY care I-KEY on O the O occasion O of O the O opening O of O the O Private O Universitat O fur O Medizinische O Informatik O and O Technik O Tirol/University O for O Health O Informatics O and O Technology O Tyrol O -LRB- O LIMIT O -RRB- O at O Innsbruck O , O Tyrol O , O Austria O . O Important O application O areas O of O information B-KEY technology I-KEY in O medicine B-KEY and O health O are O appropriate O individual O access O to O medical O knowledge O , O new O engineering B-KEY developments I-KEY such O as O new O radiant B-KEY imaging I-KEY methods I-KEY and O the O implantable O pacemaker/defibrillator O devices O , O mathematical B-KEY modeling I-KEY for O understanding O the O workings O of O the O human B-KEY body I-KEY , O the O computer-based B-KEY patient I-KEY record I-KEY , O as O well O as O new O knowledge O in O molecular B-KEY biology I-KEY , O human B-KEY genetics I-KEY , O and O biotechnology B-KEY . O Challenges O and O responsibilities O for O medical B-KEY informatics I-KEY research I-KEY include O medical B-KEY data I-KEY privacy I-KEY and O intellectual B-KEY property I-KEY rights I-KEY inherent O in O the O content O of O the O information B-KEY systems I-KEY Multidimensional B-KEY data I-KEY visualization I-KEY Historically O , O data O visualization O has O been O limited O primarily O to O two O dimensions O -LRB- O e.g. O , O histograms O or O scatter O plots O -RRB- O . O Available O software O packages O -LRB- O e.g. O , O Data O Desk O 6.1 O , O MatLab O 6.1 O , O SAS-JMP O 4.04 O , O SPSS O 10.0 O -RRB- O are O capable O of O producing O three-dimensional O scatter O plots O with O -LRB- O varying O degrees O of O -RRB- O user B-KEY interactivity I-KEY . O We O constructed O our O own O data O visualization O application O with O the O Visualization B-KEY Toolkit I-KEY -LRB- O Schroeder O et O al. O , O 1998 O -RRB- O and O Tcl/Tk B-KEY to O display O multivariate O data O through O the O application O of O glyphs B-KEY -LRB- O Ware O , O 2000 O -RRB- O . O A O glyph B-KEY is O a O visual B-KEY object I-KEY onto O which O many O data B-KEY parameters I-KEY may O be O mapped O , O each O with O a O different O visual B-KEY attribute I-KEY -LRB- O e.g. O , O size O or O color O -RRB- O . O We O used O our O multi-dimensional B-KEY data I-KEY viewer I-KEY to O explore O data O from O several O psycholinguistic B-KEY experiments I-KEY . O The O graphical B-KEY interface I-KEY provides O flexibility O when O users O dynamically O explore O the O multidimensional B-KEY image I-KEY rendered I-KEY from O raw O experimental O data O . O We O highlight O advantages O of O multidimensional B-KEY data I-KEY visualization I-KEY and O consider O some O potential O limitations O Combining O spatial O and O scale-space B-KEY techniques I-KEY for O edge B-KEY detection I-KEY to O provide O a O spatially B-KEY adaptive I-KEY wavelet-based I-KEY noise I-KEY filtering I-KEY algorithm I-KEY New O methods O for O detecting O edges O in O an O image O using O spatial O and O scale-space O domains O are O proposed O . O A B-KEY priori I-KEY knowledge I-KEY about O geometrical B-KEY characteristics I-KEY of O edges O is O used O to O assign O a O probability B-KEY factor I-KEY to O the O chance O of O any O pixel O being O on O an O edge O . O An O improved O double B-KEY thresholding I-KEY technique I-KEY is O introduced O for O spatial B-KEY domain I-KEY filtering I-KEY . O Probabilities O that O pixels O belong O to O a O given O edge O are O assigned O based O on O pixel B-KEY similarity I-KEY across O gradient B-KEY amplitudes I-KEY , O gradient B-KEY phases I-KEY and O edge B-KEY connectivity I-KEY . O The O scale-space O approach O uses O dynamic B-KEY range I-KEY compression I-KEY to O allow O wavelet B-KEY correlation I-KEY over O a O wider O range O of O scales O . O A O probabilistic B-KEY formulation I-KEY is O used O to O combine O the O results O obtained O from O filtering O in O each O domain O to O provide O a O final B-KEY edge I-KEY probability I-KEY image I-KEY which O has O the O advantages O of O both O spatial O and O scale-space O domain O methods O . O Decomposing O this O edge O probability O image O with O the O same O wavelet O as O the O original O image O permits O the O generation O of O adaptive B-KEY filters I-KEY that O can O recognize O the O characteristics O of O the O edges O in O all O wavelet O detail O and O approximation B-KEY images I-KEY regardless O of O scale O . O These O matched B-KEY filters I-KEY permit O significant O reduction O in O image B-KEY noise I-KEY without O contributing O to O edge O distortion O . O The O spatially B-KEY adaptive I-KEY wavelet I-KEY noise-filtering I-KEY algorithm I-KEY is O qualitatively O and O quantitatively O compared O to O a O frequency O domain O and O two O wavelet O based O noise B-KEY suppression I-KEY algorithms O using O both O natural O and O computer O generated O noisy O images O Quality B-KEY image I-KEY metrics I-KEY for O synthetic B-KEY images I-KEY based O on O perceptual B-KEY color I-KEY differences I-KEY Due O to O the O improvement O of O image B-KEY rendering I-KEY processes O , O and O the O increasing O importance O of O quantitative O comparisons O among O synthetic O color B-KEY images I-KEY , O it O is O essential O to O define O perceptually B-KEY based I-KEY metrics I-KEY which O enable O to O objectively O assess O the O visual B-KEY quality I-KEY of O digital B-KEY simulations I-KEY . O In O response O to O this O need O , O this O paper O proposes O a O new O methodology O for O the O determination O of O an O objective O image O quality O metric O , O and O gives O an O answer O to O this O problem O through O three O metrics O . O This O methodology O is O based O on O the O LLAB B-KEY color I-KEY space I-KEY for O perception O of O color O in O complex O images O , O a O modification O of O the O CIELab1976 B-KEY color I-KEY space I-KEY . O The O first O metric O proposed O is O a O pixel B-KEY by I-KEY pixel I-KEY metric I-KEY which O introduces O a O local B-KEY distance I-KEY map I-KEY between O two O images O . O The O second O metric O associates O , O to O a O pair O of O images O , O a O global B-KEY value I-KEY . O Finally O , O the O third O metric O uses O a O recursive B-KEY subdivision I-KEY of O the O images O to O obtain O an O adaptative B-KEY distance I-KEY map I-KEY , O rougher O but O less O expensive O to O compute O than O the O first O method O Bayesian B-KEY nonstationary I-KEY autoregressive I-KEY models I-KEY for O biomedical B-KEY signal I-KEY analysis I-KEY We O describe O a O variational B-KEY Bayesian I-KEY algorithm I-KEY for O the O estimation O of O a O multivariate O autoregressive O model O with O time-varying B-KEY coefficients I-KEY that O adapt O according O to O a O linear B-KEY dynamical I-KEY system I-KEY . O The O algorithm O allows O for O time O and O frequency B-KEY domain I-KEY characterization I-KEY of O nonstationary O multivariate O signals O and O is O especially O suited O to O the O analysis O of O event-related O data O . O Results O are O presented O on O synthetic O data O and O real O electroencephalogram O data O recorded O in O event-related B-KEY desynchronization I-KEY and O photic B-KEY synchronization I-KEY scenarios I-KEY Broadcasts O keep O staff O in O picture O -LSB- O intranets O -RSB- O Mark O Hawkins O , O chief O operating O officer O at O UK-based O streaming B-KEY media I-KEY specialist O Twofourtv B-KEY , O explains O how O firms O can O benefit O by O linking O their O corporate B-KEY intranets I-KEY to O broadcasting B-KEY technology I-KEY Selecting O rail O grade O crossing O investments O with O a O decision B-KEY support I-KEY system I-KEY The O Federal B-KEY Railroad I-KEY Administration I-KEY -LRB- O FRA O -RRB- O has O developed O a O series O of O rail O and O rail-related O analysis O tools O that O assist O FRA O officials O , O Metropolitan B-KEY Planning I-KEY Organizations I-KEY -LRB- O MPOs O -RRB- O , O state O Department B-KEY of I-KEY Transportation I-KEY -LRB- O DOT O -RRB- O , O and O other O constituents O in O evaluating O the O cost O and O benefits O of O potential O infrastructure B-KEY projects I-KEY . O To O meet O agency O objectives O , O the O FRA O wants O to O add O a O high-speed B-KEY rail I-KEY grade I-KEY crossing I-KEY analysis I-KEY tool I-KEY to O its O package O of O rail O and O rail-related B-KEY intermodal I-KEY software I-KEY products I-KEY . O This O paper O presents O a O conceptual O decision B-KEY support I-KEY system I-KEY -LRB- O DSS O -RRB- O that O can O assist O officials O in O achieving O this O goal O . O The O paper O first O introduces O the O FRA O 's O objectives O and O the O role O of O cost B-KEY benefit I-KEY analysis I-KEY in O achieving O these O objectives O . O Next O , O there O is O a O discussion O of O the O models O needed O to O assess O the O feasibility O of O proposed O high-speed O rail O grade O crossing O investments O and O the O presentation O of O a O decision B-KEY support I-KEY system I-KEY -LRB- O DSS O -RRB- O that O can O deliver O these O models O transparently O to O users O . O Then O , O the O paper O illustrates O a O system O session O and O examines O the O potential O benefits O from O system O use O An O intelligent O fuzzy O decision O system O for O a O flexible B-KEY manufacturing I-KEY system I-KEY with O multi-decision O points O This O paper O describes O an O intelligent O fuzzy O decision O support O system O for O real-time O scheduling B-KEY and O dispatching O of O parts O in O a O flexible B-KEY manufacturing I-KEY system I-KEY -LRB- O FMS B-KEY -RRB- O , O with O alternative O routing O possibilities O for O all O parts O . O A O fuzzy B-KEY logic I-KEY approach O is O developed O to O improve O the O system O performance O by O considering O multiple O performance O measures O and O at O multiple B-KEY decision I-KEY points I-KEY . O The O characteristics O of O the O system O status O , O instead O of O parts O , O are O fed O back O to O assign O priority O to O the O parts O waiting O to O be O processed O . O A O simulation B-KEY model O is O developed O and O it O is O shown O that O the O proposed O intelligent O fuzzy O decision O support O system O keeps O all O performance O measures O at O a O good O level O . O The O proposed O intelligent O system O is O a O promising O tool O for O dealing O with O scheduling B-KEY FMSs O , O in O contrast O to O traditional O rules O Fuzzy B-KEY polynomial I-KEY neural I-KEY networks I-KEY : O hybrid B-KEY architectures I-KEY of O fuzzy B-KEY modeling I-KEY We O introduce O a O concept O of O fuzzy B-KEY polynomial I-KEY neural I-KEY networks I-KEY -LRB- O FPNNs O -RRB- O , O a O hybrid O modeling O architecture O combining O polynomial O neural O networks O -LRB- O PNNs O -RRB- O and O fuzzy O neural O networks O -LRB- O FNNs O -RRB- O . O The O development O of O the O FPNNs O dwells O on O the O technologies O of O computational B-KEY intelligence I-KEY -LRB- O CI O -RRB- O , O namely O fuzzy B-KEY sets I-KEY , O neural O networks O , O and O genetic B-KEY algorithms I-KEY . O The O structure O of O the O FPNN O results O from O a O synergistic O usage O of O FNN O and O PNN O . O FNNs O contribute O to O the O formation O of O the O premise O part O of O the O rule-based O structure O of O the O FPNN O . O The O consequence O part O of O the O FPNN O is O designed O using O PNNs O . O The O structure O of O the O PNN O is O not O fixed O in O advance O as O it O usually O takes O place O in O the O case O of O conventional O neural O networks O , O but O becomes O organized O dynamically O to O meet O the O required O approximation O error O . O We O exploit O a O group B-KEY method I-KEY of I-KEY data I-KEY handling I-KEY -LRB- O GMDH B-KEY -RRB- O to O produce O this O dynamic B-KEY topology I-KEY of O the O network O . O The O performance O of O the O FPNN O is O quantified O through O experimentation O that O exploits O standard O data O already O used O in O fuzzy B-KEY modeling I-KEY . O The O obtained O experimental O results O reveal O that O the O proposed O networks O exhibit O high O accuracy O and O generalization O capabilities O in O comparison O to O other O similar O fuzzy B-KEY models I-KEY Optimize/sup O IT O / O robot O condition B-KEY monitoring I-KEY tool O As O robots O have O gained O more O and O more O ` O humanlike O ' O capability O , O users O have O looked O increasingly O to O their O builders O for O ways O to O measure O the O critical O variables-the O robotic O equivalent O of O a O physical O check-up-in O order O to O monitor O their O condition O and O schedule O maintenance O more O effectively O . O This O is O all O the O more O essential O considering O the O tremendous O pressure O there O is O to O improve O productivity O in O today O 's O global O markets O . O Developed O for O ABB B-KEY robots I-KEY with O an O S4-family B-KEY controller I-KEY and O based O on O the O company O 's O broad O process O know-how O , O Optimize/sup O IT O / O robot O condition B-KEY monitoring I-KEY offers O maintenance O routines O with O embedded O checklists O that O give O a O clear O indication O of O a O robot O 's O operating O condition O . O It O performs O semi-automatic B-KEY measurements I-KEY that O support O engineers O during O trouble-shooting O and O enable O action O to O be O taken O to O prevent O unplanned O stops O . O By O comparing O these O measurements O with O reference O data O , O negative O trends O can O be O detected O early O and O potential O breakdowns O predicted O . O Armed O with O all O these O features O , O Optimize/sup O IT O / O robot O condition B-KEY monitoring I-KEY provides O the O ideal O basis O for O reliability-centered B-KEY maintenance I-KEY -LRB- O RCM O -RRB- O for O robots O Innovative O phase B-KEY unwrapping I-KEY algorithm I-KEY : O hybrid O approach O We O present O a O novel O algorithm O based O on O a O hybrid O of O the O global O and O local B-KEY treatment I-KEY of O a O wrapped B-KEY map I-KEY . O The O proposed O algorithm O is O especially O effective O for O the O unwrapping O of O speckle-coded B-KEY interferogram I-KEY contour I-KEY maps I-KEY . O In O contrast O to O earlier O unwrapping B-KEY algorithms I-KEY by O region O , O we O propose O a O local B-KEY discontinuity-restoring I-KEY criterion I-KEY to O serve O as O the O preprocessor O or O postprocessor B-KEY of O our O hybrid B-KEY algorithm I-KEY , O which O makes O the O unwrapping O by O region O much O easier O and O more O efficient O . O With O this O hybrid B-KEY algorithm I-KEY , O a O robust O , O stable O , O and O especially O time O effective O phase O unwrapping O can O be O achieved O . O Additionally O , O the O criterion O and O limitation O of O this O hybrid B-KEY algorithm I-KEY are O fully O described O . O The O robustness O , O stability O , O and O speed O of O this O hybrid B-KEY algorithm I-KEY are O also O studied O . O The O proposed O algorithm O can O be O easily O upgraded O with O minor O modifications O to O solve O the O unwrapping B-KEY problem I-KEY of O maps O with O phase B-KEY inconsistency I-KEY . O Both O numerical B-KEY simulation I-KEY and O experimental O applications O demonstrate O the O effectiveness O of O the O proposed O algorithm O Building O digital B-KEY collections I-KEY at O the O OAC B-KEY : O current O strategies O with O a O view O to O future B-KEY uses I-KEY Providing O a O context O for O the O exploration O of O user B-KEY defined I-KEY virtual I-KEY collections I-KEY , O the O article O describes O the O history B-KEY and O recent O development O of O the O Online B-KEY Archive I-KEY of I-KEY California I-KEY -LRB- O OAC B-KEY -RRB- O . O Stating O that O usability O and O user B-KEY needs I-KEY are O primary O factors O in O digital B-KEY resource I-KEY development O , O issues O explored O include O collaborations O to O build O digital B-KEY collections I-KEY , O reliance O upon O professional B-KEY standards I-KEY for O description O and O encoding O , O system B-KEY architecture I-KEY , O interface B-KEY design I-KEY , O the O need O for O user B-KEY tools I-KEY , O and O the O role O of O archivists O as O interpreters O in O the O digital B-KEY environment I-KEY Simulation O of O evacuation O processes O using O a O bionics-inspired B-KEY cellular I-KEY automaton I-KEY model I-KEY for O pedestrian B-KEY dynamics I-KEY We O present O simulations O of O evacuation O processes O using O a O recently O introduced O cellular O automaton O model O for O pedestrian B-KEY dynamics I-KEY . O This O model O applies O a O bionics O approach O to O describe O the O interaction O between O the O pedestrians O using O ideas O from O chemotaxis B-KEY . O Here O we O study O a O rather O simple O situation O , O namely O the O evacuation O from O a O large O room O with O one O or O two O doors O . O It O is O shown O that O the O variation O of O the O model O parameters O allows O to O describe O different O types O of O behaviour O , O from O regular O to O panic O . O We O find O a O non-monotonic O dependence O of O the O evacuation O times O on O the O coupling B-KEY constants I-KEY . O These O times O depend O on O the O strength O of O the O herding B-KEY behaviour I-KEY , O with O minimal O evacuation O times O for O some O intermediate O values O of O the O couplings O , O i.e. O , O a O proper O combination O of O herding O and O use O of O knowledge O about O the O shortest O way O to O the O exit O The O social B-KEY impact I-KEY of O Internet B-KEY gambling I-KEY Technology O has O always O played O a O role O in O the O development O of O gambling O practices O and O continues O to O provide O new O market B-KEY opportunities I-KEY . O One O of O the O fastest O growing O areas O is O that O of O Internet B-KEY gambling I-KEY . O The O effect O of O such O technologies O should O not O be O accepted O uncritically O , O particularly O as O there O may O be O areas O of O potential O concern O based O on O what O is O known O about O problem O gambling O offline O . O This O article O has O three O aims O . O First O , O it O overviews O some O of O the O main O social O concerns O about O the O rise O of O Internet B-KEY gambling I-KEY . O Second O , O it O looks O at O the O limited O research O that O has O been O carried O out O in O this O area O . O Third O , O it O examines O whether O Internet B-KEY gambling I-KEY is O doubly O addictive B-KEY , O given O research O that O suggests O that O the O Internet O can O be O addictive B-KEY itself O . O It O is O concluded O that O technological B-KEY developments I-KEY in O Internet B-KEY gambling I-KEY will O increase O the O potential O for O problem O gambling O globally O , O but O that O many O of O the O ideas O and O speculations O outlined O in O this O article O need O to O be O addressed O further O by O large-scale O empirical O studies O Designing O and O delivering O a O university O course O - O a O process O -LRB- O or O operations O -RRB- O management B-KEY perspective I-KEY With O over O 30 O years O of O academic B-KEY experience I-KEY in O both O engineering O and O management B-KEY faculties I-KEY , O involving O trial O and O error O experimentation O in O teaching O as O well O as O reading O relevant O literature O and O observing O other O instructors O in O action O , O the O author O has O accumulated O a O number O of O ideas O , O regarding O the O preparation O and O delivery O of O a O university O course O , O that O should O be O of O interest O to O other O instructors O . O This O should O be O particularly O the O case O for O those O individuals O who O have O had O little O or O no O teaching O experience O -LRB- O e.g. O those O whose O graduate O education O was O recently O completed O at O research-oriented O institutions O providing O little O guidance O with O respect O to O teaching O -RRB- O . O A O particular O perspective O is O used O to O convey O the O ideas O , O namely O one O of O viewing O the O preparation O and O delivery O of O a O course O as O two O major O processes O that O should O provide O outputs O or O outcomes O that O are O of O value O to O a O number O of O customers O , O in O particular O , O students O NuVox O shows O staying O power O with O new O cash O , O new O market O Who O says O you O ca O n't O raise O cash O in O today O 's O telecom B-KEY market O ? O NuVox B-KEY Communications I-KEY positions O itself O for O the O long O run O with O $ O 78.5 O million O in O funding O and O a O new O credit O facility O I-WAP B-KEY : O an O intelligent B-KEY WAP I-KEY site I-KEY management I-KEY system I-KEY The O popularity O regarding O wireless B-KEY communications I-KEY is O such O that O more O and O more O WAP O sites O have O been O developed O with O wireless B-KEY markup I-KEY language I-KEY -LRB- O WML O -RRB- O . O Meanwhile O , O to O translate O hypertext B-KEY markup I-KEY language I-KEY -LRB- O HTML O -RRB- O pages O into O proper O WML O ones O becomes O imperative O since O it O is O difficult O for O WAP O users O to O read O most O contents O designed O for O PC O users O via O their O mobile B-KEY phone I-KEY screens O . O However O , O for O those O sites O that O have O been O maintained O with O hypertext B-KEY markup I-KEY language I-KEY -LRB- O HTML O -RRB- O , O considerable O time O and O manpower O costs O will O be O incurred O to O rebuild O them O with O WML O . O In O this O paper O , O we O propose O an O intelligent B-KEY WAP I-KEY site I-KEY management I-KEY system I-KEY to O cope O with O these O problems O . O With O the O help O of O the O intelligent O management O system O , O the O original O contents O of O HTML O Web O sites O can O be O automatically O translated O to O proper O WAP O content O in O an O efficient O way O . O As O a O consequence O , O the O costs O associated