works

Integrated restoration of forested ecosystems to achieve multiresource benefits: proceedings of the 2007 national silviculture workshop

A primary mission of the U.S. Department of Agriculture Forest Service is multiple resource management, and one of the emerging themes is forest restoration. The National Silviculture Workshop, a biennial event co-sponsored by the Forest Service, was held May 7-10, 2007, in Ketchikan, Alaska, with the theme of "Integrated Restoration of Forested Ecosystems to Achieve Multiresource Benefits." This proceedings presents a compilation of state-of-the-art silvicultural research and forestry management papers that demonstrates integrated restoration to yield multiple resource benefits. These papers highlight national perspectives on ecosystem services, forest restoration and climate change, and regional perspectives on forest restoration and silvicultural practices to achieve multiple resource benefits from researchers and forest practitioners working in a broad array of forest types in the United States.




works

Climate Change, Carbon, and Forestry in Northwestern North America: Proceedings of a Workshop November 14 - 15, 2001 Orcas Island, Washington

Interactions between forests, climatic change and the Earths carbon cycle are complex and represent a challenge for forest managers - they are integral to the sustainable management of forests. In this volume, a number of papers are presented that describe some of the complex relationships between climate, the global carbon cycle and forests.




works

Gene conservation of tree species—banking on the future. Proceedings of a workshop.

The ‘Gene Conservation of Tree Species—Banking on the Future Workshop’ provided a forum for presenting and discussing issues and accomplishments in genetic conservation of trees, and notably those of North America. The meeting gathered scientists, specialists, administrators and conservation practitioners from federal, university, non-governmental and public garden institutions worldwide. The 81 submissions included in this Proceedings are from oral and poster presentations at the 2016 workshop held in Chicago, Illinois. They update the science and policy of genetic conservation of trees, showcase current successes, and provide guidance for future efforts. This Proceedings is complemented by 11 related papers gathered in a special issue of the journal New Forests (Vol 48, No. 2, 2017). In addition to plenary talks that provided overviews of some national and international efforts, there were concurrent sessions with themes of Conservation Strategies, Pest and Pathogen Resistance, Genetic Conservation, Tools for Tree Genetic Conservation, Conservation Program Case Studies, Designing Seed Collections, Ex Situ Conservation, and Science in Support of Conservation. The meeting was also the venue for special sessions on Coordinating the Red List of North American Tree Species, Innovative Approaches for Assessing and Prioritizing Tree Species and Populations for Gene Conservation, Community Standards for Genomic Resources, Genetic Conservation and Data Integration, and Development of Seed Zones for the Eastern U.S., and a group discussion on Improving Genetic Conservation Efforts.




works

14 New Stunning Coronavirus-Themed Street Art Works From Around The World

A mother and her child are reflected as they pass a mural by artist FAKE, titled “Super Nurse”, paying tribute...




works

Make Your iPhone Ask to Join Wi-Fi Networks

By default, your iPhone automatically connects to known wi-fi networks. (To stop an iPhone from automatically connecting, you can tell your iPhone to forget a wi-fi network.) But what happens if you take your iPhone to a new location? You'll need to manually connect your iPhone to a wi-fi network.

That's a hassle. But if you have the foresight and inclination, you can save yourself time in the future by making your iPhone ask to join wi-fi networks when no known networks are available. Instead of having to open settings to join a network, you'll be able to easily select a network from an on-screen prompt.

Here's how to make your iPhone ask to join wi-fi networks:

  1. From the home screen, tap Settings.

  2. Tap Wi-Fi. The window shown below appears.

  3. Move the Ask to Join Networks slider to the On position.

  4. The next time you're in a location with no known networks, your iPhone will prompt you to connect to an available wi-fi network, as shown below.

In the future, this prompt will be displayed when no known networks are available. (To actually see the prompt, you'll need to do something that requires network access, like try to check your email or open a webpage.) To connect to a wi-fi network, select a network and enter a password, if one is required.

Related Articles


Meet Your Macinstructor

Matt Cone, the author of Master Your Mac, has been a Mac user for over 20 years. A former ghost writer for some of Apple's most notable instructors, Cone founded Macinstruct in 1999, a site with OS X tutorials that boasts hundreds of thousands of unique visitors per month. You can email him at: matt@macinstruct.com.




works

Pandemic Creativity: Edible Versions of Famous Artworks

https://kottke.org/20/05/pandemic-creativity-edible-versions-of-famous-artworks




works

WPCampus 2019 WP Rig Workshop

This post contains the slides for and links to all the things you need to follow my WP Rig workshop at WP Campus 2019, including a couple of verbose code examples for complex walk-throughs. WP Rig itself: WP Rig WP Rig Wiki Free LinkedIn Learning course on WP Rig VS Code extensions EditorConfig ESLint PHP […]

