Powered by Deep Web Technologies
Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Kirsty Hacking | Photosynthetic Antenna Research Center  

NLE Websites -- All DOE Office Websites (Extended Search)

Kirsty Hacking Kirsty Hacking placeholder image Kirsty Hacking Graduate Student Website: University of Glasgow Graduate...

2

Hacking  

Science Journals Connector (OSTI)

With the rise in importance of the Internet in our lives came the opportunity for some to exploit this for their own gain. Hacking rose to prominence as the resources they ... gain and rewards. And yet another gr...

Mark A. Gregory; David Glance

2013-01-01T23:59:59.000Z

3

Ian Hacking. An Introduction to Probability and Inductive Logic. Cambridge University Press 2000, xvii + 302 pp.  

E-Print Network (OSTI)

Ian Hacking. An Introduction to Probability and Inductive Logic. Cambridge University Press 2000, and as an introduction to statistical inference and decision theory, it is even better. Hacking writes very clearly and engagingly throughout. A good supply of well-chosen exercises appear at the end of each chapter, and Hacking

Fitelson, Branden

4

On Hack’s law  

E-Print Network (OSTI)

Abstract. Hack’s law is reviewed, emphasizing its implications for the elongation of river basins as well as its connections with their fractal characteristics. The relation between Hack’s law and the internal structure of river basins is investigated experimentally through digital elevation models. It is found that Hack’s exponent, elongation, and some relevant fractal characters are closely related. The self-affine character of basin boundaries is shown to be connected to the power law decay of the probability of total contributing areas at any link and to Hack’s law. An explanation for Hack’s law is derived from scaling arguments. From the results we suggest that a statistical framework referring to the scaling invariance of the entire basin structure should be used in the interpretation of Hack’s law.

Riccardo Rigon; Ignacio Rodriguez-iturbe; Amos Maritan; Achille Giacometti; David G. Tarboton; Andrea Rinaldo

1996-01-01T23:59:59.000Z

5

Appliance Hacking  

Science Journals Connector (OSTI)

There are three classical forms of hacking: software, hardware, and wetware (also...social engineering). More recently, firmware hacking has become prominent because low-cost hardware ... unable to build hardware...

Steven Goodwin

2010-01-01T23:59:59.000Z

6

James J. Hack James J. Hack directs the National Center for Computational Sciences (NCCS), a  

E-Print Network (OSTI)

4/22/2014 James J. Hack James J. Hack directs the National Center for Computational Sciences (NCCS.D. in Atmospheric Dynamics from Colorado State University in 1980, Hack became a research staff member at the IBM, and deputy director of the NCAR Climate and Global Dynamics Division. Hack has previously held an Adjoint

7

Hacking Cyberspace  

Science Journals Connector (OSTI)

From the Publisher:In Hacking Cyberspace David J. Gunkel examines the metaphors applied to new technologies, and how those metaphors inform, shape, and drive the implementation of the technology in question. The author explores the metaphorical ...

David J. Gunkel

2000-10-01T23:59:59.000Z

8

Hacks and Filters  

Science Journals Connector (OSTI)

In this chapter you have learned that hacks and filters can be an important weapon ... in any CSS developer’s arsenal. However, hacks need to be used sparingly, and preferably ... resort. If you do need to use hacks

2006-01-01T23:59:59.000Z

9

Hackathon Project (HC-04): Ontology Summit 2013 Content Hack  

E-Print Network (OSTI)

developed by Northeastern University and CIM3. #12;Ontology Summit 2013 Content Hack 6 Ontology Summit 2013Hackathon Project (HC-04): Ontology Summit 2013 Content Hack Leveraging Semantics on OntologPSMW Ken Baclawski Marcela Vegetti (co-champions) #12;Ontology Summit 2013 Content Hack 2 Background

Baclawski, Kenneth B.

10

Y-12 historian assists in Lincoln Memorial University display...  

National Nuclear Security Administration (NNSA)

assists in Lincoln Memorial University display design NNSA Blog Y-12 historian Ray Smith, left, joins Lincoln Memorial University board of trustees chairman Pete DeBusk in...

11

Universal informatics : building cyberinfrastructure, interoperating the geosciences  

E-Print Network (OSTI)

York, Springer: 97-113. Hacking, I. (1983). Representing andCambridge University Press. Hacking, I. (1990). The Tamingon ‘knowledge’ itself (Hacking 1983). Capturing Ontology In

Ribes, David

2006-01-01T23:59:59.000Z

12

hacking | OpenEI Community  

Open Energy Info (EERE)

hacking Home Graham7781's picture Submitted by Graham7781(2017) Super contributor 14 April, 2014 - 09:48 National Day of Civic Hacking code community data Event hacking...

13

Hacking in court  

Science Journals Connector (OSTI)

... computer buff cleared last week by a British court of several counts of conspiracy after hacking his way into hundreds of computer systems worldwide. The newspaper saw fit to add ... of Edinburgh, who cost the Financial Times more than £20,000 in telephone bills (hack-ers require onward telephone connections from their imme-diate victims) and who spent hours ...

1993-03-25T23:59:59.000Z

14

Instant Hacking: The Basics  

Science Journals Connector (OSTI)

It’s time to start hacking.1 In this chapter, you learn how to take control of your computer by speaking a language it understands: Python. Nothing here is particularly difficult, so if you know the ...

Magnus Lie Hetland

2008-01-01T23:59:59.000Z

15

Digital Photography Hacks  

Science Journals Connector (OSTI)

Going beyond the standard fare of most digital photography books, Digital Photography Hacks shares the knowledge that professional photographers have learned through thousands of shots' worth of experience and years of experimentation. With exquisite, ...

Derrick Story

2004-05-01T23:59:59.000Z

16

Hacking Is Pervasive  

E-Print Network (OSTI)

are often viewed negatively. Many people associate these labels with somebody breaking into a computer system with malicious or criminal intent. However, hacking’s older definitions are quite different: interacting with a computer or any other technology-infused system in a playful or exploratory way, 1 or modifying an existing system (hardware, mechanical, or software) to improve performance or create an application that differs from the device’s original purpose. These definitions

Joseph A. Paradiso; John Heidemann; Thomas G. Zimmerman

17

Appliance Hacking: Converting Existing Technology  

Science Journals Connector (OSTI)

There are three classical forms of hacking: software, hardware, and wetware (also...social engineering). More recently, firmware hacking has become prominent because low-cost hardware ... unable to build hardware...

Steven Goodwin

2013-01-01T23:59:59.000Z

18

Hacking and Digital Dissidence Activities  

Science Journals Connector (OSTI)

This Chapter deals with hacking activities under several points of view. The ... themes that are outlined are the relationship between hacking and cybercrime, the Do-It-Yourself...approach, and the evolution of t...

Giovanni Ziccardi

2013-01-01T23:59:59.000Z

19

Chapter 1 - Hacking Methodology  

Science Journals Connector (OSTI)

Publisher Summary Hacking has evolved over a period of time. Many of the now-infamous hackers, such as Cap’n Crunch, started out by breaking into the phone lines of Ma Bell. What started out as interest and curiosity was in reality an early form of hacking. Computer hacking really took off with the introduction of ARPANET, personal computers, and the Internet. Advancements in technology have a direct correlation to challenges posed by the hacking community. The term “hacker” has numerous meanings, depending on what one's perceptions are and whether the name is self-ascribed. The key difference we should be aware of is the difference between a malicious hacker and an ethical hacker. A malicious hacker hacks with the intent to find a vulnerability and then exploit that vulnerability. Ethical hackers choose to disclose the vulnerabilities they find to the appropriate people. What most often motivates a hacker is the challenge to find a hole, exploitable code, or a breach in security nobody else has found. The method of attacks is as varied as the reasons for them, but the ones we are all more familiar with are DDoS, virus, and worm attacks; attacks more directly avoidable by developers include buffer overflow attacks, cookie poisoning, and cross-site scripting. Hiring a security professional is a step in the right direction toward serious defense.

2006-01-01T23:59:59.000Z

20

Criminalising hacking tools  

Science Journals Connector (OSTI)

Making the sale, possession and distribution of the tools of hacking a criminal offence has obvious attractions. But many such tools are dual use and new laws run the risk of significantly inhibiting the activities of investigators, incident responders, penetration testers and academics. Recent UK attempts at framing such a law are discussed in order to show the broader problems of policy and wording.

Peter Sommer

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Hacking: Crafters tinker with technology  

Science Journals Connector (OSTI)

... in San Diego, California, ran sessions on how to make aerial drones and on hacking— beyond gadgets to the body, brain and food. In May, just south ...

Krista Zala

2008-03-05T23:59:59.000Z

22

Chapter 1 - How To Hack  

Science Journals Connector (OSTI)

Publisher Summary The aim of this chapter is to introduce the topic of hacking and teach skills that will be useful for breaking into computers. There are some legitimate reasons for hacking. These can be security testing, consumer advocacy and civil rights, military interests, and hacking politics. This chapter introduces the techniques used to hack. Hacking basically means bypassing security measures on computer systems and networks. The word hack can also be used to describe a clever or quick program. There are certain laws that govern how security works. This chapter briefly introduces these laws and how they can be applied to hacking techniques. It also introduces various types of attacks and how serious the potential damage is, and provides examples of each type; the various methodologies that one might employ to discover security problems. Various hacking technique include—diffing—which is comparing code before and after some action has taken place, cryptography and the various means that exist for keeping information hidden or private, sniffing or monitoring of network communications for hacking purposes. This chapter introduces such techniques, security problems, tunneling mechanisms, viruses, and reporting security problems.

David R. Mirza Ahmad; Ido Dubrawsky; Hal Flynn; Joe “Kingpin” Grand; Robert Graham; Norris L. Johnson Jr.; K2; Dan “Effugas” Kaminsky; F. William Lynch; Steve W. Manzuik; Ryan Permeh; Ken Pfeil; Rain Forest Puppy; Ryan Russell

2002-01-01T23:59:59.000Z

23

Geological Aspects of the Port Hacking Estuary  

Science Journals Connector (OSTI)

The geology of Port Hacking, a small estuary on Australia’s east ... construction sand that could be dredged from Port Hacking.

Alberto D. Albani; Peter C. Rickwood…

1983-01-01T23:59:59.000Z

24

Chapter 11 - Google Hacking Showcase  

Science Journals Connector (OSTI)

Publisher Summary This chapter deals with the Google hacking showcase. As quoted by the founder of the Google hacking database, this chapter states that Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers access it at their disposal. It takes a look at some technical discoveries uncovered by Google hackers. It begins by various utilities that really have no business being online, unless of course one's goal is to aid hackers. Following this, it considers open network devices and open applications, neither of which requires any real hacking to gain access to. Through various examples, it describes what can go drastically wrong when the Google hacking threat is ignored, thus emphasizing the importance of knowledge of understanding of Google hacking, and online security measures.

Johnny Long

2008-01-01T23:59:59.000Z

25

Hacking the Sky  

E-Print Network (OSTI)

In this article I present some special astronomical scripts created for Google Earth, Google Sky and Twitter. These 'hacks' are examples of the ways in which such tools can be used either alone, in on conjunction with online services. The result of a combination of multiple, online services to form a new facility is called a mash-up. Some of what follows falls into that definition. As we move into an era of online data and tools, it is the network as a whole that becomes important. Tools emerging from this network can be capable of more than the sum of their parts.

Simpson, R J

2009-01-01T23:59:59.000Z

26

Chapter 10 - Dissecting Hacks  

Science Journals Connector (OSTI)

Publisher Summary It is essential that every Solaris administrator understand the risks posed to a Solaris system by errors in configuration as well as programming. Understanding Solaris' weaknesses as well as its strengths makes a Solaris system defending against easier hacking attempts. The chapter covers some of the more common hacks and exploits used against Solaris systems. These exploits include denial of service (DOS) attacks, either to bring the system down or simply make it unavailable for legitimate users, and buffer overflows to gain remote access or elevated privileges—usually root. Other attacks can include IP spoofing, MAC address spoofing, rootkits, connection hijacking, and logic bombs. With system and network administrators struggling to keep up with user requests and other demands, security is usually the first item to be dropped. Attackers rely on this fact. By understanding how exploits work under Solaris and how exploits affect the Solaris operating environment, the Solaris system administrator is better prepared to eliminate or mitigate the effects of these threats.

2001-01-01T23:59:59.000Z

27

Hacking’s historical epistemology: a critique of styles of reasoning  

Science Journals Connector (OSTI)

The paper begins with a detailed reconstruction of the development of Ian Hacking’s theory of scientific ‘styles of reasoning’, paying particular attention to Alistair Crombie’s influence, and suggesting that Hacking’s theory deserves to come under the title ‘historical epistemology’. Subsequently, the paper seeks to establish three critical theses. First, Hacking’s reliance on Crombie leads him to adopt an outdated historiographical position; second, Hacking is unsuccessful in his attempt to distance historical epistemology from epistemic relativism; and third, Hacking has not (yet) offered convincing criteria for individuating styles of reasoning.

Martin Kusch

2010-01-01T23:59:59.000Z

28

Hume (and Hacking) on Induction  

Science Journals Connector (OSTI)

Several years ago, Ian Hacking wrote a fascinating book called The Emergence of Probability...(1975). It deals with several important issues in the history of epistemology and breaks new ground in its treatment o...

Larry Laudan

1981-01-01T23:59:59.000Z

29

Chapter 6 - Google Hacking Showcase  

Science Journals Connector (OSTI)

Publisher Summary This chapter focuses on what can go drastically wrong when the Google hacking threat is ignored. A decent no-tech hacker can accumulate a library of significant data just by observing the world around him. But often that data is completely useless on its own. Arguably the most well known of no-tech hacking techniques among hackers in the know, Google hacking has become a standard weapon in every attacker's arsenal. A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. Google Hacking Showcase consists of screenshots of wild Google hacks the author had witnessed. Borrowing from the pool of interesting Google queries he had created, along with scores of queries from the community. The author snagged screenshots and presented them one at a time, making smarmy comments along the way. It makes sense to include the showcase in the edition of Google Hacking.

Johnny Long; Scott Pinzon; Jack Wiles; Kevin D. Mitnick

2008-01-01T23:59:59.000Z

30

History and Organization of the Port Hacking Estuary Project  

Science Journals Connector (OSTI)

The history of research into Port Hacking before the Port Hacking Estuary Project of 1973–1978 is summarized....

Robert R. Parker; David J. Rochford…

1983-01-01T23:59:59.000Z

31

SLIGHTLY MORE REALISTIC PERSONAL PROBABILITY IAN HACKING  

E-Print Network (OSTI)

SLIGHTLY MORE REALISTIC PERSONAL PROBABILITY IAN HACKING Makerere U~ziversityCollege A person's work are to this article. #12;312 I&? HACKING The third one, though it will appeal to logicians, might

Fitelson, Branden

32

HACK Patrice Les coulisses des assistances tlphoniques  

E-Print Network (OSTI)

HACK Patrice 1 ________________________________________________________________ Les coulisses des Criminologie et de Police Technique et Scientifique LXV (2012) 110" #12;HACK Patrice 2 1 ­ Données et méthode

Paris-Sud XI, Université de

33

Incorporating hacking projects in computer and information security education: an empirical study  

Science Journals Connector (OSTI)

Incorporating hacking projects in information security education is controversial. However, several studies discussed the benefits of including offensive exercises (e.g., hacking) in information security courses. In this paper, we present our experiment in incorporating hacking projects in the laboratory exercises for an undergraduate-level Computer and Information Security (CIS) course at King Abdulaziz University (KAU), Saudi Arabia. We conducted a survey to measure the effectiveness of incorporating hacking projects from the students' perspective. We also questioned the ethical aspects of these projects. The results strongly suggest that hacking projects have helped the students better understanding computer and information security principles. Furthermore, the majority of the students stated that they do not intend to misuse the learned skills, mainly for religious and ethical reasons. We also present the precautions that we took to avoid legal or ethical consequences that may be connected with these activities.