O with O maintaining O WAP O sites O could O be O significantly O reduced O . O The O management O system O also O allows O the O system O manager O to O define O the O relevance O of O numerals O and O keywords O for O removing O unimportant O or O meaningless O contents O . O The O original O contents O will O be O reduced O and O reorganized O to O fit O the O size O of O mobile B-KEY phone I-KEY screens O , O thus O reducing O the O communication B-KEY cost I-KEY and O enhancing O readability B-KEY . O Numerical O results O gained O through O various O experiments O have O evinced O the O effective O performance O of O the O WAP O management O system O Control O of O combustion B-KEY processes I-KEY in O an O internal B-KEY combustion I-KEY engine I-KEY by O low-temperature B-KEY plasma I-KEY A O new O method O of O operation O of O internal B-KEY combustion I-KEY engines I-KEY enhances O power O and O reduces O fuel B-KEY consumption I-KEY and O exhaust B-KEY toxicity I-KEY . O Low-temperature B-KEY plasma I-KEY control O combines O working B-KEY processes I-KEY of O thermal B-KEY engines I-KEY and O steam B-KEY machines I-KEY into O a O single O process O Who O Wants O To O Be O A O Millionaire O -LRB- O R O -RRB- O : O The O classroom B-KEY edition O This O paper O introduces O a O version O of O the O internationally O popular O television O game O show O Who O Wants O To O Be O A O Millionaire O -LRB- O R O -RRB- O that O has O been O created O for O use O in O the O classroom B-KEY using O Microsoft O PowerPoint O -LRB- O R O -RRB- O . O A O suggested O framework O for O its O classroom B-KEY use O is O presented O , O instructions O on O operating O and O editing O the O classroom B-KEY version O of O Who O Wants O To O Be O A O Millionaire O -LRB- O R O -RRB- O are O provided O , O and O sample O feedback O from O students O who O have O played O the O classroom O version O of O Who O Wants O To O Be O A O Millionaire O -LRB- O R O -RRB- O is O offered O Firewall O card O shields O data O The O SlotShield B-KEY 3000 I-KEY firewall I-KEY on O a O PCI B-KEY card I-KEY saves O power O and O space O , O but O might O not O offer O enough O security B-KEY for O large B-KEY networks I-KEY Spectral B-KEY characteristics I-KEY of O the O linear O systems O over O a O bounded B-KEY time I-KEY interval I-KEY Consideration O was O given O to O the O spectral B-KEY characteristics I-KEY of O the O linear B-KEY dynamic I-KEY systems I-KEY over O a O bounded B-KEY time I-KEY interval I-KEY . O Singular B-KEY characteristics I-KEY of O standard B-KEY dynamic I-KEY blocks I-KEY , O transcendental B-KEY characteristic I-KEY equations I-KEY , O and O partial B-KEY spectra I-KEY of O the O singular B-KEY functions I-KEY were O studied O . O Relationship O between O the O spectra O under O study O and O the O classical O frequency B-KEY characteristic I-KEY was O demonstrated O The O creation O of O a O high-fidelity B-KEY finite I-KEY element I-KEY model I-KEY of O the O kidney B-KEY for O use O in O trauma B-KEY research I-KEY A O detailed O finite O element O model O of O the O human O kidney B-KEY for O trauma B-KEY research I-KEY has O been O created O directly O from O the O National B-KEY Library I-KEY of I-KEY Medicine I-KEY Visible O Human O Female O -LRB- O VHF O -RRB- O Project O data O set O . O An O image B-KEY segmentation I-KEY and O organ B-KEY reconstruction I-KEY software B-KEY package I-KEY has O been O developed O and O employed O to O transform O the O 2D B-KEY VHF I-KEY images I-KEY into O a O 3D B-KEY polygonal I-KEY representation I-KEY . O Nonuniform O rational O B-spline O -LRB- O NURBS B-KEY -RRB- O surfaces O were O then O mapped O to O the O polygonal B-KEY surfaces I-KEY , O and O were O finally O utilized O to O create O a O robust O 3D B-KEY hexahedral I-KEY finite I-KEY element I-KEY mesh I-KEY within O a O commercially O available O meshing O software O . O The O model O employs O a O combined O viscoelastic O and O hyperelastic B-KEY material I-KEY model I-KEY to O successfully O simulate O the O behaviour O of O biological B-KEY soft I-KEY tissues I-KEY . O The O finite O element O model O was O then O validated O for O use O in O biomechanical B-KEY research I-KEY Design O of O PID-type B-KEY controllers I-KEY using O multiobjective B-KEY genetic I-KEY algorithms I-KEY The O design O of O a O PID O controller O is O a O multiobjective O problem O . O A O plant O and O a O set O of O specifications O to O be O satisfied O are O given O . O The O designer O has O to O adjust O the O parameters O of O the O PID O controller O such O that O the O feedback B-KEY interconnection I-KEY of O the O plant O and O the O controller O satisfies O the O specifications O . O These O specifications O are O usually O competitive O and O any O acceptable O solution O requires O a O tradeoff O among O them O . O An O approach O for O adjusting O the O parameters O of O a O PID O controller O based O on O multiobjective O optimization O and O genetic O algorithms O is O presented O in O this O paper O . O The O MRCD O -LRB- O multiobjective B-KEY robust I-KEY control I-KEY design I-KEY -RRB- O genetic O algorithm O has O been O employed O . O The O approach O can O be O easily O generalized O to O design O multivariable O coupled O and O decentralized B-KEY PID I-KEY loops I-KEY and O has O been O successfully O validated O for O a O large O number O of O experimental O cases O Security B-KEY crisis I-KEY management I-KEY - O the O basics O Of O the O more O pervasive O problems O in O any O kind O of O security B-KEY event I-KEY is O how O the O security B-KEY event I-KEY is O managed O from O the O inception O to O the O end O . O There O 's O a O lot O written O about O how O to O manage O a O specific O incident O or O how O to O deal O with O a O point O problem O such O as O a O firewall B-KEY log I-KEY , O but O little O tends O to O be O written O about O how O to O deal O with O the O management O of O a O security B-KEY event I-KEY as O part O of O corporate B-KEY crisis I-KEY management I-KEY . O This O article O discusses O the O basics O of O security B-KEY crisis I-KEY management I-KEY and O of O the O logical O steps O required O to O ensure O that O a O security O crisis O does O not O get O out O of O hand O The O plot O thins O : O thin-client B-KEY computer I-KEY systems I-KEY and O academic B-KEY libraries I-KEY The O few O libraries O that O have O tried O thin O client O architectures O have O noted O a O number O of O compelling O reasons O to O do O so O . O For O starters O , O thin O client O devices O are O far O less O expensive O than O most O PCs O . O More O importantly O , O thin O client O computing O devices O are O believed O to O be O far O less O expensive O to O manage O and O support O than O traditional O PCs O Support B-KEY vector I-KEY machines I-KEY model I-KEY for O classification O of O thermal O error O in O machine O tools O This O paper O addresses O a O change O in O the O concept O of O machine B-KEY tool I-KEY thermal I-KEY error I-KEY prediction I-KEY which O has O been O hitherto O carried O out O by O directly O mapping O them O with O the O temperature O of O critical O elements O on O the O machine O . O The O model O developed O herein O using O support O vector O machines O , O a O powerful O data-training B-KEY algorithm I-KEY , O seeks O to O account O for O the O impact O of O specific O operating O conditions O , O in O addition O to O temperature O variation O , O on O the O effective O prediction O of O thermal O errors O . O Several O experiments O were O conducted O to O study O the O error B-KEY pattern I-KEY , O which O was O found O to O change O significantly O with O variation O in O operating O conditions O . O This O model O attempts O to O classify O the O error O based O on O operating O conditions O . O Once O classified O , O the O error O is O then O predicted O based O on O the O temperature O states O . O This O paper O also O briefly O describes O the O concept O of O the O implementation O of O such O a O comprehensive O model O along O with O an O on-line O error O assessment O and O calibration O system O in O a O PC-based B-KEY open-architecture I-KEY controller I-KEY environment I-KEY , O so O that O it O could O be O employed O in O regular O production O for O the O purpose O of O periodic O calibration O of O machine O tools O Estimating O populations O for O collective B-KEY dose I-KEY calculations I-KEY The O collective O dose O provides O an O estimate O of O the O effects O of O facility B-KEY operations I-KEY on O the O public B-KEY based O on O an O estimate O of O the O population O in O the O area O . O Geographic B-KEY information I-KEY system I-KEY software I-KEY , O electronic B-KEY population I-KEY data I-KEY resources I-KEY , O and O a O personal B-KEY computer I-KEY were O used O to O develop O estimates O of O population O within O 80 O km O radii O of O two O sites O Embedding O of O level-continuous B-KEY fuzzy I-KEY sets I-KEY on O Banach O spaces O In O this O paper O we O present O an O extension O of O the O Minkowski O embedding O theorem O , O showing O the O existence O of O an O isometric B-KEY embedding I-KEY between O the O classF/sub O c O / O -LRB- O X O -RRB- O of O compact-convex O and O level-continuous B-KEY fuzzy I-KEY sets I-KEY on O a O real B-KEY separable I-KEY Banach I-KEY space I-KEY X O and O C O -LRB- O -LSB- O 0 O , O 1 O -RSB- O * O B O -LRB- O X O * O -RRB- O -RRB- O , O the O Banach O space O of O real B-KEY continuous I-KEY functions I-KEY defined O on O the O cartesian B-KEY product I-KEY between O -LSB- O 0 O , O 1 O -RSB- O and O the O unit B-KEY ball I-KEY B O -LRB- O X O * O -RRB- O in O the O dual B-KEY space I-KEY X O * O . O Also O , O by O using O this O embedding O , O we O give O some O applications O to O the O characterization O of O relatively O compact O subsets O of O F/sub O c O / O -LRB- O X O -RRB- O . O In O particular O , O an O Ascoli-Arzela B-KEY type I-KEY theorem I-KEY is O proved O and O applied O to O solving O the O Cauchy B-KEY problem I-KEY x O -LRB- O t O -RRB- O = O f O -LRB- O t O , O x O -LRB- O t O -RRB- O -RRB- O , O x O -LRB- O t/sub O 0 O / O -RRB- O = O x/sub O 0 O / O on O F/sub O c O / O -LRB- O X O -RRB- O Knowledge O management-capturing O the O skills O of O key B-KEY performers I-KEY in O the O power B-KEY industry I-KEY The O growing O pressure O to O reduce O the O cost O of O electrical O power O in O recent O years O has O resulted O in O an O enormous O `` O brain-drain B-KEY '' O within O the O power B-KEY industry I-KEY . O A O novel O approach O has O been O developed O by O Eskom B-KEY to O capture O these O skills O before O they O are O lost O and O to O incorporate O these O into O a O computer-based B-KEY programme I-KEY called O `` O knowledge B-KEY management I-KEY '' O Online B-KEY longitudinal I-KEY survey I-KEY research I-KEY : O viability O and O participation O This O article O explores O the O viability O of O conducting O longitudinal O survey O research O using O the O Internet B-KEY in O samples O exposed O to O trauma B-KEY . O A O questionnaire B-KEY battery O assessing O psychological B-KEY adjustment I-KEY following O adverse O life O experiences O was O posted O online O . O Participants O who O signed O up O to O take O part O in O the O longitudinal O aspect O of O the O study O were O contacted O 3 O and O 6 O months O after O initial O participation O to O complete O the O second O and O third O waves O of O the O research O . O Issues O of O data B-KEY screening I-KEY and O sample B-KEY attrition I-KEY rates I-KEY are O considered O and O the O demographic B-KEY profiles I-KEY and O questionnaire B-KEY scores O of O those O who O did O and O did O not O take O part O in O the O study O during O successive O time O points O are O compared O . O The O results O demonstrate O that O it O is O possible O to O conduct O repeated O measures O survey O research O online O and O that O the O similarity O in O characteristics O between O those O who O do O and O do O not O take O part O during O successive O time O points O mirrors O that O found O in O traditional O pencil-and-paper O trauma B-KEY surveys O How O should O team O captains O order O golfers O on O the O final O day O of O the O Ryder O Cup O matches O ? O I O used O game B-KEY theory I-KEY to O examine O how O team O captains O should O select O their O slates B-KEY for O the O final O day O of O the O Ryder O Cup O matches O . O Under O the O assumption O that O golfers O have O different O abilities O and O are O not O influenced O by O pressure O or O momentum O , O I O found O that O drawing O names O from O a O hat O will O do O no O worse O than O any O other O strategy O Self-calibration O from O image O derivatives O This O study O investigates O the O problem O of O estimating O camera B-KEY calibration I-KEY parameters I-KEY from O image O motion O fields O induced O by O a O rigidly O moving O camera O with O unknown O parameters O , O where O the O image O formation O is O modeled O with O a O linear O pinhole-camera O model O . O The O equations O obtained O show O the O flow O to O be O separated O into O a O component O due O to O the O translation O and O the O calibration B-KEY parameters I-KEY and O a O component O due O to O the O rotation O and O the O calibration B-KEY parameters I-KEY . O A O set O of O parameters O encoding O the O latter O component O is O linearly O related O to O the O flow O , O and O from O these O parameters O the O calibration O can O be O determined O . O However O , O as O for O discrete O motion O , O in O general O it O is O not O possible O to O decouple O image B-KEY measurements I-KEY obtained O from O only O two O frames O into O translational O and O rotational B-KEY components I-KEY . O Geometrically O , O the O ambiguity O takes O the O form O of O a O part O of O the O rotational B-KEY component I-KEY being O parallel O to O the O translational B-KEY component I-KEY , O and O thus O the O scene O can O be O reconstructed O only O up O to O a O projective O transformation O . O In O general O , O for O full O calibration O at O least O four O successive O image O frames O are O necessary O , O with O the O 3D O rotation O changing O between O the O measurements O . O The O geometric O analysis O gives O rise O to O a O direct B-KEY self-calibration I-KEY method I-KEY that O avoids O computation O of O optical B-KEY flow I-KEY or O point B-KEY correspondences I-KEY and O uses O only O normal B-KEY flow I-KEY measurements I-KEY . O New O constraints O on O the O smoothness O of O the O surfaces O in O view O are O formulated O to O relate O structure O and O motion O directly O to O image O derivatives O , O and O on O the O basis O of O these O constraints O the O transformation O of O the O viewing O geometry O between O consecutive O images O is O estimated O . O The O calibration B-KEY parameters I-KEY are O then O estimated O from O the O rotational B-KEY components I-KEY of O several O flow O fields O . O As O the O proposed O technique O neither O requires O a O special O set O up O nor O needs O exact O correspondence O it O is O potentially O useful O for O the O calibration O of O active B-KEY vision I-KEY systems I-KEY which O have O to O acquire O knowledge O about O their O intrinsic O parameters O while O they O perform O other O tasks O , O or O as O a O tool O for O analyzing O image B-KEY sequences I-KEY in O large B-KEY video I-KEY databases I-KEY Analyzing O the O benefits O of O 300 B-KEY mm I-KEY conveyor-based O AMHS O While O the O need O for O automation O in O 300 B-KEY mm I-KEY fabs O is O not O debated O , O the O form O and O performance O of O such O automation O is O still O in O question O . O Software B-KEY simulation I-KEY that O compares O conveyor-based B-KEY continuous I-KEY flow I-KEY transport I-KEY technology I-KEY to O conventional O car-based B-KEY wafer-lot I-KEY delivery I-KEY has O detailed O delivery B-KEY time I-KEY and O throughput B-KEY advantages O to O the O former O The O acquisition O of O out-of-print B-KEY music I-KEY Non-specialist O librarians O are O alerted O to O factors O important O in O the O successful O acquisition O of O out-of-print B-KEY music I-KEY , O both O scholarly B-KEY editions I-KEY and O performance B-KEY editions I-KEY . O The O appropriate O technical B-KEY music I-KEY vocabulary I-KEY , O the O music B-KEY publishing I-KEY industry I-KEY , O specialized B-KEY publishers I-KEY and O vendors O , O and O methods O of O acquisition O of O out-of-print B-KEY printed I-KEY music I-KEY are O introduced O , O and O the O need O for O familiarity O with O them O is O emphasized O Duality O revisited O : O construction O of O fractional O frequency O distributions O based O on O two O dual B-KEY Lotka I-KEY laws I-KEY Fractional O frequency O distributions O of O , O for O example O , O authors O with O a O certain O -LRB- O fractional O -RRB- O number O of O papers O are O very O irregular O , O and O therefore O not O easy O to O model O or O to O explain O . O The O article O gives O a O first O attempt O to O this O by O as O suming O two O simple O Lotka O laws O -LRB- O with O exponent O 2 O -RRB- O : O one O for O the O number O of O authors O with O n O papers O -LRB- O total O count O here O -RRB- O and O one O for O the O number O of O papers O with O n O authors O , O n O in O N. O Based O on O an O earlier O made O convolution B-KEY model I-KEY of O Egghe O , O interpreted O and O reworked O now O for O discrete B-KEY scores I-KEY , O we O are O able O to O produce O theoretical O fractional O frequency O distributions O with O only O one O parameter O , O which O are O in O very O close O agreement O with O the O practical O ones O as O found O in O a O large O dataset O produced O earlier O by O Rao O -LRB- O 1995 O -RRB- O . O The O article O also O shows O that O -LRB- O irregular O -RRB- O fractional O frequency O distributions O are O a O consequence O of O Lotka O 's O law O , O and O are O not O examples O of O breakdowns O of O this O famous O historical O law O Accessible B-KEY streaming I-KEY content I-KEY Make O sure O your O Web B-KEY site I-KEY is O offering O quality B-KEY service I-KEY to O all O your O users O . O The O article O provides O some O tips O and O tactics O for O making O your O streaming B-KEY media I-KEY accessible O . O Accessibility O of O streaming O content O for O people O with O disabilities O is O often O not O part O of O the O spec O for O multimedia B-KEY projects I-KEY , O but O it O certainly O affects O your O quality O of O service O . O Most O of O the O resources O available O on O Web B-KEY accessibility I-KEY deal O with O HTML B-KEY . O Fortunately O , O rich O media O and O streaming B-KEY content I-KEY developers I-KEY have O a O growing O number O of O experts O to O turn O to O for O information O and O assistance O . O The O essentials O of O providing O accessible B-KEY streaming I-KEY content I-KEY are O simple O : O blind O and O visually B-KEY impaired I-KEY people I-KEY need O audio O to O discern O important O visual B-KEY detail I-KEY and O interface B-KEY elements I-KEY , O while O deaf O and O hard-of-hearing B-KEY people I-KEY need O text O to O access O sound B-KEY effects I-KEY and O dialog O . O Actually O implementing O these O principles O is O quite O a O challenge O , O though O . O Now O due O to O a O relatively O new O law O in O the O US O , O known O as O Section B-KEY 508 I-KEY , O dealing O with O accessibility B-KEY issues I-KEY is O becoming O an O essential O part O of O publishing O on O the O Web O The O efficacy O of O electronic O telecommunications B-KEY in O fostering O interpersonal B-KEY relationships I-KEY The O effectiveness O of O electronic O telecommunications B-KEY as O a O supplementary O aid O to O instruction O and O as O a O communication O link O between O students O , O and O between O students O and O instructors O in O fostering O interpersonal B-KEY relationships I-KEY was O explored O in O this O study O . O More O specifically O , O the O impacts O of O e-mail B-KEY , O one O of O the O most O accessible O , O convenient O , O and O easy O to O use O computer-mediated B-KEY communications I-KEY , O on O student B-KEY attitudes I-KEY toward O the O instructor O , O group-mates O , O and O other O classmates O were O investigated O . O A O posttest-only O experimental O design O was O adopted O . O In O total O , O 68 O prospective O teachers O enrolling O in O a O `` O Computers O in O Education O '' O course O participated O in O the O study O for O a O whole O semester O . O Results O from O the O study O provided O substantial O evidence O supporting O e-mail B-KEY 's O beneficial O effects O on O student B-KEY attitudes I-KEY toward O the O instructor O and O other O classmates O Online B-KEY auctions I-KEY : O dynamic B-KEY pricing I-KEY and O the O lodging B-KEY industry I-KEY The O traditional O channels O of O distribution O for O overnight B-KEY accommodation I-KEY are O rapidly O being O displaced O by O Web B-KEY site I-KEY scripting I-KEY , O online B-KEY intermediaries I-KEY , O and O specialty B-KEY brokers I-KEY . O Businesses O that O pioneered O Internet B-KEY usage I-KEY relied O on O it O as O a O sales B-KEY and O marketing B-KEY alternative O to O predecessor O product O distribution O channels O . O As O such O , O Web O sites O replace O the O traditional O trading B-KEY model I-KEY to O the O Internet O . O Web-enabled O companies O are O popular O because O the O medium O renders O the O process O faster O , O less O costly O , O highly O reliable O , O and O secure O . O Auction-based O models O impact O business B-KEY models I-KEY by O converting O the O price B-KEY setting I-KEY mechanism I-KEY from O supplier-centric O to O market-centric O and O transforming O the O