The post WPCampus 2019 WP Rig Workshop appeared first on MOR10.




works

Join Our New Online Workshops On CSS, Accessibility, Performance, And UX

It has been a month since we launched our first online workshop and, to be honest, we really didn’t know whether people would enjoy them — or if we would enjoy running them. It was an experiment, but one we are so glad we jumped into! I spoke about the experience of taking my workshop online on a recent episode of the Smashing podcast. As a speaker, I had expected it to feel very much like I was presenting into the empty air, with no immediate feedback and expressions to work from.




works

Topology Identification of Heterogeneous Networks: Identifiability and Reconstruction. (arXiv:1909.11054v2 [math.OC] UPDATED)

This paper addresses the problem of identifying the graph structure of a dynamical network using measured input/output data. This problem is known as topology identification and has received considerable attention in recent literature. Most existing literature focuses on topology identification for networks with node dynamics modeled by single integrators or single-input single-output (SISO) systems. The goal of the current paper is to identify the topology of a more general class of heterogeneous networks, in which the dynamics of the nodes are modeled by general (possibly distinct) linear systems. Our two main contributions are the following. First, we establish conditions for topological identifiability, i.e., conditions under which the network topology can be uniquely reconstructed from measured data. We also specialize our results to homogeneous networks of SISO systems and we will see that such networks have quite particular identifiability properties. Secondly, we develop a topology identification method that reconstructs the network topology from input/output data. The solution of a generalized Sylvester equation will play an important role in our identification scheme.




works

Multi-task pre-training of deep neural networks for digital pathology. (arXiv:2005.02561v2 [eess.IV] UPDATED)

In this work, we investigate multi-task learning as a way of pre-training models for classification tasks in digital pathology. It is motivated by the fact that many small and medium-size datasets have been released by the community over the years whereas there is no large scale dataset similar to ImageNet in the domain. We first assemble and transform many digital pathology datasets into a pool of 22 classification tasks and almost 900k images. Then, we propose a simple architecture and training scheme for creating a transferable model and a robust evaluation and selection protocol in order to evaluate our method. Depending on the target task, we show that our models used as feature extractors either improve significantly over ImageNet pre-trained models or provide comparable performance. Fine-tuning improves performance over feature extraction and is able to recover the lack of specificity of ImageNet features, as both pre-training sources yield comparable performance.




works

Generative Adversarial Networks in Digital Pathology: A Survey on Trends and Future Potential. (arXiv:2004.14936v2 [eess.IV] UPDATED)

Image analysis in the field of digital pathology has recently gained increased popularity. The use of high-quality whole slide scanners enables the fast acquisition of large amounts of image data, showing extensive context and microscopic detail at the same time. Simultaneously, novel machine learning algorithms have boosted the performance of image analysis approaches. In this paper, we focus on a particularly powerful class of architectures, called Generative Adversarial Networks (GANs), applied to histological image data. Besides improving performance, GANs also enable application scenarios in this field, which were previously intractable. However, GANs could exhibit a potential for introducing bias. Hereby, we summarize the recent state-of-the-art developments in a generalizing notation, present the main applications of GANs and give an outlook of some chosen promising approaches and their possible future applications. In addition, we identify currently unavailable methods with potential for future applications.




works

Efficient Exact Verification of Binarized Neural Networks. (arXiv:2005.03597v1 [cs.AI])

We present a new system, EEV, for verifying binarized neural networks (BNNs). We formulate BNN verification as a Boolean satisfiability problem (SAT) with reified cardinality constraints of the form $y = (x_1 + cdots + x_n le b)$, where $x_i$ and $y$ are Boolean variables possibly with negation and $b$ is an integer constant. We also identify two properties, specifically balanced weight sparsity and lower cardinality bounds, that reduce the verification complexity of BNNs. EEV contains both a SAT solver enhanced to handle reified cardinality constraints natively and novel training strategies designed to reduce verification complexity by delivering networks with improved sparsity properties and cardinality bounds. We demonstrate the effectiveness of EEV by presenting the first exact verification results for $ell_{infty}$-bounded adversarial robustness of nontrivial convolutional BNNs on the MNIST and CIFAR10 datasets. Our results also show that, depending on the dataset and network architecture, our techniques verify BNNs between a factor of ten to ten thousand times faster than the best previous exact verification techniques for either binarized or real-valued networks.




works

Bundle Recommendation with Graph Convolutional Networks. (arXiv:2005.03475v1 [cs.IR])