Eman Alashwali

2014-01-01T23:59:59.000Z

34

ABBREVIATED CURRICULUM VITA JAMES J. HACK  

E-Print Network (OSTI)

5/2/2014 ABBREVIATED CURRICULUM VITA JAMES J. HACK PERSONAL: Home Address: One Bethel Valley Road P) (Google Scholar: 11565 citations, h-index 43, i10-index 62: 15 March 2014) 1. Schubert, W. H., J. J. Hack. Sci., 37, 1464­1484. 2. Hack, J. J. and W. H. Schubert, 1981: Lateral Boundary Conditions for Tropical

35

Console Hacking 2010 PS3 Epic Fail  

E-Print Network (OSTI)

Console Hacking 2010 PS3 Epic Fail bushing, marcan, segher, sven 27th Chaos Communication Congress Hack Homebrew Channel Drivechips Bannerbomb Bannerbomb for 4.2 latest update broken Indiana Pwns t Wii Xbox 360 PS3 2006 2011 2010 2009 2008 2007 Mittwoch, 29. Dezember 2010 #12;Twiizer Attack Twilight Hack

Touretzky, David S.

36

Was Valerius Maxumus a Hack?  

E-Print Network (OSTI)

KU ScholarWorks | http://kuscholarworks.ku.edu Was Valerius Maximus a Hack? by Tara Welch KU ScholarWorks is a service provided by the KU Libraries’ Office of Scholarly Communication & Copyright. This is the published version of the article, made... available with the permission of the publisher. The original published version can be found at the link below. Tara Welch. (2013). Was Valerius Maximus a Hack? American Journal of Philology 134:67-82. Published version: http://www.dx.doi.org/10.1353/ajp...

Welch, Tara

2013-01-01T23:59:59.000Z

37

TD Ameritrade suffers database hack  

Science Journals Connector (OSTI)

Online Brokerage TD Ameritrade has suffered a database hack. Client information such as addresses and phone numbers were accessed from the database. Although social security numbers, account numbers and date of birth details were within reach of the hacker, the sensitive information was left untouched according to Ameritrade.

2007-01-01T23:59:59.000Z

38

Darstellen und Rekonstruieren: Eine Hermeneutische Erwiderung auf Ian Hacking  

Science Journals Connector (OSTI)

Representing and Reconstructing: A Hermeneutical Reply to Ian Hacking. Hacking published in 1983 Representing and Intervening which ... my paper I am going to take the Hacking-Putnam controversy as a starting-poi...

Reinhard Schulz

39

The Economics of Computer Hacking  

E-Print Network (OSTI)

This paper considers various classes of computer hackers, with a special emphasis on fame-driven versus profit-driven hackers. We use simple economic analysis to examine how each of these hacking “markets ” work. The resulting framework is employed to evaluate current U.S. policy aimed at reducing the threat of computer hacking and shows that this policy is largely effective. We consider policy adjustments consistent with the insights of the framework provided as a means of strengthening cyber security. * We thank Peter Boettke, Tony Carilli and Tyler Cowen for helpful comments and suggestions. The financial support of the Critical Infrastructure Project, the Earhart Foundation and the Oloffson Weaver Fellowship is also gratefully acknowledged. 1

Peter T. Leeson; Christopher J. Coyne

2006-01-01T23:59:59.000Z

40

Chapter 2 - Web Server Hacking  

Science Journals Connector (OSTI)

Abstract This chapter covers the fundamental process of hacking a web server by using several seminal network hacking tools. It is critical to understand what each of these tools is trying to accomplish and how to effectively use it yourself. The process is very structured with port scanning with Nmap, vulnerability scanning with Nesssus and Nikto, exploitation with Metasploit, and maintaining access (persistence) with Netcat. It introduces an easy-to-follow process for using each of these tools at the appropriate time with the appropriate technique to ensure high-quality results. This tool-driven approach is the same type of thinking that is used throughout the book on other targets such as the web application and web users.

Josh Pauli

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Hacking Spaces: Place as Interface  

Science Journals Connector (OSTI)

In this article, we analyze the complex rationales—both transparent to us and, at times, made visible—underneath the instructional spaces in which we work and teach. To do so, we first situate space analysis in the larger, national conversations about instructional spaces and then through the work of computers and writing scholars. We conclude with an analysis of instructional spaces at our institution. These are spaces specific to our locale, but spaces we think are quite common at most institutions of higher education. Perhaps more importantly, we situate this space analysis on issues these spaces pose—issues of restricted movement, impaired ability to collaborate, sensory disruption, limited leadership ability, and functional/material constraints. We attempt to return to the roots of hacking and to situate hacking as a particular tool for negotiating and, at times, disrupting the assumptions built under, within, and across instructional spaces.

Douglas M. Walls; Scott Schopieray; Dànielle Nicole DeVoss

2009-01-01T23:59:59.000Z

42

Zur Adäquatheit des Hacking — Stegmüllerschen Stützungsbegriffs  

Science Journals Connector (OSTI)

Unter der Voraussetzung einer Adäquatheitsbedingung für einen Bestätigungsbegriff für deterministische Hypothesen wird an einem Beispiel gezeigt, daß der Hacking-Stegmüllersche Stützungsbegriff kein Analogon zu e...

Michael F. Schuntermann

1977-01-01T23:59:59.000Z

43

Phone Hacking Scandal: Who's Getting the Message?  

Science Journals Connector (OSTI)

In the wake of the tabloid cellphone hacking scandal, have operators really closed all the loopholes that let snoopers intercept our communications? Jim Mortleman investigates

Jim Mortleman

2011-01-01T23:59:59.000Z

44

Hacking Is Wild Pleasure — Lexikalitäten und Stigmatisierungen  

Science Journals Connector (OSTI)

Es scheint, als ob die Begrifflichkeit Hacking im aktuellen Diskurs immer in den Kontext...subversiv oder Subkultur ordnen sich dazu und vermischen sich zu fast mythischen Ausprägungen.

Martin Kiel

2005-01-01T23:59:59.000Z

45

Ian Hacking: Auf der Suche nach der Realität der Naturwissenschaften  

Science Journals Connector (OSTI)

Ian Hacking, 1936 in Vancouver (Kanada) geboren, ... eines fundierten naturwissenschaftlichen Sachverstands geführt wird, macht Hacking zu einer interessanten Schlüsselfigur in der Diskussion...Representing and I...

Dipl.-Soz. Peter Hofmann

2014-01-01T23:59:59.000Z

46

Comments on ‘Linguistically Invariant Inductive Logic’ by Ian Hacking  

Science Journals Connector (OSTI)

In his highly suggestive paper, Hacking states that he will attempt to overcome ... of ‘primitive’ predicates partitioning these families. Hacking indicates agreement with Wesley Salmon that such...

Isaac Levi

1970-01-01T23:59:59.000Z

47

Hacking: Home cooking with a twist  

Science Journals Connector (OSTI)

... “I think of cooking as hacking,” says Californian computer programmer Marc Powell, who led a 'Kitchen ... ,” says Californian computer programmer Marc Powell, who led a 'Kitchen Hack Lab' demonstration at the O'Reilly Emerging Technology Conference in San Diego this week. ...

Jascha Hoffman

2008-03-05T23:59:59.000Z

48

The `summation hack' as an outlier model Thomas P. Minka  

E-Print Network (OSTI)

The `summation hack' as an outlier model Thomas P. Minka August 22, 2003 (revised) Abstract The `summation hack' is the ad-hoc replacement of a product by a sum in a probabilistic expression. This hack that the hack does make sense probabilistically, and can be best thought of as replacing an outlier

Minka,Tom

49

Dyke quality assessment by remote sensing Robert Hack  

E-Print Network (OSTI)

FC2015 RSDYK Dyke quality assessment by remote sensing Robert Hack 14-Apr-09 1FC2015-RSDYK - Hack Robert Hack #12;Pilot project: RSDYK2008 Trial to establish whether remote sensing in combination-Apr-09 2FC2015-RSDYK - Hack #12;Test sites in Reeuwijk ­ Zuid Holland (map: Routenet-Routeplan, http

Hack, Robert

50

Chapter 10 - Hacking Google Services  

Science Journals Connector (OSTI)

Publisher Summary This chapter describes ways of hacking into Google services. It reveals tricks to recover interesting information from Google's vast indexes. AJAX Search API is one of the leading Google services on the AJAX front. This service is meant as a replacement of the older SOAP search service which support was discontinued some time ago. AJAX Search API is considered to be more powerful then the SOAP service and easier to work with. The primary goal of the service is to enable external websites to host Google supplied gadgets which provide searching facilities within or outside of the hosting website and also among video clips, maps, blogs, custom search engines, etc. The Google AJAX Search API is designed to be embedded within external pages. This is described in the study. Following this, it reveals the characteristics of AJAX search, using Firefox as the primary tool of development. Furthermore, it describes the ways of hacking into the AJAX search engine. It also discusses Google calendar, Google's blog search, and subversion version management system. Finally, the study demonstrates that that the search facility is quite fuzzy and queries need to be often refined in order to get better results.

Johnny Long

2008-01-01T23:59:59.000Z

51

Chapter 1 - The Basics of Web Hacking  

Science Journals Connector (OSTI)

Abstract This chapter covers many foundational topics that the reader must be comfortable with before jumping into the hacking tools and techniques. Topics include defining a web server from a web application, the basics of the HTTP protocol including the request/response cycle and HTTP response status codes, existing penetration testing methodologies that our Hands-On approach is derived from, the most common web vulnerabilities in today’s web, and setting up a safe environment to conduct our hacking experiments! Special attention will be paid to ensuring the beginner is well positioned to succeed with later material in the book that introduces specific tools and techniques to hack web servers, web applications, and web users—we’ll even throw in a little database hacking for good measure!

Josh Pauli

2013-01-01T23:59:59.000Z

52

“What Dr Venter did on his holidays”: exploration, hacking, entrepreneurship in the narratives of the Sorcerer II expedition  

E-Print Network (OSTI)

his holidays”: exploration, hacking, entrepreneurship in thewith his ideas for “DNA hacking”, which he has presented

Delfanti, Alessandro; Castelfranchi, Yurij; Pitrelli, Nico

2009-01-01T23:59:59.000Z

53

Polar Maps at the William C. Wonders Map Collection, University of Alberta Display items -PLC June 2008  

E-Print Network (OSTI)

Polar Maps at the William C. Wonders Map Collection, University of Alberta Display items - PLC June, University of Alberta Display items - PLC June 2008 C:\\Documents and Settings items - PLC June 2008 C:\\Documents and Settings\\mclarke\\Desktop\\PolarLibraries.doc10/3/2008 3 7 Title

MacMillan, Andrew

54

A study of cytogenetical relationships between Sorghum vulgare Pers., S. virgatum (HACK.) Stapf, and S. halepense (Linn.  

E-Print Network (OSTI)

A STUPY OF CYTOGENETICAL RELATIONSHIPS BETWEEN ~SO H VIP PERS, , S. VIRGATUM (HACK. ) STAPF, AND S. HALEPENSE (LINN. ) A Thesis By Samir P. Mouftah Submitted to the Graduate School of Texas A&M University in partial fulfillment... of the requirements for the degree of MASTER OF SCIENCE August 1966 Major Subject: Genetics A STUDY OP CYTOGENETICAL RELATIONSHIPS BETWEEN SOBOHUM VULGARE PERS. , S. VIRGATUM (HACK. ) STAPF~ AND S. HALEPENSE (LINN. ) A Thesis By Samir P. Mouftah Approved...

Mouftah, Samir Pacha Mohamed Sabri

2012-06-07T23:59:59.000Z

55

The Attack Back Mechanism: An Efficient Back-Hacking Technique  

Science Journals Connector (OSTI)

In recent years there has been substantial increase in both online conducted industrial espionage and hacking, resulting in heavy losses to various organizations ... espionage. The global losses due to internet hacking

Abhishek Joshi; Rayan H. Goudar

2014-01-01T23:59:59.000Z

56

Considering the potential of criminal profiling to combat hacking  

Science Journals Connector (OSTI)

This paper outlines the results of a case study focusing upon hacking incidents in Germany. This work aims to ... of a Criminal Profile. Therefore cases of hacking incidents have been studied to find commonalitie...

Jörg Preuß; Steven M. Furnell; Maria Papadaki

2007-06-01T23:59:59.000Z

57

National Day of Civic Hacking | OpenEI Community  

Open Energy Info (EERE)

of Civic Hacking Home > Blogs > Graham7781's blog Graham7781's picture Submitted by Graham7781(2017) Super contributor 14 April, 2014 - 09:48 code community data Event hacking...

58

The bracket-hack package Christopher Roman Nerz  

E-Print Network (OSTI)

The bracket-hack package Christopher Roman Nerz June 5, 2014 Abstract This small LATEX-package1 := and =: to be \\coloneqq (..=) and \\eqqcolon (=..), respectively. brackethack@phoenixes.de 1This package is a `dirty-hack

Ould Ahmedou, Mohameden

59

Chapter 3 - Google Hacking Basics  

Science Journals Connector (OSTI)

Publisher Summary This chapter focuses on the basics of Google hacking and the functionality of the directory listings that can be used to locate specific files and directories. Google cache is a powerful tool in the hands of an advanced user. It can be used to locate old versions of pages that may expose information that normally would be unavailable to the casual user. The cache can be used to highlight terms in the cached version of a page, even if the terms were not used as part of the query to find that page. An advanced Google user will always pay careful attention to the details contained in the cached page's header, since there can be important information about the date the page was crawled, the terms that were found in the search, whether the cached page contains external images, links to the original page, and the text of the URL used to access the cached version of the page. Directory listings contain a great deal of information that is interesting from a security perspective. The directory listings can be used to determine specific information about the software installed on a server. Traversal techniques can be used to locate information that is often outside the piercing gaze of Google's crawlers. The chapter explores some specific techniques including directory traversal, incremental substitution, and extension walking.

2005-01-01T23:59:59.000Z

60

Hack's law of debris-flow basins  

Science Journals Connector (OSTI)

Hack's law was originally derived from basin statistics for varied spatial scales and regions. The exponent value of the law has been shown to vary between 0.47 and 0.70, causing uncertainty in its application. This paper focuses on the emergence of Hack's law from debris-flow basins in China. Over 5,000 debris-flow basins in different regions of China with drainage areas less than 100km2 are included in this study. Basins in the different regions are found to present similar distributions. Hack's law is derived from maximum probability and conditional distributions, suggesting that the law should describe some critical state of basin evolution. Results suggest the exponent value is approximately 0.5. Further analysis indicates that Hack's law is related to other scaling laws underlying the evolution of a basin and that the exponent is not dependent on basin shape but rather on the evolutionary stage. A case study of a well known debris-flow basin further confirms Hack's law and its implications in basin evolution.

Yong LI; Z.Q. YUE; C.F. LEE; R.E. BEIGHLEY; Xiao-Qing CHEN; Kai-Heng HU; Peng CUI

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Hacking, Mashing, Gluing: A Study of Opportunistic Design and Development  

E-Print Network (OSTI)

1 Hacking, Mashing, Gluing: A Study of Opportunistic Design and Development Björn Hartmann, Scott and digital hot glue and duct tape. It is about the hacks and prototypes of lowbrow experimentation, hacking ACM Classification Keywords D.2.11. [Software Engineering]: Software Architectures -- Patterns. K

Stanford University

62

Is ZF a hack? Comparing the complexity of some  

E-Print Network (OSTI)

Is ZF a hack? Comparing the complexity of some (formalist interpretations of) foundational systems is a hack'.1 This statement was the reason for this paper. 1 Actually his statement was not that strong. He [. . .] with Bram, and he called ZF set theory a `hack.' I more or less agree, but playing with it in the context

Wiedijk, Freek

63

Is ZF a hack? Comparing the complexity of some  

E-Print Network (OSTI)

Is ZF a hack? Comparing the complexity of some postings on the forum called Advogato, Raph had written that `ZF is a hack'.1 This statement was the reason, and he called ZF set theory a `hack.' I more or less agree, but playing with it in the context

Wiedijk, Freek

64

A Hack-Free RTS Game Toolkit Michael Buro  

E-Print Network (OSTI)

ORTS A Hack-Free RTS Game Toolkit Michael Buro RTDS-Meeting Oct/25/2002 Outline RTS Games Sophisticated distributed game AI Competition on server Hack-free client software Server-Side Game Simulation Server-Side Simulation Benefits Client hacks useless. Fair competition! All unit commands

Buro, Michael

65

Is ZF a hack? Comparing the complexity of some  

E-Print Network (OSTI)

Is ZF a hack? Comparing the complexity of some (formalist interpretations of) foundational systems that `ZF is a hack'. 1 This statement was the reason for this paper. 1 Actually his statement was talking [. . .] with Bram, and he called ZF set theory a `hack.' I more or less agree, but playing

Wiedijk, Freek

66

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, 1st edition  

Science Journals Connector (OSTI)

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which ...