trading O model O from O `` O one O to O many O '' O to O `` O many O to O many O . O '' O Historically O , O pricing O was O based O on O the O cost O of O production O plus O a O margin O of O profit O . O Traditionally O , O as O products O and O services O move O through O the O supply B-KEY chain I-KEY , O from O the O producer O to O the O consumer O , O various O intermediaries O added O their O share O of O profit O to O the O price O . O As O Internet O based O mediums O of O distribution O become O more O prevalent O , O traditional O pricing O models O are O being O supplanted O with O dynamic B-KEY pricing I-KEY . O A O dynamic B-KEY pricing I-KEY model O represents O a O flexible O system O that O changes O prices O not O only O from O product O to O product O , O but O also O from O customer O to O customer O and O transaction O to O transaction O . O Many O industry O leaders O are O skeptical O of O the O long O run O impact O of O online B-KEY auctions I-KEY on O lodging B-KEY industry I-KEY profit O margins O , O despite O the O fact O pricing O theory O suggests O that O an O increase O in O the O flow O of O information O results O in O efficient O market B-KEY pricing O . O The O future O of O such O endeavors O remains O promising O , O but O controversial O Acquisitions O in O the O James B-KEY Ford I-KEY Bell I-KEY Library I-KEY This O article O presents O basic O acquisitions O philosophy O and O approaches O in O a O noted O special B-KEY collection I-KEY , O with O commentary O on O `` O just O saying O no O '' O and O on O how O the O electronic B-KEY revolution I-KEY has O changed O the O acquisition O of O special B-KEY collections I-KEY materials O Rapid B-KEY microwell I-KEY polymerase I-KEY chain I-KEY reaction I-KEY with O subsequent O ultrathin-layer B-KEY gel I-KEY electrophoresis I-KEY of O DNA O Large-scale B-KEY genotyping I-KEY , O mapping O and O expression B-KEY profiling I-KEY require O affordable O , O fully O automated O high-throughput O devices O enabling O rapid O , O high-performance O analysis O using O minute O quantities O of O reagents O . O In O this O paper O , O we O describe O a O new O combination O of O microwell O polymerase O chain O reaction O -LRB- O PCR O -RRB- O based O DNA B-KEY amplification I-KEY technique O with O automated O ultrathin-layer B-KEY gel I-KEY electrophoresis I-KEY analysis O of O the O resulting O products O . O This O technique O decreases O the O reagent B-KEY consumption I-KEY -LRB- O total O reaction O volume O 0.75-1 O mu O L O -RRB- O , O the O time O requirement O of O the O PCR O -LRB- O 15-20 O min O -RRB- O and O subsequent O ultrathin-layer B-KEY gel I-KEY electrophoresis I-KEY based O fragment O analysis O -LRB- O 5 O min O -RRB- O by O automating O the O current O manual O procedure O and O reducing O the O human O intervention O using O sample B-KEY loading I-KEY robots I-KEY and O computerized B-KEY real I-KEY time I-KEY data I-KEY analysis I-KEY . O Small O aliquots O -LRB- O 0.2 O mu O L O -RRB- O of O the O submicroliter O size O PCR O reaction O were O transferred O onto O loading O membranes O and O analyzed O by O ultrathin-layer B-KEY gel I-KEY electrophoresis I-KEY which O is O a O novel O , O high-performance O and O automated B-KEY microseparation I-KEY technique O . O This O system O employs O integrated O scanning O laser-induced O fluorescence-avalanche O photodiode O detection O and O combines O the O advantages O of O conventional O slab O and O capillary O gel O electrophoresis O . O Visualization O of O the O DNA O fragments O was O accomplished O by O `` O in O migratio O '' O complexation B-KEY with I-KEY ethidium I-KEY bromide I-KEY during O the O electrophoresis O process O also O enabling O real B-KEY time I-KEY imaging I-KEY and O data O analysis O Robust B-KEY wavelet I-KEY neuro I-KEY control I-KEY for O linear B-KEY brushless I-KEY motors I-KEY Design O , O simulation O and O experimental O implementation O of O a O wavelet B-KEY basis I-KEY function I-KEY network I-KEY learning O controller O for O linear O brushless O dc O motors O -LRB- O LBDCM B-KEY -RRB- O are O considered O . O Stability B-KEY robustness I-KEY with O position B-KEY tracking I-KEY is O the O primary O concern O . O The O proposed O controller O deals O mainly O with O external B-KEY disturbances I-KEY , O e.g. O nonlinear B-KEY friction I-KEY force I-KEY and O payload O variation O in O motion O control O of O linear O motors O . O It O consists O of O two O parts O , O one O is O a O state B-KEY feedback I-KEY component I-KEY , O and O the O other O one O is O a O learning B-KEY feedback I-KEY component I-KEY . O The O state O feedback O controller O is O designed O on O the O basis O of O a O simple O linear O model O , O and O the O learning B-KEY feedback I-KEY component I-KEY is O a O wavelet O neural O controller O . O The O attenuation B-KEY effect I-KEY of O wavelet O neural O networks O on O friction B-KEY force I-KEY is O first O verified O by O the O numerical O method O . O The O learning O effect O of O wavelet O neural O networks O on O friction B-KEY force I-KEY is O also O shown O in O the O numerical O results O . O Then O , O a O wavelet O neural O network O is O applied O on O a O real O LBDCM B-KEY to O on-line O suppress O the O friction B-KEY force I-KEY , O which O may O be O variable O due O to O the O different O lubrication B-KEY . O The O effectiveness O of O the O proposed O control O schemes O is O demonstrated O by O simulated O and O experimental O results O The O set O of O stable B-KEY polynomials I-KEY of O linear B-KEY discrete I-KEY systems I-KEY : O its O geometry B-KEY The O multidimensional B-KEY stability I-KEY domain I-KEY of O linear B-KEY discrete I-KEY systems I-KEY is O studied O . O Its O configuration O is O determined O from O the O parameters O of O its O intersection O with O coordinate O axes O , O coordinate O planes O , O and O certain O auxiliary O planes O . O Counterexamples O for O the O discrete O variant O of O the O Kharitonov B-KEY theorem I-KEY are O given O Computer B-KEY processing I-KEY of O data O on O mental B-KEY impairments I-KEY during O the O acute B-KEY period I-KEY of I-KEY concussion I-KEY The O article O presents O results O of O computer B-KEY processing I-KEY of O experimental O information O obtained O from O patients O during O the O acute B-KEY period I-KEY of I-KEY concussion I-KEY . O A O number O of O computational B-KEY procedures I-KEY are O described O E-mail B-KEY and O the O legal B-KEY profession I-KEY The O widespread O use O of O E-mail B-KEY can O be O found O in O all O areas O of O commerce O , O and O the O legal B-KEY profession I-KEY is O one O that O has O embraced O this O new O medium O of O communication O . O E-mail B-KEY is O not O without O its O drawbacks O , O however O . O Due O to O the O nature O of O the O technologies O behind O the O medium O , O it O is O a O less O secure O form O of O communication O than O many O of O those O traditionally O used O by O the O legal B-KEY profession I-KEY , O including O DX O , O facsimile O , O and O standard O and O registered O post O . O There O are O a O number O of O ways O in O which O E-mails B-KEY originating O from O the O practice O may O be O protected O , O including O software B-KEY encryption I-KEY , O hardware B-KEY encryption I-KEY and O various O methods O of O controlling O and O administering O access O to O the O E-mails B-KEY MEMS B-KEY applications O in O computer B-KEY disk I-KEY drive I-KEY dual-stage I-KEY servo I-KEY systems I-KEY We O present O a O decoupled B-KEY discrete I-KEY time I-KEY pole I-KEY placement I-KEY design I-KEY method I-KEY , O which O can O be O combined O with O a O self-tuning B-KEY scheme I-KEY to O compensate O variations O in O the O microactuator B-KEY 's O -LRB- O MA O 's O -RRB- O resonance O mode O . O Section O I O of O the O paper O describes O the O design O and O fabrication O of O a O prototype O microactuator B-KEY with O an O integrated O gimbal O structure O . O Section O II O presents O a O decoupled O track-following B-KEY controller I-KEY design I-KEY and O a O self-tuning O control O scheme O to O compensate O for O the O MA O 's O resonance O mode O variations O Accelerated B-KEY simulation I-KEY of O the O steady-state B-KEY availability I-KEY of O non-Markovian B-KEY systems I-KEY A O general O accelerated B-KEY simulation I-KEY method O for O evaluation O of O the O steady-state O availability O of O non-Markovian O systems O is O proposed O . O It O is O applied O to O the O investigation O of O a O class O of O systems O with O repair O . O Numerical B-KEY examples I-KEY are O given O Restoration O of O broadband B-KEY imagery I-KEY steered O with O a O liquid-crystal O optical B-KEY phased I-KEY array I-KEY In O many O imaging B-KEY applications I-KEY , O it O is O highly O desirable O to O replace O mechanical B-KEY beam-steering I-KEY components I-KEY -LRB- O i.e. O , O mirrors B-KEY and O gimbals B-KEY -RRB- O with O a O nonmechanical B-KEY device I-KEY . O One O such O device O is O a O nematic O liquid O crystal O optical B-KEY phased I-KEY array I-KEY -LRB- O LCOPA O -RRB- O . O An O LCOPA O can O implement O a O blazed B-KEY phase I-KEY grating I-KEY to O steer O the O incident O light O . O However O , O when O a O phase O grating O is O used O in O a O broadband B-KEY imaging I-KEY system I-KEY , O two O adverse O effects O can O occur O . O First O , O dispersion B-KEY will O cause O different O incident B-KEY wavelengths I-KEY arriving O at O the O same O angle O to O be O steered O to O different O output B-KEY angles I-KEY , O causing O chromatic B-KEY aberrations I-KEY in O the O image B-KEY plane I-KEY . O Second O , O the O device O will O steer O energy O not O only O to O the O first B-KEY diffraction I-KEY order I-KEY , O but O to O others O as O well O . O This O multiple-order B-KEY effect I-KEY results O in O multiple B-KEY copies I-KEY of O the O scene O appearing O in O the O image B-KEY plane I-KEY . O We O describe O a O digital B-KEY image I-KEY restoration I-KEY technique I-KEY designed O to O overcome O these O degradations O . O The O proposed O postprocessing B-KEY technique I-KEY is O based O on O a O Wiener B-KEY deconvolution I-KEY filter I-KEY . O The O technique O , O however O , O is O applicable O only O to O scenes O containing O objects O with O approximately B-KEY constant I-KEY reflectivities I-KEY over O the O spectral B-KEY region I-KEY of I-KEY interest I-KEY . O Experimental O results O are O presented O to O demonstrate O the O effectiveness O of O this O technique O Genetic O algorithm O guided O selection O : O variable B-KEY selection O and O subset O selection O A O novel O genetic B-KEY algorithm I-KEY guided I-KEY selection I-KEY method I-KEY , O GAS O , O has O been O described O . O The O method O utilizes O a O simple O encoding B-KEY scheme I-KEY which O can O represent O both O compounds B-KEY and O variables B-KEY used O to O construct O a O QSAR/QSPR B-KEY model I-KEY . O A O genetic O algorithm O is O then O utilized O to O simultaneously O optimize B-KEY the O encoded O variables B-KEY that O include O both O descriptors B-KEY and O compound B-KEY subsets O . O The O GAS O method O generates O multiple B-KEY models I-KEY each O applying O to O a O subset O of O the O compounds B-KEY . O Typically O the O subsets O represent O clusters B-KEY with O different O chemotypes B-KEY . O Also O a O procedure O based O on O molecular B-KEY similarity I-KEY is O presented O to O determine O which O model O should O be O applied O to O a O given O test O set O compound B-KEY . O The O variable B-KEY selection O method O implemented O in O GAS O has O been O tested O and O compared O using O the O Selwood O data O set O -LRB- O n O = O 31 O compounds O ; O nu O = O 53 O descriptors O -RRB- O . O The O results O showed O that O the O method O is O comparable O to O other O published O methods O . O The O subset B-KEY selection I-KEY method O implemented O in O GAS O has O been O first O tested O using O an O artificial O data O set O -LRB- O n O = O 100 O points O ; O nu O = O 1 O descriptor B-KEY -RRB- O to O examine O its O ability O to O subset O data O points O and O second O applied O to O analyze O the O XLOGP B-KEY data I-KEY set I-KEY -LRB- O n O = O 1831 O compounds B-KEY ; O nu O = O 126 O descriptors B-KEY -RRB- O . O The O method O is O able O to O correctly O identify O artificial B-KEY data I-KEY points I-KEY belonging O to O various O subsets O . O The O analysis O of O the O XLOGP B-KEY data I-KEY set I-KEY shows O that O the O subset B-KEY selection I-KEY method O can O be O useful O in O improving O a O QSAR/QSPR B-KEY model I-KEY when O the O variable B-KEY selection O method O fails O Real-time B-KEY tissue I-KEY characterization I-KEY on O the O basis O of O in O vivo O Raman O spectra O The O application O of O in O vivo O Raman O spectroscopy O for O clinical B-KEY diagnosis I-KEY demands O dedicated B-KEY software I-KEY that O can O perform O the O necessary O signal O processing O and O subsequent O -LRB- O multivariate O -RRB- O data O analysis O , O enabling O clinically O relevant O parameters O to O be O extracted O and O made O available O in O real O time O . O Here O we O describe O the O design O and O implementation O of O a O software O package O that O allows O for O real-time O signal O processing O and O data O analysis O of O Raman O spectra O . O The O design O is O based O on O automatic B-KEY data I-KEY exchange I-KEY between O Grams B-KEY , O a O spectroscopic O data O acquisition O and O analysis O program O , O and O Matlab B-KEY , O a O program O designed O for O array-based B-KEY calculations I-KEY . O The O data B-KEY analysis I-KEY software I-KEY has O a O modular B-KEY design I-KEY providing O great O flexibility O in O developing O custom O data O analysis O routines O for O different O applications O . O The O implementation O is O illustrated O by O a O computationally B-KEY demanding I-KEY application I-KEY for O the O classification O of O skin O spectra O using O principal O component O analysis O and O linear B-KEY discriminant I-KEY analysis I-KEY Naomi B-KEY Campbell I-KEY : O drugs B-KEY , O distress B-KEY and O the O Data B-KEY Protection I-KEY Act I-KEY In O the O first O case O of O its O kind O , O Naomi B-KEY Campbell I-KEY successfully O sued O Mirror O Group O Newspapers O for O damage O and O distress B-KEY caused O by O breach O of O the O Data B-KEY Protection I-KEY Act I-KEY 1998 O . O Partner O N. O Wildish O and O assistant O M. O Turle O of O City O law O firm O Field O Fisher O Waterhouse O discuss O the O case O and O the O legal O implications O of O which O online B-KEY publishers I-KEY should O be O aware O Antipersistent B-KEY Markov I-KEY behavior I-KEY in O foreign B-KEY exchange I-KEY markets I-KEY A O quantitative O check O of O efficiency B-KEY in O US O dollar/Deutsche O mark O exchange O rates O is O developed O using O high-frequency O -LRB- O tick O by O tick O -RRB- O data O . O The O antipersistent B-KEY Markov I-KEY behavior I-KEY of O log-price B-KEY fluctuations I-KEY of O given O size O implies O , O in O principle O , O the O possibility O of O a O statistical B-KEY forecast I-KEY . O We O introduce O and O measure O the O available O information O of O the O quote B-KEY sequence I-KEY , O and O we O show O how O it O can O be O profitable O following O a O particular O trading B-KEY rule I-KEY Fast B-KEY frequency I-KEY acquisition I-KEY phase-frequency B-KEY detectors I-KEY for O Gsamples/s O phase-locked O loops O This O paper O describes O two O techniques O for O designing O phase-frequency B-KEY detectors I-KEY -LRB- O PFDs O -RRB- O with O higher O operating O frequencies O -LSB- O periods O of O less O than O 8 O * O the O delay O of O a O fan-out-4 O inverter O -LRB- O FO-4 O -RRB- O -RSB- O and O faster O frequency O acquisition O . O Prototypes O designed O in O 0.25 O - O mu O m O CMOS B-KEY process I-KEY exhibit O operating O frequencies O of O 1.25 B-KEY GHz I-KEY -LSB- O = O 1 O / O -LRB- O 8.FO-4 O -RRB- O -RSB- O and O 1.5 B-KEY GHz I-KEY -LSB- O = O 1 O / O -LRB- O 6.7.FO-4 O -RRB- O -RSB- O for O two O techniques O , O respectively O , O whereas O a O conventional O PFD O operates O at O < O 1 O GHz O -LSB- O = O 1 O / O -LRB- O 10.FO-4 O -RRB- O -RSB- O . O The O two O proposed O PFDs O achieve O a O capture O range O of O 1.7 O * O and O 1.4 O * O the O conventional O design O , O respectively O Model O intestinal B-KEY microflora I-KEY in O computer O simulation O : O a O simulation O and O modeling O package O for O host-microflora B-KEY interactions I-KEY The O ecology O of O the O human B-KEY intestinal I-KEY microflora O and O its O interaction O with O the O host O are O poorly O understood O . O Though O more O and O more O data O are O being O acquired O , O in O part O using O modern O molecular B-KEY methods I-KEY , O development O of O a O quantitative B-KEY theory I-KEY has O not O kept O pace O with O this O increase O in O observing B-KEY power I-KEY . O This O is O in O part O due O to O the O complexity O of O the O system O and O to O the O lack O of O simulation O environments O in O which O to O test O what O the O ecological O effect O of O a O hypothetical O mechanism O of O interaction O would O be O , O before O resorting O to O laboratory O experiments O . O The O MIMICS B-KEY project I-KEY attempts O to O address O this O through O the O development O of O a O cellular O automaton O for O simulation O of O the O intestinal B-KEY microflora I-KEY . O In O this O paper O , O the O design O and O evaluation O of O this O simulator O is O discussed O Fault-tolerant B-KEY computer-aided I-KEY control I-KEY systems I-KEY with O multiversion-threshold B-KEY adaptation I-KEY : O adaptation O methods O , O reliability B-KEY estimation I-KEY , O and O choice O of O an O architecture B-KEY For O multiversion B-KEY majority-redundant I-KEY computer-aided I-KEY control I-KEY systems I-KEY , O systematization O of O adaptation O methods O that O are O stable O to O hardware O and O software O failures O , O a O method O for O estimating O their O reliability O from O an O event B-KEY graph I-KEY model I-KEY , O and O a O method O for O selecting O a O standard O architecture B-KEY with O regard O for O reliability O requirements O are O studied O Nonlinear B-KEY systems I-KEY arising O from O nonisothermal O , O non-Newtonian O Hele-Shaw B-KEY flows I-KEY in O the O presence O of O body B-KEY forces I-KEY and O sources B-KEY In O this O paper O , O we O first O give O a O formal O derivation O of O several O systems O of O equations O for O injection B-KEY moulding I-KEY . O This O is O done O starting O from O the O basic O equations O for O nonisothermal O , O non-Newtonian O flows O in O a O three-dimensional O domain O . O We O derive O systems O for O both O -LRB- O T/sup O 0 O / O , O p/sup O 0 O / O -RRB- O and O -LRB- O T/sup O 1 O / O , O p/sup O 1 O / O -RRB- O in O the O presence O of O body B-KEY forces I-KEY and O sources B-KEY . O We O find O that O body B-KEY forces I-KEY and O sources B-KEY have O a O nonlinear O effect O on O the O systems O . O We O also O derive O a O nonlinear O `` O Darcy B-KEY law I-KEY '' O . O Our O formulation O includes O not O only O the O pressure O gradient O , O but O also O body B-KEY forces I-KEY and O sources B-KEY , O which O play O the O role O of O a O nonlinearity O . O Later O , O we O prove O the O existence O of O weak O solutions O to O certain O boundary B-KEY value I-KEY problems I-KEY and O initial-boundary O value O problems O associated O with O the O resulting O equations O for O -LRB- O T/sup O 0 O / O , O p/sup O 0 O / O -RRB- O but O in O a O more O general O mathematical O setting O Enterprise O in O focus O at O NetSec B-KEY 2002 I-KEY NetSec B-KEY 2002 I-KEY took O place O in O San O Francisco O , O amid O industry O reflection O on O the O balance O to O be O struck O between O combatting O cyber-terrorism O and O safeguarding O civil O liberties O post-9 O .11 O . O The O author O reports O on O the O punditry O and O the O pedagogy O at O the O CSI B-KEY event O , O focusing O on O security O in O the O enterprise O Generalized O predictive O control O for O non-uniformly O sampled O systems O In O this O paper O , O we O study O digital B-KEY control I-KEY systems I-KEY with O non-uniform O updating O and O sampling O patterns O , O which O include O multirate B-KEY sampled-data I-KEY systems I-KEY as O special O cases O . O We O derive O lifted O models O in O the O state-space O domain O . O The O main O obstacle O for O generalized O predictive O control O -LRB- O GPC B-KEY -RRB- O design O using O the O lifted O models O is O the O so-called O causality B-KEY constraint I-KEY . O Taking O into O account O this O design O constraint O , O we O propose O a O new O GPC B-KEY algorithm O , O which O results O in O optimal B-KEY causal I-KEY control I-KEY laws I-KEY for O the O non-uniformly O sampled O systems O . O The O solution O applies O immediately O to O multirate B-KEY sampled-data I-KEY systems I-KEY where O rates O are O integer B-KEY multiples I-KEY of O some O base O period O Randomized B-KEY two-process I-KEY wait-free I-KEY test-and-set I-KEY We O present O the O first O explicit O , O and O currently O simplest O , O randomized B-KEY algorithm I-KEY for O two-process O wait-free O test-and-set O . O It O is O implemented O with O two O 4-valued B-KEY single I-KEY writer I-KEY single I-KEY reader I-KEY atomic I-KEY variables I-KEY . O A O test-and-set O takes O at O most O 11 O expected B-KEY elementary I-KEY steps I-KEY , O while O a O reset O takes O exactly O 1 O elementary O step O . O Based O on O a O finite-state B-KEY analysis I-KEY , O the O proofs O of O correctness O and O expected O length O are O compressed O into O one O table O A