Bundle recommendation aims to recommend a bundle of items for a user to consume as a whole. Existing solutions integrate user-item interaction modeling into bundle recommendation by sharing model parameters or learning in a multi-task manner, which cannot explicitly model the affiliation between items and bundles, and fail to explore the decision-making when a user chooses bundles. In this work, we propose a graph neural network model named BGCN (short for extit{ extBF{B}undle extBF{G}raph extBF{C}onvolutional extBF{N}etwork}) for bundle recommendation. BGCN unifies user-item interaction, user-bundle interaction and bundle-item affiliation into a heterogeneous graph. With item nodes as the bridge, graph convolutional propagation between user and bundle nodes makes the learned representations capture the item level semantics. Through training based on hard-negative sampler, the user's fine-grained preferences for similar bundles are further distinguished. Empirical results on two real-world datasets demonstrate the strong performance gains of BGCN, which outperforms the state-of-the-art baselines by 10.77\% to 23.18\%.




works

Lifted Regression/Reconstruction Networks. (arXiv:2005.03452v1 [cs.LG])

In this work we propose lifted regression/reconstruction networks (LRRNs), which combine lifted neural networks with a guaranteed Lipschitz continuity property for the output layer. Lifted neural networks explicitly optimize an energy model to infer the unit activations and therefore---in contrast to standard feed-forward neural networks---allow bidirectional feedback between layers. So far lifted neural networks have been modelled around standard feed-forward architectures. We propose to take further advantage of the feedback property by letting the layers simultaneously perform regression and reconstruction. The resulting lifted network architecture allows to control the desired amount of Lipschitz continuity, which is an important feature to obtain adversarially robust regression and classification methods. We analyse and numerically demonstrate applications for unsupervised and supervised learning.




works

Detection and Feeder Identification of the High Impedance Fault at Distribution Networks Based on Synchronous Waveform Distortions. (arXiv:2005.03411v1 [eess.SY])

Diagnosis of high impedance fault (HIF) is a challenge for nowadays distribution network protections. The fault current of a HIF is much lower than that of a normal load, and fault feature is significantly affected by fault scenarios. A detection and feeder identification algorithm for HIFs is proposed in this paper, based on the high-resolution and synchronous waveform data. In the algorithm, an interval slope is defined to describe the waveform distortions, which guarantees a uniform feature description under various HIF nonlinearities and noise interferences. For three typical types of network neutrals, i.e.,isolated neutral, resonant neutral, and low-resistor-earthed neutral, differences of the distorted components between the zero-sequence currents of healthy and faulty feeders are mathematically deduced, respectively. As a result, the proposed criterion, which is based on the distortion relationships between zero-sequence currents of feeders and the zero-sequence voltage at the substation, is theoretically supported. 28 HIFs grounded to various materials are tested in a 10kV distribution networkwith three neutral types, and are utilized to verify the effectiveness of the proposed algorithm.




works

DMCP: Differentiable Markov Channel Pruning for Neural Networks. (arXiv:2005.03354v1 [cs.CV])

Recent works imply that the channel pruning can be regarded as searching optimal sub-structure from unpruned networks.

However, existing works based on this observation require training and evaluating a large number of structures, which limits their application.

In this paper, we propose a novel differentiable method for channel pruning, named Differentiable Markov Channel Pruning (DMCP), to efficiently search the optimal sub-structure.

Our method is differentiable and can be directly optimized by gradient descent with respect to standard task loss and budget regularization (e.g. FLOPs constraint).

In DMCP, we model the channel pruning as a Markov process, in which each state represents for retaining the corresponding channel during pruning, and transitions between states denote the pruning process.

In the end, our method is able to implicitly select the proper number of channels in each layer by the Markov process with optimized transitions. To validate the effectiveness of our method, we perform extensive experiments on Imagenet with ResNet and MobilenetV2.

Results show our method can achieve consistent improvement than state-of-the-art pruning methods in various FLOPs settings. The code is available at https://github.com/zx55/dmcp




works

Causal Paths in Temporal Networks of Face-to-Face Human Interactions. (arXiv:2005.03333v1 [cs.SI])

In a temporal network causal paths are characterized by the fact that links from a source to a target must respect the chronological order. In this article we study the causal paths structure in temporal networks of human face to face interactions in different social contexts. In a static network paths are transitive i.e. the existence of a link from $a$ to $b$ and from $b$ to $c$ implies the existence of a path from $a$ to $c$ via $b$. In a temporal network the chronological constraint introduces time correlations that affects transitivity. A probabilistic model based on higher order Markov chains shows that correlations that can invalidate transitivity are present only when the time gap between consecutive events is larger than the average value and are negligible below such a value. The comparison between the densities of the temporal and static accessibility matrices shows that the static representation can be used with good approximation. Moreover, we quantify the extent of the causally connected region of the networks over time.