Patrick Engebretson

2011-07-01T23:59:59.000Z

67

A Stored Picture Hacking Facility  

E-Print Network (OSTI)

A short description of LISP functions that have been written for use with the stored picture facility. These functions allow one to display an image of a stored scene on the 340 scope, and produce graphs and histograms of ...

Markowitz, Sidney

68

More accusations of hacking by China  

Science Journals Connector (OSTI)

The flood of hacking accusations levelled at China continues unabated. In what may be viewed as a ‘conveniently’ leaked report, Chinese hackers are claimed to have had access to secrets relating to more than 20 US defence programmes. And there are also claims that Chinese cyber-spies helped themselves to the building plans of a new Australian intelligence service headquarters.

2013-01-01T23:59:59.000Z

69

Breaking the Code of The Matrix; or, Hacking Hollywood to Liberate Film  

E-Print Network (OSTI)

Code of The Matrix; or, Hacking Hollywood to Liberate Film”I want out. ” (Art, 313) Hacking with Good Kung-fu If theat his computer and hacking. This is not just because it

Warner, William

2002-01-01T23:59:59.000Z

70

Hacking page 1 WHAT MATHEMATICS HAS DONE TO SOME AND ONLY SOME PHILOSOPHERS  

E-Print Network (OSTI)

Hacking page 1 WHAT MATHEMATICS HAS DONE TO SOME AND ONLY SOME PHILOSOPHERS Ian Hacking 1 HOW remarkable. #12;Hacking page 2 1.1 Philosophy AND mathematics When Professor Smiley arranged these Dawes

Sloman, Aaron

71

Chapter 4 - Low tech wireless hacking  

Science Journals Connector (OSTI)

Publisher Summary This chapter presents the reader with a variety of attacks and countermeasures for wireless technologies in the home and office by applying a technical approach to low tech hacking. These attacks fall in five primary categories: denial of service and availability, backdoors and cracks, rogue exploits, default vulnerabilities, and attacks on specific security tools. Wireless is a broad topic, with a variety of implementations throughout the world and in every facet of life. Wireless ploys bestowed range from disrupting municipal Wi-Fi with an antenna attack to bypassing access control systems with simple spoofing attacks. In the great world of wireless hacking, there are even a few low tech hacks that can bypass very specific higher tech security mechanisms. Several ways of bypassing media access control (MAC) filtering, port security, and even some of the newer network access control (NAC)-based controls are also discussed. It does no good to hermetically seal the windows in an organization if the doors are left wide open. But that is precisely what many organizations are doing today when they neglect to secure their wireless communications systems. Organizations habitually overlook the security of their wireless communications because they cannot see it. If they cannot see it, then they presume that no one else can either, and it is safe. However, that presumption cannot be farther from the truth. This chapter is dedicated to thwarting wireless systems of all types, armed with everything from a bobby pin to a yagi antenna. The goal of this chapter is to enable readers to “see” wireless, by explaining how it works, describing different types of devices that share common mediums and functionality, and offering clear explanations of security vulnerabilities using real-world examples. The attacks included are part of the low tech hacking subgenre of wireless assaults.

Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther

2012-01-01T23:59:59.000Z

72

Size-Specific Respiration Rate of Port Hacking Zooplankton  

Science Journals Connector (OSTI)

The respiration rates of natural Zooplankton assemblages from Port Hacking, measured 4–5 h after capture,... % MathType!MTEF!2!1!+- % feaagCar...

David J. Tranter; Gillian Kennedy

1983-01-01T23:59:59.000Z

73

An Evaluation of the Port Hacking Estuary Project from the Viewpoint of Applied Science  

Science Journals Connector (OSTI)

The Port Hacking Estuary Project, a model-guided study of ... flow in the South West Arm of Port Hacking and key ambiguities in project design and...

Wilfred R. Cuff

1983-01-01T23:59:59.000Z

74

A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation  

Science Journals Connector (OSTI)

Stack buffer overflow hacking became generally known due to the Morris’ ... Worm in 1988. Since then buffer overflow hacking has been used to attack systems and...

Choi Yang-Seo; Seo Dong-il; Sohn Sung-Won

2002-01-01T23:59:59.000Z

75

Air Date: Week of June 16, 2006 Living on Earth's Tobin Hack reports on a  

E-Print Network (OSTI)

Air Date: Week of June 16, 2006 Living on Earth's Tobin Hack reports on a culture where gestures on emerging science from Tobin Hack. [SCIENCE NOTE THEME] HACK: Time is a slippery concept, so people use pleased. That's this week's note on emerging science, I'm Tobin Hack. Guardian Unlimited article: How Time

Nuñez, Rafael

76

Chapter 7 - P2P Hacking  

Science Journals Connector (OSTI)

Publisher Summary A peer-to peer (P2P) network is composed of a number of clients (called peers) who want to share files or data. Most often, peer-to-peer networks carry audio, video or program files shared by users who join the network. P2P is one of the most common file sharing services in existence. In order to join a P2P network, you simply download a P2P client, run it and begin searching for files to download. A no-tech hacker knows that there is thousands of Internet users who have downloaded and installed P2P software and have accidentally shared sensitive files. Gaining access to these files is as easy as installing a P2P client and submitting creative searches. It's scary to think about a hacker targeting individual personal information, but understand that P2P hacking is not about targeting specific individuals. P2P hacking is about finding interesting information based on specific keywords. So if one runs P2P software, it is important to know exactly what is being shared, and then focus the attention on making sure that personal firewall, and anti-virus/spyware/adware software is current and correctly configured.

Johnny Long; Scott Pinzon; Jack Wiles; Kevin D. Mitnick

2008-01-01T23:59:59.000Z

77

2013 Civic Hacking Day Ideas | OpenEI Community  

Open Energy Info (EERE)

2013 Civic Hacking Day Ideas 2013 Civic Hacking Day Ideas Home > Groups > Utility Rate Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 April, 2013 - 13:44 Apps challenge hackathon The folks at Rally are considering options to help build a great energy app for Civic Hacking Day in Boulder, Colorado. Perhaps we'll get more folks interested? Here are a few ideas to start the discussion! Please post comments to this thread to follow up. Electric cost app Pictured above; dimensions are iPhone dimensions for a future iOS app, though we'd start with a web version All icons have been created This would use dataset http://en.openei.org/datasets/node/903; this data took ~2.5 months to build out from SAM (sam.nrel.gov) modeling Potential pre-hack day work would create an API so this information

78

A Study on Wi-Fi Hacking Attack Using Web  

Science Journals Connector (OSTI)

Using Smart Phone, Tablet PC and laptop that SNS, or they want to surf the web to obtain information by connecting to the Internet. But if you use the hacked site Malicious code is downloaded incident occurs. The...

Jin-Young Song; Dea-Woo Park

2011-01-01T23:59:59.000Z

79

A Carbon Budget for South West Arm, Port Hacking  

Science Journals Connector (OSTI)

A multidisciplinary study of the structure and dynamics of a small (~78 ha) Australian marine embay ment (South West Arm of Port Hacking, New South Wales) was conducted during...

Wilfred R. Cuff; Richard E. Sinclair…

1983-01-01T23:59:59.000Z

80

Low Tech Hacking: Street Smarts for Security Professionals  

Science Journals Connector (OSTI)

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are ...

Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther

2011-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Agrobacterium-mediated transformation of centipedegrass (Eremochloa ophiuroides [Munro] Hack.)  

Science Journals Connector (OSTI)

Centipedegrass (Eremochloa ophiuroides [Munro] Hack.) is an important warm-season turfgrass...Agrobacterium strain EHA105 harboring pCAMBIA1301, followed by selection of hygromycin B (hyg B)-resistant callus and ...

Mingxi Liu; Shaoyun Lu; Lin Liu; Jiali Tan…

2012-06-01T23:59:59.000Z

82

On the Hardness of Approximating the Min-Hack Problem  

Science Journals Connector (OSTI)

We show several hardness results for the Minimum Hacking problem, which roughly can be described as the problem of finding the best way to compromise a target node given a few initial compromised nodes in a netwo...

Ramkumar Chinchani; Duc Ha; Anusha Iyer…

2005-05-01T23:59:59.000Z

83

B-chromosomes in Iseilema laxum Hack. I. Cytology  

Science Journals Connector (OSTI)

Upto 6 B-chromosomes occurred in natural populations of the fodder grass Iseilema laxum Hack. They were smaller than the A-chromosomes...Iseilema laxum appear to have a common origin.

U. R. Murty

1972-01-01T23:59:59.000Z

84

ORTS: A Hack-Free RTS Game Environment  

Science Journals Connector (OSTI)

This paper presents a novel approach to Real-Time-Strategy (RTS) gaming which allows human players as well as machines to compete in a hack-free environment. The main idea is to ... sent to the respective clients...

Michael Buro

2003-01-01T23:59:59.000Z

85

B-chromosomes in Iseilema laxum Hack. II. Genetics  

Science Journals Connector (OSTI)

Transmission of B-chromosomes to S1 progenies and progenies of crosses involving parents with different numbers of B-chromosomes in Iseilema laxum Hack. is reported. The mean number of...1 progenies. In the proge...

U. R. Murty; D. Satyavathi

1972-01-01T23:59:59.000Z

86

Photo: D. Stevenson and C. Conway/Beckman Institute/University of Illinois An inorganic LED display printed on a flexible substrate bends without breaking  

E-Print Network (OSTI)

Photo: D. Stevenson and C. Conway/Beckman Institute/University of Illinois An inorganic LED display LED Displays Printed compound semiconductors could challenge OLEDs, say researchers BY WILLIE JONES cameras. Conventional inorganic LEDs, which are poised to put incandescent and fluorescent lightbulbs out

Rogers, John A.

87

Entangled Agencies: New Individual Practices of Human-Technology Hybridism Through Body Hacking  

Science Journals Connector (OSTI)

This essay develops its idiosyncrasy by concentrating primarily on the trend of body hacking. The practitioners, self-defined as body ... replacements, the technical innovations of the body hacking trend are begi...

Bárbara Nascimento Duarte

2014-12-01T23:59:59.000Z

88

Hack-proof synchronization protocol for multi-player online games  

Science Journals Connector (OSTI)

Synchronization protocols based on “dead-reckoning” are vulnerable to a popular type of cheat called speed-hack. A speed-hack helps a cheater to gain unfair advantages ... dead-reckoning protocol that is invulner...

Yeung Siu Fung; John C. S. Lui

2009-01-01T23:59:59.000Z

89

CHAPTER 3 - Hacking as a Career  

Science Journals Connector (OSTI)

Publisher Summary This chapter focuses on hacking as a career and discusses how one can develop a career as a penetration tester. Penetration testing expertise can be narrowed down into three different fields: networks, systems, and applications. Penetration testers with a network architecture background can identify deficiencies in a large variety of network designs, penetration testers who specialize in system administration often expand the knowledge of an operating system by learning about things such as secure communication protocols, file sharing, directory services, system hardening, backup processes, and more. Penetration testers who specialize in application and databases typically understand what it takes to create applications and how they interact with databases. The chapter offers information on some of the certifications of information systems security (ISS), such as the (ISC)2, the (ISC)2 CBK, Systems Security Certified Practitioner (SSCP), Certification and Accreditation Professional (CAP), Certified Secure Software Lifecycle Professional (CSSLP), and CISSP–ISSEP. Certifications are helpful in employment and government related exams and contracts. There are a variety of information security organizations that disseminate news about the happenings within the industry, including local and national associations. Many security conferences provide training opportunities, while some mailing lists provide the latest in news and vulnerabilities related to information security.

Thomas Wilhelm

2010-01-01T23:59:59.000Z

90

Namur, Belgium -weathering deteriorating slope stability future -Robert Hack 1 WEATHERING DETERIORATING  

E-Print Network (OSTI)

Namur, Belgium - weathering deteriorating slope stability future - Robert Hack 1 WEATHERING DETERIORATING AND SLOPE STABILITY CLASSIFICATION FOR THE FUTURE Namur, Belgium, 12 June 2008 Robert Hack Geo #12;Namur, Belgium - weathering deteriorating slope stability future - Robert Hack 2 Jan van Goyen

Hack, Robert

91

3 July 2003 HIRES3D -ITC Research Seminar -Robert Hack 1 HIGH RESOLUTION REMOTE SENSING  

E-Print Network (OSTI)

3 July 2003 HIRES3D - ITC Research Seminar - Robert Hack 1 HIRES3D HIGH RESOLUTION REMOTE SENSING FOR 3D GROUND MODELING AND CLASSIFICATION ITC Research Seminar, 3 July 2003 Robert Hack International Seminar - Robert Hack 2 HIRES3D HIGH RESOLUTION REMOTE SENSING FOR 3D GROUND MODELING AND CLASSIFICATION

Hack, Robert

92

08 Oct 1999 Visualisatie Heinenoord Tunnel -Hack & Ozmutlu -LWI dag 1 VISUALISATIE  

E-Print Network (OSTI)

08 Oct 1999 Visualisatie Heinenoord Tunnel - Hack & Ozmutlu - LWI dag 1 VISUALISATIE HEINENOORD applications in the Netherlands #12;08 Oct 1999 Visualisatie Heinenoord Tunnel - Hack & Ozmutlu - LWI dag 2 Visualisatie Heinenoord Tunnel - Hack & Ozmutlu - LWI dag 3 Heinenoord tunnel · Eerste geboorde tunnel

Hack, Robert

93

Around Montgomery's trick: A taste of a bit hack Marc Moreno Maza (after Wei Pan's notes)  

E-Print Network (OSTI)

Around Montgomery's trick: A taste of a bit hack Marc Moreno Maza (after Wei Pan's notes of a bit hack #12;Introduction Let a, b, p be number-like objects (integer numbers, univariate polynomials over a field) and such that p {-1, 0, 1}. Around Montgomery's trick: A taste of a bit hack #12

Moreno Maza, Marc

94

HACK: A Health-based Access Control Mechanism for Dynamic Enterprise Environments  

E-Print Network (OSTI)

HACK: A Health-based Access Control Mechanism for Dynamic Enterprise Environments Chenjia Wang - the software itself. In this paper, we propose HACK, a health-based, adaptive access control scheme be determined when the user attempts to create a new process executing that software. HACK checks its own

Shi, Weisong

95

When Governments Hack Opponents: A Look at Actors and Technology William R. Marczak  

E-Print Network (OSTI)

When Governments Hack Opponents: A Look at Actors and Technology William R. Marczak UC Berkeley Gamma's FinSpy and Hacking Team's Remote Control Sys- tem (RCS). We describe their use in Bahrain of these campaigns via strong circumstantial evidence linking hacking to arrests, interrogations, and imprisonment. 1

Paxson, Vern

96

Seoul, South Korea -classification deteriorating slope stability -Robert Hack 1 SLOPE STABILITY CLASSIFICATION  

E-Print Network (OSTI)

Seoul, South Korea - classification deteriorating slope stability - Robert Hack 1 SLOPE STABILITY CLASSIFICATION OF TIME DEPENDENT DETERIORATING SLOPES Seoul, Korea, 29 February 2008 Robert Hack Engineering) The Netherlands #12;Seoul, South Korea - classification deteriorating slope stability - Robert Hack 2 Jan van

Hack, Robert

97

December 26, 2012 Important Notice: Gmail, iCloud and Twitter Account Hacking!  

