ScaleNet – Converged Networks of the Future (ScaleNet – Konvergente Netze der Zukunft)

2006 ◽  
Vol 48 (5) ◽  
Author(s):  
Matthias Siebert ◽  
B. Xu ◽  
M. Grigat ◽  
E. Weis ◽  
N. Bayer ◽  
...  

This article provides an overview of ongoing research within the framework ScaleNet. Considering IP as the basis transport scheme, the wireless and the wireline world have just started to move towards each other. ScaleNet is pushing this development by evolving a new system concept and by developing technologies for Fixed & Mobile Convergence.

2013 ◽  
Vol 706-708 ◽  
pp. 733-736
Author(s):  
Fang Li

It is very difficult to confirm the position of the center of gravity irregular object.This paper introduces a new system,which can be used in measuring and adjusting of the center of gravity.The irregular object was put on the support parts,then the center of gravity was given.When the actual position was compared with the ideal position,the difference was given. Until actual position and ideal position were coincided,the machining was continuing. Matlab was programmed in this measure system. It will be applied widely in the future.


2021 ◽  
Vol 7 ◽  
Author(s):  
Thomas H. Edwards ◽  
Guillaume L. Hoareau

Fluids are a vital tool in the armament of acute care clinicians in both civilian and military resuscitation. We now better understand complications from inappropriate resuscitation with currently available fluids; however, fluid resuscitation undeniably remains a life-saving intervention. Military research has driven the most significant advances in the field of fluid resuscitation and is currently leading the search for the fluids of the future. The veterinary community, much like our civilian human counterparts, should expect the fluid of the future to be the fruit of military research. The fluids of the future not only are expected to improve patient outcomes but also be field expedient. Those fluids should be compatible with military environments or natural disaster environments. For decades, military personnel and disaster responders have faced the peculiar demands of austere environments, prolonged field care, and delayed evacuation. Large scale natural disasters present field limitations often similar to those encountered in the battlefield. The fluids of the future should, therefore, have a long shelf-life, a small footprint, and be resistant to large temperature swings, for instance. Traumatic brain injury and hemorrhagic shock are the leading causes of preventable death for military casualties and a significant burden in civilian populations. The military and civilian health systems are focusing efforts on field-expedient fluids that will be specifically relevant for the management of those conditions. Fluids are expected to be compatible with blood products, increase oxygen-carrying capabilities, promote hemostasis, and be easy to administer in the prehospital setting, to match the broad spectrum of current acute care challenges, such as sepsis and severe systemic inflammation. This article will review historical military and civilian contributions to current resuscitation strategies, describe the expectations for the fluids of the future, and describe select ongoing research efforts with a review of current animal data.


Author(s):  
Steven Brint

This chapter discusses the analytical contrast between the two systems for organizing research and education, the system of academic professionalism and the system of academic innovationism. Under the impetus of academic innovationism, universities became more porous to the outside world and reciprocal relations of knowledge exchange grew denser. On balance, the new system contributed significantly and positively to the research prowess of universities. But it has also yielded a spotty record—some extraordinary successes but also many short-lived, troubled collaborations. Some universities invested heavily in the infrastructure to foster academic innovation and had little to show for their investments. For research universities, the challenge for the future will be to expand the possibilities to contribute more to the national innovation effort.


Author(s):  
Michael Greenhalgh

This chapter evaluates current possibilities for the attainment of a realistic context over the web by attempting to match the basic requirements of art history scholarship and teaching against what is currently offered and what can be expected in the future. It surveys some ongoing research in the field from the perspective of an observer and a user. The first section of the chapter discusses virtual reality modelling language (VRML) and describes a project of the Supercomputer Group at the Australian National University. This project aimed to model, using VRML, the Buddhist stupa at Borobudur. The chapter also discusses a second project which deals with the Piazza de Popolo at Rome and the reasons why this project did not employ VMRL. The second section of the chapter examines some other ways in which an ordinary lecturer may use various simple technologies to conjure context, and with more flexibility, detail and accuracy that VRML can ever achieve.