works

Constructing Accurate and Efficient Deep Spiking Neural Networks with Double-threshold and Augmented Schemes. (arXiv:2005.03231v1 [cs.NE])

Spiking neural networks (SNNs) are considered as a potential candidate to overcome current challenges such as the high-power consumption encountered by artificial neural networks (ANNs), however there is still a gap between them with respect to the recognition accuracy on practical tasks. A conversion strategy was thus introduced recently to bridge this gap by mapping a trained ANN to an SNN. However, it is still unclear that to what extent this obtained SNN can benefit both the accuracy advantage from ANN and high efficiency from the spike-based paradigm of computation. In this paper, we propose two new conversion methods, namely TerMapping and AugMapping. The TerMapping is a straightforward extension of a typical threshold-balancing method with a double-threshold scheme, while the AugMapping additionally incorporates a new scheme of augmented spike that employs a spike coefficient to carry the number of typical all-or-nothing spikes occurring at a time step. We examine the performance of our methods based on MNIST, Fashion-MNIST and CIFAR10 datasets. The results show that the proposed double-threshold scheme can effectively improve accuracies of the converted SNNs. More importantly, the proposed AugMapping is more advantageous for constructing accurate, fast and efficient deep SNNs as compared to other state-of-the-art approaches. Our study therefore provides new approaches for further integration of advanced techniques in ANNs to improve the performance of SNNs, which could be of great merit to applied developments with spike-based neuromorphic computing.




works

ContextNet: Improving Convolutional Neural Networks for Automatic Speech Recognition with Global Context. (arXiv:2005.03191v1 [eess.AS])

Convolutional neural networks (CNN) have shown promising results for end-to-end speech recognition, albeit still behind other state-of-the-art methods in performance. In this paper, we study how to bridge this gap and go beyond with a novel CNN-RNN-transducer architecture, which we call ContextNet. ContextNet features a fully convolutional encoder that incorporates global context information into convolution layers by adding squeeze-and-excitation modules. In addition, we propose a simple scaling method that scales the widths of ContextNet that achieves good trade-off between computation and accuracy. We demonstrate that on the widely used LibriSpeech benchmark, ContextNet achieves a word error rate (WER) of 2.1\%/4.6\% without external language model (LM), 1.9\%/4.1\% with LM and 2.9\%/7.0\% with only 10M parameters on the clean/noisy LibriSpeech test sets. This compares to the previous best published system of 2.0\%/4.6\% with LM and 3.9\%/11.3\% with 20M parameters. The superiority of the proposed ContextNet model is also verified on a much larger internal dataset.




works

Evolutionary Multi Objective Optimization Algorithm for Community Detection in Complex Social Networks. (arXiv:2005.03181v1 [cs.NE])

Most optimization-based community detection approaches formulate the problem in a single or bi-objective framework. In this paper, we propose two variants of a three-objective formulation using a customized non-dominated sorting genetic algorithm III (NSGA-III) to find community structures in a network. In the first variant, named NSGA-III-KRM, we considered Kernel k means, Ratio cut, and Modularity, as the three objectives, whereas the second variant, named NSGA-III-CCM, considers Community score, Community fitness and Modularity, as three objective functions. Experiments are conducted on four benchmark network datasets. Comparison with state-of-the-art approaches along with decomposition-based multi-objective evolutionary algorithm variants (MOEA/D-KRM and MOEA/D-CCM) indicates that the proposed variants yield comparable or better results. This is particularly significant because the addition of the third objective does not worsen the results of the other two objectives. We also propose a simple method to rank the Pareto solutions so obtained by proposing a new measure, namely the ratio of the hyper-volume and inverted generational distance (IGD). The higher the ratio, the better is the Pareto set. This strategy is particularly useful in the absence of empirical attainment function in the multi-objective framework, where the number of objectives is more than two.




works

Evaluation, Tuning and Interpretation of Neural Networks for Meteorological Applications. (arXiv:2005.03126v1 [physics.ao-ph])

Neural networks have opened up many new opportunities to utilize remotely sensed images in meteorology. Common applications include image classification, e.g., to determine whether an image contains a tropical cyclone, and image translation, e.g., to emulate radar imagery for satellites that only have passive channels. However, there are yet many open questions regarding the use of neural networks in meteorology, such as best practices for evaluation, tuning and interpretation. This article highlights several strategies and practical considerations for neural network development that have not yet received much attention in the meteorological community, such as the concept of effective receptive fields, underutilized meteorological performance measures, and methods for NN interpretation, such as synthetic experiments and layer-wise relevance propagation. We also consider the process of neural network interpretation as a whole, recognizing it as an iterative scientist-driven discovery process, and breaking it down into individual steps that researchers can take. Finally, while most work on neural network interpretation in meteorology has so far focused on networks for image classification tasks, we expand the focus to also include networks for image translation.