E-Print Network (OSTI)

December 26, 2012 Important Notice: Gmail, iCloud and Twitter Account Hacking! Kiyoshi Otani Chief of receiving spoofed e-mails from hacked Gmail accounts are on the rise at the Institute. These attacks for hacking are becoming more and more sophisticated and do more than simply breaking into an email account

Furui, Sadaoki

98

Mark Rasch, SecurityFocus, 2004.10.25: "The latest tool in competition: hacking  

E-Print Network (OSTI)

Mark Rasch, SecurityFocus, 2004.10.25: "The latest tool in competition: hacking "Your competitor; or (C) hack into the competitor's website, steal the code, and for good measure hire their critical and welcome to the new world of competitive hacking. #12;"On October 15, the United States Court of Appeals

Bernstein, Daniel

99

A Note on Hack's Conjecture, Parikh Images of Matrix Languages and Multiset Grammars  

E-Print Network (OSTI)

A Note on Hack's Conjecture, Parikh Images of Matrix Languages and Multiset Grammars Georg Zetzsche It is shown that Hack's Conjecture on Petri nets implies that for every language generated by a matrix grammar by arbitrary and monotone multiset grammars coincide. Zusammenfassung Es wird gezeigt, dass die Hack

Hamburg.Universit�¤t

100

picoCTF: Teaching 10,000 High School Students to Hack Preliminary Report  

E-Print Network (OSTI)

picoCTF: Teaching 10,000 High School Students to Hack Preliminary Report Peter Chapman peter on offensive hacking skills presented in the form of a web-based video game to better excite students about of our knowledge, the largest hacking competition ever held. The competition introduced thousands of high

Brumley, David

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh  

E-Print Network (OSTI)

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford. This makes it possible to hack proprietary closed-binary services, or open-source servers manually compiled to find vulnerabilities. Hacking closed-source software is also possible for more motivated attackers

Mazières, David

102

Name: dhr. prof. dr. C.E. Hack Immunology/Inflammation  

E-Print Network (OSTI)

Name: dhr. prof. dr. C.E. Hack Profile Teaching commitment Immunology/Inflammation Faculty Medicine Department Department Rheumatology/Dermatology Contact details Telephone 088 755 7388 E-mail address c.e.hack, Farkas H, Varga L, Obtulowicz K, Bilo B, Porebski G, Hack CE, Verdonk R, Nuijens J, Levi M. Transfusion

Utrecht, Universiteit

103

Assignment 9: Hacking a Game Page 1 of 1 600.112: Introduction to Programming  

E-Print Network (OSTI)

Assignment 9: Hacking a Game Page 1 of 1 600.112: Introduction to Programming for Scientists and Engineers Assignment 9: Hacking a Game Peter H. Fr¨ohlich phf@cs.jhu.edu Joanne Selinski joanne with something a bit more relaxed: you'll hack a video game. The handout itself is also not going to be very

Fröhlich, Peter

104

Making Votes Count: How to Hack an Election January 31, 2004  

E-Print Network (OSTI)

Making Votes Count: How to Hack an Election January 31, 2004 MAKING VOTES COUNT How to Hack&pagewanted=print&position= (1 of 2)12/22/2004 6:49:30 AM #12;Making Votes Count: How to Hack an Election

Rivest, Ronald L.

105

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions  

E-Print Network (OSTI)

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions Dung V hack tools. However, beside U3 technology, attackers also have another more flexible alternative, portable application or application virtualization, which allows a wide range of hack tools to be compiled

Halgamuge, Malka N.

106

On Hack's law Riccardo Rigon,1,2 Ignacio Rodriguez-Iturbe,1 Amos Maritan,3  

E-Print Network (OSTI)

On Hack's law Riccardo Rigon,1,2 Ignacio Rodriguez-Iturbe,1 Amos Maritan,3 Achille Giacometti,4 David G. Tarboton,5 and Andrea Rinaldo6 Abstract. Hack's law is reviewed, emphasizing its implications between Hack's law and the internal structure of river basins is investigated experimentally through

Tarboton, David

107

TCP HACK: a mechanism to improve performance over lossy links  

Science Journals Connector (OSTI)

In recent years, wireless networks have become increasingly common and an increasing number of devices are communicating with each other over lossy links. Unfortunately, TCP performs poorly over lossy links as it is unable to differentiate the loss due to packet corruption from that due to congestion. In this paper, we present an extension to TCP which enables TCP to distinguish packet corruption from congestion in lossy environments resulting in improved performance. We refer to this extension as the HeAder ChecKsum option (HACK). We implemented our algorithm in the Linux kernel and performed various tests to determine its effectiveness. Our results have shown that HACK performs substantially better than both selective acknowledgement (SACK) and NewReno in cases where burst corruptions are frequent. We also found that HACK can co-exist very nicely with SACK and performs even better with SACK enabled.

R.K. Balan; B.P. Lee; K.R.R. Kumar; L. Jacob; W.K.G. Seah; A.L. Ananda

2002-01-01T23:59:59.000Z

108

A Summary of Hacking Organizations, Conferences, Publications, and E... http://www.cse.wustl.edu/~jain/cse571-07/ftp/hacking_orgs/ 1 of 16 12/19/2007 5:12 PM  

E-Print Network (OSTI)

A Summary of Hacking Organizations, Conferences, Publications, and E... http://www.cse.wustl.edu/~jain/cse571-07/ftp/hacking_orgs/ 1 of 16 12/19/2007 5:12 PM A Summary of Hacking Organizations, Conferences notable groups and individuals of each 'category' of hackers, the effects of hacking on society, as well

Jain, Raj

109

Wireless Hacking Tools http://www.cse.wustl.edu/~jain/cse571-07/ftp/wireless_hacking/ 1 of 12 12/19/2007 5:16 PM  

E-Print Network (OSTI)

Wireless Hacking Tools http://www.cse.wustl.edu/~jain/cse571-07/ftp/wireless_hacking/ 1 of 12 12/19/2007 5:16 PM Wireless Hacking Tools Author: Michael Roche mroche@wustl.edu Abstract: This paper or application. #12;Wireless Hacking Tools http://www.cse.wustl.edu/~jain/cse571-07/ftp/wireless_hacking/ 2 of 12

Jain, Raj

110

Data Base for the Port Hacking Estuary Project: Parameters, Monitoring Procedure, and Management System  

Science Journals Connector (OSTI)

The data base which resulted from two of the major monitoring activities of the Port Hacking Estuary Project is described and discussed: monitoring...

David J. Vaudrey; F. Brian Griffiths…

1983-01-01T23:59:59.000Z

111

Terrorism or hacking? A law interpretation on the concept of cyber terrorism.  

E-Print Network (OSTI)

?? Cyber-crime, terrorism and hacking is a topic discussed widely and many independent groups as for example Wikileaks and Anonymous are often taken into consideration… (more)

Synnestvedt Jensen, Louise

2013-01-01T23:59:59.000Z

112

A practical local hacking scheme on device-independent Bell test based quantum randomness expansion  

Science Journals Connector (OSTI)

Violation of Bell inequality cannot guarantee non-locality, thus an applicable hacking scheme on device-independent Bell test based quantum randomness expansion is given, together with...

Li, Junhui; Yu, Quanfu; Liu, Yu; Guo, Hong

113

Metal accumulation in the greentail prawn, Metapenaeus bennettae, in Sydney and Port Hacking estuaries, Australia  

Science Journals Connector (OSTI)

Metal concentrations of the inshore greentail prawn, Metapenaeus bennettae..., and surface sediments from locations within Sydney estuary and Port Hacking (Australia) were assessed for bioaccumulation and ... est...

K. L. M. Lewtas; G. F. Birch…

2014-01-01T23:59:59.000Z

114

Hierarchical Diagnosis J. T. Kiehl, M. W. Moncrieff, J. J. Hack...  

NLE Websites -- All DOE Office Websites (Extended Search)

T. Kiehl, M. W. Moncrieff, J. J. Hack, and W. Grabowski National Center for Atmospheric Research Boulder, CO 80307-3000 V. Ramaswamy Geophysical Fluid Dynamics Laboratory...

115

30 November 2007 Where do we come from... -Robert Hack -Delft 1 Where do we come from and  

E-Print Network (OSTI)

30 November 2007 Where do we come from... - Robert Hack - Delft 1 Where do we come from and where are we going in 15 minutes Robert Hack ITC 30 November 2007 #12;30 November 2007 Where do we come from... - Robert Hack - Delft 2 Long, long ago when I started in Leiden... Average study time geology: 9 ½ years

Hack, Robert

116

Control-Alt-Hack: The Design and Evaluation of a Card Game for Computer Security Awareness and Education  

E-Print Network (OSTI)

Control-Alt-Hack: The Design and Evaluation of a Card Game for Computer Security Awareness from 22 of these educators about their experiences using Control-Alt-Hack with over 450 students to thinking about security and that facilitates ad hoc, social interactions led us to design Control-Alt-Hack

Kohno, Tadayoshi

117

Composition Patterns of Hacking Sergey Bratus, Julian Bangert, Alexandar Gabrovsky, Anna Shubina, Daniel Bilar, and Michael E. Locasto  

E-Print Network (OSTI)

Composition Patterns of Hacking Sergey Bratus, Julian Bangert, Alexandar Gabrovsky, Anna Shubina study hacking, they mostly con- centrate on two classes of attack-related artifacts: "malicious code need to make an important terminological point. The word hacking is used to refer to all kinds

Locasto, Michael E.

118

Almeida-Rodriguez and Hacke, American Journal of Botany 99(#): ###-###. 2012. Data Supplement S3 Page 1  

E-Print Network (OSTI)

Almeida-Rodriguez and Hacke, American Journal of Botany 99(#): ###-###. 2012. ­ Data Supplement S3-Rodriguez and Hacke--American Journal of Botany 99(#): ###-###. 2012. ­ Data Supplement S4 ­ Page 1 Appendix S4/enrichment in labeling; + weak signal; - no signal. #12;Almeida-Rodriguez and Hacke, American Journal of Botany 99

Hacke, Uwe

119

21 January 2005: 13:00 Inhomogeneity as main source... -Robert Hack 1 Inhomogeneity as main source of  

E-Print Network (OSTI)

21 January 2005: 13:00 Inhomogeneity as main source... - Robert Hack 1 Inhomogeneity as main source of problems in engineering geology Robert Hack 21 January 2005 #12;21 January 2005: 13:00 Inhomogeneity as main source... - Robert Hack 2 What is inhomogeneity (or non- homogeneity) : Inhomogeneity

Hack, Robert

120

350 PIERS Proceedings, Cambridge, USA, July 58, 2010 Optimizing Windows Security Features to Block Malware and Hack  

E-Print Network (OSTI)

Malware and Hack Tools on USB Storage Devices Dung Vu Pham1 , Malka N. Halgamuge2 , Ali Syed1 , and Priyan malicious codes together with USB based hack tools such as Pod Slurp and USB Switchblade have accounted) storage devices have been one of the most common means of malware and hack tools attacks on computers

Halgamuge, Malka N.

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

1998 3D GIS vs Advanced visualisation -Hack & Ozmutlu -LWI Seminar 1 3D-GIS vs Advanced Visualization  

E-Print Network (OSTI)

1998 3D GIS vs Advanced visualisation - Hack & Ozmutlu - LWI Seminar 1 3D-GIS vs Advanced Visualization Hack H.R.G.K. and Ozmutlu S. LWI seminar 1998 Delft, The Netherlands #12;1998 3D GIS vs Advanced visualisation - Hack & Ozmutlu - LWI Seminar 2 3D-GIS vs Advanced Visualization Visualization Strategy At source

Hack, Robert

122

Chapter 8 - Hack Your Atari 5200 and 8-Bit Computer  

Science Journals Connector (OSTI)

Publisher Summary In 1982, Atari revealed the Atari 5200 SuperSystem to the gaming public. Based on the Atari 400 8-bit computer, the 5200 was Atari's answer to the competition it was receiving in the videogame market. Knowing that its 8-bit line of computers already had an excellent game library, Atari decided instead to transform its 8-bit computer into a powerful game system. In most respects, the 5200 was very similar to the Atari 400 computer, but it featured a sleek, wedge-shaped case with only a single power button on the unit itself. The most noticeable change from the Atari 8-bit line was the inclusion of two analog joysticks. These new controllers allowed for a full 360degree movement, but unfortunately they were not self-centering and proved awkward to use with many games. The controllers were highly prone to failure and became the primary bane of the system. In addition to the analog control stick, the 5200 controllers also featured two independent fire buttons, a numeric keypad, and Start, Reset, and Pause buttons built on the controller. Atari 8-bit computers and Atari 5200 SuperSystem have been around for over 20 years now, and in that time many hacks have been developed to enhance these systems. A large “homebrew” community is developing new software for the systems, keeping the spirit alive for Atari fans. This chapter describes how to perform the Atari 8-bit and 5200 hacks. Some of these hacks include adding a Blue Power light-emitting diode (LED) to the Atari 5200, creating an Atari 5200 Paddle, and building Atari 8-Bit S-Video and Composite Cables.

Joe Grand; Ryan Russell; Kevin D. Mitnick; Andrew “bunnie” Huang; Lee Barken; Marcus R. Brown; Job de Haas; Deborah Kaplan; Bobby Kinstle; Tom Owad; Albert Yarusso

2004-01-01T23:59:59.000Z

123

Optimised quantum hacking of superconducting nanowire single-photon detectors  

E-Print Network (OSTI)

We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

Michael G. Tanner; Vadim Makarov; Robert H. Hadfield

2013-05-26T23:59:59.000Z

124

The Climate Sensitivity of the Community Climate System Model Version 3 (CCSM3) JEFFREY T. KIEHL, CHRISTINE A. SHIELDS, JAMES J. HACK, AND WILLIAM D. COLLINS  

E-Print Network (OSTI)

, CHRISTINE A. SHIELDS, JAMES J. HACK, AND WILLIAM D. COLLINS National Center for Atmospheric Research

Bretherton, Chris

125

Ethnological Displays  

Science Journals Connector (OSTI)

...236). tionary and ethnological displays. Maior But tme midway concessionanes were there John Wesley Powell collected for the...that from Europe and they were international. featured a sham battle every dav between The book gives verv little attention to the...

BURTON BENEDICT

1986-01-10T23:59:59.000Z

126

Primary Production of Benthic Micro-organisms in South West Arm, Port Hacking, New South Wales  

Science Journals Connector (OSTI)

Net photosynthetic incorporation of dissolved inorganic carbon into the micro-organisms of shallow benthic areas of South West Arm, Port Hacking, New South Wales was measured in situ and in the laboratory. Method...

Max S. Giles

1983-01-01T23:59:59.000Z

127

Zooplankton Community Structure and Succession in South West Arm, Port Hacking  

Science Journals Connector (OSTI)

A one-year study of the Zooplankton and its community structure in South West Arm, Port Hacking was carried out between June 1975 and...Oithona species group (Copepoda, Cyclopodia). These differences in community...

F. Brian Griffiths

1983-01-01T23:59:59.000Z

128

Fallstudie I: «Hacking» in einem Local Area Network-Ein quantitativer Ansatz  

Science Journals Connector (OSTI)

Im folgenden Fallbeispiel wird das Risiko eines erstmaligen, erfolgreichen Einbruchs durch «Hacking»1 in ein Local Area Network einer Unternehmung aus dem Dienstleistungsbereich betrachtet, die mit nicht-sensitiv...

Christine Strauß

1991-01-01T23:59:59.000Z

129

An Evaluation of the Dynamic Information for South West Arm, Port Hacking  

Science Journals Connector (OSTI)

A multidisciplinary study of the structure and dynamics of a small (~78 ha) Australian marine embay ment (South West Arm of Port Hacking, New South Wales) was conducted during...