2011 ◽  
pp. 234-248
Author(s):  
Enid Mumford

Participative systems design has, in the past, been seen as a positive group process of thinking through needs and problems and arriving at solutions for making the situation better. This improved situation then continues until new technology or new solutions provide an opportunity for making the situation better still. So far this book has concentrated on how to make the best use of the positive factors assisting change, especially change that involves the introduction and use of technology. It has described the importance of getting a clear understanding of the change problem and its complexity, of developing effective strategies to address this complexity, and of the creation of structures, often organizational, to facilitate the subsequent use of the new system. This last requires always keeping in mind the need to meet the dual objectives of achieving operating efficiency and a good quality of working life. This is often described as job satisfaction. Most of all there has been a continual stress on the importance of participation. This involves sharing the design tasks with those who will be affected by them and taking account of their opinions in design decisions. This chapter addresses the reverse of this positive objective. It considers the negative factors in a change situation which are likely to cause problems and to threaten the success of the change programme and of the new system. There are very many of these kinds of problems and it is only possible to discuss a few here. The ones I have selected are criminal threats which affect the future viability of the company, technical problems which reduce efficiency, unpleasant and stressful work that threatens employee health, and problems of morale which affect the individual’s happiness in the workplace. A consideration of negative factors brings us into the challenging areas of uncertainty and risk. Uncertainty is when we do not know what is going to happen and often contains an element of surprise. This is especially true today when so many decisions depend on forecasts of the future. A contributing factor here can be an overemphasis on the present as a means of forecasting the future. Uncertainty is also often a result of the behaviour of others rather than of events. This is hard to predict. Experts tell us that today we are living in a risk society (Beck, 1992). Complex design problems can have a high degree of uncertainty and easily become risks. They often have a subjective element, for what one person considers a problem or a risk, another will see as an opportunity. Complex problems also require information for their solution and this may be difficult to find. It requires the ability to search for, analyse and synthesise, relevant intelligence and relate it to past, current and future events. Threats to important institutions from terrorists are of a different nature and scale to those that have been experienced before. Many will take us completely by surprise. Bernstein (1996) suggests that the essence of risk management lies in maximising the areas which we have some control over while minimising those areas where we have no control over the outcome and the linkage between cause and effect is hidden. When we take a risk we are making a bet that a particular outcome will result from the decision we have made although we have no certainty that this will happen. Risk management usually starts with risk analysis, which attempts to establish and rank the most serious risks to be avoided so far as these are known. Here many companies attempt to achieve a balance between the benefits of greater security and the costs involved. Too high a level of security, while providing good protection, can result in a system that is both difficult to use and expensive to operate (Mumford, 1999). Risk analysis next moves on to risk assessment. This is an analysis of the seriousness of different risks by determining the probability and potential damage of each one. For example, major risks can come from a large concentration of data in one place that is accessed by many different people, not all of whom are known. There can be relationships between risks. Clifford Stoll’s (1990) book The Cuckoo’s Egg shows how the ability of a German hacker to enter a university laboratory computer made it possible for him to later enter into the computers of United States military bases. Risk analysis identifies the risks; risk assessment tries to estimate how likely they are to happen and how serious the consequences will be. Risk priorisation recognises that all companies cannot be protected from all risks and choices must be made. Risk impact is the likely magnitude of the loss if a system break-in, fraud or other serious problem occurs. Risk control involves further actions to reduce the risk and to trigger further defensive actions if a very serious problem occurs. Risk control also covers the monitoring of risk on a regular basis to check that existing protection is still effective. This can lead to risk reassessment. Very serious risks such as those coming from terrorist attack or criminal activity require monitoring. This, together with the detailed documentation of any problems or illegal activities when they occur, is essential to avoid complacency. An effective system must both prevent problems and detect when they have occurred. All of these activities to design security into a system require human vigilance if they are to be effective. All employees should accept some responsibility for checking that the system they work with continues to maintain its integrity and security. This chapter will place its main focus on protective problem solving and design directed at avoiding or minimising very serious risks. Today, it is unwise for managers to neglect this. Because of its growth in recent years and its prevalence today criminal activity will be examined first in some detail. Particular attention will be paid to how the involvement of employees in problem solving can play a part in reducing or avoiding this.


2019 ◽  
Vol 109 ◽  
pp. 409-413
Author(s):  
Katharine G. Abraham

An important factor in the government's ability to collect data from individuals and businesses is the promise that their information will be kept private. Given the explosion of other data increasingly available in electronic form, however, there is a growing risk that the subjects of federal data collections could be re-identified and their privacy thereby compromised. This implies that current modes for disseminating information based on survey and census data will need to be rethought. While the broad outlines for a new system seem relatively clear, important practical questions about its implementation will need to be addressed.


2002 ◽  
Vol 124 (3) ◽  
pp. 650-659 ◽  
Author(s):  
J. K. Park ◽  
J. O. Chae

Engine knocking and misfire cause a negative effect on the engine power and the exhaust emissions such as HC, CO and NOx. They also cause permanent damages to the three way catalyst (TWC) system. And a heavy knock can cause severe damages to the engine itself, which gives more reason why it must be detected and corrected. This study introduces a new system concept for detecting combustion misfire and knocking using breakdown voltage (BDV) characteristics between spark plug electrodes. This system detects and evaluates the degree of combustion by measuring the breakdown voltage which predicts that the breakdown voltage depends on the pressure and the temperature.


BJPsych Open ◽  
2021 ◽  
Vol 7 (5) ◽  
Author(s):  
Andrew M. Novick ◽  
Joel Stoddard ◽  
Rachel L. Johnson ◽  
Mary D. Sammel ◽  
Lily Berkowitz ◽  
...  

Virtual platforms can provide a socially distanced mechanism by which to promote ongoing research progress in the coronavirus disease 2019 (COVID-19) era and may change our approach to online research in the future. Understanding how to best utilise online research represents an important task for our field.


Sign in / Sign up

Export Citation Format

Share Document