works

Near-optimal Detector for SWIPT-enabled Differential DF Relay Networks with SER Analysis. (arXiv:2005.03096v1 [cs.IT])

In this paper, we analyze the symbol error rate (SER) performance of the simultaneous wireless information and power transfer (SWIPT) enabled three-node differential decode-and-forward (DDF) relay networks, which adopt the power splitting (PS) protocol at the relay. The use of non-coherent differential modulation eliminates the need for sending training symbols to estimate the instantaneous channel state informations (CSIs) at all network nodes, and therefore improves the power efficiency, as compared with the coherent modulation. However, performance analysis results are not yet available for the state-of-the-art detectors such as the approximate maximum-likelihood detector. Existing works rely on Monte-Carlo simulation to show that there exists an optimal PS ratio that minimizes the overall SER. In this work, we propose a near-optimal detector with linear complexity with respect to the modulation size. We derive an accurate approximate SER expression, based on which the optimal PS ratio can be accurately estimated without requiring any Monte-Carlo simulation.




works

Robust Trajectory and Transmit Power Optimization for Secure UAV-Enabled Cognitive Radio Networks. (arXiv:2005.03091v1 [cs.IT])

Cognitive radio is a promising technology to improve spectral efficiency. However, the secure performance of a secondary network achieved by using physical layer security techniques is limited by its transmit power and channel fading. In order to tackle this issue, a cognitive unmanned aerial vehicle (UAV) communication network is studied by exploiting the high flexibility of a UAV and the possibility of establishing line-of-sight links. The average secrecy rate of the secondary network is maximized by robustly optimizing the UAV's trajectory and transmit power. Our problem formulation takes into account two practical inaccurate location estimation cases, namely, the worst case and the outage-constrained case. In order to solve those challenging non-convex problems, an iterative algorithm based on $mathcal{S}$-Procedure is proposed for the worst case while an iterative algorithm based on Bernstein-type inequalities is proposed for the outage-constrained case. The proposed algorithms can obtain effective suboptimal solutions of the corresponding problems. Our simulation results demonstrate that the algorithm under the outage-constrained case can achieve a higher average secrecy rate with a low computational complexity compared to that of the algorithm under the worst case. Moreover, the proposed schemes can improve the secure communication performance significantly compared to other benchmark schemes.




works

Learning, transferring, and recommending performance knowledge with Monte Carlo tree search and neural networks. (arXiv:2005.03063v1 [cs.LG])

Making changes to a program to optimize its performance is an unscalable task that relies entirely upon human intuition and experience. In addition, companies operating at large scale are at a stage where no single individual understands the code controlling its systems, and for this reason, making changes to improve performance can become intractably difficult. In this paper, a learning system is introduced that provides AI assistance for finding recommended changes to a program. Specifically, it is shown how the evaluative feedback, delayed-reward performance programming domain can be effectively formulated via the Monte Carlo tree search (MCTS) framework. It is then shown that established methods from computational games for using learning to expedite tree-search computation can be adapted to speed up computing recommended program alterations. Estimates of expected utility from MCTS trees built for previous problems are used to learn a sampling policy that remains effective across new problems, thus demonstrating transferability of optimization knowledge. This formulation is applied to the Apache Spark distributed computing environment, and a preliminary result is observed that the time required to build a search tree for finding recommendations is reduced by up to a factor of 10x.




works

Vehicle event recorder systems and networks having integrated cellular wireless communications systems

Vehicle event recorder systems are arranged to be in constant communication with remote servers and administrators via mobile wireless cellular networks. Vehicle event recorders equipped with video cameras capture video and other data records of important events relating to vehicle use. These data are then transmitted over special communications networks having very high coverage space but limited bandwidth. A vehicle may be operated over very large region while maintaining continuous communications connections with a remote fixed server. As such, systems of these inventions may be characterized as including a mobile unit having: a video camera; a microprocessor; memory; an event trigger; and mobile wireless transceivers, and a fixed network portion including: mobile wireless cellular network, a protocol translation gateway, the Internet and an application-specific server.