Wilfred R. Cuff

1983-01-01T23:59:59.000Z

130

National Day of Civic Hacking at the White House | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

National Day of Civic Hacking at the White House National Day of Civic Hacking at the White House Developer Data Web Services Source Code Challenges Semantic Web Blogs Let's Talk Developers You are here Data.gov » Communities » Developers » Blogs National Day of Civic Hacking at the White House Submitted by Anonymous on Mon, 04/15/2013 - 11:29am Log in to vote 0 On the first weekend in June, civic activists, technology experts, and entrepreneurs around the country will gather together for the National Day of Civic Hacking. By combining their expertise with new technologies and publicly released data, participants hope to build tools that help others in their own neighborhoods and across the United States. It's a great cause and we're excited to take part. On June 1, we'll welcome developers and tech experts to the White House for our second hackathon.

131

Cytogenetic studies in Sorghum vulgare Pers. and Sorghum virgatum (Hack.) Stapf hybrids  

E-Print Network (OSTI)

CYTOGENETIC STUDIES IN SORGHUM VULGARE PERS? AND SORGHUM VIRGATUM (HACK.) STAPF HYBRIDS A Dissertation By Abdul Ghafoor Bhatti Submitted to the Graduate School of the Agricultural and Mechanical Collage of Texas in partial fulfillment... of the requirements for the degree of DOCTOR OF PHILOSOPHY August, 1959 Major Subjects Plant Breeding CYTOGENETIC STUDIES IN SORGHUM VULGARE PERS. AND SORGHUM VIRGATUM (HACK.) STAPF HYBRIDS A Dissertation By Abdul Ghafoor Bhatti Approved as to style...

Bhatti, Abdul Ghafoor

2013-10-04T23:59:59.000Z

132

A nexus of Cyber-Geography and Cyber-Psychology: Topos/“Notopia” and identity in hacking  

Science Journals Connector (OSTI)

This paper explores the Cyber-Psychological and Cyber-Geographic aspects of hacking and hacktivism. An examination of the literature related to hackers and hacking reveals a complex nexus of spatial (including cyber-spatial such as “Notopia”) and psychological aspects of hacking, from which emerges a central question of how humans perceive and manipulate their cyber-identities. Concealing (real and cyber) identities is typical in hacking. With our progressive acculturation with identity-less and place-less modes of existence, our cyber-identities through time may be studied from within John Locke’s criterion of “memory” and the spatial-geographical criterion of identity.

Fivos Papadimitriou

2009-01-01T23:59:59.000Z

133

From: Amorphous & Microcrystalline Silicon Technology, edited by S. Wagner, M. Hack, E. A. Schiff, R. Schropp, and I. Shimizu (Materials Research Society Symposium Proceedings, Vol.  

E-Print Network (OSTI)

From: Amorphous & Microcrystalline Silicon Technology, edited by S. Wagner, M. Hack, E. A. Schiff & Microcrystalline Silicon Technology, edited by S. Wagner, M. Hack, E. A. Schiff, R. Schropp, and I. Shimizu

Schiff, Eric A.

134

Applications of Ethical Hacking Techniques to Software Professionals with respect to Behavioral Science  

E-Print Network (OSTI)

The Information for the organization is an asset which has to be protected from the unauthorized persons and misuse for some other illegal issues, the hacking has been very common on the internet and it has affected the organization in terms of money, resources loss and image loss. The Hacking can also be ethical which can be made for positive use in the net environment. The knowledge of the programmer can be utilized for the security of the software’s in the Internet environment. The software professionals like progrmmmers, software analyst, testers are going to benefit by this technique of ethical hacking. The authors have discussed the mind set of the ethical hackers and use of their technical knowledge for the solution of security problems in the network environment. Security of password, login names, financial transactions are the areas of concern for the organizations those dealing online. The activities of the Internet are widely affected by countries policies and rules. The paper highlights on the ethical hacking concepts and application of theses techniques to software professional in order to information security issues. The Hackers though have negative trait of mind the ethical hackers are also human beings which have positive trait of mind which help the professional in Computer field to maintain the security in systems and networks. The hacking is habit of the programmers in the society

Prof A. T. Gaikwad; Dr. R. V. Kulkarni

135

The garden of forking paths: Why multiple comparisons can be a problem, even when there is no "fishing expedition" or "p-hacking" and the research  

E-Print Network (OSTI)

there is no "fishing expedition" or "p-hacking" and the research hypothesis was posited ahead of time Andrew Gelman called "p-hacking" or "researcher degrees of freedom" (Simmons, Nel- son, and Simonsohn, 2011 the spread of the terms "fishing" and "p-hacking" (and even "researcher degrees of freedom") for two reasons

Gelman, Andrew

136

2010 CyLab. All rights reserved. www.cylab.cmu.edu Hacking Comes of Age: Climategate, Cyber-Espionage & iWar  

E-Print Network (OSTI)

© 2010 CyLab. All rights reserved. www.cylab.cmu.edu Hacking Comes of Age: Climategate, Cyber & Economic Struggle in Cyberspace ­ No Longer "What If ..." · "Climategate" ­ Climate emails hacked by spies GhostNet penetrates 103 countries Telegraph, 3-29-09 · More Congressional Computers Hacked from China

Sadeh, Norman M.

137

254 / QELS 2000 / FRlDAY MORNlNG Ily briiiging i n a third laser licuii, a hack-  

E-Print Network (OSTI)

254 / QELS 2000 / FRlDAY MORNlNG Ily briiiging i n a third laser licuii, a hack- lighting lases iiiIor1ii:itioii. The hack- lighting laser acts as a qiiaiitriin interlesencc light swiIcIi. 'The

Sipe,J. E.

138

TCP HACK: TCP Header Checksum Option to Improve Performance over Lossy Links  

E-Print Network (OSTI)

In recent years, wireless networks have become increasingly common and an increasing number of devices are communicating with each other over lossy links. Unfortunately, TCP performs poorly over lossy links as it is unable to differentiate the loss due to packet corruption from that due to congestion. In this paper, we present an extension to TCP which enables TCP to distinguish packet corruption from congestion in lossy environments resulting in improved performance. We refer to this extension as the HeAder ChecKsum option (HACK). We implemented our algorithm in the Linux kernel and performed various tests to determine its effectiveness. Our results have shown that HACK performs substantially better than both SACK and NewReno in cases where burst corruptions are frequent. We also found that HACK can co-exist very nicely with SACK and performs even better with SACK enabled. Keywords -- Protocol Design, Protocol Analysis, Wireless Networks. I.

Rajesh Krishna Balan; Lee Boon Peng; K. Renjish Kumar; Lillykutty Jacob; Winston K. G. Seah; R. K. Balan; B. P. Lee; K. R. R. Kumar; L. Jacob; W. K. G. Seah; A. L. Ananda

2001-01-01T23:59:59.000Z

139

No, Not That Kind of Hacking. Supporting Energy Data Innovation at  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

No, Not That Kind of Hacking. Supporting Energy Data Innovation at No, Not That Kind of Hacking. Supporting Energy Data Innovation at Hackathons No, Not That Kind of Hacking. Supporting Energy Data Innovation at Hackathons October 12, 2012 - 5:18pm Addthis Developers at Tech Crunch Disrupt SF 2012. Developers at Tech Crunch Disrupt SF 2012. Ian Kalin Director of the Energy Data Initiative Earlier this year, the administration launched the Energy Data Initiative to improve access to energy data and encourage innovation while rigorously protecting privacy. The resulting datasets and technologies are already being used within companies to create new products and services that help Americans -- and also create new jobs. But these resources are not exclusively valuable to established companies. They are also being used by individual software engineers and student developers at code-a-thons.

140

To be published in IEEE ELECTRON DEVICE LETTERS, January 2008 Reliability of Active-Matrix Organic  

E-Print Network (OSTI)

Hack 5 6 Abstract--We have fabricated active-matrix organic light emit-7 ting diode (AMOLED) test. Hack are with Universal Display Corporation, Ewing, NJ 08618 USA. Color versions of one or more

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Chapter 7 - Hack Your Atari 2600 and 7800  

Science Journals Connector (OSTI)

Publisher Summary This chapter discusses how to hack Atari 2600 and 7800. Atari introduced the Video Computer System (VCS) in 1977. The VCS, later renamed the 2600, was part of the first generation of videogame systems that weren't hardwired to play a certain set of games. Instead, they could be reprogrammed time and time again by the user, who purchased new game cartridges. The Atari 2600 is one of the most successful game consoles of all time with a place in history as the machine that started the home videogame craze. Under pressure from competitors that were eroding Atari's market share by producing competing consoles as well as clones of the 2600, Atari hastily released the Atari 5200 SuperSystem in 1982. The Atari 5200 was a repackaged Atari 400 computer and did not represent development of a new game system from scratch. That would not happen until the introduction of the Atari 7800 five years later. The Atari 7800 is more closely related to the 2600 than it is to the 5200. The Atari 7800 is backward compatible with 2600 games—the only system Atari would ever produce with built-in backward compatibility. The cartridges for the two systems are of the same size, with the only discernible difference being two additional “fingers” on the cartridge connector for 7800 games. Both systems feature 9-pin controller ports, and 2600-compatible controllers work fine with the 7800. 2600 controllers can be used with 7800 games except for those that require two independent fire buttons. The 7800 also uses the same hardware as the 2600 to produce sound, which unfortunately hinders the 7800 in the audio department.

Joe Grand; Ryan Russell; Kevin D. Mitnick; Andrew “bunnie” Huang; Lee Barken; Marcus R. Brown; Job de Haas; Deborah Kaplan; Bobby Kinstle; Tom Owad; Albert Yarusso

2004-01-01T23:59:59.000Z

142

Interaction with deformable displays  

Science Journals Connector (OSTI)

Technological developments in display technologies allow us to explore the design of mobile devices that extend beyond the rigid, flat screen surfaces with which we are familiar. The next generation mobile devices will instead include deformable displays ... Keywords: deformable displays, display surfaces, interaction, shape-changing displays

Jason Alexander; Johan Kildal; Kasper Hornbaek; Viljakaisa Aaltonen; Andrés Lucero; Sriram Subramanian

2012-09-01T23:59:59.000Z

143

Chapter 1 - Social engineering: The ultimate low tech hacking threat  

Science Journals Connector (OSTI)

Publisher Summary This chapter presents various social engineering topics, from understanding the minds of hackers and victims to methods for protecting personal, household and business information from theft and destruction. Social engineering has become the low tech hacker's most valuable and effective tool. The bad guys have continued to use the art of the con to gain access to intellectual property and if necessary the buildings that house that property. In this chapter, several examples illustrate how social engineering attacks happen in homes and businesses, and possible measures to prevent them. Today, every area of concern with security involves managing the risks associated with staying safe and secure. Most of the social engineering tools come from yard sales, thrift stores, flea markets, pawn shops, and Internet. This ranges from hats, jackets with corporate logos, tool belts, tools, listening devices, briefcases, spyware, and locks that can be used quite effectively for social engineering. The overall sneakiness of the threats associated with social engineering make it very easy for social engineers to catch anyone off guard. Several useful risk management countermeasures against social engineering are also described in the chapter. Social engineering is not a new phenomenon. Yet, it is still one of the most effective outsider-insider threats to any security plan. Despite valiant attempts by corporations to manage risk by not becoming victims of social engineering attacks, it is often far too easy for hackers to use the art of the con to gain access to intellectual property and to the buildings housing that property. This chapter explores the phenomenon of social engineering and explains why it is the ultimate low tech hacking threat. The chapter begins by explaining what social engineering is and how easy it is to pull off. Next, it digs into the minds of a social engineering attacker and a victim of an attack, and covers some of the more popular tools of the trade. The chapter also includes interviews with specialists in technical security issues, and closes with a few countermeasures associated with social engineering.

Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther

2012-01-01T23:59:59.000Z

144

Ultra High-Resolution Global Climate Simulation Project PRINCIPAL INVESTIGATOR: James J. Hack  

E-Print Network (OSTI)

changes in the frequency and intensity of extreme events. This project is developing the scientific a terrestrial carbon modeling capabil- ity. #12;Ultra High-Resolution Global Climate Simulation Project elersUltra High-Resolution Global Climate Simulation Project PRINCIPAL INVESTIGATOR: James J. Hack

145

The Failure of Anti-Hacking Legislation: a Hong Kong Perspective Invited Paper  

E-Print Network (OSTI)

for ensuring the integrity of the Internet. For example, a young man, who successfully gained unautho- rised on Internet issues, and discusses why present computer- related legislation fails to attain its goal of anti-hacking. The paper gives a Hong Kong perspective to government's eort to curb intrusion of businesses on the Internet

Lau, W. H. Nynson

146

Somatic embryogenesis and plant regeneration in centipedegrass (Eremochloa ophiuroides [Munro] Hack.)  

Science Journals Connector (OSTI)

Centipedegrass (Eremochloa ophiuroides [Munro] Hack.) is an important warm-season turfgrass...?1 2,4-D and 1 mg l?1 BAP was the best medium for callus induction, while the combination of 2 mg l?1 BAP and 1 mg l?1

Mingxi Liu; Jing Yang; Shaoyun Lu…

2008-04-01T23:59:59.000Z

147

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition  

Science Journals Connector (OSTI)

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security ...

Jayson E. Street; Kent Nabors; Brian Baskin

2010-07-01T23:59:59.000Z

148

Seasonal Abundance, Geographical Distribution and Feeding Types of the Copepod Species Dominant in Port Hacking, New South Wales  

Science Journals Connector (OSTI)

Zooplankton samples were collected over a one-year period by net haul and light trap at four locations in Port Hacking Estuary. Copepods accounted for approximately three quarters...Acartia tranteri, Bestiola sim...

Dennis J. Tafe; F. Brian Griffiths

1983-01-01T23:59:59.000Z

149

Hacking the Body and Posthumanist Transbecoming: 10,000 Generations Later as the mestizaje of Speculative Cyborg Feminism and Significant Otherness  

Science Journals Connector (OSTI)

This essay gives a situated introduction to body hacking, an underground surgical process that seeks to...mestizaje between speculative cyborg feminism and significant otherness.

Lissette Olivares

2014-12-01T23:59:59.000Z

150

Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level.  

E-Print Network (OSTI)

??Given that computer hacking cause huge loss among firms, itâs necessary to understand how individuals engage to commit it. Most of previous research on computer… (more)

Tsai, Ju-han

2010-01-01T23:59:59.000Z

151

Rule by Aesthetics: World-Class City Making in Delhi  

E-Print Network (OSTI)

Oxford University Press. Hacking, I. (1990). The Taming ofCambridge University Press. Hacking, I. (1992). Statisticalnumbers,” to borrow Ian Hacking’s phrase? when there is no “

Ghertner, David Asher

2010-01-01T23:59:59.000Z

152

Chip fractal geometry and loading characteristics of sinusoidal multi-cutters in hack-sawing process  

Science Journals Connector (OSTI)

This work proposed a sinusoidal-type discrete analytic geometry model and derives sinusoidal serrated chip loading characteristics equation for the simulation of the hack-saw reciprocating mechanism by the cutter analytic geometry. The chip loading with different wavelength units in hack-sawing process are studied. The factors affecting chip loading of unit wave, namely the length of the wavelength, the cutters numbers of unit wavelength, saw blade thickness, the equivalent cutting depth per tooth, the cutting overlap-area ratio per cutter edge, the pitch per each cutter, the cutting overlap-area factor, and the proportional factor of sinusoidal amplitude are investigated. The effects of sinusoidal cutter arrangement on chip loading are simulated by the chip loading equations. It is found that the maximum chip loading is always in the front of the cutters, which is at either the peak or the trough of different phase, while the numbers of wavelength unit is 3, 5, 7 and 40, respectively. The chip loading characteristics depend on the convolution of chip loading function, the cutter order window function and the cutter interval function. The simulated results from the established cutting force model for sinusoidal multi-cutters agree well with the experimental measurements. The wear location and failure types of cutters could be predicted for in hack-sawing process.

J.-J. Junz Wang; Sung-Hua Wu; Rong-Shean Lee

2012-01-01T23:59:59.000Z

153

Display blocks : cubic displays for multi-perspective visualizations  

E-Print Network (OSTI)

This thesis details the design, execution and evaluation of a new type of display technology, known as Display Blocks. Display Blocks are a response to two major limitations of current displays: visualization and interaction. ...