O PID O standard O : O What O , O why O , O how O ? O The O paper O is O written O for O all O who O develop O and O use O P&ID O s O . O It O will O aid O in O solving O the O long O existing O and O continuing O problem O of O confusing O information O on O P&ID O s O . O The O acronym O P&ID O is O widely O understood O to O mean O the O principal B-KEY document I-KEY used O to O define O the O details O of O how O a O process O works O and O how O it O is O controlled O . O The O ISA O Dictionary O definition O for O P&ID O tells O what O they O do O , O `` O show O the O interconnection O of O process O equipment O and O the O instrumentation O used O to O control O the O process O . O In O the O process O industry O a O standard O set O of O symbols O is O used O to O prepare O drawings O of O processes O . O The O instrument O symbols O used O in O these O drawings O are O generally O based O on O ISA-S5 O .1 O . O '' O In O the O paper O the O ISA B-KEY standard I-KEY is O referred O to O as O ISA-5 O .1 O . O The O article O develops O the O concept O of O the O `` O standard O '' O and O poses O some O of O the O questions O that O the O `` O standard O '' O can O answer O Allan B-KEY variance I-KEY and O fractal B-KEY Brownian I-KEY motion I-KEY Noise B-KEY filtering I-KEY is O the O subject O of O a O voluminous O literature O in O radio B-KEY engineering I-KEY . O The O methods O of O filtering O require O knowledge O of O the O frequency B-KEY response I-KEY , O which O is O usually O unknown O . O D.W. O Allan O -LRB- O see O Proc O . O IEEE O , O vol O .54 O , O no. O 2 O , O p.221-30 O , O 1966 O ; O IEEE O Trans O . O Instr O . O Measur. O , O vol.IM-36 O , O p.646-54 O , O 1987 O -RRB- O proposed O a O simple O method O of O determining O the O interval O between O equally O accurate O observations O which O does O without O this O information O . O In O this O method O , O the O variances O of O the O increments O of O noise O and O signal O are O equal O , O so O that O , O in O observations O with O a O greater O step O , O the O variations O caused O by O noise O are O smaller O than O those O caused O by O the O signal O . O This O method O is O the O standard O accepted O by O the O USA B-KEY metrology I-KEY community I-KEY . O The O present O paper O is O devoted O to O a O statistical B-KEY analysis I-KEY of O the O Allan O method O and O acquisition O of O additional O information O Four O factors O influencing O the O fair B-KEY market I-KEY value I-KEY of O out-of O print O books O . O 2 O Fot O pt O .1 O see O ibid. O , O p.71-8 O -LRB- O 2002 O -RRB- O . O Data O from O the O fifty-six O titles O examined O qualitatively O in O the O Patterson O study O are O examined O quantitatively O . O In O addition O to O the O four O factors O of O edition O , O condition O , O dust O jacket O , O and O autograph O that O were O hypothesized O to O influence O the O value O of O a O book O , O four O other O factors O for O which O information O was O available O in O the O data O were O examined O A O framework O of O electronic B-KEY tendering I-KEY for O government O procurement O : O a O lesson O learned O in O Taiwan O To O render O government O procurement O efficient O , O transparent O , O nondiscriminating O , O and O accountable O , O an O electronic B-KEY government I-KEY procurement I-KEY system I-KEY is O required O . O Accordingly O , O Taiwan B-KEY government I-KEY procurement I-KEY law I-KEY -LRB- O TGPL O -RRB- O states O that O suppliers O may O employ O electronic O devices O to O forward O a O tender O . O This O investigation O demonstrates O how O the O electronic B-KEY government I-KEY procurement I-KEY system I-KEY functions O and O reengineers B-KEY internal B-KEY procurement I-KEY processes I-KEY , O which O in O turn O benefits O both O government O bodies O and O vendors O . O The O system O features O explored O herein O include O posting/receiving O bids O via O the O Internet O , O vendor B-KEY registration I-KEY , O certificate B-KEY authorization I-KEY , O contract B-KEY development I-KEY tools I-KEY , O bid/request O for O proposal O -LRB- O RFP O -RRB- O development O , O online B-KEY bidding I-KEY , O and O online B-KEY payment I-KEY , O all O of O which O can O be O integrated O easily O within O most O existing O information O infrastructures O Industry O insiders O loading O up O on O cheap O company O stock O A O surge O of O telecom O executives O and O directors O purchasing O their O own O companies O , O stock O in O the O last O two O months O points O toward O a O renewed O optimism O in O the O beleaguered O sector O , O say O some O observers O , O who O view O the O rash O of O insider O buying O as O a O vote O of O confidence O from O management O . O Airgate O PCS O , O Charter O Communications O , O Cox O Communications O , O Crown O Castle O International O , O Nextel O Communications O and O Nortel O Networks O all O have O seen O infusions O of O insider B-KEY investment I-KEY this O summer O , O echoing O trends O in O both O the O telecom B-KEY industry I-KEY and O the O national O economy O Computer-mediated B-KEY communication I-KEY and O remote B-KEY management O : O integration O or O isolation O ? O The O use O of O intranets B-KEY and O e-mails B-KEY to O communicate O with O remote B-KEY staff O is O increasing O rapidly O within O organizations O . O For O many O companies B-KEY this O is O viewed O as O a O speedy O and O cost-effective B-KEY way O of O keeping O in O contact O with O staff O and O ensuring O their O continuing O commitment O to O company B-KEY goals O . O This O article O highlights O the O problems O experienced O by O staff O when O managers B-KEY use O intranets B-KEY and O e-mails B-KEY in O an O inappropriate O fashion O for O these O purposes O . O Issues O of O remoteness B-KEY and O isolation O are O discussed O , O along O with O the O reports O of O frustration O and O disidentification O experienced O . O However O , O it O will O be O shown O that O when O used O appropriately O , O communication O using O these O technologies O can O facilitate O shared O understanding O and O help O remote B-KEY staff O to O view O their O company O as O alive O and O exciting O . O Theoretical O aspects O are O highlighted O and O the O implications O of O these O findings O are O discussed O Application O of O multiprocessor B-KEY systems I-KEY for O computation B-KEY of I-KEY jets I-KEY The O article O describes O the O implementation O of O methods O for O numerical O solution O of O gas-dynamic B-KEY problems I-KEY on O a O wide O class O of O multiprocessor B-KEY systems I-KEY , O conventionally O characterized O as O `` O cluster O '' O systems O . O A O standard O data-transfer B-KEY interface I-KEY - O the O so-called O message B-KEY passing I-KEY interface I-KEY - O is O used O for O parallelization O of O application O algorithms O among O processors O . O Simulation O of O jets O escaping O into O a O low-pressure B-KEY region I-KEY is O chosen O as O a O computational O example O Designing O a O new O urban O Internet B-KEY The O parallel O between O designing O a O Web B-KEY site I-KEY and O the O construction O of O a O building O is O a O familiar O one O , O but O how O often O do O we O think O of O the O Internet B-KEY as O having O parks O and O streets O ? O It O would O be O absurd O to O say O that O the O Internet B-KEY could O ever O take O the O place O of O real O , O livable O communities B-KEY ; O however O , O it O is O safe O to O say O that O the O context O for O using O the O Internet B-KEY is O on O a O path O of O change O . O As O the O Internet B-KEY evolves O beyond O a O simple O linkage O of O disparate O Web B-KEY sites I-KEY and O applications O , O the O challenge O for O Information B-KEY Architects I-KEY is O establishing O a O process O by O which O to O structure O , O organize O , O and O design O networked B-KEY environments I-KEY . O The O principles O that O guide O New O Urbanism O can O offer O much O insight O into O networked B-KEY electronic I-KEY environment I-KEY design I-KEY . O At O the O core O of O every O New O Urbanism O principle O is O the O idea O of O `` O wholeness O '' O - O of O making O sure O that O neighborhoods O and O communities B-KEY are O knit O together O in O a O way O that O supports O civic O activities O , O economic O development O , O efficient O ecosystems O , O aesthetic O beauty O , O and O human O interaction O Comprehensive O encoding O and O decoupling O solution O to O problems O of O decoherence B-KEY and O design O in O solid-state B-KEY quantum I-KEY computing I-KEY Proposals O for O scalable B-KEY quantum I-KEY computing I-KEY devices I-KEY suffer O not O only O from O decoherence B-KEY due O to O the O interaction O with O their O environment O , O but O also O from O severe O engineering B-KEY constraints I-KEY . O Here O we O introduce O a O practical O solution O to O these O major O concerns O , O addressing O solid-state O proposals O in O particular O . O Decoherence B-KEY is O first O reduced O by O encoding O a O logical O qubit O into O two O qubits O , O then O completely O eliminated O by O an O efficient O set O of O decoupling O pulse O sequences O . O The O same O encoding O removes O the O need O for O single-qubit O operations O , O which O pose O a O difficult O design O constraint O . O We O further O show O how O the O dominant O decoherence B-KEY processes O can O be O identified O empirically O , O in O order O to O optimize O the O decoupling O pulses O Post-haste O . O 100th O robotic B-KEY containerization I-KEY system I-KEY installed O in O US O mail B-KEY sorting I-KEY center O Spot O welding O , O machine O tending O , O material O handling O , O picking O , O packing O , O painting O , O palletizing O , O assembly O ... O the O list O of O tasks O being O performed O by O ABB B-KEY robots I-KEY keeps O on O growing O . O Adding O to O this O portfolio O is O a O new O robot B-KEY containerization I-KEY system I-KEY -LRB- O RCS O -RRB- O that O ABB O developed O specifically O for O the O United B-KEY States I-KEY Postal I-KEY Service I-KEY -LRB- O USPS O -RRB- O . O The O RCS O has O brought O new O levels O of O speed O , O accuracy O , O efficiency O and O productivity O to O the O process O of O sorting O and O containerizing O mail O and O packages O . O Recently O , O the O 100th O ABB O RCS O was O installed O at O the O USPS O processing O and O distribution O center O in O Columbus O , O Ohio O Fully B-KEY automatic I-KEY algorithm I-KEY for O region B-KEY of I-KEY interest I-KEY location I-KEY in O camera O calibration O We O present O an O automatic O method O for O region O of O interest O -LRB- O ROI O -RRB- O location O in O camera B-KEY calibration I-KEY used O in O computer B-KEY vision I-KEY inspection I-KEY . O An O intelligent O ROI B-KEY location I-KEY algorithm I-KEY based O on O the O Radon B-KEY transform I-KEY is O developed O to O automate O the O calibration B-KEY process I-KEY . O The O algorithm O remains O robust O even O if O the O anchor O target O has O a O notable O rotation B-KEY angle I-KEY in O the O target O plane O . O This O method O functions O well O although O the O anchor O target O is O not O carefully O positioned O . O Several O improvement O methods O are O studied O to O avoid O the O algorithm O 's O huge O time/space B-KEY consumption I-KEY problem I-KEY . O The O algorithm O runs O about O 100 O times O faster O if O these O improvement O methods O are O applied O . O Using O this O method O fully B-KEY automatic I-KEY camera I-KEY calibration I-KEY is O achieved O without O human O interactive O ROI O specification O . O Experiments O show O that O this O algorithm O can O help O to O calibrate O the O intrinsic B-KEY parameters I-KEY of O the O zoom B-KEY lens I-KEY and O the O camera B-KEY parameters I-KEY quickly O and O automatically O On O optimality O in O auditory O information O processing O We O study O limits O for O the O detection O and O estimation O of O weak B-KEY sinusoidal I-KEY signals I-KEY in O the O primary O part O of O the O mammalian B-KEY auditory I-KEY system I-KEY using O a O stochastic B-KEY Fitzhugh-Nagumo I-KEY model I-KEY and O an O action-recovery B-KEY model I-KEY for O synaptic O depression O . O Our O overall O model O covers O the O chain O from O a O hair O cell O to O a O point O just O after O the O synaptic O connection O with O a O cell O in O the O cochlear O nucleus O . O The O information O processing O performance O of O the O system O is O evaluated O using O so-called O phi O - O divergences O from O statistics O that O quantify O `` O dissimilarity O '' O between O probability O measures O and O are O intimately O related O to O a O number O of O fundamental O limits O in O statistics O and O information O theory O -LRB- O IT O -RRB- O . O We O show O that O there O exists O a O set O of O parameters O that O can O optimize O several O important O phi O - O divergences O simultaneously O and O that O this O set O corresponds O to O a O constant O quiescent B-KEY firing I-KEY rate I-KEY -LRB- O QFR O -RRB- O of O the O spiral B-KEY ganglion I-KEY neuron I-KEY . O The O optimal O value O of O the O QFR O is O frequency O dependent O but O is O essentially O independent O of O the O amplitude O of O the O signal O -LRB- O for O small O amplitudes O -RRB- O . O Consequently O , O optimal O processing O according O to O several O standard O IT O criteria O can O be O accomplished O for O this O model O if O and O only O if O the O parameters O are O `` O tuned O '' O to O values O that O correspond O to O one O and O the O same O QFR O . O This O offers O a O new O explanation O for O the O QFR O and O can O provide O new O insight O into O the O role O played O by O several O other O parameters O of O the O peripheral B-KEY auditory I-KEY system I-KEY Java O portability O put O to O the O test O Sun B-KEY Microsystems I-KEY ' O recently O launched O Java B-KEY Verification I-KEY Program I-KEY aims O to O enable O companies O to O assess O the O cross-platform B-KEY portability I-KEY of O applications O written O in O Java O , O and O to O help O software O vendors O ensure O that O their O solutions O can O run O in O heterogenous O J2EE O application O server O environments O An O optimal B-KEY control I-KEY algorithm I-KEY based O on O reachability B-KEY set I-KEY approximation I-KEY and O linearization B-KEY The O terminal B-KEY functional I-KEY of O a O general O control O system O is O refined O by O studying O an O analogous O problem O for O a O variational B-KEY system I-KEY and O regularization B-KEY . O A O sequential B-KEY refinement I-KEY method I-KEY is O designed O by O combining O the O local B-KEY approximation I-KEY of O the O reachability O set O and O reduction O . O The O corresponding O algorithm O has O relaxation B-KEY properties I-KEY . O An O illustrative O example O is O given O Managing O safety O and O strategic B-KEY stocks I-KEY to O improve O materials B-KEY requirements I-KEY planning I-KEY performance O This O paper O provides O a O methodology O for O managing O safety O and O strategic B-KEY stocks I-KEY in O materials B-KEY requirements I-KEY planning I-KEY -LRB- O MRP B-KEY -RRB- O environments O to O face O uncertainty O in O market B-KEY demand I-KEY . O A O set O of O recommended O guidelines O suggest O where O to O position O , O how O to O dimension O and O when O to O replenish O both O safety O and O strategic B-KEY stocks I-KEY . O Trade-offs O between O stock O positioning O and O dimensioning O and O between O stock O positioning O and O replenishment O order O triggering O are O outlined O . O The O study O reveals O also O that O most O of O the O decisions O are O system O specific O , O so O that O they O should O be O evaluated O in O a O quantitative O manner O through O simulation O . O A O case O study O is O reported O , O where O the O benefits O from O adopting O the O new O proposed O methodology O lie O in O achieving O the O target O service B-KEY level I-KEY even O under O peak B-KEY demand I-KEY conditions O , O with O the O value O of O safety B-KEY stocks I-KEY as O a O whole O growing O only O by O about O 20 O per O cent O A O pretopological B-KEY approach I-KEY for O structural B-KEY analysis I-KEY The O aim O of O this O paper O is O to O present O a O methodological O approach O for O problems O encountered O in O structural B-KEY analysis I-KEY . O This O approach O is O based O upon O the O pretopological O concepts O of O pseudoclosure B-KEY and O minimal B-KEY closed I-KEY subsets I-KEY . O The O advantage O of O this O approach O is O that O it O provides O a O framework O which O is O general O enough O to O model O and O formulate O different O types O of O connections B-KEY that O exist O between O the O elements O of O a O population O . O In O addition O , O it O has O enabled O us O to O develop O a O new O structural B-KEY analysis I-KEY algorithm O . O An O explanation O of O the O definitions O and O properties O of O the O pretopological O concepts O applied O in O this O work O is O first O shown O and O illustrated O in O sample O settings O . O The O structural B-KEY analysis I-KEY algorithm O is O then O described O and O the O results O obtained O in O an O economic B-KEY study I-KEY of O the O impact O of O geographic B-KEY proximity I-KEY on O scientific B-KEY collaborations I-KEY are O presented O A O framework O for O evaluating O the O data-hiding B-KEY capacity I-KEY of O image B-KEY sources I-KEY An O information-theoretic B-KEY model I-KEY for O image O watermarking B-KEY and O data O hiding O is O presented O in O this O paper O . O Previous O theoretical O results O are O used O to O characterize O the O fundamental O capacity B-KEY limits I-KEY of O image O watermarking B-KEY and O data-hiding O systems O . O Capacity O is O determined O by O the O statistical B-KEY model I-KEY used O for O the O host O image O , O by O the O distortion B-KEY constraints I-KEY on O the O data O hider O and O the O attacker O , O and O by O the O information O available O to O the O data O hider O , O to O the O attacker O , O and O to O the O decoder O . O We O consider O autoregressive O , O block-DCT O , O and O wavelet B-KEY statistical I-KEY models I-KEY for O images O and O compute O data-hiding O capacity O for O compressed O and O uncompressed O host-image O sources O . O Closed-form B-KEY expressions I-KEY are O obtained O under O sparse-model B-KEY approximations I-KEY . O Models O for O geometric B-KEY attacks I-KEY and O distortion B-KEY measures I-KEY that O are O invariant O to O such O attacks O are O considered O Standards O for O service B-KEY discovery I-KEY and O delivery O For O the O past O five O years O , O competing O industries O and O standards O developers O have O been O hotly O pursuing O automatic O configuration O , O now O coined O the O broader O term O service B-KEY discovery I-KEY . O Jini B-KEY , O Universal B-KEY Plug I-KEY and I-KEY Play I-KEY -LRB- O UPnP O -RRB- O , O Salutation B-KEY , O and O Service B-KEY Location I-KEY Protocol I-KEY are O among O the O front-runners O in O this O new O race O . O However O , O choosing O service B-KEY discovery I-KEY as O the O topic O of O the O hour O goes O beyond O the O need O for O plug-and-play O solutions O or O support O for O the O SOHO O -LRB- O small O office/home O office O -RRB- O user O . O Service B-KEY discovery I-KEY 's O potential O in O mobile O and O pervasive B-KEY computing I-KEY environments O motivated O my O choice O Chemical B-KEY information I-KEY based I-KEY scaling I-KEY of O molecular B-KEY descriptors I-KEY : O a O universal B-KEY chemical I-KEY scale I-KEY for O library B-KEY design I-KEY and O analysis O Scaling O is O a O difficult O issue O for O any O analysis O of O chemical B-KEY properties I-KEY or O molecular B-KEY topology I-KEY when O disparate O descriptors O are O involved O . O To O compare O properties O across O different O data B-KEY sets I-KEY , O a O common O scale O must O be O defined O . O Using O several O publicly O available O databases B-KEY -LRB- O ACD O , O CMC O , O MDDR O , O and O NCI O -RRB- O as O a O basis O , O we O propose O to O define O chemically O meaningful O scales O for O a O number O of O molecular O properties O and O topology O descriptors O . O These O chemically O derived O scaling O functions O have O several O advantages O . O First O , O it O is O possible O to O define O chemically O relevant O scales O , O greatly O simplifying O similarity O and O diversity B-KEY analyses I-KEY across O data B-KEY sets I-KEY . O Second O , O this O approach O provides O a O convenient O method O for O setting O descriptor B-KEY boundaries I-KEY that O define O chemically O reasonable O topology O spaces O . O For O example O , O descriptors O can O be O scaled O so O that O compounds O with O little O potential O for O biological B-KEY activity I-KEY , O bioavailability B-KEY , O or O other O drug-like B-KEY characteristics I-KEY are O easily O identified O as O outliers B-KEY . O We O have O compiled O scaling O values O for O 314 O molecular B-KEY descriptors I-KEY . O In O addition O the O 10th O and O 90th O percentile O values O for O each O descriptor O have O been O calculated O for O use O in O outlier B-KEY filtering O Pattern B-KEY recognition I-KEY strategies I-KEY for O molecular B-KEY surfaces I-KEY . O II O . O Surface B-KEY complementarity I-KEY For O pt.I O see O ibid. O , O vol O .23 O , O p.1176-87 O -LRB- O 2002 O -RRB- O . O Fuzzy B-KEY logic I-KEY based I-KEY algorithms I-KEY for O the O quantitative B-KEY treatment I-KEY of O complementarity O of O molecular B-KEY surfaces I-KEY are O presented O . O Therein O , O the O overlapping B-KEY surface I-KEY patches O defined O in O part O I O of O this O series O are O used O . O The O identification O