works

3D mobile user interface with configurable workspace management

Systems and methods of a 3D mobile user interface with configurable workspace management are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of a three-dimensional, multi-layer user interface of a mobile device in a mobile network. User environment may include one or more layers or levels of applications, services, or accounts that are all easily accessible to and navigable by the user. For example, an indicator can be used to access a workspace in 3D representing a category or grouping of services or applications for the user. The user can customize or create a unique, non-mutually exclusive grouping, aggregation, or category of applications, services, accounts, or items. The grouping of indicators can be used to swiftly and efficiently navigate to a desired application, service, account or item, in a 3D-enabled user environment.




works

Interpenetrating polymer networks derived from silylated triglyceride oils and polysiloxanes

A composition of matter comprising an interpenetrating polymer network of a combination of a silanol-containing polysiloxane phase and a silylated triglyceride oil phase. The two phases are mixed and covalently bound to each other via siloxane crosslinks. A method for producing interpenetrating polymer networks. The method comprises providing triglycerides from oils or fats and reacting the triglycerides with a reactive silane to form a silylated triglyceride oil. The silylated triglyceride oil and a silanol terminated polysiloxane are emulsified with water in a predetermined ratio. Thereafter, crosslinking agents are added and the water is removed from the emulsions providing siloxane crosslinks between the two intimately mixed immiscible phases.




works

Real-time predictive systems for intelligent energy monitoring and management of electrical power networks

A system for intelligent monitoring and management of an electrical system is disclosed. The system includes a data acquisition component, a power analytics server and a client terminal. The data acquisition component acquires real-time data output from the electrical system. The power analytics server is comprised of a real-time energy pricing engine, virtual system modeling engine, an analytics engine, a machine learning engine and a schematic user interface creator engine. The real-time energy pricing engine generates real-time utility power pricing data. The virtual system modeling engine generates predicted data output for the electrical system. The analytics engine monitors real-time data output and predicted data output of the electrical system. The machine learning engine stores acid processes patterns observed from the real-time data output and the predicted data output to forecast an aspect of the electrical system.




works

Dynamically configuring and verifying routing information of broadcast networks using link state protocols in a computer network

A technique dynamically configures and verifies routing information of broadcast networks using link state protocols in a computer network. According to the novel technique, a router within the broadcast network receives a link state protocol routing information advertisement from an advertising router, e.g., a designated router or other adjacent neighbor. The router learns of a next-hop router (“next-hop”) to reach a particular destination from the advertisement, and determines whether the next-hop is located within the same broadcast network (e.g., subnet) as the designated router. If so, the router further determines whether the next-hop is directly addressable (i.e., reachable), such as, e.g., by checking for link adjacencies to the next-hop or by sending request/reply messages (e.g., echo messages or “ping” messages) to the next-hop. In the event the next-hop for the destination is not directly addressable by the router (e.g., no adjacency or reply), the router installs a route to the destination via the designated router. Otherwise, the router installs a route to the destination via the next-hop.




works

Audio-video multi-participant conference systems using PSTN and internet networks

A multi-participant conference system and method is described. The multi-participant system includes a PSTN client, at least one remote client and a first participant client. The PSTN client communicates audio data and the remote clients communicate audio-video data. The first participant client includes a voice over IP (VoIP) encoder, a VoIP decoder, a first audio mixer, and a second audio mixer. The VoIP encoder compresses audio data transported to the PSTN client. The VoIP decoder then decodes audio data from the PSTN client. The first audio mixer mixes the decoded audio data from the PSTN client with the audio-video data from the first participant into a first mixed audio-video data stream transmitted to the remote client. The second audio mixer mixes the audio-video data stream from the first participant with the audio-video data stream from each remote client into a second mixed audio transmitted to the PSTN client.




works

Apparatus and method for mounting and moving a working apparatus on a structure for the performance of works on the structure

A working apparatus has: a working equipment for doing works on a structure; an operation mechanism adapted to actively move the working equipment relative to the structure; and an adhering/traveling module coupled to the operation mechanism and adapted to adhere to the structure so as to have the weight of the working apparatus borne by the structure and travel/move on the structure for positioning. With this arrangement, the working apparatus can perform accurate positioning operations in a narrow environment and complex scanning operations by means of various pieces of the working equipment such as inspection sensors, and can secure a large working area within a short period of time and reduce the overall working hours.




works

Non-volatile memory physical networks

A method for communication between computing devices includes identifying the parameters of a data transfer between a source computing device and a target computing device and identifying communication paths between a source computing device and target computing device, in which at least one of the communications paths is a physical network. A communication path is selected for the data transfer. When a data transfer over the physical network is selected as a communication path, a nonvolatile memory (NVM) unit is removed from the source computing device and placed in a cartridge and the cartridge is programmed with transfer information. The NVM unit and cartridge are transported through the physical network to the target computing device according to the transfer information and the NVM unit is electrically connected to the target computing device.