Pla i Conesa, Pol

2012-01-01T23:59:59.000Z

154

15/05/12 1:58 PMFloating sensor networks -Hack a Day Page 1 of 8http://hackaday.com/2012/05/15/floating-sensor-networks/  

E-Print Network (OSTI)

15/05/12 1:58 PMFloating sensor networks - Hack a Day Page 1 of 8http://hackaday.com/2012: robots hacks These cool looking little bots are part of a fleet of floating water sensors built! tall bots can steer with the help of their twin props Ads by Google Speed Sensor Electronics Hack

155

An Inside Job: Hacking into Janus Kinase/Signal Transducer and Activator of Transcription Signaling Cascades by the Intracellular Protozoan Toxoplasma gondii  

Science Journals Connector (OSTI)

...February 2012 review-article Minireview An Inside Job: Hacking into Janus Kinase/Signal Transducer and Activator of Transcription...signaling. J. Immunol. 176 :1840-1847. An inside job: hacking into Janus kinase/signal transducer and activator of transcription...

Eric Y. Denkers; David J. Bzik; Barbara A. Fox; Barbara A. Butcher

2011-11-21T23:59:59.000Z

156

Split image optical display  

DOE Patents (OSTI)

A video image is displayed from an optical panel by splitting the image into a plurality of image components, and then projecting the image components through corresponding portions of the panel to collectively form the image. Depth of the display is correspondingly reduced.

Veligdan, James T. (Manorville, NY)

2007-05-29T23:59:59.000Z

157

Computational immersive displays  

E-Print Network (OSTI)

Immersion is an oft-quoted but ill-defined term used to describe a viewer or participant's sense of engagement with a visual display system or participatory media. Traditionally, advances in immersive quality came at the ...

Novy, Daniel E. (Daniel Edward)

2013-01-01T23:59:59.000Z

158

A consistent framework for Horton regression statistics that leads to a modified Hack's law  

Science Journals Connector (OSTI)

A statistical framework is introduced that resolves important problems with the interpretation and use of traditional Horton regression statistics. The framework is based on a univariate regression model that leads to an alternative expression for Horton ratio, connects Horton regression statistics to distributional simple scaling, and improves the accuracy in estimating Horton plot parameters. The model is used to examine data for drainage area A and mainstream length L from two groups of basins located in different physiographic settings. Results show that confidence intervals for the Horton plot regression statistics are quite wide. Nonetheless, an analysis of covariance shows that regression intercepts, but not regression slopes, can be used to distinguish between basin groups. The univariate model is generalized to include n > 1 dependent variables. For the case where the dependent variables represent ln A and ln L, the generalized model performs somewhat better at distinguishing between basin groups than two separate univariate models. The generalized model leads to a modification of Hack's law where L depends on both A and Strahler order ?. Data show that ? plays a statistically significant role in the modified Hack's law expression.

Peter R. Furey; Brent M. Troutman

2008-01-01T23:59:59.000Z

159

Red Quasars in the Las Campanas Infrared Survey Frank Masci, Carol Lonsdale, Perry Hacking, the LCIR collaboraton...  

E-Print Network (OSTI)

Red Quasars in the Las Campanas Infrared Survey Frank Masci, Carol Lonsdale, Perry Hacking, the LCIR collaboraton... Summary We propose to search for red quasars in the Las Campanas Infrared (LCIR/near-IR appearence prior to spectroscopic follow- up. Our method will preferentially select red quasars at z>2

Masci, Frank

160

Media hacking.  

E-Print Network (OSTI)

??Jeffrey Charles Stanley is an M.F.A. Candidate in Transmedia in the Department of Art and Art History. The Artist, Jeff Stanley, Works as a cultural… (more)

Stanley, Jeffrey Charles

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Hacking Life  

Science Journals Connector (OSTI)

I suspect, if you’re like me, that you find the idea of modeling aspects of the natural world a bit more interesting than, say, creating an accounting program (no disrespect to accountants intended). I first g...

Ira J. Greenberg

2009-01-01T23:59:59.000Z

162

Tooth Chipping During Power Hack Sawing and the Role of Saw Material Characteristics  

Science Journals Connector (OSTI)

This paper presents results from an investigation devoted to the study of tooth chipping during the power hack sawing of austenitic stainless steel (AISI 316) with HSS saws, with special reference to the composition and heat treatment of the saw material. Based upon the experimental results of controlled sawing tests, microscopy (SEN and LOM) and the bend and hardness test results of the saw material, specific mechanisms for initiation and propagation of cracks in saw teeth dependent upon the cutting stage, interaction geometry and tooth-stress state are proposed. These results indicate that hardness to be a dominant parameter controlling hot cracking capability while strength and microstructure appear to control crack propagation and fracture behaviour of the high speed steel.

H. Chandrasekaran; Stig Svensson; Michael Nissle

1987-01-01T23:59:59.000Z

163

Hacking on decoy-state quantum key distribution system with partial phase randomization  

E-Print Network (OSTI)

Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum+weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

Shi-Hai Sun; Mu-Sheng Jiang; Xiang-Chun Ma; Chun-Yan Li; Lin-Mei Liang

2014-07-15T23:59:59.000Z

164

Chapter 7 - Low tech hacking and the law: Where can you go for help?  

Science Journals Connector (OSTI)

Publisher Summary This chapter presents a low tech hacking interview with Tony Marino. Mr. Marino has been a tremendous resource for all of the members of the North Carolina Electronic Crimes Task Force (ECTF) for many years. His willingness to share his decades of experience in the fields of electronic crimes investigation and in personal protection have been invaluable to the entire task force. He has been an excellent example of how beneficial it can be for non–law enforcement members to take the time to get to know and learn from these senior federal agents. The interview-style format provides a unique insight into the thoughts and personalities of the people most able to help in the event of an incident that spans jurisdictions, states, or even countries. The chapter also incites the readers to investigate public-private collaborative organizations such as the United States Secret Service (USSS) ECTF and the Federal Bureau of Investigation (FBI) InfraGard. A computer can be used to commit a crime—for instance, people can use a computer to download child pornography. But that same computer can also be the victim of a crime—if, for example, an attacker attempts to break into the computer to gain access to intellectual property. Because the computer plays such an integral role in the daily activities of individuals and corporations alike, it is important to understand the crimes associated with computers and to know the law enforcement agencies to contact for help should the need arise. With that in mind, this chapter introduces readers to two senior members of law enforcement and the organizations they belong to. First, Tony Marino, U.S. Secret Service (Retired), shares his experience in the fields of electronic crimes investigation and personal protection. Then SA Greg Baker of the FBI conveys his thoughts on low tech hacking.

Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther

2012-01-01T23:59:59.000Z

165

Forty years of movie hacking: considering the potential implications of the popular media representation of computer hackers from 1968 to 2008  

Science Journals Connector (OSTI)

Increasingly movies are being produced which feature plots that incorporate elements of computer security and hacking, and cumulatively these movies are creating a public perception as to the nature of computer security. This research examines movies that feature hackers (and hacking) to identify if any common themes emerge from these movies in their representation of these issues. To achieve this, first a corpus of hacking movies is created, and then using a qualitative data analysis technique, guidelines are developed which distinguish those movies that actually have the potential to create a perception with the general public. The resultant dataset is analysed and the salient details are compared to the reality of hacking. This research has implications in a range of fields, including in the education of computer students, organisation computer security and in the behaviour of the general public when using computers.

Damian Gordon

2010-01-01T23:59:59.000Z

166

Focusing management needs at the sub-catchment level via assessments of change in the cover of estuarine vegetation, Port Hacking, NSW, Australia  

Science Journals Connector (OSTI)

Aerial photographs from 1930 to 1999 were used to assess change in the distribution of seagrass, mangrove and saltmarsh in Port Hacking, New South Wales. Initially stable at ... five-fold increase in mangrove. Wi...

R. J. Williams; A. J. Meehan

2004-10-01T23:59:59.000Z

167

C4-Dicarboxylic acid metabolism in bundle-sheath chloroplasts, mitochondria and strands of Eriochloa borumensis Hack., a phosphoenolpyruvate-carboxykinase type C4 species  

Science Journals Connector (OSTI)

C4-acid metabolism by isolated bundlesheath chloroplasts, mitochondria and strands of Eriochloa borumensis Hack., a phosphoennolpyruvate-carboxykinase (PEP-CK)...4Cl. There was very little conversion of PEP to py...

C. K. M. Rathnam; G. E. Edwards

168

Use of sequence-related amplified polymorphism (SRAP) markers for comparing levels of genetic diversity in centipedegrass (Eremochloa ophiuroides (Munro) Hack.) germplasm  

Science Journals Connector (OSTI)

Centipedegrass (Eremochloa ophiuroides (Munro) Hack.) has great potential as a low-...P < 0.0001), most of the variation (94%) could be explained by differences within groups. The PCO plot showed large difference...

Susana R. Milla-Lewis; Jennifer A. Kimball…

2012-10-01T23:59:59.000Z

169

Display Size Wireless LAN  

E-Print Network (OSTI)

.) - Security sofware ­ESET Smart Security. No Reuse PC with English OS for this time. PC PC Code Image Brand PC PC Code Image Brand Model F008 Panasonic CF-W2 Pentium733 M 1.10GHz 256MB 40GB 12.1 inch 1.0kg System Memory HDD Display Size Weight OS Accessory LAN Wireless LAN Remarks PC PC Code Image Brand

Katsumoto, Shingo

170

Second generation bioethanol production from Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.  

Science Journals Connector (OSTI)

Saccharum (Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.), is a rapidly growing, wide ranging high-yield perennial, suitable for second generation bioethanol production. This study evaluated oxalic acid as a pretreatment for bioconversion. Overall sugar yields, sugar degradation products, enzymatic glucan hydrolysis and ethanol production were studied as effects of temperature (150–190 °C), reaction time (10–40 min) and oxalic acid concentration 2–8% (w/w). Time and temperature were combined into a single parameter, Severity Factor (SF) [Log (R0)], and related to oxalic acid using a response surface methodology. Maximum total sugar yield was attained at a SF of 2.93 and 6.79% (w/w) oxalic acid, while maximum formation of sugar degradation products was observed at the highest SF (4.05) and 5% (w/w) oxalic acid. These were also the conditions for maximum simultaneous saccharification and fermentation (SSF) of the residual solids. Commercial cellulases and Saccharomyces cerevisiae attained 89.9% glucan conversion and 17.8 g/l ethanol. Pichia stipitis CBS 6054 fermented hemicellulosic hydrolysates from less severe conditions to ethanol with a yield of 0.35 (ge/gs). Maximal product yields were 69% of theoretical value and 90% of the SSF conversion efficiency for hydrolysate fermentation and SSF, respectively.

Danilo Scordia; Salvatore L. Cosentino; Thomas W. Jeffries

2010-01-01T23:59:59.000Z

171

Lightweight embedded software performance analysis method by kernel hack and its industrial field study  

Science Journals Connector (OSTI)

Despite advances in software testing technologies, there are still limitations in directly applying them to embedded software. Since the operational environment of embedded software has severe resource constraints, it is necessary to develop a lightweight testing method that has little impact on the operational environment of embedded software. We propose an agent-based performance analysis method to hack kernel performance counters that manage the system's execution information. The proposed method enables us to collect data required for analyzing performance bottlenecks and identify the causes and locations of bottlenecks with little impact on the test target system's operational environment. We introduce a test automation tool called Analytic Master of System v2.0 that we developed by employing our proposed method. Presently, Analytic Master of System v2.0 is being utilized as a standard tool for performance testing of embedded systems in the automotive industry. In addition, we suggest a guideline for performance analysis and improvement by introducing an industrial field study among our best practices, which analyze the relationship between the memory fault processing of the operating system and the application processing speed.

Jooyoung Seo; Byoungju Choi; Sueng-wan Yang

2012-01-01T23:59:59.000Z

172

High-Throughput Hacking of the Methylation Patterns in Breast Cancer by In vitro Transcription and Thymidine-Specific Cleavage Mass Array on MALDI-TOF Silico-Chip  

Science Journals Connector (OSTI)

...Research Article Cancer Genes and Genomics High-Throughput Hacking of the Methylation Patterns in Breast Cancer by In vitro Transcription...Supplement: Supplementary Data Supplementary Data High-throughput hacking of the methylation patterns in breast cancer by in vitro transcription...

Ramin Radpour; Mahdi Montazer Haghighi; Alex Xiu-Cheng Fan; Peyman Mohammadi Torbati; Sinuhe Hahn; Wolfgang Holzgreve; Xiao Yan Zhong

2008-11-01T23:59:59.000Z

173

FORGING PSYCHIATRIC CATEGORIES: A Philosophical Examination of the Creation and Stabilization of Diagnostic Knowledge  

E-Print Network (OSTI)

psychres.2010.03.010 Hacking, I. (1998). Mad travelers :Hopkins University Press. Hacking, I. (1995). Rewriting theUniversity Press. Hacking, I. (1998). Mad travelers :

Roome, Benjamin Reynolds

2012-01-01T23:59:59.000Z

174

Laser illuminated flat panel display  

SciTech Connect

A 10 inch laser illuminated flat panel Planar Optic Display (POD) screen has been constructed and tested. This POD screen technology is an entirely new concept in display technology. Although the initial display is flat and made of glass, this technology lends itself to applications where a plastic display might be wrapped around the viewer. The display screen is comprised of hundreds of planar optical waveguides where each glass waveguide represents a vertical line of resolution. A black cladding layer, having a lower index of refraction, is placed between each waveguide layer. Since the cladding makes the screen surface black, the contrast is high. The prototype display is 9 inches wide by 5 inches high and approximately I inch thick. A 3 milliwatt HeNe laser is used as the illumination source and a vector scanning technique is employed.

Veligdan, J.T.

1995-12-31T23:59:59.000Z

175

LARGE DISPLAY RESEARCH As large displays become more affordable, researchers  

E-Print Network (OSTI)

-hung displays. A precipitous price drop has also occurred in the last few years, and the average computer are investigating their effects on productivity, and techniques for making the large display user experience more effective. Recent work has demonstrated significant productivity benefits, but has also identified numerous

Rajamani, Sriram K.

176

E-Print Network 3.0 - antibody phage display Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Collection: Physics ; Biology and Medicine 3 Phage Display Technologies Nicole Stricker, Johns Hopkins University, Baltimore, Maryland, USA Summary: of antibody binding or...

177

A comparison of nuclear reactor control room display panels  

E-Print Network (OSTI)

complex and time consuming task. It is expected that the control room of future commercial nuclear reactor power plants will change considerably as a result of these studies. Currently there are literally hundreds of displays and controls...: Dr. Rodger S. Koppa A study was conducted to investigate the use of computer generated displays to operate nuclear reactor power plants. The AGN-201 reactor at Texas A&M university was the reactor studied. After observing several licensed reactor...

Bowers, Frances Renae

2012-06-07T23:59:59.000Z

178

CS120 Fall 2013 --Lab, Week of November 10th Some basic input and output this week, a little bit of C hacking, and some work with arrays.  

E-Print Network (OSTI)

of C hacking, and some work with arrays. Connect your Arduino, and hook up one of the speakers in lab it on to your Arduino, to make sure the speaker is connected correctly. 1) Look at the memory array -- this has in the array (the Arduino has an oscillator, with higher numbers oscillating faster, and producing a higher

Madden, Patrick H.

179

Improving OLED technology for displays  

E-Print Network (OSTI)

Organic light emitting devices (OLEDs) are brightly emissive, efficient, have fast switching speeds, and are paper-thin in format, propelling their use as an emerging flat panel display technology. However, two primary ...