of O complementary O surface O patches O can O be O considered O as O a O first O step O for O the O solution O of O molecular O docking O problems O . O Standard O technologies O can O then O be O used O for O further O optimization B-KEY of O the O resulting O complex O structures O . O The O algorithms O are O applied O to O 33 O biomolecular B-KEY complexes I-KEY . O After O the O optimization B-KEY with O a O downhill B-KEY simplex I-KEY method I-KEY , O for O all O these O complexes O one O structure O was O found O , O which O is O in O very O good O agreement O with O the O experimental O results O Strategies O for O high O throughput O , O templated B-KEY zeolite I-KEY synthesis I-KEY The O design O and O redesign O of O high O throughput O experiments O for O zeolite O synthesis O are O addressed O . O A O model O that O relates O materials B-KEY function I-KEY to O the O chemical B-KEY composition I-KEY of O the O zeolite O and O the O structure B-KEY directing I-KEY agent I-KEY is O introduced O . O Using O this O model O , O several O Monte B-KEY Carlo-like I-KEY design I-KEY protocols I-KEY are O evaluated O . O Multi-round B-KEY protocols I-KEY are O bound O to O be O effective O , O and O strategies O that O use O a B-KEY priori I-KEY information I-KEY about O the O structure-directing O libraries O are O found O to O be O the O best O E-government B-KEY The O author O provides O an O introduction O to O the O main O issues O surrounding O E-government B-KEY modernisation B-KEY and O electronic B-KEY delivery I-KEY of O all O public B-KEY services I-KEY by O 2005 O . O The O author O makes O it O clear O that O E-government B-KEY is O about O transformation O , O not O computers O and O hints O at O the O special O legal B-KEY issues I-KEY which O may O arise O Warranty B-KEY reserves I-KEY for O nonstationary B-KEY sales I-KEY processes I-KEY Estimation O of O warranty O costs O , O in O the O event O of O product B-KEY failure I-KEY within O the O warranty O period O , O is O of O importance O to O the O manufacturer O . O Costs O associated O with O replacement O or O repair O of O the O product O are O usually O drawn O from O a O warranty B-KEY reserve I-KEY fund O created O by O the O manufacturer O . O Considering O a O stochastic B-KEY sales I-KEY process I-KEY , O first O and O second B-KEY moments I-KEY -LRB- O and O thereby O the O variance B-KEY -RRB- O are O derived O for O the O manufacturer O 's O total B-KEY discounted I-KEY warranty I-KEY cost I-KEY of O a O single O sale O for O single-component B-KEY items I-KEY under O four O different O warranty O policies O from O a O manufacturer O 's O point O of O view O . O These O servicing B-KEY strategies I-KEY represent O a O renewable B-KEY free-replacement I-KEY , O nonrenewable B-KEY free-replacement I-KEY , O renewable B-KEY pro-rata I-KEY , O and O a O nonrenewable B-KEY minimal-repair I-KEY warranty I-KEY plans I-KEY . O The O results O are O extended O to O determine O the O mean O and O variance B-KEY of O total B-KEY discounted I-KEY warranty I-KEY costs I-KEY for O the O total O sales O over O the O life O cycle O of O the O product O . O Furthermore O , O using O a O normal B-KEY approximation I-KEY , O warranty B-KEY reserves I-KEY necessary O for O a O certain O protection O level O , O so O that O reserves O are O not O completely O depleted O , O are O found O . O Results O and O their O managerial B-KEY implications I-KEY are O studied O through O an O extensive O example O Library O services O today O and O tomorrow O : O lessons O from O iLumina B-KEY , O a O digital B-KEY library I-KEY for O creating O and O sharing O teaching O resources O This O article O is O based O on O the O emerging O experience O associated O with O a O digital B-KEY library I-KEY of O instructional O resources O , O iLumina B-KEY , O in O which O the O contributors O of O resources O and O the O users O of O those O resources O are O the O same-an O open O community O of O instructors O in O science O , O mathematics O , O engineering O , O and O technology O . O Moreover O , O it O is O not O the O resources O , O most O of O which O will O be O distributed O across O the O Internet B-KEY , O but O metadata B-KEY about O the O resources O that O is O the O focus O of O the O central O iLumina B-KEY repository O and O its O support O services O for O resource O contributors O and O users O . O The O distributed O iLumina B-KEY library O is O a O community-sharing B-KEY library I-KEY for O repurposing O and O adding O value O to O potentially O useful O , O mostly O non-commercial O instructional O resources O that O are O typically O more O granular O in O nature O than O commercially O developed O course O materials O . O The O experience O of O developing O iLumina B-KEY is O raising O a O range O of O issues O that O have O nothing O to O do O with O the O place O and O time O characteristics O of O the O instructional O context O in O which O iLumina B-KEY instructional O resources O are O created O or O used O . O The O issues O instead O have O their O locus O in O the O democratization O of O both O the O professional B-KEY roles I-KEY of O librarians B-KEY and O the O quality B-KEY assurance I-KEY mechanisms O associated O with O traditional O peer B-KEY review I-KEY An O unconditionally O stable O extended O -LRB- O USE O -RRB- O finite-element O time-domain O solution O of O active B-KEY nonlinear I-KEY microwave I-KEY circuits I-KEY using O perfectly B-KEY matched I-KEY layers I-KEY This O paper O proposes O an O extension O of O the O unconditionally O stable O finite-element O time-domain O -LRB- O FETD O -RRB- O method O for O the O global B-KEY electromagnetic I-KEY analysis I-KEY of O active O microwave O circuits O . O This O formulation O has O two O advantages O . O First O , O the O time-step B-KEY size I-KEY is O no O longer O governed O by O the O spatial O discretization O of O the O mesh O , O but O rather O by O the O Nyquist B-KEY sampling I-KEY criterion I-KEY . O Second O , O the O implementation O of O the O truncation O by O the O perfectly B-KEY matched I-KEY layers I-KEY -LRB- O PML O -RRB- O is O straightforward O . O An O anisotropic B-KEY PML I-KEY absorbing I-KEY material I-KEY is O presented O for O the O truncation O of O FETD O lattices O . O Reflection O less O than O -50 O dB O is O obtained O numerically O over O the O entire O propagation O bandwidth O in O waveguide B-KEY and O microstrip B-KEY line I-KEY . O A O benchmark O test O on O a O microwave B-KEY amplifier I-KEY indicates O that O this O extended O FETD O algorithm O is O not O only O superior O to O finite-difference O time-domain-based O algorithm O in O mesh B-KEY flexibility I-KEY and O simulation B-KEY accuracy I-KEY , O but O also O reduces O computation O time O dramatically O MATLAB B-KEY code I-KEY for O plotting O ambiguity O functions O A O MATLAB B-KEY code I-KEY capable O of O plotting O ambiguity O functions O of O many O different O radar B-KEY signals I-KEY is O presented O . O The O program O makes O use O of O MATLAB O 's O sparse B-KEY matrix I-KEY operations I-KEY , O and O avoids O loops O . O The O program O could O be O useful O as O a O pedagogical B-KEY tool I-KEY in O radar B-KEY courses I-KEY teaching O pulse B-KEY compression I-KEY Statistical O inference O with O partial B-KEY prior I-KEY information I-KEY based O on O a O Gauss-type O inequality O Potter O and O Anderson O -LRB- O 1983 O -RRB- O have O developed O a O Bayesian B-KEY decision I-KEY procedure I-KEY requiring O the O specification O of O a O class O of O prior B-KEY distributions I-KEY restricted O to O have O a O minimal B-KEY probability I-KEY content I-KEY for O a O given O subset O of O the O parameter B-KEY space I-KEY . O They O do O not O , O however O , O provide O a O method O for O the O selection O of O that O subset O . O We O show O how O a O generalization O of O Gauss O ' O inequality O can O be O used O to O determine O the O relevant O parameter O subset O Phase B-KEY control I-KEY of O higher-order B-KEY squeezing I-KEY of O a O quantum B-KEY field I-KEY In O a O recent O experiment O -LSB- O Phys O . O Rev. O Lett O . O 88 O -LRB- O 2002 O -RRB- O 023601 O -RSB- O , O phase-dependent B-KEY photon I-KEY statistics I-KEY in O a O c.w. O system O has O been O observed O in O the O mixing O of O a O coherent O field O with O a O two-photon O source O . O Their O system O has O the O advantage O over O other O atomic B-KEY transition-based I-KEY fluorescent I-KEY systems I-KEY . O In O this O paper O , O we O examine O further O the O squeezing O properties O of O higher-order O quantum B-KEY fluctuations I-KEY in O one O of O the O quadrature O components O of O the O combined O field O in O this O system O . O We O demonstrate O that O efficient O and O lasting O higher-order B-KEY squeezing I-KEY effects O could O be O observed O with O proper O choice O of O the O relative O phase O between O the O pump O and O coherent O fields O . O This O nonclassical O feature O is O attributed O to O a O constructive O two-photon B-KEY interference I-KEY . O Relationship O between O the O second O - O and O higher-order B-KEY squeezing I-KEY of O the O field O is O discussed O Virus O hunting O We O all O appreciate O the O need O for O , O and O hopefully O we O have O all O deployed O , O anti-virus B-KEY software I-KEY . O The O good O news O is O that O AV O software O has O come O a O long O way O fast O . O Four O or O so O years O ago O it O was O true O to O write O that O AV O software O could O not O detect O Trojan B-KEY Horses I-KEY and O similar O intrusion O attempts O . O Now O it O can O and O does O . O McAfee O 's O VirusScan O , O for O example O , O goes O one O further O ; O it O detects O viruses O , O worms B-KEY and O Trojan B-KEY Horses I-KEY and O deploys O itself O as O a O firewall O to O filter O data O packets O , O control O access O to O Internet O resources O , O activate O rule O sets O for O specific O applications O , O in O general O to O protect O against O hackers O . O But O like O so O much O software O , O we O use O it O with O little O thought O as O to O how O it O came O to O do O its O job O . O Behind O the O scenes O there O is O an O army O of O top O notch O programmers B-KEY trying O to O stay O ahead O of O the O baddies O who O , O at O the O last O count O , O had O produced O some O 60,000 O viruses O Modeling O self-consistent O multi-class O dynamic O traffic O flow O In O this O study O , O we O present O a O systematic O self-consistent O multiclass O multilane B-KEY traffic I-KEY model I-KEY derived O from O the O vehicular B-KEY Boltzmann I-KEY equation I-KEY and O the O traffic B-KEY dispersion I-KEY model I-KEY . O The O multilane O domain O is O considered O as O a O two-dimensional O space O and O the O interaction O among O vehicles O in O the O domain O is O described O by O a O dispersion O model O . O The O reason O we O consider O a O multilane O domain O as O a O two-dimensional O space O is O that O the O driving O behavior O of O road B-KEY users I-KEY may O not O be O restricted O by O lanes O , O especially O motorcyclists O . O The O dispersion O model O , O which O is O a O nonlinear B-KEY Poisson I-KEY equation I-KEY , O is O derived O from O the O car-following O theory O and O the O equilibrium O assumption O . O Under O the O concept O that O all O kinds O of O users O share O the O finite O section O , O the O density O is O distributed O on O a O road O by O the O dispersion O model O . O In O addition O , O the O dynamic B-KEY evolution I-KEY of O the O traffic O flow O is O determined O by O the O systematic O gas-kinetic O model O derived O from O the O Boltzmann O equation O . O Multiplying O Boltzmann O equation O by O the O zeroth O , O first O - O and O second-order O moment O functions O , O integrating O both O side O of O the O equation O and O using O chain O rules O , O we O can O derive O continuity O , O motion O and O variance B-KEY equation I-KEY , O respectively O . O However O , O the O second-order O moment O function O , O which O is O the O square O of O the O individual O velocity O , O is O employed O by O previous O researches O does O not O have O physical O meaning O in O traffic O flow O Control O centers O are O here O to O stay O Despite O changes O with O different O structures O , O market O rules O , O and O uncertainties O , O a O control O center O must O always O be O in O place O to O maintain O the O security O , O reliability O , O and O quality O of O electric O service O . O This O article O focuses O on O the O energy B-KEY management I-KEY system I-KEY -LRB- O EMS O -RRB- O control O center O , O identifying O the O major O functions O that O have O become O standard B-KEY components I-KEY of O every O application B-KEY software I-KEY package I-KEY . O The O two O most O important O control O center O functions O , O security B-KEY control I-KEY and O load-following B-KEY control I-KEY , O guarantee O the O continuity O of O electric O service O , O which O after O all O , O is O the O end-product O of O the O utility O business O . O New O technology O trends O in O the O design O of O control B-KEY center I-KEY infrastructures I-KEY are O emerging O in O the O liberalized B-KEY environment I-KEY of O the O energy B-KEY market I-KEY . O An O example O of O a O control B-KEY center I-KEY infrastructure I-KEY is O described O . O The O article O ends O with O a O concern O for O the O security O of O the O control O center O itself O The O Canadian B-KEY National I-KEY Site I-KEY Licensing I-KEY Project I-KEY In O January O 2000 O , O a O consortium O of O 64 O universities O in O Canada O signed O a O historic O inter-institutional B-KEY agreement I-KEY that O launched O the O Canadian B-KEY National I-KEY Site I-KEY Licensing I-KEY Project I-KEY -LRB- O CNSLP B-KEY -RRB- O , O a O three-year O pilot O project O aimed O at O bolstering O the O research B-KEY and I-KEY innovation I-KEY capacity O of O the O country O 's O universities O . O CNSLP B-KEY tests O the O feasibility O of O licensing O , O on O a O national O scale O , O electronic O versions O of O scholarly O publications O ; O in O its O initial O phases O the O project O is O focused O on O full-text B-KEY electronic I-KEY journals I-KEY and O research B-KEY databases I-KEY in O science O , O engineering O , O health O and O environmental O disciplines O . O This O article O provides O an O overview O of O the O CNSLP B-KEY initiative O , O summarizes O organizational O and O licensing O accomplishments O to O date O , O and O offers O preliminary O observations O on O challenges O and O opportunities O for O subsequent O phases O of O the O project O Low-voltage O DRAM O sensing O scheme O with O offset-cancellation O sense O amplifier O A O novel O bitline B-KEY sensing I-KEY scheme I-KEY is O proposed O for O low-voltage O DRAM O to O achieve O low B-KEY power I-KEY dissipation I-KEY and O compatibility O with O low-voltage O CMOS O . O One O of O the O major O obstacles O in O low-voltage O DRAM O is O the O degradation O of O data-retention B-KEY time I-KEY due O to O low O signal O level O at O the O memory B-KEY cell I-KEY , O which O requires O power-consuming B-KEY refresh I-KEY operations I-KEY more O frequently O . O This O paper O proposes O an O offset-cancellation O sense-amplifier O scheme O -LRB- O OCSA O -RRB- O that O improves O data-retention B-KEY time I-KEY significantly O even O at O low O supply O voltage O . O It O also O improves O die O efficiency O , O because O the O proposed O scheme O reduces O the O number O of O sense O amplifiers O by O supporting O more O cells O in O each O sense O amplifier O . O Measurements O show O that O the O data-retention B-KEY time I-KEY of O the O proposed O scheme O at O 1.5-V O supply O voltage O is O 2.4 O times O of O the O conventional O scheme O at O 2.0 O V O Recursive B-KEY state I-KEY estimation I-KEY for O multiple B-KEY switching I-KEY models I-KEY with O unknown B-KEY transition I-KEY probabilities I-KEY This O work O considers O hybrid B-KEY systems I-KEY with O continuous-valued B-KEY target I-KEY states I-KEY and O discrete-valued B-KEY regime I-KEY variable I-KEY . O The O changes O -LRB- O switches O -RRB- O of O the O regime O variable O are O modeled O by O a O finite B-KEY state I-KEY Markov I-KEY chain I-KEY with O unknown O and O random B-KEY transition I-KEY probabilities I-KEY following O Dirichlet B-KEY distributions I-KEY . O Our O work O analytically O derives O the O marginal B-KEY posterior I-KEY distribution I-KEY of O the O states O and O regime O variables O , O the O transition O probabilities O being O integrated O out O . O This O leads O to O a O variety O of O recursive O hybrid O state O estimation O schemes O which O are O an O appealing O intuitive O and O straightforward O extension O of O standard O algorithms O . O Their O performance O is O illustrated O by O a O maneuvering B-KEY target I-KEY tracking I-KEY example O Global O stability O of O the O attracting O set O of O an O enzyme-catalysed O reaction O system O The O essential O feature O of O enzymatic B-KEY reactions I-KEY is O a O nonlinear B-KEY dependency I-KEY of O reaction O rate O on O metabolite B-KEY concentration I-KEY taking O the O form O of O saturation B-KEY kinetics I-KEY . O Recently O , O it O has O been O shown O that O this O feature O is O associated O with O the O phenomenon O of O `` O loss O of O system O coordination O '' O -LRB- O Liu O , O 1999 O -RRB- O . O In O this O paper O , O we O study O a O system O of O ordinary B-KEY differential I-KEY equations I-KEY representing O a O branched O biochemical B-KEY system I-KEY of O enzyme-mediated B-KEY reactions I-KEY . O We O show O that O this O system O can O become O very O sensitive O to O changes O in O certain O maximum O enzyme O activities O . O In O particular O , O we O show O that O the O system O exhibits O three O distinct O responses O : O a O unique O , O globally-stable O steady-state O , O large O amplitude O oscillations O , O and O asymptotically O unbounded O solutions O , O with O the O transition O between O these O states O being O almost O instantaneous O . O It O is O shown O that O the O appearance O of O large O amplitude O , O stable B-KEY limit I-KEY cycles I-KEY occurs O due O to O a O `` O false O '' O bifurcation B-KEY or O canard O explosion O . O The O subsequent O disappearance O of O limit O cycles O corresponds O to O the O collapse O of O the O domain O of O attraction O of O the O attracting O set O for O the O system O and O occurs O due O to O a O global O bifurcation B-KEY in O the O flow O , O namely O , O a O saddle B-KEY connection I-KEY . O Subsequently O , O almost O all O nonnegative O data O become O unbounded O under O the O action O of O the O dynamical O system O and O correspond O exactly O to O loss O of O system O coordination O . O We O discuss O the O relevance O of O these O results O to O the O possible O consequences O of O modulating O such O systems O The O archival B-KEY imagination I-KEY of O David B-KEY Bearman I-KEY , O revisited O Many O archivists O regard O the O archival B-KEY imagination I-KEY evidenced O in O the O writings O of O David B-KEY Bearman I-KEY as O avant-garde O . O Archivist O L. O Henry O -LRB- O 1998 O -RRB- O has O sharply O criticized O Bearman O for O being O irreverent O toward O the O archival B-KEY theory I-KEY and O practice O outlined O by O classical B-KEY American I-KEY archivist I-KEY T. O R. O Schellenberg B-KEY . O Although O Bearman O is O sometimes O credited O -LRB- O and O sometimes O berated O -RRB- O for O establishing O `` O a O new O paradigm O '' O centered O on O the O archival B-KEY management I-KEY of O electronic B-KEY records I-KEY , O his O methods O and O strategies O are O intended O to O encompass O all O forms O of O record B-KEY keeping I-KEY . O The O article O provides O general O observations O on O Bearman O 's O archival B-KEY imagination I-KEY , O lists O some O of O its O components O , O and O addresses O elements O of O Henry O 's O critique O . O Although O the O long O lasting O impact O of O Bearman O 's O imagination O upon O the O archival B-KEY profession I-KEY might O be O questioned O , O it O nonetheless O deserves O continued O consideration O by O archivists O and O inclusion O as O a O component O of O graduate B-KEY archival I-KEY education I-KEY Variable B-KEY structure I-KEY intelligent I-KEY control I-KEY for O PM B-KEY synchronous I-KEY servo I-KEY motor I-KEY drive I-KEY The O variable O structure O control O -LRB- O VSC O -RRB- O of O discrete B-KEY time I-KEY systems I-KEY based O on O intelligent O control O is O presented O in O this O paper O . O A O novel O approach O is O proposed O for O the O state B-KEY estimation I-KEY . O A O linear B-KEY observer I-KEY is O firstly O designed O . O Then O a O neural B-KEY network I-KEY is O used O for O compensating O uncertainty O . O The O parameter O of O the O VSC O scheme O is O adjusted O online O by O a O neural B-KEY network I-KEY . O Practical O operating O results O from O a O PM O synchronous O motor O -LRB- O PMSM O -RRB- O illustrate O the O effectiveness O and O practicability O of O the O proposed O approach O Cyberobscenity B-KEY and O the O ambit O of O English O criminal B-KEY law I-KEY The O author O looks O at O a O recent O case O and O questions O the O Court B-KEY of I-KEY Appeal I-KEY 's O approach O . O In O the O author O 's O submission O , O the O Court B-KEY of I-KEY Appeal I-KEY 's O decision O in O Perrin O was O wrong O . O P O published O no O material O in O England B-KEY and O Wales O , O and O should O not O have O been O convicted O of O any O offence O under O English O law O , O even O if O it O were O proved O that O he O sought O to O attract O English O subscribers O to O his O site O . O That