works

Method for topology control using sectorized antennas in wireless networks

The invention concerns a method for optimizing antenna pattern assignment for a first wireless communication device forming a wireless network with at least one second wireless communication device, each of said communication device being equipped with a multi-sector antenna, an antenna pattern being a combination of said antenna sectors, said communication devices being adapted for sending a request and for receiving a response using a current antenna pattern assignment, said method comprising a step of: evaluating by said first communication device a first value;sending by said first communication device to said second communication device a broadcast request comprising said valuereceiving by said first communication device, a response to said broadcast request, said response being sent by said second communication device, said response depending on a second value evaluated by said second device;Switching or not, by said first communication device, to a new antenna sector assignment depending on said response; According to the invention the first value is evaluated by minimizing a first local function according to the received signal strength received by said first communication device having said current antenna pattern assignment and the second value is evaluated by minimizing a second local function according to the received signal strength received by said second communication device for its own current antenna pattern assignment.




works

Positioning for WLANS and other wireless networks

Techniques for positioning access points and terminals in WLANs and other wireless networks are described. For access point positioning, measurements are obtained for at least one access point in a WLAN. The measurements may be based on transmission sequences (e.g., beacon frames) transmitted periodically by each access point. The measurements may be made by multiple terminals at different locations or a single mobile terminal at different locations. The location of each access point is determined based on the measurements and known locations of the terminal(s). For terminal positioning, measurements for at least one access point in a WLAN are obtained. The location of the terminal is determined based on the measurements and known location of each access point. The measurements may be round trip time (RTT) measurements, observed time difference (OTD) measurements, time of arrival (TOA) measurements, signal strength measurements, signal quality measurements, etc.




works

Bufferless nonblocking networks on chip

Network on Chips (NoC)s with a bufferless and nonblocking architecture are described. Core processors are communicatively coupled together on a substrate with a set of routing nodes based on nonblocking process. A network component routes data packets through the routing nodes and the core processors via communication links. A bufferless cross bar switch facilitates the communication of the data packets and/or path setup packets through the communication links among source processors and destination processors. The communication links include one or more channels, in which a channel comprises a data sub-channel, an acknowledgement sub-channel and a release sub-channel.




works

Resonant clock distribution network architecture for tracking parameter variations in conventional clock distribution networks

A resonant clock distribution network architecture is proposed that enables a resonant clock network to track the impact of parameter variations on the insertion delay of a conventional clock distribution network, thus limiting clock skew between the two networks and yielding increased performance. Such a network is generally applicable to semiconductor devices with various clock frequencies, and high-performance and low-power clocking requirements such as microprocessors, ASICs, and SOCs.




works

System and apparatus for interference suppression using macrodiversity in mobile wireless networks

In a wireless network, plural downlink signals from plural base stations are transmitted to a terminal. The plural downlink signals all carry the same information to the terminal. The terminal provides feedback on the downlink channels. The feedback provides information on the taps of the channels. The amount of information fed back is constrained. Based on the feedback, transmission parameters of the downlink signals are adjusted. The process of transmitting, providing feedback, and adjusting the parameters continue so that the energy of the downlink signal is enhanced at the terminal location and suppressed elsewhere. Beam forming can be used to further suppress the energy signature at locations other than the terminal location.




works

System and method for managing multimedia communications across convergent networks

A method and device that interrogates the availability of a called party before placing a communication from the calling party to the called party. A callback may be initiated so that both communications are completed simultaneously. The routing of communication may take place through any one of a number of different networks and at another time of the day, even if the caller does not otherwise have access to those networks.




works

Removable surface-wave networks for in-situ material health monitoring

A system for measuring properties of a surface under test with surface waves includes a surface wave network including a dielectric substrate, a reactive grid of a plurality of metallic patches on a first surface of the dielectric substrate, a plurality of electronic nodes on the first surface of the dielectric substrate, and a ground plane on a second surface of the dielectric substrate permeable to RF fields of the surface waves, and a controller configured for causing a respective one of the electronic nodes to transmit at least one surface wave and configured for collecting data for signals received by at least one other of the plurality of electronic nodes.




works

Two speed direct drive drawworks

A direct drive drawworks (100) has a permanent magnet motor (40) with a first set of windings (250) and a second set of windings (252), a shaft (41) extending from the permanent magnet motor (40) such that the permanent magnet motor directly rotates the shaft (41), a drum (43) connected to the shaft (41) away from the permanent magnet motor (40) such that the rotation of the shaft (41) causes a corresponding rotation of the drum (43), and a switch cooperative with the first set of windings and the second set of windings so as to cause the sets of windings to be selectively connected in parallel or in series.