Yu, Jennifer J. (Jennifer Jong-Hwa), 1980-

2008-01-01T23:59:59.000Z

180

A Directory of Dedicated Commemorative Groves, Trees and Display Plantings (sorted by common name)  

E-Print Network (OSTI)

) University of Idaho Arboretum Botanical Garden Paul Warnick Common Name Scientific Name Commemorating Ash North America Fraxinus pennsylvanica, americana etc. Idaho Public Utilities Executives' Course Aspen Groves, Trees and Display Plantings (sorted by common name) University of Idaho Arboretum Botanical

Waits, Lisette

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Studies of science before "Science Studies" : Cold War and the politics of science in the U.S., U.K., and U.S.S.R., 1950s-1970s  

E-Print Network (OSTI)

of California Press. Hacking, Ian. 1992. The Self-of Chicago Press. Hacking, Ian. 1996. The disunities of theStanford University Press. Hacking, Ian. 1999. The Social

Aronova, E. A.; Aronova, E. A.

2012-01-01T23:59:59.000Z

182

Fixing famine : the politics of information in famine early warning  

E-Print Network (OSTI)

World Food Programme. Hacking, I. (1990) The Taming ofCambridge University Press. Hacking, I. (1991). How shouldsee Desrosières (1998), Hacking (1990) and Porter (1995),

Burg, Suzanne M. M.

2008-01-01T23:59:59.000Z

183

The Sanitized City and Other Urban Myths: Fantasies of Risk and Illness in the Twentieth Century Metropolis  

E-Print Network (OSTI)

New York: Routledge, 94) Hacking, Ian. Rewriting the Soul:University Press, 1995. 95) Hacking, Ian. The Taming ofto determine. Ian Hacking tackles a similar problem in his

Youssef, David

2012-01-01T23:59:59.000Z

184

Examining life's origins : history and epistemic principles in the search for the origins of life  

E-Print Network (OSTI)

Rutgers University Press. Hacking, Ian. 1983. Representinganonymous) servants (Hacking 1983). Perhaps this preferencenew experimentalists” (see, e.g. , Hacking 1983). This group

Martin, Eric Collin

2010-01-01T23:59:59.000Z

185

On the Other Side of Hyperactivity: an Anthropology of ADHD  

E-Print Network (OSTI)

Democracy. The MIT Press. Hacking, Ian. 1998b. Rewriting thePrinceton University Press. Hacking, Ian. 2000. The Sociallike Allan Young, Ian Hacking, and Emily Martin, take the

Goodwin, Marc

2010-01-01T23:59:59.000Z

186

Reproducing Autonomy  

E-Print Network (OSTI)

making up people. ' 168 Hacking, The Social Construction of103. ! Ibid. , 116. ! Hacking, “Making Up People. ” ! ThisUniversity Press, 2000. Hacking, Ian. “Making Up People. ”

Denbow, Jennifer Marie

2010-01-01T23:59:59.000Z

187

Insuring climate change? Science, fear, and value in reinsurance markets  

E-Print Network (OSTI)

Oxford University Press. Hacking, I. 1990. The Taming ofof liberal governance (Hacking 1990; Rose 1999; Ewald 1991;historian of science Ian Hacking (1990) calls “the taming of

Johnson, Leigh Taylor

2011-01-01T23:59:59.000Z

188

Toolkit support for interactive projected displays  

Science Journals Connector (OSTI)

This paper presents a software toolkit designed to enable the rapid development of multimedia-rich, multi-touch enabled, and interactive projection-based displays. For instance: door displays, floor displays, wall displays, and interactive tables. Despite ... Keywords: deployments, experimentation, interaction, interactive surface, multi-touch, projection mapping, toolkit, ubiquitous displays

John Hardy; Jason Alexander

2012-12-01T23:59:59.000Z

189

An expert display system and nuclear power plant control rooms  

SciTech Connect

An expert display system controls automatically the display of segments on a cathode ray tube's screen to form an image of plant operations. The image consists of an icon of: 1) the process (heat engine cycle), 2) plant control systems, and 3) safety systems. A set of data-driven, forward-chaining computer stored rules control the display of segments. As plant operation changes, measured plant data are processed through the rules, and the results control the deletion and addition of segments to the display format. The icon contains information needed by control rooms operators to monitor plant operations. One example of an expert display is illustrated for the operator's task of monitoring leakage from a safety valve in a steam line of a boiling water reactor (BWR). In another example, the use of an expert display to monitor plant operations during pre-trip, trip, and post-trip operations is discussed as a universal display. The viewpoints and opinions expressed herein are the author's personal ones, and they are not to be interpreted as Nuclear Regulatory Commission criteria, requirements, or guidelines.

Beltracchi, L.

1988-04-01T23:59:59.000Z

190

UCSD Department of Communication Job Talk  

E-Print Network (OSTI)

University of California, Irvine Hacking Politics in India that hacking, brainstorming, and crowdsourcing can transform citizenship, poverty

191

Proactive Recruitment and Retentionist Patterns of Migration and Nationality Policy in Argentina, Italy, and Spain (1850-1919).  

E-Print Network (OSTI)

Oxford University Press. Hacking, Ian. 1986. "Making Upof counting them, see Hacking 1986, 1990:3. On the role of

Cook Martín, David

2005-01-01T23:59:59.000Z

192

Lightweight User Interfaces for Watch Based Displays Peter Hutterer  

E-Print Network (OSTI)

Lightweight User Interfaces for Watch Based Displays Peter Hutterer , Mark T. Smith , Bruce H Science University of South Australia Mawson Lakes, Adelaide, SA, 5095, Australia office@who-t.net bruce of the user's clothing, and removed from the pocket and held in the hand for operation. Recently, a number

Thomas, Bruce

193

Proceedings of the K-IDS Three-Dimensional Display Workshop 2006 (21 August 2006) The Compatibility of Consumer Displays with  

E-Print Network (OSTI)

Rourke, Ka Lun Yuen Centre for Marine Science & Technology, Curtin University of Technology, GPO Box U an alternating sequence of left and right perspective images on the display whilst the user is wearing a pair

194

Widget:DisplayDialog | Open Energy Information  

Open Energy Info (EERE)

DisplayDialog DisplayDialog Jump to: navigation, search This widget displays a javascript link, that will pop up a dialog window displaying the contents of the (hidden) element on the page provided. The dialog has a single button that dismisses the dialog. Parameters link - link text to display type - type of content: id - id of element on the page, the contents of that element will be displayed in the dialog sibling - the "id" is the class name of a sibling element, the contents of that element will be displayed in the dialog the widget and sibling should be within a common container (eg div, td), so the sibling element can be found img - the id is an image to be displayed in the dialog NOTE: the first time the dialog is displayed, it will not be centered unless the width is specified

195

High frequency plantlet regeneration from callus and artificial seed production of rock plant Pogonatherum paniceum (Lam.) Hack. (Poaceae)  

Science Journals Connector (OSTI)

Pogonatherum paniceum (Lam.) Hack. is a rock plant with good potential for vegetative recovery on naked lands. A high frequency in vitro regeneration system was developed for P. paniceum. Calli were induced from explants of mature seeds, seedlings, young leaves, and stem segments on Murashige and Skoog (MS) medium supplemented with 1.0 mg L?1 2,4-dichlorophenoxyacetic acid (2,4-D), 2.0 mg L?1 ?-naphthalene acetic acid (NAA) and 0.2 mg L?1 6-benzylaminopurine (BAP). High induction rates (59.57%) and regeneration rates (100%) were obtained from mature seed explants; calli were sub-cultured for over 2 years and still retained a high regenerative capacity. One seed explant resulted in 69,997 plants in 1 year. Shoot buds derived from calli were used for encapsulation in liquid MS medium containing 3% sucrose and two different alginate matrices (3% sodium alginate (w/v) + MS medium containing 3% sucrose and 3% sodium alginate + 1% activated carbon (w/v) + MS medium containing 3% sucrose) with a 20-min exposure to 2% CaCl2 and 0.3% bavistin (w/v). The capsule with 3.0% sodium alginate (w/v) and 1% activated carbon (w/v) showed a higher conversion rate (61.58%) and stronger plantlets under non-aseptic conditions. These systems are useful for the rapid clonal propagation and dissemination of artificial seed material of P. paniceum for eco-recovery.

Wen-Guo Wang; Sheng-Hua Wang; Xiao-Ai Wu; Xing-Yu Jin; Fang Chen

2007-01-01T23:59:59.000Z

196

Display Blocks: a Set of Cubic Displays for Tangible, Multi-Perspective Data Exploration  

E-Print Network (OSTI)

This paper details the design and implementation of a new type of display technology. Display Blocks are a response to two major limitations of current displays: dimensional compression and physical-digital disconnect. ...

Maes, Pattie

197

Design and Application of LED Beam Display Based on LED Number Display Interface  

Science Journals Connector (OSTI)

This paper introduces a design actualizing LED beam display. The design directly used LED number display interface on single-chip micro- ... to obtain font and bit interface line through LED number display socket...

Hong Deng; Xiuhui Chang; Yanling Zhang

2012-01-01T23:59:59.000Z

198

Two Dimensional Radiation Pressure Tactile Display Takayuki Iwamoto, Yoshimichi Ikeda, and Hiroyuki Shinoda  

E-Print Network (OSTI)

Two Dimensional Radiation Pressure Tactile Display Takayuki Iwamoto, Yoshimichi Ikeda, and Hiroyuki Shinoda The University of Tokyo, 7-3-1, Hongo, Bunkyo-ku, Tokyo, Japan {iwa, ikeda, shino, radiation pressure 1. Introduction One of the difficulties in designing tactile displays is to find

Shinoda, Hiroyuki

199

Technology Roadmap for Automotive Flexible Display  

Science Journals Connector (OSTI)

Flexible displays are thin, lightweight, unbreakable, and energy saving, which can be fabricated using the existing display manufacturing facilities, reducing the significant cost of building new facilities. In a...

Byung Sung Yoon; Corey White; Greg Wease…

2014-01-01T23:59:59.000Z

200

D20: Interaction with Multifaceted Display Devices  

E-Print Network (OSTI)

, there has been a rapid progress in the new dis- play technologies, such as electronic ink and organic light-emitting diode (OLED) displays. These technolo- gies potentially allows to make displays with arbitrary pixel

Poupyrev, Ivan

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

REVIEW/SYNTHSE Threat display in birds  

E-Print Network (OSTI)

REVIEW/SYNTHÃ?SE Threat display in birds Peter L. Hurd and Magnus Enquist Abstract: The study of threat displays has long been an area in which theory and empirical work have each spurred the other. A great deal that classical ethologists have accurately described about threat displays still lacks

Hurd, Peter L.

202

Stereographic displays of atmospheric model data  

Science Journals Connector (OSTI)

A system has been developed to display color stereographic time-lapsed sequences of outputs of three-dimensional atmospheric models. Contour lines and wind vectors derived from a model can be overlaid on a geostationary satellite image or displayed with ... Keywords: Computer graphics, Meteorology, Modeling display, Stereography

Mary desJardins; A. Frederick Hasler

1980-07-01T23:59:59.000Z

203

Tilt display demonstration: a display surface with multi-axis tilt & actuation  

Science Journals Connector (OSTI)

This demonstration accompanies a full paper accepted into MobileHCI '12 [1]. We demonstrate a new type of actuatable display, called a Tilt Display, that provides visual feedback combined with multi-axis tilting and vertical actuation. Its ability to ... Keywords: actuated displays, nonplanar surface interaction, physical actuation, tilt displays

Jason Alexander; Andrés Lucero; Sriram Subramanian

2012-09-01T23:59:59.000Z

204

Tilt displays: designing display surfaces with multi-axis tilting and actuation  

Science Journals Connector (OSTI)

We present a new type of actuatable display, called Tilt Displays, that provide visual feedback combined with multi-axis tilting and vertical actuation. Their ability to physically mutate provides users with an additional information channel that facilitates ... Keywords: actuated displays, non-planar surface interaction, physical actuation, tilt displays

Jason Alexander; Andrés Lucero; Sriram Subramanian

2012-09-01T23:59:59.000Z

205

Development of a plant regeneration system from seed-derived calluses of centipedegrass [Eremochloa ophiuroides (Munro.) Hack  

Science Journals Connector (OSTI)

The objective of this study is to establish plant regeneration system with the seed of the new Chinese selection “E-126”of centipedegrass [Eremochloa ophiuroides (Munro.) Hack] as explant. In present study, the following results were obtained: (1) The medium formulation most suitable for calluses induction was identified to be MS with 1.0 mg l?1 2,4-D + 30 g l?1 mannitol + 50 ml l?1 coconut milk and the ratio of calluses induction was 96.0%, including 5.2% of yellow granule calluses induction. The above medium formulation was adopted for subculture. (2) The rate of shoot regeneration from yellow granular calluses was 98.0% by MS optimum medium formulation with 2.0 mg l?1 KT + 50 ml l?1 coconut milk. The differentiated rate retained as high as 88.0% even after 5 times of subculture and 18.6% after 15 times of subculture. The optimum medium formulation for shoot growth was identified to be MS medium plus 2.0 mg l?1 BAP, 0.8 mg l?1 NAA and 50 ml l?1 coconut milk. (3) The optimum medium for shoot rooting was identified to be MS medium with 0.6 mg l?1 NAA + 50 ml l?1 coconut milk, and the rooting rate to be 98.0%. The survival rate of transplanted plantlets from tubes to basin with soil was 92.0%. In conclusion, the plant regeneration system was successfully developed in this study, which may provide basic reference for screening of somaclonal variants and genetic transformation of centipedegrass.

Xuejun Yuan; Zhiyong Wang; Jianxiu Liu; Jianming She

2009-01-01T23:59:59.000Z

206

Critical function and success path summary display  

DOE Patents (OSTI)

The content of and hierarchical access to three levels of display pages containing information on critical function monitoring and success path monitoring.

Scarola, Kenneth (Windsor, CT); Jamison, David S. (Windsor, CT); Manazir, Richard M. (North Canton, CT); Rescorl, Robert L. (Vernon, CT); Harmon, Daryl L. (Enfield, CT)

1995-01-01T23:59:59.000Z

207

Public Displays of Efficiency | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

by displaying the collective energy savings of two island neighborhoods. In Connecticut, the Neighbor to Neighbor Energy Challenge encourages homeowners in 14 towns to...

208

DISPLAYING AND INTERPRETING FLUID INCLUSION STRATIGRAPHY ANALYSES...  

Open Energy Info (EERE)

This is the fourth paper in a series on developing fluid inclusion stratigraphy (FIS) as a logging tool for geothermal bore holes. Here we address methods of displaying...

209

Dynamic voltage scaling of OLED displays  

Science Journals Connector (OSTI)

Unlike liquid crystal display (LCD) panels that require high-intensity backlight, organic LED (OLED) display panels naturally consume low power and provide high image quality thanks to their self-illuminating characteristic. In spite of this fact, the ... Keywords: DVS, OLED, image processing, low-power design

Donghwa Shin; Younghyun Kim; Naehyuck Chang; Massoud Pedram

2011-06-01T23:59:59.000Z

210

The {mu}Mural : a six-projector tiled display.  

SciTech Connect

Tiled displays have become a recent technical solution to aggregating commodity displays in order to provide higher resolution displays. This document describes the background, design, and implementation of the micromural, a six projector tiled display developed at Argonne National Laboratory.

Judson, I. R.

2002-06-27T23:59:59.000Z

211

The effects of high intensity continuous auditory stimulation on the perception of visual display information  

E-Print Network (OSTI)

THE EFFECTS OF HIGH INTENSITY CONTINUOUS AUDITORY STIMULATION ON THE PERCEPTION OF VISUAL DISPLAY INFORMATION A Thesis by WILLIAM HAROLD PERSKY Submitted to the Graduate College of Texas AS M University in partial fulfillment... of the requirement for the degree of MASTER OF SCIENCE May 1972 Major Subject: Industrial Hygiene THE EFFECTS OF HIGH INTENSITY CONTINUOUS AUDITORY STIMULATION ON THE PERCEPTION OF VISUAL DISPLAY INFORMATION A Thesis by WILLIAM HAROLD PERSKY Approved...

Persky, William Harold

1972-01-01T23:59:59.000Z

212

A CMOS-compatible compact display  

E-Print Network (OSTI)

Portable information devices demand displays with high resolution and high image quality that are increasingly compact and energy-efficient. Microdisplays consisting of a silicon CMOS backplane integrated with light ...