O may O be O an O unpalatable O conclusion O but O , O if O the O content O of O foreign-hosted O Internet B-KEY sites I-KEY is O to O be O controlled O , O the O only O sensible O way O forward O is O through O international B-KEY agreement I-KEY and O cooperation O . O The O Council B-KEY of I-KEY Europe I-KEY 's O Cybercrime B-KEY Convention I-KEY provides O some O indication O of O the O limited O areas O over O which O widespread O international B-KEY agreement I-KEY might O be O achieved O A O multimodal O data B-KEY collection I-KEY tool O using O REALbasic O and O Mac O OS O X O This O project O uses O REALbasic B-KEY 3.5 O in O the O Mac B-KEY OS I-KEY X I-KEY environment I-KEY for O development O of O a O configuration B-KEY tool I-KEY that O builds O a O data B-KEY collection I-KEY procedure O for O investigating O the O effectiveness O of O sonified B-KEY graphs I-KEY . O The O advantage O of O using O REALbasic B-KEY with O the O Mac O OS O X O system O is O that O it O provides O rapid O development O of O stimulus B-KEY presentation I-KEY , O direct O recording O of O data O to O files O , O and O control O over O other O procedural O issues O . O The O program O can O be O made O to O run O natively O on O the O new O Mac O OS O X O system O , O older O Mac O OS O systems O , O and O Windows B-KEY -LRB- O 98SE O , O ME O , O 2000 O PRO O -RRB- O . O With O modification O , O similar O programs O could O be O used O to O present O any O number O of O visual/auditory O stimulus O combinations O , O complete O with O questions O for O each O stimulus O The O role O of O speech B-KEY input I-KEY in O wearable B-KEY computing I-KEY Speech B-KEY recognition I-KEY seems O like O an O attractive O input O mechanism O for O wearable B-KEY computers I-KEY , O and O as O we O saw O in O this O magazine O 's O first O issue O , O several O companies O are O promoting O products O that O use O limited O speech B-KEY interfaces I-KEY for O specific O tasks O . O However O , O we O must O overcome O several O challenges O to O using O speech B-KEY recognition I-KEY in O more O general O contexts O , O and O interface O designers O must O be O wary O of O applying O the O technology O to O situations O where O speech O is O inappropriate O Median B-KEY partitioning I-KEY : O a O novel O method O for O the O selection O of O representative O subsets O from O large B-KEY compound I-KEY pools I-KEY A O method O termed O median B-KEY partitioning I-KEY -LRB- O MP O -RRB- O has O been O developed O to O select O diverse O sets O of O molecules B-KEY from O large B-KEY compound I-KEY pools I-KEY . O Unlike O many O other O methods O for O subset O selection O , O the O MP O approach O does O not O depend O on O pairwise O comparison O of O molecules B-KEY and O can O therefore O be O applied O to O very O large O compound O collections O . O The O only O time B-KEY limiting I-KEY step I-KEY is O the O calculation O of O molecular B-KEY descriptors I-KEY for O database B-KEY compounds I-KEY . O MP O employs O arrays O of O property O descriptors O with O little O correlation O to O divide O large B-KEY compound I-KEY pools I-KEY into O partitions O from O which O representative O molecules B-KEY can O be O selected O . O In O each O of O n O subsequent O steps O , O a O population O of O molecules B-KEY is O divided O into O subpopulations O above O and O below O the O median O value O of O a O property O descriptor O until O a O desired O number O of O 2/sup O n O / O partitions O are O obtained O . O For O descriptor O evaluation O and O selection O , O an O entropy B-KEY formulation I-KEY was O embedded O in O a O genetic B-KEY algorithm I-KEY . O MP O has O been O applied O to O generate O a O subset O of O the O Available B-KEY Chemicals I-KEY Directory I-KEY , O and O the O results O have O been O compared O with O cell-based B-KEY partitioning I-KEY Labscape B-KEY : O a O smart B-KEY environment I-KEY for O the O cell B-KEY biology I-KEY laboratory O Labscape B-KEY is O a O smart B-KEY environment I-KEY that O we O designed O to O improve O the O experience O of O people O who O work O in O a O cell B-KEY biology I-KEY laboratory O . O Our O goal O in O creating O it O was O to O simplify O , O laboratory B-KEY work I-KEY by O making O information O available O where O it O is O needed O and O by O collecting O and O organizing O data O where O and O when O it O is O created O into O a O formal O representation O that O others O can O understand O and O process O . O By O helping O biologists O produce O a O more O complete O record O of O their O work O with O less O effort O , O Labscape B-KEY is O designed O to O foster O improved O collaboration O in O conjunction O with O increased O individual O efficiency O and O satisfaction O . O A O user-driven O system O , O although O technologically O conservative O , O embraces O a O central O goal O of O ubiquitous B-KEY computing I-KEY : O to O enhance O the O ability O to O perform O domain O tasks O through O fluid O interaction O with O computational O resources O . O Smart B-KEY environments I-KEY could O soon O replace O the O pen O and O paper O commonly O used O in O the O laboratory O setting O Electrical B-KEY facility I-KEY construction I-KEY work I-KEY for O information B-KEY network I-KEY structuring I-KEY by O the O use O of O sewage B-KEY conduits I-KEY To O confront O the O advent O of O the O advanced O information O society O , O there O has O been O a O pressing O demand O for O the O adjustment O of O the O communications B-KEY infrastructure I-KEY and O the O structuring O of O the O information O network O by O utilizing O the O sewage B-KEY conduits I-KEY . O The O City O of O Tokyo B-KEY is O promoting O a O project O by O the O name O of O the O sewer O optical O fiber O teleway O -LRB- O SOFT O -RRB- O network O plan O . O According O to O this O plan O , O the O total O distance O of O the O optical O fiber O network O laid O in O the O sewer O conduits O is O scheduled O to O reach O about O 470 O km O by O the O end O of O March O 2000 O . O At O the O final O stage O , O this O distance O will O reach O 800 O km O as O a O whole O . O We O completed O the O construction O work O for O the O information B-KEY control I-KEY facilities I-KEY scattered O in O 11 O places O inclusive O of O the O Treatment B-KEY Site I-KEY S I-KEY , O with O the O intention O to O adjust O and O extend O the O information B-KEY transmission I-KEY network I-KEY laid O through O the O above-mentioned O optical O fiber O network O , O to O be O used O exclusively O by O the O Bureau B-KEY of I-KEY Sewerage I-KEY . O This O construction O work O is O described O in O the O paper O The O eyes O have O it O -LSB- O hotel B-KEY security I-KEY -RSB- O CCTV B-KEY systems I-KEY can O help O lodging O establishments O accomplish O a O range O of O objectives O , O from O deterring O criminals O to O observing O staff O interactions O with O clientele O . O But O pitfalls O can O arise O if O the O CCTV B-KEY system I-KEY has O not O been O properly O integrated O into O the O overall O hotel B-KEY security I-KEY plan O . O CCTV B-KEY system I-KEY designs O at O new O hotel O properties O are O often O too O sophisticated O , O too O complicated O , O and O too O costly O , O and O do O not O take O into O consideration O the O security O realities O of O site B-KEY management I-KEY . O These O problems O arise O when O the O professionals O designing O or O installing O the O system O , O including O architects O , O construction O engineers O , O integrators O , O and O consultants O , O are O not O familiar O with O a O hotel O 's O operating B-KEY strategies I-KEY or O security O standards O A O universal O decomposition O of O the O integration O range O for O exponential B-KEY functions I-KEY The O problem O of O determining O the O independent O constants O for O decomposition O of O the O integration O range O of O exponential B-KEY functions I-KEY was O solved O on O the O basis O of O a O similar O approach O to O polynomials B-KEY . O The O constants O obtained O enable O one O to O decompose O the O integration O range O in O two O so O that O the O integrals O over O them O are O equal O independently O of O the O function O parameters O . O For O the O nontrigonometrical B-KEY polynomials I-KEY of O even O functions O , O an O alternative O approach O was O presented O Innovative O manufacture B-KEY of O impulse B-KEY turbine I-KEY blades I-KEY for O wave B-KEY energy I-KEY power I-KEY conversion I-KEY An O innovative O approach O to O the O manufacture B-KEY of O impulse B-KEY turbine I-KEY blades I-KEY using O rapid B-KEY prototyping I-KEY , O fused B-KEY decomposition I-KEY modelling I-KEY -LRB- O FDM O -RRB- O , O is O presented O . O These O blades O were O designed O and O manufactured B-KEY by O the O Wave O Energy O Research O Team O -LRB- O WERT O -RRB- O at O the O University B-KEY of I-KEY Limerick I-KEY for O the O experimental O analysis O of O a O 0.6 O m O impulse O turbine O with O fixed O guide O vanes O for O wave B-KEY energy I-KEY power I-KEY conversion I-KEY . O The O computer O aided O design/manufacture O -LRB- O CAD/CAM O -RRB- O package O Pro-Engineer O 2000i O was O used O for O three-dimensional O solid O modelling O of O the O individual O blades O . O A O detailed O finite B-KEY element I-KEY analysis I-KEY of O the O blades O under O centrifugal O loads O was O performed O using O Pro-Mechanica O . O based O on O this O analysis O and O FDM O machine O capabilities O , O blades O were O redesigned O . O Finally O , O Pro-E O data O were O transferred O to O an O FDM O machine O for O the O manufacture B-KEY of O turbine O blades O . O The O objective O of O this O paper O is O to O present O the O innovative O method O used O to O design O , O modify O and O manufacture B-KEY blades O in O a O time O and O cost O effective O manner O using O a O concurrent B-KEY engineering I-KEY approach O Numerical B-KEY representation I-KEY of O binary B-KEY relations I-KEY with O a O multiplicative O error B-KEY function O This O paper O studies O the O case O of O the O representation O of O a O binary B-KEY relation I-KEY via O a O numerical B-KEY function I-KEY with O threshold B-KEY -LRB- O error B-KEY -RRB- O depending O on O both O compared O alternatives O . O The O error B-KEY is O considered O to O be O multiplicative O , O its O value O being O either O directly O or O inversely O proportional O to O the O values O of O the O numerical B-KEY function I-KEY . O For O the O first O case O , O it O is O proved O that O a O binary B-KEY relation I-KEY is O a O semiorder B-KEY . O Moreover O , O any O semiorder B-KEY can O be O represented O in O this O form O . O In O the O second O case O , O the O corresponding O binary B-KEY relation I-KEY is O an O interval B-KEY order I-KEY Computational O capacity O of O an O odorant B-KEY discriminator I-KEY : O the O linear B-KEY separability I-KEY of O curves O We O introduce O and O study O an O artificial B-KEY neural I-KEY network I-KEY inspired O by O the O probabilistic O receptor B-KEY affinity I-KEY distribution I-KEY model O of O olfaction B-KEY . O Our O system O consists O of O N O sensory B-KEY neurons I-KEY whose O outputs O converge O on O a O single O processing O linear B-KEY threshold I-KEY element I-KEY . O The O system O 's O aim O is O to O model O discrimination O of O a O single O target O odorant O from O a O large O number O p O of O background O odorants O within O a O range O of O odorant O concentrations O . O We O show O that O this O is O possible O provided O p O does O not O exceed O a O critical O value O p/sub O c O / O and O calculate O the O critical O capacity O alpha O c O =p O / O sub O c O / O / O N O . O The O critical O capacity O depends O on O the O range O of O concentrations O in O which O the O discrimination O is O to O be O accomplished O . O If O the O olfactory O bulb O may O be O thought O of O as O a O collection O of O such O processing O elements O , O each O responsible O for O the O discrimination O of O a O single O odorant O , O our O study O provides O a O quantitative O analysis O of O the O potential O computational O properties O of O the O olfactory O bulb O . O The O mathematical O formulation O of O the O problem O we O consider O is O one O of O determining O the O capacity O for O linear B-KEY separability I-KEY of O continuous O curves O , O embedded O in O a O large-dimensional O space O . O This O is O accomplished O here O by O a O numerical O study O , O using O a O method O that O signals O whether O the O discrimination O task O is O realizable O , O together O with O a O finite-size O scaling O analysis O Virtual B-KEY engineering I-KEY office I-KEY : O a O state-of-the-art B-KEY platform O for O engineering O collaboration O A O sales O force O in O Latin O America O , O the O design O department O in O Europe O , O and O production O in O Asia O ? O Arrangements O of O this O kind O are O the O new O business B-KEY reality O for O today O 's O global B-KEY manufacturing I-KEY companies I-KEY . O But O how O are O such O global O operations O to O be O effectively O coordinated O ? O ABB B-KEY 's O answer O was O to O develop O and O implement O a O new O platform O for O high-performance O , O real-time O collaboration O . O Globally B-KEY distributed I-KEY engineering I-KEY teams I-KEY can O now O work O together O , O regardless O of O time O , O location O or O the O CAD B-KEY system I-KEY they O use O , O making O ABB B-KEY easier O to O do O business B-KEY with O , O for O customers O as O well O as O suppliers O Autofocus B-KEY system I-KEY for O microscope O A O technique O is O developed O for O microscope B-KEY autofocusing I-KEY , O which O is O called O the O eccentric B-KEY light I-KEY beam I-KEY approach I-KEY with O high O resolution O , O wide O focusing O range O , O and O compact O construction O . O The O principle O is O described O . O The O theoretical O formula O of O the O eccentric B-KEY light I-KEY beam I-KEY approach I-KEY deduced O can O be O applied O not O only O to O an O object B-KEY lens I-KEY whose O objective B-KEY plane I-KEY is O just O at O the O focal O plane O , O but O also O to O an O object B-KEY lens I-KEY whose O objective B-KEY plane I-KEY is O not O at O the O focal O plane O . O The O experimental O setup O uses O a O semiconductor B-KEY laser I-KEY device O as O the O light O source O . O The O laser O beam O that O enters O into O the O microscope O is O eccentric O with O the O main B-KEY light I-KEY axis I-KEY . O A O defocused B-KEY signal I-KEY is O acquired O by O a O symmetrical B-KEY silicon I-KEY photocell I-KEY for O the O change O of O the O reflected B-KEY light I-KEY position I-KEY caused O by O differential B-KEY amplification I-KEY and O processed O by O a O microprocessor B-KEY . O Then O the O electric O signal O is O power-amplified O and O drives O a O dc B-KEY motor I-KEY , O which O moves O a O fine B-KEY working I-KEY platform I-KEY to O an O automatic O focus O of O the O microscope O . O The O result O of O the O experiments O shows O a O + O or-0 O .1 O - O mu O m O precision O of O autofocusing O for O a O range O of O + O or-500 O - O mu O m O defocusing O . O The O system O has O high B-KEY reliability I-KEY and O can O meet O the O requirements O of O various O accurate O micro B-KEY measurement I-KEY systems I-KEY Social B-KEY percolation I-KEY and O the O influence O of O mass O media O In O the O marketing O model O of O Solomon O and O Weisbuch O , O people O buy O a O product O only O if O their O neighbours O tell O them O of O its O quality O , O and O if O this O quality O is O higher O than O their O own O quality B-KEY expectations I-KEY . O Now O we O introduce O additional O information O from O the O mass O media O , O which O is O analogous O to O the O ghost B-KEY field I-KEY in O percolation O theory O . O The O mass O media O shift O the O percolative B-KEY phase I-KEY transition I-KEY observed O in O the O model O , O and O decrease O the O time O after O which O the O stationary B-KEY state I-KEY is O reached O Collective B-KEY action I-KEY in O the O age O of O the O Internet B-KEY : O mass B-KEY communication I-KEY and O online B-KEY mobilization I-KEY This O article O examines O how O the O Internet B-KEY transforms O collective B-KEY action I-KEY . O Current O practices O on O the O Web O bear O witness O to O thriving O collective B-KEY action I-KEY ranging O from O persuasive O to O confrontational O , O individual O to O collective O , O undertakings O . O Even O more O influential O than O direct O calls O for O action O is O the O indirect O mobilizing O influence O of O the O Internet B-KEY 's O powers O of O mass B-KEY communication I-KEY , O which O is O boosted O by O an O antiauthoritarian B-KEY ideology I-KEY on O the O Web O . O Theoretically O , O collective B-KEY action I-KEY through O the O otherwise O socially O isolating O computer O is O possible O because O people O rely O on O internalized O group B-KEY memberships I-KEY and O social B-KEY identities I-KEY to O achieve O social O involvement O . O Empirical O evidence O from O an O online B-KEY survey I-KEY among O environmental O activists O and O nonactivists O confirms O that O online O action O is O considered O an O equivalent O alternative O to O offline O action O by O activists O and O nonactivists O alike O . O However O , O the O Internet B-KEY may O slightly O alter O the O motives O underlying O collective B-KEY action I-KEY and O thereby O alter O the O nature O of O collective B-KEY action I-KEY and O social O movements O . O Perhaps O more O fundamental O is O the O reverse O influence O that O successful O collective B-KEY action I-KEY will O have O on O the O nature O and O function O of O the O Internet B-KEY Inverse B-KEY problems I-KEY for O a O mathematical B-KEY model I-KEY of O ion B-KEY exchange I-KEY in O a O compressible B-KEY ion I-KEY exchanger I-KEY A O mathematical B-KEY model I-KEY of O ion B-KEY exchange I-KEY is O considered O , O allowing O for O ion B-KEY exchanger I-KEY compression O in O the O process O of O ion O exchange O . O Two O inverse B-KEY problems I-KEY are O investigated O for O this O model O , O unique B-KEY solvability I-KEY is O proved O , O and O numerical B-KEY solution I-KEY methods I-KEY are O proposed O . O The O efficiency O of O the O proposed O methods O is O demonstrated O by O a O numerical O experiment O Information B-KEY interaction I-KEY : O providing O a O framework O for O information O architecture O Information B-KEY interaction I-KEY is O the O process O that O people O use O in O interacting O with O the O content O of O an O information O system O . O Information O architecture O is O a O blueprint O and O navigational B-KEY aid I-KEY to O the O content O of O information-rich B-KEY systems I-KEY . O As O such O information O architecture O performs O an O important O supporting O role O in O information B-KEY interactivity I-KEY . O This O article O elaborates O on O a O model O of O information B-KEY interactivity I-KEY that O crosses O the O `` O no-man O 's O land O '' O between O user O and O computer O articulating O a O model O that O includes O user O , O content O and O system O , O illustrating O the O context O for O information O architecture O The O development O of O a O mobile B-KEY manipulator I-KEY imaging B-KEY system I-KEY for O bridge B-KEY crack I-KEY inspection I-KEY A O mobile B-KEY manipulator I-KEY imaging B-KEY system I-KEY is O developed O for O the O automation B-KEY of O bridge B-KEY crack I-KEY inspection I-KEY . O During O bridge O safety O inspections O , O an O eyesight B-KEY inspection I-KEY is O made O for O preliminary O evaluation O and O screening O before O a O more O precise O inspection O . O The O inspection O for O cracks O is O an O important O part O of O the O preliminary O evaluation O . O Currently O , O the O inspectors O must O stand O on O the O platform O of O a O bridge O inspection O vehicle O or O a O temporarily O erected O scaffolding O to O examine O the O underside O of O a O bridge O . O However O , O such O a O procedure O is O risky O . O To O help O automate B-KEY the O bridge B-KEY crack I-KEY inspection I-KEY process O , O we O installed O two O CCD B-KEY cameras I-KEY and O a O four-axis B-KEY manipulator I-KEY system O on O a O mobile O vehicle O . O The O parallel B-KEY cameras I-KEY are O used O to O detect O cracks O . O The O manipulator O system O is O equipped O with O binocular O charge B-KEY coupled I-KEY devices I-KEY -LRB- O CCD O -RRB- O for O examining O structures O that O may O not O be O accessible O to O the O eye O . O The O system O also O reduces O the O danger O of O accidents O to O the O human O inspectors O . O The O manipulator O system O consists O of O four O arms O . O Balance O weights O are O placed O at O the O ends O of O arms O 2 O and O 4 O , O respectively O , O to O maintain O the O center O of O gravity O during O operation O . O Mechanically O , O arms O 2 O and O 4 O can O revolve O smoothly O . O Experiments O indicated O that O the O system O could O be O useful O for O bridge B-KEY crack I-KEY inspections I-KEY Ideal B-KEY sliding I-KEY mode I-KEY in O the O problems O of O convex B-KEY optimization I-KEY The O characteristics O of O the O sliding O mode O that O appears O with O using O continuous B-KEY convex-programming I-KEY algorithms I-KEY based O on O the O exact B-KEY penalty I-KEY functions I-KEY were O discussed O . O For O the O case O under O study O , O the O ideal B-KEY sliding I-KEY mode I-KEY was O shown O to O occur O in O the O absence O of O infinite O number O of O switchings O Gifts O to O a O science B-KEY academic I-KEY librarian I-KEY Gifts O , O by O their O altruistic O nature O , O perfectly O fit O into O the O environment O of O universities O and