works

Method for Network Self-Healing in Cluster-Tree Structured Wireless Communication Networks

Provided is a network self-healing method in which, when a link between a parent device and a child device breaks down in a wireless communication network of a cluster-tree structure in which a main communication device (referred to an access point (AP)) manages network operation, routers that are devices capable of having their child devices, and end devices that are devices incapable of having their child devices are associated with each other in a parent-child device relationship, the link is restored. When a router becomes an orphan device, the router makes network re-association in a cluster unit while maintaining synchronized operation with its child devices, and thus time, energy and signaling burden for network self-healing is largely reduced.




works

Method for vehicle internetworks

Vehicle internetworks provide for communications among diverse electronic devices within a vehicle, and for communications among these devices and networks external to the vehicle. The vehicle internetwork comprises specific devices, software, and protocols, and provides for security for essential vehicle functions and data communications, ease of integration of new devices and services to the vehicle internetwork, and ease of addition of services linking the vehicle to external networks such as the Internet.




works

Blending Search Results on Online Social Networks

In one embodiment, a method includes receiving a search query input comprising one or more n-grams; parsing the search query input to identify keywords; generating query commands for the keywords. Each query command may specify: a particular object-type; one or more identifiers of one or more objects that match the search query input; and one or more types of relationships with respect to the objects. The method may further include searching a particular vertical that stores objects of the particular object-type having a relationship of the type of relationship with respect to one or more of the objects; generating a plurality of search-result modules corresponding to the query commands, each search-result module comprising references to objects of the particular object-type specified by the query command; and sending, to a client device, instructions for presenting an interface comprising one or more of the search-result modules.




works

Reconfigurable Antennas And Configuration Selection Methods For Ad-Hoc Networks

Reconfigurable antennas in an ad-hoc network are provided where all nodes employ MIMO/SIMO/MISO communication techniques. Three types of reconfigurable antennas: Reconfigurable Printed Dipole Array (RPDA), Reconfigurable Circular Patch Antenna (RCPA) and Two-Port Reconfigurable CRLH Leaky Wave Antennas are used. The RPDA, RCPA and the CRLH Leaky Wave antennas have a different number of configurations as well as different degrees of pattern diversity between possible configurations. To effectively use these antennas in a network, the performance of centralized and decentralized antenna configuration selection schemes are quantified for reconfiguration at one or both link ends. The sum capacity of the network is used as a metric to quantify the performance of these antennas in measured and simulated network channels.




works

DEVICES AND METHODS FOR INHIBITING OR PREVENTING COLONIZATION OF FLUID FLOW NETWORKS BY MICROORGANISMS

The invention includes novel devices and methods for inhibiting or preventing colonization of fluid flow networks by bacteria that have upstream surface motility. In certain aspects, the devices and methods of the invention prevent or minimize undesirable bacterial colonization of medical devices and/or treat or prevent bacterial infections.




works

Sign up for free online creative workshops

LIVE Art Local are set to ease Covid-19 isolation boredom with a series of free online creative workshops later this month.




works

NHS 'track and trace' app: What you need to know - and how it works

A new app to show users if they've come into contact with someone with Covid-19 is being trialled this week.




works

No Downtown Fireworks This Year, TV Event To Feature Past Displays

One of the largest fireworks displays in the Midwest will not take place this year due to coronavirus concerns.




works

Music Interview: Musical Masterworks Presents ALL Of Beethoven's String Quartets

There are celebrations of Beethoven's 250th birthday all over the world this year, but close to home, Musical Masterworks in Old Lyme is presenting every string quartet by Beethoven in two sets of three evening performances by the Ehnes Quartet beginning on Friday, March 13th. Kate Remington talks with series Artistic Director Edward Aaron about the concerts, which he'll be experiencing from the inside out as the cellist with the Ehnes Quartet.




works

The Art of Attention Episode #6: Carl Coleman Envisions a Plan and Works to Make It Happen

Carl Coleman has worked in law enforcement and protection for 30 years. He has provided security for professional sports teams, politicians, and public figures such as Les Wexner, James Caan, and Shaquille O’Neal. He is a lifelong learner who leverages his time to assess his life, come up with ideas, and develop projects. He started to learn how to play the piano as an adult and has been taking lessons for eleven years. Carl and Daron talk about situational awareness, sustaining attention over extended periods of time, and the importance of challenging yourself throughout your life. Carl recommends: Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Rac e by Margot Lee Shetterly and the 2016 movie based on it Can't Hurt Me: Master Your Mind and Defy the Odds by David Goggins Additional information related to topics we discussed: "Attentional Fitness Exercises for Musicians" by Daron Larson The Gift of Fear and Other