O academic B-KEY libraries I-KEY . O As O a O university O 's O community O and O general O public O continue O to O donate B-KEY materials O , O libraries O accept O donations B-KEY willingly O , O both O in-kind O and O monetary O . O Eight O steps O of O gift B-KEY processing I-KEY are O listed O in O the O paper O . O Positive O and O negative O aspects O of O gift O acceptance O are O discussed O . O Gifts O bring O value O for O academic B-KEY libraries I-KEY . O Gifts O can O be O considered O additional O routes O to O contribute O to O library B-KEY collections I-KEY without O direct O purchases O , O options O to O add O money O to O the O library O budget B-KEY , O and O the O cement O of O social O relationships O . O But O , O unfortunately O , O large O donations B-KEY are O time-consuming O , O labor-intensive O and O costly O to O process O . O Great O amounts O of O staff B-KEY time I-KEY and O processing O space O are O two O main O negative O aspects O that O cause O concern O and O put O the O value O of O gift O acceptance O under O consideration O by O librarians O . O Some O strategies O in O handling O gifts O are O recommended O . O To O be O effective O , O academic O science O librarians O need O to O approach O gifts O as O an O investment O . O Librarians O are O not O to O be O forced O by O moral O and O public O notions O and O should O be O able O to O make O professional B-KEY decisions I-KEY in O evaluating O proposed O collections O Supervisory B-KEY control I-KEY design I-KEY based O on O hybrid B-KEY systems I-KEY and O fuzzy O events O detection O . O Application O to O an O oxichlorination B-KEY reactor I-KEY This O paper O presents O a O supervisory O control O scheme O based O on O hybrid B-KEY systems I-KEY theory O and O fuzzy O events O detection O . O The O fuzzy O event O detector O is O a O linguistic B-KEY model I-KEY , O which O synthesizes O complex B-KEY relations I-KEY between O process B-KEY variables I-KEY and O process B-KEY events I-KEY incorporating O experts O ' O knowledge O about O the O process B-KEY operation I-KEY . O This O kind O of O detection O allows O the O anticipation O of O appropriate O control B-KEY actions I-KEY , O which O depend O upon O the O selected O membership B-KEY functions I-KEY used O to O characterize O the O process O under O scrutiny O . O The O proposed O supervisory O control O scheme O was O successfully O implemented O for O an O oxichlorination B-KEY reactor I-KEY in O a O vinyl B-KEY monomer I-KEY plant I-KEY The O perils O of O privacy O The O recent O string O of O failures O among O dotcom O companies O has O heightened O fears O of O privacy B-KEY abuse I-KEY . O What O should O happen O to O the O names O and O addresses O on O a O customer B-KEY list I-KEY if O these O details O were O obtained O under O a O privacy B-KEY policy I-KEY which O specified O no O disclosure B-KEY to O any O third O party O ? O Should O the O personal O data O in O the O list O be O deemed O to O be O an O asset O of O a O failing O company O which O can O be O transferred O to O any O future O -LRB- O third O party O -RRB- O purchaser O for O its O purposes O ? O Or O should O the O privacy B-KEY policy I-KEY take O precedence O over O the O commercial O concerns O of O the O purchaser O ? O A O simple O graphic B-KEY approach I-KEY for O observer B-KEY decomposition I-KEY Based O upon O the O proposition O that O the O roles O of O inputs O and O outputs O in O a O physical O system O and O those O in O the O corresponding O output-injection B-KEY observer I-KEY do O not O really O have O to O be O consistent O , O a O systematic O procedure O is O developed O in O this O work O to O properly O divide O a O set O of O sparse B-KEY system I-KEY models I-KEY and O measurement B-KEY models I-KEY into O a O number O of O independent B-KEY subsets I-KEY with O the O help O of O a O visual O aid O . O Several O smaller O sub-observers B-KEY can O then O be O constructed O accordingly O to O replace O the O original O one O . O The O size O of O each O sub-observer B-KEY may O be O further O reduced O by O strategically O selecting O one O or O more O appended O states O . O These O techniques O are O shown O to O be O quite O effective O in O relieving O on-line O computation O load O of O the O output-injection B-KEY observers I-KEY and O also O in O identifying O detectable O sub-systems O Universal O dynamic O synchronous O self-stabilization B-KEY We O prove O the O existence O of O a O `` O universal O '' O synchronous O self-stabilizing B-KEY protocol O , O that O is O , O a O protocol O that O allows O a O distributed O system O to O stabilize O to O a O desired O nonreactive O behaviour O -LRB- O as O long O as O a O protocol O stabilizing O to O that O behaviour O exists O -RRB- O . O Previous O proposals O required O drastic O increases O in O asymmetry O and O knowledge O to O work O , O whereas O our O protocol O does O not O use O any O additional O knowledge O , O and O does O not O require O more O symmetry-breaking O conditions O than O available O ; O thus O , O it O is O also O stabilizing O with O respect O to O dynamic B-KEY changes I-KEY in O the O topology B-KEY . O We O prove O an O optimal B-KEY quiescence I-KEY time I-KEY n O + O D O for O a O synchronous O network O of O n O processors O and O diameter O D O ; O the O protocol O can O be O made O finite O state O with O a O negligible O loss O in O quiescence O time O . O Moreover O , O an O optimal O D O + O 1 O protocol O is O given O for O the O case O of O unique B-KEY identifiers I-KEY . O As O a O consequence O , O we O provide O an O effective O proof B-KEY technique I-KEY that O allows O one O to O show O whether O self-stabilization B-KEY to O a O certain O behaviour O is O possible O under O a O wide O range O of O models O Conformal-mapping O design O tools O for O coaxial B-KEY couplers I-KEY with O complex B-KEY cross I-KEY section I-KEY Numerical O conformal O mapping O is O exploited O as O a O simple O , O accurate O , O and O efficient O tool O for O the O analysis O and O design O of O coaxial B-KEY waveguides I-KEY and O couplers O of O complex B-KEY cross I-KEY section I-KEY . O An O implementation O based O on O the O Schwarz-Christoffel B-KEY Toolbox I-KEY , O a O public-domain B-KEY MATLAB I-KEY package I-KEY , O is O applied O to O slotted B-KEY coaxial I-KEY cables I-KEY and O to O symmetrical O coaxial B-KEY couplers I-KEY , O with O circular O or O polygonal B-KEY inner I-KEY conductors I-KEY and O external B-KEY shields I-KEY . O The O effect O of O metallic B-KEY diaphragms I-KEY of O arbitrary O thickness O , O partially O separating O the O inner O conductors O , O is O also O easily O taken O into O account O . O The O proposed O technique O is O validated O against O the O results O of O the O finite-element O method O , O showing O excellent O agreement O at O a O fraction O of O the O computational O cost O , O and O is O also O extended O to O the O case O of O nonsymmetrical B-KEY couplers I-KEY , O providing O the O designer O with O important O additional O degrees O of O freedom O Nonlockability B-KEY in O multirings B-KEY and O hypercubes B-KEY at O serial O transmission O of O data O blocks O For O the O multiring B-KEY and O hypercube B-KEY , O a O method O of O conflictless O realization O of O an O arbitrary O permutation O of O `` O large O '' O data O items O that O can O be O divided O into O many O `` O smaller O '' O data O blocks O was O considered O , O and O its O high O efficiency O was O demonstrated O Analyzing O the O potential O of O a O firm O : O an O operations B-KEY research I-KEY approach O An O approach O to O analyzing O the O potential O of O a O firm O , O which O is O understood O as O the O firm O 's O ability O to O provide O goods O or B-KEY -LRB- O and O -RRB- O services O to O be O supplied O to O a O marketplace O under O restrictions O imposed O by O a O business O environment O in O which O the O firm O functions O , O is O proposed O . O The O approach O is O based O on O using O linear B-KEY inequalities I-KEY and O , O generally O , O mixed O variables O in O modelling O this O ability O for O a O broad O spectrum O of O industrial O , O transportation O , O agricultural O , O and O other O types O of O firms O and O allows O one O to O formulate O problems O of O analyzing O the O potential O of O a O firm O as O linear B-KEY programming I-KEY problems O or B-KEY mixed B-KEY programming I-KEY problems O with O linear O constraints O . O This O approach O generalizes O a O previous O one O which O was O proposed O for O a O more O narrow O class O of O models O , O and O allows O one O to O effectively O employ O a O widely O available O software O for O solving O practical O problems O of O the O considered O kind O , O especially O for O firms O described O by O large O scale O models O of O mathematical B-KEY programming I-KEY Stock O market O dynamics O We O elucidate O on O several O empirical B-KEY statistical I-KEY observations I-KEY of O stock B-KEY market I-KEY returns I-KEY . O Moreover O , O we O find O that O these O properties O are O recurrent O and O are O also O present O in O invariant B-KEY measures I-KEY of O low-dimensional B-KEY dynamical I-KEY systems I-KEY . O Thus O , O we O propose O that O the O returns O are O modeled O by O the O first B-KEY Poincare I-KEY return I-KEY time I-KEY of O a O low-dimensional B-KEY chaotic I-KEY trajectory I-KEY . O This O modeling O , O which O captures O the O recurrent O properties O of O the O return O fluctuations O , O is O able O to O predict O well O the O evolution O of O the O observed O statistical B-KEY quantities I-KEY . O In O addition O , O it O explains O the O reason O for O which O stocks O present O simultaneously O dynamical O properties O and O high O uncertainties O . O In O our O analysis O , O we O use O data O from O the O S&P O 500 O index O and O the O Brazilian B-KEY stock I-KEY Telebras O High-voltage O transistor O scaling O circuit O techniques O for O high-density O negative-gate O channel-erasing O NOR O flash O memories O In O order O to O scale O high-voltage O transistors O for O high-density O negative-gate O channel-erasing O NOR O flash O memories O , O two O circuit O techniques O were O developed O . O A O proposed O level B-KEY shifter I-KEY with O low O operating O voltage O is O composed O of O three O parts O , O a O latch O holding O the O negative O erasing O voltage O , O two O coupling O capacitors O connected O with O the O latched O nodes O in O the O latch O , O and O high-voltage B-KEY drivers I-KEY inverting O the O latch O , O resulting O in O reduction O of O the O maximum O internal O voltage O by O 0.5 O V O . O A O proposed O high-voltage B-KEY generator I-KEY adds O a O path-gate B-KEY logic I-KEY to O a O conventional O high-voltage B-KEY generator I-KEY to O realize O both O low B-KEY noise I-KEY and O low B-KEY ripple I-KEY voltage I-KEY , O resulting O in O a O reduction O of O the O maximum O internal O voltage O by O 0.5 O V O . O As O a O result O , O these O circuit O techniques O along O with O high B-KEY coupling-ratio I-KEY cell I-KEY technology I-KEY can O scale O down O the O high-voltage O transistors O by O 15 O % O and O can O realize O higher O density O negative-gate O channel-erase O NOR O flash O memories O in O comparison O with O the O source-erase O NOR O flash O memories O One-step B-KEY digit-set-restricted I-KEY modified I-KEY signed-digit I-KEY adder I-KEY using O an O incoherent B-KEY correlator I-KEY based O on O a O shared B-KEY content-addressable I-KEY memory I-KEY An O efficient O one-step O digit-set-restricted O modified O signed-digit O -LRB- O MSD O -RRB- O adder O based O on O symbolic B-KEY substitution I-KEY is O presented O . O In O this O technique O , O carry O propagation O is O avoided O by O introducing O reference B-KEY digits I-KEY to O restrict O the O intermediate B-KEY carry I-KEY and O sum B-KEY digits I-KEY to O -LCB- O 1,0 O -RCB- O and O -LCB- O 0,1 O -RCB- O , O respectively O . O The O proposed O technique O requires O significantly O fewer O minterms B-KEY and O simplifies O system B-KEY complexity I-KEY compared O to O the O reported O one-step O MSD O addition O techniques O . O An O incoherent B-KEY correlator I-KEY based O on O an O optoelectronic O shared B-KEY content-addressable I-KEY memory I-KEY processor O is O suggested O to O perform O the O addition O operation O . O In O this O technique O , O only O one O set O of O minterms B-KEY needs O to O be O stored O , O independent O of O the O operand B-KEY length I-KEY A O method O for O correlations O analysis O of O coordinates O : O applications O for O molecular B-KEY conformations I-KEY We O describe O a O new O method O to O analyze O multiple O correlations O between O subsets O of O coordinates O that O represent O a O sample O . O The O correlation O is O established O only O between O specific O regions B-KEY of I-KEY interest I-KEY at O the O coordinates O . O First O , O the O region O -LRB- O s O -RRB- O of O interest O are O selected O at O each O molecular B-KEY coordinate I-KEY . O Next O , O a O correlation B-KEY matrix I-KEY is O constructed O for O the O selected O regions O . O The O matrix O is O subject O to O further O analysis O , O illuminating O the O multidimensional B-KEY structural I-KEY characteristics I-KEY that O exist O in O the O conformational B-KEY space I-KEY . O The O method O 's O abilities O are O demonstrated O in O several O examples O : O it O is O used O to O analyze O the O conformational B-KEY space I-KEY of O complex B-KEY molecules I-KEY , O it O is O successfully O applied O to O compare O related O conformational B-KEY spaces I-KEY , O and O it O is O used O to O analyze O a O diverse O set O of O protein B-KEY folding I-KEY trajectories I-KEY Loudspeaker B-KEY voice-coil I-KEY inductance I-KEY losses I-KEY : O circuit B-KEY models I-KEY , O parameter B-KEY estimation I-KEY , O and O effect O on O frequency B-KEY response I-KEY When O the O series B-KEY resistance I-KEY is O separated O and O treated O as O a O separate O element O , O it O is O shown O that O losses O in O an O inductor O require O the O ratio O of O the O flux O to O MMF O in O the O core O to O be O frequency O dependent O . O For O small-signal B-KEY operation I-KEY , O this O dependence O leads O to O a O circuit B-KEY model I-KEY composed O of O a O lossless B-KEY inductor I-KEY and O a O resistor O in O parallel O , O both O of O which O are O frequency O dependent O . O Mathematical O expressions O for O these O elements O are O derived O under O the O assumption O that O the O ratio O of O core O flux O to O MMF O varies O as O omega O / O sup O n-1 O / O , O where O n O is O a O constant O . O A O linear B-KEY regression I-KEY technique O is O described O for O extracting O the O model O parameters O from O measured O data O . O Experimental O data O are O presented O to O justify O the O model O for O the O lossy B-KEY inductance I-KEY of O a O loudspeaker O voice-coil O . O A O SPICE B-KEY example O is O presented O to O illustrate O the O effects O of O voice-coil O inductor O losses O on O the O frequency B-KEY response I-KEY of O a O typical O driver O Electronic O signatures O - O much O ado O ? O Whilst O the O market O may O be O having O a O crisis O of O confidence O regarding O the O prospects O for O e-commerce B-KEY , O the O EU O and O the O Government O continue O apace O to O develop O the O legal B-KEY framework I-KEY . O Most O recently O , O this O has O resulted O in O the O Electronic B-KEY Signatures I-KEY Regulations I-KEY 2002 I-KEY . O These O Regulations O were O made O on O 13 O February O 2002 O and O came O into O force O on O 8 O March O 2002 O . O The O Regulations O implement O the O European B-KEY Electronic I-KEY Signatures I-KEY Directive I-KEY -LRB- O 1999/93/EC O -RRB- O . O Critics O may O say O that O the O Regulations O were O implemented O too O late O -LRB- O they O were O due O to O have O been O implemented O by O 19 O July O 2001 O -RRB- O , O with O too O short O a O consultation O period O -LRB- O 25 O January O 2002 O to O 12 O February O 2002 O -RRB- O and O with O an O unconvincing O case O as O to O what O they O add O to O English O law O -LRB- O as O to O which O , O read O on O -RRB- O . O The O author O explains O the O latest O development O on O e-signatures O and O the O significance O of O Certification O Service O Providers O -LRB- O CSPs O -RRB- O Solution O of O the O safe B-KEY problem I-KEY on O -LRB- O 0,1 O -RRB- O - O matrices O A O safe B-KEY problem I-KEY with O mn B-KEY locks I-KEY is O studied O . O It O is O reduced O to O a O system O of O linear B-KEY equations I-KEY in O the O modulo B-KEY 2 I-KEY residue I-KEY class I-KEY . O There O are O three O possible O variants O defined O by O the O numbers O m O and O n O evenness O , O with O only O one O of O them O having O a O solution O . O In O two O other O cases O , O correction O of O the O initial O state O of O the O safe O insuring O a O solution O is O proposed O Regularization O of O linear O regression O problems O The O study O considers O robust B-KEY estimation I-KEY of O linear B-KEY regression I-KEY parameters I-KEY by O the O regularization O method O , O the O pseudoinverse B-KEY method O , O and O the O Bayesian O method O allowing O for O correlations O and O errors O in O the O data O . O Regularizing O algorithms O are O constructed O and O their O relationship O with O pseudoinversion B-KEY , O the O Bayesian B-KEY approach I-KEY , O and O BLUE B-KEY is O investigated O Electronic B-KEY data I-KEY exchange I-KEY for O real O estate O With O HM B-KEY Land I-KEY Registry I-KEY 's O consultation O now O underway O , O no O one O denies O that O the O property B-KEY industry I-KEY is O facing O a O period O of O unprecedented O change O . O PISCES B-KEY -LRB- O Property B-KEY Information I-KEY Systems I-KEY Common I-KEY Exchange I-KEY -RRB- O is O a O property-focused O electronic B-KEY data I-KEY exchange I-KEY standard B-KEY . O The O standard B-KEY is O a O set O of O definitions O and O rules O to O facilitate O electronic O transfer O of O data O between O key O business O areas O and O between O different O types O of O software B-KEY packages I-KEY that O are O used O regularly O by O the O property B-KEY industry I-KEY . O It O is O not O itself O a O piece O of O software O but O an O enabling O technology O that O allows O software O providers O to O prepare O solutions O within O their O own O packages O to O transfer O data O between O databases B-KEY . O This O provides O the O attractive O prospect O of O seamless B-KEY transfer I-KEY of O data O within O and O between O systems O and O organisations O Nuclear O magnetic O resonance O molecular O photography O A O procedure O is O described O for O storing O a O two-dimensional O -LRB- O 2D O -RRB- O pattern O consisting O of O 32 O * O 32 O = O 1024 B-KEY bits I-KEY in O a O spin O state O of O a O molecular O system O and O then O retrieving O the O stored O information O as O a O stack O of O nuclear O magnetic O resonance O spectra O . O The O system O used O is O a O nematic B-KEY liquid I-KEY crystal I-KEY , O the O protons O of O which O act O as O spin B-KEY clusters I-KEY with O strong B-KEY intramolecular I-KEY interactions I-KEY . O The O technique O used O is O a O programmable B-KEY multifrequency I-KEY irradiation I-KEY with O low B-KEY amplitude I-KEY . O When O it O is O applied O to O the O liquid O crystal O , O a O large O number O of O coherent O long-lived O / O sup O 1/H O response O signals O can O be O excited O , O resulting O in O a O spectrum O showing O many O sharp O peaks O with O controllable O frequencies O and O amplitudes O . O The O spectral B-KEY resolution I-KEY is O enhanced O by O using O a O second B-KEY weak I-KEY pulse I-KEY with O a O 90 O degrees O phase O shift O , O so O that O the O 1024 B-KEY bits I-KEY of O information O can O be O retrieved O as O a O set O of O well-resolved O pseudo-2D B-KEY spectra I-KEY reproducing O the O input O pattern O Decisions O , O decisions O , O decisions O : O a O tale O of O special B-KEY collections I-KEY in O the O small B-KEY academic I-KEY library I-KEY A O case B-KEY study I-KEY of O a O special B-KEY collections I-KEY department O in O a O small B-KEY academic I-KEY library I-KEY and O how O its O collections O have O been O acquired O and O developed O over O the O years O is O described O . O It O looks O at O the O changes O that O have O occurred O in O the O academic O environment O and O what O effect O , O if O any O , O these O changes O may O have O had O on O the O department O and O how O it O has O adapted O to O them O . O It O raises O questions O about O development O and O acquisitions B-KEY policies I-KEY and O procedures O Simple O minds O -LSB- O health B-KEY care I-KEY IT O -RSB- O A O few O things O done O properly O , O and O soon O , O is O the O short-term O strategy B-KEY for O the O UK B-KEY NHS I-KEY IT I-KEY programme I-KEY . O Can O it O deliver O this O time O ? O Outlier B-KEY resistant I-KEY adaptive I-KEY matched I-KEY filtering I-KEY Robust O adaptive O matched O filtering O -LRB- O AMF O -RRB- O whereby O outlier O data O vectors O are O censored O from O the O covariance B-KEY matrix I-KEY estimate I-KEY is O considered O in O a O maximum O likelihood O estimation O -LRB- O MLE O -RRB- O setting O . O It O is O known O that O outlier O data O vectors O whose O steering B-KEY vector I-KEY is O highly O correlated O with O the O desired O steering B-KEY vector I-KEY , O can O significantly O degrade O the O performance O of O AMF O algorithms O such O as O sample B-KEY matrix I-KEY inversion I-KEY -LRB- O SMI O -RRB- O or O fast B-KEY maximum I-KEY likelihood I-KEY -LRB- O FML O -RRB- O . O Four O new O algorithms O that O censor O outliers O are O presented O which O are O derived O via O approximation O to O the O MLE O solution O . O Two O algorithms O each O are O related O to O using O the O SMI O or O the O FML O to O estimate O the O unknown O underlying O covariance O matrix O . O Results O are O presented O using O computer O simulations O which O demonstrate O the O relative O effectiveness O of O the O four O algorithms O versus O each O other O and O also O versus O the O SMI O and O FML O algorithms O in O the O presence O of O outliers O and O no O outliers O . O It O is O shown O that O one O of O the O censoring B-KEY algorithms I-KEY , O called O the O reiterative O censored O fast B-KEY maximum I-KEY likelihood I-KEY -LRB- O CFML O -RRB- O technique O is O significantly O superior O to O the O other O three O censoring O methods O in O stressful O outlier O scenarios O Stochastic B-KEY systems I-KEY with O a O random B-KEY jump I-KEY in O phase B-KEY trajectory I-KEY : O stability O of O their O motions O The O probabilistic O stability O of O the O perturbed O motion O of O a O system O with O parameters O under O the O action O of O a O general B-KEY Markov I-KEY process I-KEY is O studied O . O The O phase O vector O is O assumed O to O experience O random B-KEY jumps I-KEY when O the O structure O the O system O suffers O random B-KEY jumps I-KEY . O Such O a O situation O is O encountered O , O for O example O , O in O the O motion O of O a O solid O with O random B-KEY jumps I-KEY in O its O mass O . O The O mean-square O stability O of O random-structure O linear O systems O and O stability O . O of O nonlinear O systems O in O the O first O approximation O are O studied O . O The O applied O approach O is O helpful O in O studying O the O asymptotic B-KEY probabilistic I-KEY stability I-KEY and O mean-square B-KEY exponential I-KEY stability I-KEY of O stochastic B-KEY systems I-KEY through O the O stability O of O the O respective O deterministic O systems O Affine B-KEY invariants I-KEY of O convex B-KEY polygons I-KEY In O this O correspondence O , O we O prove O that O the O affine B-KEY invariants I-KEY , O for O image B-KEY registration I-KEY and O object B-KEY recognition I-KEY , O proposed O recently O by O Yang O and O Cohen O -LRB- O see O ibid. O , O vol O .8 O , O no. O 7 O , O p.934-46 O , O July O 1999 O -RRB- O are O algebraically O dependent O . O We O show O how O to O select O an O independent O and O complete O set O of O the O invariants O . O The O use O of O this O new O set O leads O to O a O significant O reduction O of O the O computing O complexity O without O decreasing O the O discrimination O power O Relevance O of O Web O documents O : O ghosts B-KEY consensus I-KEY method I-KEY The O dominant O method O currently O used O to O improve O the O quality O of O Internet B-KEY search I-KEY systems I-KEY is O often O called O `` O digital B-KEY democracy I-KEY . O '' O Such O an O approach O implies O the O utilization O of O the O majority B-KEY opinion I-KEY of O Internet O users O to O determine O the O most O relevant O documents O : O for O example O , O citation B-KEY index I-KEY usage I-KEY for O sorting O of O search B-KEY results I-KEY -LRB- O google.com O -RRB- O or O an O enrichment O of O a O query O with O terms O that O are O asked O frequently O in O relation O with O the O query O 's O theme O . O `` O Digital B-KEY democracy I-KEY '' O is O an O effective O instrument O in O many O cases O , O but O it O has O an O unavoidable O shortcoming O , O which O is O a O matter O of O principle O : O the O average O intellectual O and O cultural O level O of O Internet O users O is O very O low O ; O everyone O knows O what O kind O of O information O is O dominant O in O Internet B-KEY query I-KEY statistics I-KEY . O Therefore O , O when O one O searches O the O Internet O by O means O of O `` O digital B-KEY democracy I-KEY '' O systems O , O one O gets O answers O that O reflect O an O underlying O assumption O that O the O user O 's O mind O potential O is O very O low O , O and O that O his O cultural O interests O are O not O demanding O . O Thus O , O it O is O more O correct O to O use O the O term O `` O digital B-KEY ochlocracy I-KEY '' O to O refer O to O Internet B-KEY search I-KEY systems I-KEY with O `` O digital B-KEY democracy I-KEY . O '' O Based O on O the O well-known O mathematical O mechanism O of O linear B-KEY programming I-KEY , O we O propose O a O method O to O solve O the O indicated O problem O Reaching O for O five O nines O : O ActiveWatch O and O SiteSeer O Every O Web O admin O 's O dream O is O achieving O the O fabled O five O nines-99 O .999 O percent O uptime O . O To O attain O such O availability O , O your O Web B-KEY site I-KEY must O be O down O no O more O than O about O five O minutes O per O year O . O Technologies O like O RAID O , O clustering O , O and O load O balancing O make O this O easier O , O but O to O actually O track O uptime O , O maintain O auditable B-KEY records I-KEY , O and O discover O patterns O in O failures O to O prevent O downtime B-KEY in O the O future O , O you O 'll O need O to O set O up O external B-KEY monitoring I-KEY . O Because O your O Internet B-KEY connection I-KEY is O a O key O factor O in O measuring O uptime O , O you O must O monitor O your O site O from O the O Internet O itself O , O beyond O your O firewall O . O You O could O monitor O with O custom O software O on O remote O hosts O , O or O you O could O use O one O of O the O two O reasonably O priced O services O available O : O Mercury O Interactive O 's O ActiveWatch O and O Freshwater O Software O 's O SiteSeer O . O -LRB- O Freshwater O Software O has O been O a O subsidiary O of O Mercury O Interactive O for O about O a O year O now O . O -RRB- O The O two O services O offer O a O slightly O different O mix O of O features O and O target O different O markets O . O Both O services O offer O availability O and O performance B-KEY monitoring I-KEY from O several O remote B-KEY locations I-KEY , O alerts O to O email O or O pager O , O and O periodic B-KEY reports I-KEY . O They O differ O in O what O 's O most O easily O monitored O , O and O in O the O way O you O interact O with O the O services O Absorption O of O long O waves O by O nonresonant O parametric O microstructures O Using O simple O acoustical O and O mechanical B-KEY models I-KEY , O we O consider O the O conceptual O possibility O of O designing O an O active O absorbing O -LRB- O nonreflecting O -RRB- O coating O in O the O form O of O a O thin B-KEY layer I-KEY with O small-scale B-KEY stratification I-KEY and O fast B-KEY time I-KEY modulation I-KEY of O parameters O . O Algorithms O for O space-time B-KEY modulation I-KEY of O the O controlled-layer B-KEY structure I-KEY are O studied O in O detail O for O a O one-dimensional B-KEY boundary-value I-KEY problem I-KEY . O These O algorithms O do O not O require O wave-field O measurements O , O which O eliminates O the O self-excitation O problem O that O is O characteristic O of O active O systems O . O The O majority O of O the O considered O algorithms O of O parametric B-KEY control I-KEY transform O the O low-frequency B-KEY incident I-KEY wave I-KEY to O high-frequency B-KEY waves I-KEY of O the O technological O band O for O which O the O waveguiding B-KEY medium I-KEY inside O the O layer O is O assumed O to O be O opaque O -LRB- O absorbing O -RRB- O . O The O efficient O use O conditions O are O found O for O all O the O algorithms O . O It O is O shown O that O the O absorbing B-KEY layer I-KEY can O be O as O thin O as O desired O with O respect O to O the O minimum O spatial O scale O of O the O incident O wave O and O ensures O efficient O absorption O in O a O wide O frequency O interval O -LRB- O starting O from O zero O frequency O -RRB- O that O is O bounded O from O above O only O by O a O finite O space-time O resolution O of O the O parameter-control O operations O . O The O structure O of O a O three-dimensional O parametric O '' O ` O black O '' O coating O whose O efficiency O is O independent O of O the O angle B-KEY of I-KEY incidence I-KEY of O an O incoming O wave O is O developed O on O the O basis O of O the O studied O one-dimensional B-KEY problems I-KEY . O The O general O solution O of O the O problem O of O diffraction B-KEY of O incident O waves O from O such O a O coating O is O obtained O . O This O solution O is O analyzed O in O detail O for O the O case O of O a O disk-shaped B-KEY element I-KEY Books O on O demand O : O just-in-time O acquisitions O The O Purdue B-KEY University I-KEY Libraries I-KEY Interlibrary I-KEY Loan I-KEY unit I-KEY proposed O a O pilot O project O to O purchase O patrons O ' O loan O requests O from O Amazon O . O com O , O lend O them O to O the O patrons O , O and O then O add O the O titles O to O the O collection O . O Staff O analyzed O previous O monograph B-KEY loans I-KEY , O developed O ordering B-KEY criteria I-KEY , O implemented O the O proposal O as O a O pilot O project O for O six O months O , O and O evaluated O the O resulting O patron B-KEY comments I-KEY , O statistics O , O and O staff B-KEY perceptions I-KEY . O As O a O result O of O enthusiastic O patron B-KEY comments I-KEY and O a O review O of O the O project O statistics O , O the O program O was O extended O Internet-based O psychological B-KEY experimenting O : O five O dos O and O five O do O n'ts O Internet-based O psychological B-KEY experimenting O is O presented O as O a O method O that O needs O careful O consideration O of O a O number O of O issues-from O potential O data O corruption O to O revealing O confidential O information O about O participants O . O Ten O issues O are O grouped O into O five O areas O of O actions O to O be O taken O when O developing O an O Internet O experiment O -LRB- O dos O -RRB- O and O five O errors O to O be O avoided O -LRB- O do O n'ts O -RRB- O . O Dos O include O : O -LRB- O a O -RRB- O utilizing O dropout B-KEY as O a O dependent O variable O , O -LRB- O b O -RRB- O the O use O of O dropout B-KEY to O detect O motivational B-KEY confounding I-KEY , O -LRB- O c O -RRB- O placement O of O questions O for O personal B-KEY information I-KEY , O -LRB- O d O -RRB- O using O a O collection O of O techniques O , O and O -LRB- O e O -RRB- O using O Internet-based O tools O . O Do O n'ts O are O about O : O -LRB- O a O -RRB- O unprotected B-KEY directories I-KEY , O -LRB- O b O -RRB- O public O access O to O confidential O data O , O -LRB- O c O -RRB- O revealing O the O experiment O 's O structure O , O -LRB- O d O -RRB- O ignoring O the O Internet O 's O technical O variance O , O and O -LRB- O e O -RRB- O improper O use O of O form O elements O Temelin O casts O its O shadow O -LSB- O nuclear O power O plant O -RSB- O Reservations O about O Temelin B-KEY nuclear I-KEY plant I-KEY in O the O Czech B-KEY Republic I-KEY are O political O rather O than O technical O . O This O paper O discusses O the O problems O of O turbogenerator B-KEY vibrations I-KEY and O how O they O were O diagnosed O . O The O paper O also O discusses O some O of O the O other O problems O of O commissioning O the O power O plant O . O The O simulator O used O for O training O new O staff O is O also O mentioned O Geotensity O : O combining O motion O and O lighting O for O 3D O surface O reconstruction O This O paper O is O about O automatically O reconstructing O the O full B-KEY 3D I-KEY surface I-KEY of O an O object O observed O in O motion O by O a O single B-KEY static I-KEY camera I-KEY . O Based O on O the O two O paradigms O , O structure O from O motion O and O linear B-KEY intensity I-KEY subspaces I-KEY , O we O introduce O the O geotensity B-KEY constraint I-KEY that O governs O the O relationship O between O four O or O more O images O of O a O moving O object O . O We O show O that O it O is O possible O in O theory O to O solve O for O 3D B-KEY Lambertian I-KEY surface I-KEY structure I-KEY for O the O case O of O a O single B-KEY point I-KEY light I-KEY source I-KEY and O propose O that O a O solution O exists O for O an O arbitrary O number O point O light O sources O . O The O surface O may O or O may O not O be O textured O . O We O then O give O an O example O of O automatic B-KEY surface I-KEY reconstruction I-KEY of O a O face O under O a O point B-KEY light I-KEY source I-KEY using O arbitrary O unknown O object O motion O and O a O single O fixed O camera O Operational B-KEY phase-space I-KEY probability I-KEY distribution I-KEY in O quantum B-KEY communication I-KEY theory I-KEY Operational B-KEY phase-space I-KEY probability I-KEY distributions I-KEY are O useful O tools O for O describing O quantum B-KEY mechanical I-KEY systems I-KEY , O including O quantum O communication O and O quantum B-KEY information I-KEY processing I-KEY systems I-KEY . O It O is O shown O that O quantum O communication O channels O with O Gaussian B-KEY noise I-KEY and O quantum B-KEY teleportation I-KEY of O continuous B-KEY variables I-KEY are O described O by O operational B-KEY phase-space I-KEY probability I-KEY distributions I-KEY . O The O relation O of O operational B-KEY phase-space I-KEY probability I-KEY distribution I-KEY to O the O extended B-KEY phase-space I-KEY formalism I-KEY proposed O by O Chountasis O and O Vourdas O -LRB- O 1998 O -RRB- O is O discussed O An O application O of O fuzzy B-KEY linear I-KEY regression I-KEY to O the O information B-KEY technology I-KEY in O Turkey B-KEY Fuzzy O set O theory O deals O with O the O vagueness O of O human O thought O . O A O major O contribution O of O fuzzy O set O theory O is O its B-KEY capability O of O representing O vague O knowledge O . O Fuzzy O set O theory O is O very O practical O when O sufficient O and O reliable O data O is O n't O available O . O Information B-KEY technology I-KEY -LRB- O IT B-KEY -RRB- O is O the O acquisition O , O processing O , O storage O and O dissemination O of O information O in O all O its B-KEY forms O -LRB- O auditory O , O pictorial O , O textual O and O numerical O -RRB- O through O a O combination O of O computers B-KEY , O telecommunication B-KEY , O networks O and O electronic B-KEY devices I-KEY . O IT B-KEY includes O matters O concerned O with O the O furtherance O of O computer B-KEY science O and O technology O , O design O , O development O , O installation O and O implementation O of O information O systems O and O applications O . O In O the O paper O , O assuming O that O there O are O n O independent O variables O and O the O regression B-KEY function I-KEY is O linear O , O the O possible O levels O of O information B-KEY technology I-KEY -LRB- O the O sale O levels O of O computer B-KEY equipment O -RRB- O in O Turkey B-KEY are O forecasted O by O using O fuzzy B-KEY linear I-KEY regression I-KEY . O The O independent O variables O assumed O are O the O import O level O and O the O export O level O of O computer B-KEY equipment O A O new O graphical B-KEY user I-KEY interface I-KEY for O fast O construction O of O computation B-KEY phantoms I-KEY and O MCNP O calculations O : O application O to O calibration B-KEY of O in B-KEY vivo I-KEY measurement I-KEY systems O Reports O on O a O new O utility O for O development O of O computational B-KEY phantoms I-KEY for O Monte B-KEY Carlo I-KEY calculations I-KEY and O data O analysis O for O in B-KEY vivo I-KEY measurements I-KEY of O radionuclides B-KEY deposited O in O tissues B-KEY . O The O individual O properties O of O each O worker B-KEY can O be O acquired O for O a O rather O precise B-KEY geometric I-KEY representation I-KEY of O his O -LRB- O her O -RRB- O anatomy B-KEY , O which O is O particularly O important O for O low B-KEY energy I-KEY gamma I-KEY ray I-KEY emitting I-KEY sources I-KEY such O as O thorium O , O uranium O , O plutonium O and O other O actinides B-KEY . O The O software B-KEY enables O automatic B-KEY creation I-KEY of O an O MCNP B-KEY input I-KEY data I-KEY file I-KEY based O on O scanning B-KEY data I-KEY . O The O utility O includes O segmentation O of O images O obtained O with O either O computed B-KEY tomography I-KEY or O magnetic O resonance O imaging O by O distinguishing O tissues B-KEY according O to O their O signal B-KEY -LRB- O brightness B-KEY -RRB- O and O specification O of O the O source O and O detector B-KEY . O In O addition O , O a O coupling O of O individual B-KEY voxels I-KEY within O the O tissue B-KEY is O used O to O reduce O the O memory B-KEY demand I-KEY and O to O increase O the O calculational B-KEY speed I-KEY . O The O utility O was O tested O for O low O energy O emitters O in O plastic B-KEY and O biological B-KEY tissues I-KEY as O well O as O for O computed O tomography O and O magnetic O resonance O imaging O scanning O information O Information B-KEY security I-KEY policy I-KEY - O what O do O international B-KEY information I-KEY security I-KEY standards I-KEY say O ? O One O of O the O most O important O information O security O controls O , O is O the O information B-KEY security I-KEY policy I-KEY . O This O vital O direction-giving O document O is O , O however O , O not O always O easy O to O develop O and O the O authors O thereof O battle O with O questions O such O as O what O constitutes O a O policy O . O This O results O in O the O policy O authors O turning O to O existing O sources O for O guidance O . O One O of O these O sources O is O the O various O international B-KEY information I-KEY security I-KEY standards I-KEY . O These O standards O are O a O good O starting O point O for O determining O what O the O information B-KEY security I-KEY policy I-KEY should O consist O of O , O but O should O not O be O relied O upon O exclusively O for O guidance O . O Firstly O , O they O are O not O comprehensive O in O their O coverage O and O furthermore O , O tending O to O rather O address O the O processes O needed O for O successfully O implementing O the O information B-KEY security I-KEY policy I-KEY . O It O is O far O more O important O the O information B-KEY security I-KEY policy I-KEY must O fit O in O with O the O organisation O 's O culture O and O must O therefore O be O developed O with O this O in O mind O Academic B-KEY libraries I-KEY and O community O : O making O the O connection O I O explore O the O theme O of O academic B-KEY libraries I-KEY serving O and O reaching O out O to O the O broader O community O . O I O highlight O interesting O projects O reported O on O in O the O literature O -LRB- O such O as O the O Through O Our O Parents O ' O Eyes O project O -RRB- O and O report O on O others O . O I O look O at O challenges O to O community B-KEY partnerships I-KEY and O recommendations O for O making O them O succeed O . O Although O I O focus O on O links O with O the O broader O community O , O I O also O took O at O methods O for O increasing O cooperation O among O various O units O on O campus O , O so O that O the O needs O of O campus O community O groups-such O as O distance B-KEY education I-KEY students I-KEY or O disabled O students-are O effectively O addressed O . O Though O academic B-KEY libraries I-KEY are O my O focus O , O we O can O learn O a O lot O from O the O community O building O efforts O of O public B-KEY libraries I-KEY Symbiosis O or O alienation O : O advancing O the O university B-KEY press/research I-KEY library I-KEY relationship I-KEY through O electronic B-KEY scholarly I-KEY communication I-KEY University O presses O and O research O libraries O have O a O long O tradition O of O collaboration O . O The O rapidly O expanding O electronic B-KEY scholarly I-KEY communication I-KEY environment O offers O important O new O opportunities O for O cooperation O and O for O innovative O new O models O of O publishing O . O The O economics B-KEY of O libraries O and O scholarly O publishers O have O strained O the O working O relationship O and O promoted O debates O on O important O information B-KEY policy I-KEY issues O . O This O article O explores O the O context O for O advancing O the O partnership O , O cites O examples O of O joint O efforts O in O electronic B-KEY publishing I-KEY , O and O presents O an O action O plan O for O working O together O Fusion O of O qualitative B-KEY bond I-KEY graph I-KEY and O genetic B-KEY algorithms I-KEY : O A O fault B-KEY diagnosis I-KEY application O In O this O paper O , O the O problem O of O fault B-KEY diagnosis I-KEY via O integration O of O genetic B-KEY algorithms I-KEY -LRB- O GA O 's O -RRB- O and O qualitative B-KEY bond I-KEY graphs I-KEY -LRB- O QBG O 's O -RRB- O is O addressed O . O We O suggest O that O GA O 's O can O be O used O to O search O for O possible O fault B-KEY components I-KEY among O a O system O of O qualitative B-KEY equations I-KEY . O The O QBG O is O adopted O as O the O modeling O scheme O to O generate O a O set O of O qualitative B-KEY equations I-KEY . O The O qualitative B-KEY bond I-KEY graph I-KEY provides O a O unified O approach O for O modeling O engineering B-KEY systems I-KEY , O in O particular O , O mechatronic B-KEY systems I-KEY . O In O order O to O demonstrate O the O performance O of O the O proposed O algorithm O , O we O have O tested O the O proposed O algorithm O on O an O in-house O designed O and O built O floating B-KEY disc I-KEY experimental O setup O . O Results O from O fault B-KEY diagnosis I-KEY in O the O floating B-KEY disc I-KEY system O are O presented O and O discussed O . O Additional O measurements O will O be O required O to O localize O the O fault O when O more O than O one O fault O candidate O is O inferred O . O Fault B-KEY diagnosis I-KEY is O activated O by O a O fault O detection O mechanism O when O a O discrepancy O between O measured B-KEY abnormal I-KEY behavior I-KEY and O predicted B-KEY system I-KEY behavior I-KEY is O observed O . O The O fault O detection O mechanism O is O not O presented O here O