Chen, Andrew R. (Andrew Raymond)

2005-01-01T23:59:59.000Z

213

A smart active matrix pixelated OLED display  

E-Print Network (OSTI)

An OLED display has been fabricated and successfully tested with an external optical feedback circuit to demonstrate improvement in uniformity. In addition, the process of making an integrated system with the optical ...

Yu, Jennifer J. (Jennifer Jong-Hwa), 1980-

2004-01-01T23:59:59.000Z

214

Image fusion for a nighttime driving display  

E-Print Network (OSTI)

An investigation into image fusion for a nighttime driving display application was performed. Most of the image fusion techniques being investigated in this application were developed for other purposes. When comparing the ...

Herrington, William Frederick

2005-01-01T23:59:59.000Z

215

Tailored displays to compensate for visual aberrations  

E-Print Network (OSTI)

We introduce tailored displays that enhance visual acuity by decomposing virtual objects and placing the resulting anisotropic pieces into the subject's focal range. The goal is to free the viewer from needing wearable ...

Pamplona, Vitor F.

216

Beacon data acquisition and display system  

DOE Patents (OSTI)

A system for transmitting aircraft beacon information received by a secondary surveillance radar through telephone lines to a remote display includes a digitizer connected to the radar for preparing a serial file of data records containing position and identification information of the beacons detected by each sweep of the radar. This information is transmitted through the telephone lines to a remote computer where it is displayed.

Skogmo, David G. (Albuquerque, NM); Black, Billy D. (Albuquerque, NM)

1991-01-01T23:59:59.000Z

217

Beacon data acquisition and display system  

DOE Patents (OSTI)

A system for transmitting aircraft beacon information received by a secondary surveillance radar through telephone lines to a remote display includes a digitizer connected to the radar for preparing a serial file of data records containing position and identification information of the beacons detected by each sweep of the radar. This information is transmitted through the telephone lines to a remote computer where it is displayed. 6 figures.

Skogmo, D.G.; Black, B.D.

1991-12-17T23:59:59.000Z

218

Hacking for Social Justice  

Science Journals Connector (OSTI)

Since the eruption of the global justice movement at 1999’s Battle of Seattle, much has been said about the impact of the Internet on progressive activism. Of particular interest have been the ways in which ac...

Kate Milberry

2012-01-01T23:59:59.000Z

219

Break In: Hacking  

Science Journals Connector (OSTI)

Open on a shot of an empty alley behind a CompUSA computer store. A girl in a hoody and a beefy guy roar up on a motorcycle. They stop next to an overflowing Dumpster and the camera zooms in on the action. The gi...

John Biggs

2004-01-01T23:59:59.000Z

220

Hacking Millennium Park  

Science Journals Connector (OSTI)

It was to be one of the best-kept secrets of the late 20th century. Code name: Millennium Park. A networked virtual theme park due to open in 2001. If a defector, Searchbot Ver Mela Parka, hadn’t prematurely disc...

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Hacking Is Important  

Science Journals Connector (OSTI)

Back in the early 1990s, Borland International was the place to be an engineer. Coming off the purchase of Ashton-Tate, Borland was the third-largest software company, but, more importantly, it was a legitimat...

Michael Lopp

2012-01-01T23:59:59.000Z

222

Hacking als Grenzüberschreitung  

Science Journals Connector (OSTI)

In der Vergangenheit hat es sich als nützlich erwiesen, am Anfang eines Vortrages erst einmal ein paar Worte zu dem Verein zu verlieren, in dessen Vorstand ich mitwirke. Der Chaos Computer Club (CCC) ist viele...

Frank Simon

1994-01-01T23:59:59.000Z

223

Johannes Hack, Bonn  

Science Journals Connector (OSTI)

Meine Beziehung zu den fünf neuen Bundesländern, zu der alten DDR — mit und ohne Anführungszeichen — ist eine Beziehung „nach Drüben“.

Carl-Christoph Schweitzer; Dieter Haack…

1993-01-01T23:59:59.000Z

224

Bringing climate change down to earth : science and participation in Canadian and Australian climate change campaigns  

E-Print Network (OSTI)

McCarthy. London: Heinemann. Hacking, Ian. 1986. Making UpStanford University Press. Hacking, Ian. 1990. The Taming ofCambridge University Press. Hacking, Ian. 1995. The Looping

Padolsky, Miriam Elana

2006-01-01T23:59:59.000Z

225

Random and Raster: Display Technologies and the Development of Videogames  

E-Print Network (OSTI)

Videogame developers have utilized many types of display technology, from oscilloscopes to Teletypes to high-definition LCD displays. Two significant early display technologies, raster scan and random scan CRTs, played a ...

Montfort, Nick

226

The TV Turtle: A Logo Graphics System for Raster Displays  

E-Print Network (OSTI)

Until recently, most computer graphics systems have been oriented toward the display of line drawins, continually refreshing the screen from a display list of vectors. Developments such as plasma panel displays and ...

Lieberman, Henry

1976-06-01T23:59:59.000Z

227

Covered Product Category: Displays and Monitors  

Energy.gov (U.S. Department of Energy (DOE))

FEMP provides acquisition guidance and Federal efficiency requirements across a variety of product categories, including displays, which are covered by the ENERGY STAR program. Federal laws and requirements mandate that agencies meet these efficiency requirements in all procurement and acquisition actions that are not specifically exempted by law.

228

Interactive Display of Isosurfaces with Global Illumination  

Science Journals Connector (OSTI)

In many applications, volumetric data sets are examined by displaying isosurfaces, surfaces where the data, or some function of the data, takes on a given value. Interactive applications typically use local lighting models to render such surfaces. This ... Keywords: Path tracing, isosurface, visualization, rendering, global illumination, precomputed radiance transfer.

Chris Wyman; Steven Parker; Peter Shirley; Charles Hansen

2006-03-01T23:59:59.000Z

229

Tables in Context: Integrating Horizontal Displays with  

E-Print Network (OSTI)

design challenges for tabletop interfaces: integrating access to public and private information, managing a cooperative gesture to organize digital documents on an interactive table. Our tabletop interface designTables in Context: Integrating Horizontal Displays with Ubicomp Environments Abstract Our work

Klemmer, Scott

230

(Haskins Analysis Display and Experiment System) Philip Rubin, Ph.D.  

E-Print Network (OSTI)

HADES (Haskins Analysis Display and Experiment System) Philip Rubin, Ph.D. Vice President://www.haskins.yale.edu/ and Yale University School of Medicine Department of Surgery (Otolaryngology) #12;I. INTRODUCTION HADES, speech, and other sampled data in an experimental context. HADES has become the main system for signal

231

Multimodal evidence  

E-Print Network (OSTI)

Journal of Hygiene 27: Hacking, Ian (1988) “Telepathy:Design” Isis 79(3): 427-51. Hacking, Ian (1983) RepresentingCambridge University Press. Hacking, Ian (1965) The Logic of

Stegenga, Jacob

2011-01-01T23:59:59.000Z

232

Nationalizing statistics : a comparative study of the development of official statistics during the 20th century in Israel-Palestine and Canada  

E-Print Network (OSTI)

Boston, Beacon Press. Hacking, I. (1987). Prussian NumbersBook MIT Press: 377-393. Hacking, I. (1990). The Taming ofCambridge University Press. Hacking, I. (1992a). Statistical

Leibler, Anat Elza

2008-01-01T23:59:59.000Z

233

Genetic linkage maps of centipedegrass [Eremochloa ophiuroides (Munro) Hack] based on sequence-related amplified polymorphism and expressed sequence tag-simple sequence repeat markers  

Science Journals Connector (OSTI)

Abstract Centipedegrass [Eremochloa ophiuroides (Munro) Hack] is a warm-season turfgrass native to the southeast of China. In this study, the first genetic linkage maps of centipedegrass were constructed using PCR-based markers based on a segregation population consisting of 89 F1 progeny derived from a cross between two ecotypes (E102 and E092(1)). A combination of sequence-related amplified polymorphisms (SRAPs) and expressed sequence tag-simple sequence repeats (EST-SSRs) from wheat was used for map construction. Eighty nine loci, including 85 SRAP and 4 EST-SSR loci, in the female (E102) linkage map were placed in five major and five minor (two triplet and three doublets) linkage maps, covering 623.6 cM with an average map distance of 7.1 cM between adjacent markers. In the male (E092(1)) linkage map, 71 loci including 71 SRAP and 0 EST-SSR loci were assigned to seven major and five triplets linkage maps, with genome coverage of 673.1 cM, and a mean inter-marker separation of 9.6 cM. The information presented in this study establishes a foundation for extending genetic mapping in this species, serves as a framework for mapping quantitative trait loci, and provides basic information for future molecular breeding.

Yiqi Zheng; Hailin Guo; Guozhang Zang; Jianxiu Liu

2013-01-01T23:59:59.000Z

234

Effect of post-fire defoliation on bud viability and plant mortality of Piptochaetium napostaense (Speg.) Hack. and Poa ligularis Ness.  

Science Journals Connector (OSTI)

The objective of this work was to evaluate the effects of post-fire defoliation on axillary bud viability and mortality of Piptochaetium napostaense (Speg.) Hack. and Poa ligularis Nees. at different phenological stages. Both species are cool-season perennial native grasses highly preferred by cattle in the semi-arid region of central Argentina. The following treatments were established for each species: no defoliation (control), early-season defoliation (vegetative stage) and late-season defoliation (internode elongation stage). Ten plants were assigned randomly to each treatment. Fire treatment was applied at the end of the annual growing cycle of both species. Our results would suggest that early-season defoliation during the first year after fire might reduce axillary bud viability in P. napostaense and P. ligularis. In addition, P. napostaense was more susceptible to early-season defoliation than P. ligularis. Post-fire defoliation, principally early-season defoliation, might increase plant mortality in P. napostaense, but it does not seem to affect P. ligularis. Therefore, a period with no grazing after fire might be the key factor to protect axillary buds, and subsequently permit the re-establishment of the photosynthetic canopy through the production of new tillers, favouring mainly the persistence of P. napostaense in the community.

D.V. Peláez; R.M. Bóo; M.D. Mayor; O.R. Elia; N.M. Cardona

2009-01-01T23:59:59.000Z

235

Hermetically sealed encasements for historic document display and preservation  

E-Print Network (OSTI)

The goal of this thesis was to develop designs and methods for the preservation and display of historic documents. The results were applied via the design, manufacture, and installation of five hermetic display encasements ...

Durand, Keith (Keith V.)

2011-01-01T23:59:59.000Z

236

A Power Optimized Display Memory Organization for Handheld User Terminals  

Science Journals Connector (OSTI)

Today's handheld devices become more and more multimedia capable. One subsystem of a multimedia terminal that accounts for a considerable amount of the total power consumption is the display unit. The backlight is the major culprit there. As new display ...

Lieven Hollevoet; Andy Dewilde; Kristof Denolf; Francky Catthoor; Filip Louagie

2004-02-01T23:59:59.000Z

237

A 3-D display head-set for personalized computing  

E-Print Network (OSTI)

This thesis covers the design and implementation of a binocular display head-set akin to Dr . Ivan E. Sutherland's head-mounted display, but using several new technologies and new techniques in computer graphics: small ...

Callahan, Mark A

1983-01-01T23:59:59.000Z

238

Liquid crystal displays for the evaluation of dental  

Science Journals Connector (OSTI)

We assessed whether dental x-ray images observed on a liquid crystal display (LCD) could be applied to diagnosis. A 13-inch TFT (thin film transistor) display was utilized in this study. Fifty x-ray films of r...

Keiichi Uchida D.D.S.; Masaomi Takizawa Sc.D.; Takurou Wada D.D.S.; Ph.D.…

1999-06-01T23:59:59.000Z

239

LM Completes the Grand Junction, Colorado, Site Historical Wall Display  

Energy.gov (U.S. Department of Energy (DOE))

On Wednesday, October 8, a new display was unveiled at DOE Headquarters in Washington, DC, by DOE Deputy Under Secretary David Klaus. The display celebrates more than 70 years of operations at the...

240

Methods of invisibility and multi-dimensional display  

E-Print Network (OSTI)

Modern methods of multidimensional display are extremely limited in their depiction of three dimensional environments. Improving upon modern integral imaging displays with respect to viewing angle and angular resolution, ...

Ku, Jason (Jason Stoutsenberger)

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Web Page Error 500 Page Cannot Be Displayed  

NLE Websites -- All DOE Office Websites (Extended Search)

requested cannot be displayed. There is a problem with the page you are trying to reach and it cannot be displayed. Please try the following: Click the Refresh button, or try again...

242

Display Advertising Impact: Search Lift and Social P. Papadimitriou1  

E-Print Network (OSTI)

Display Advertising Impact: Search Lift and Social Influence P. Papadimitriou1 P. Krishnamurthy2 R study the impact of display advertising on user search behav- ior using a field experiment. In such an experiment, the treatment group users are exposed to some display advertising campaign, while the control

Chang, Edward Y.

243

Icon Abacus: Positional Display of Document Attributes Eric A. Bier  

E-Print Network (OSTI)

Icon Abacus: Positional Display of Document Attributes Eric A. Bier Palo Alto Research Center, Inc This paper presents icon abacus, a space-efficient technique for displaying document attributes by automatic positioning of document icons. It displays the value of an attribute by using position on a single axis

244

ORIGINAL PAPER Peacocks orient their courtship displays towards the sun  

E-Print Network (OSTI)

ORIGINAL PAPER Peacocks orient their courtship displays towards the sun Roslyn Dakin & Robert on male orientation relative to the position of the sun. During the "wing-shaking" display, females were generally behind the displaying male, and male orientation with respect to the position of the sun

Montgomerie, Bob

245

Who goes there. A dialogue of questions and answers about benign hacking. [Securing access to computer from outside sources  

SciTech Connect

On August 23, 1986, it was noticed that the accounting files for one of LBL's computing systems failed to balance. On August 24, we received word that an unauthorized person was attempting entry into a US Navy computer from LBL. Preliminary investigation indicated that LBL was the victim of a benign hacker, where ''benign'' is used in the medical sense. It was thought that the perpetrator was a graduate student from a neighboring university, and that it would provide a useful object lesson to other such folk if he were caught and admonished. LBL therefore embarked upon a journey of detection and containment instead of prevention. That journey continues today, having led first across the country, then across the Atlantic. In the course of the journey we have gathered a number of observations that should be of interest to anyone running a computer with any connection to the outside world.

Stevens, D.F.

1987-04-01T23:59:59.000Z

246

DISPLAY WEEK 2012 REVIEW ISSUE Official Monthly Publication of the Society for Information Display www.informationdisplay.org  

E-Print Network (OSTI)

companies at Display Week 2012: Tactus Technology for best prototype in the new Innovation Zone and Dimenco, Fraunhofer COMEDD, LG Display, Ocular, and Samsung as Best-in-Show winners from the exhibit floor. By Jenny to innovate. By Alfred Poor 17 Part I: A Brief History of Key Areas in Display Technology In Part I of our 50

Heikenfeld, Jason

247

Property:Integrated Display/Graphics | Open Energy Information  

Open Energy Info (EERE)

Display/Graphics Display/Graphics Jump to: navigation, search Property Name Integrated Display/Graphics Property Type Text Pages using the property "Integrated Display/Graphics" Showing 22 pages using this property. A Alden Large Flume + Lab View, Test Point Alden Small Flume + Lab View, Test Point Alden Tow Tank + Lab View, Test Point Alden Wave Basin + Lab View, Test Point B Bucknell Hydraulic Flume + Microsoft Windows based systems C Conte Large Flume + Conventional PC and video displays; TecPlot Conte Small Flume + Conventional PC and video displays; TecPlot D Davidson Laboratory Tow Tank + Standard PC-based tools H Haynes Tow Tank + National Instruments LabView Haynes Wave Basin + National Instruments LabView Hinsdale Wave Basin 1 + Remote telepresence and experiment participation as part of George E. Brown Jr. Network for Earthquake Engineering Simulation (NEES)

248

Minimal Viewing Distance Calculation in LED Display Panels  

Science Journals Connector (OSTI)

Light-emitting diode (LED) display panels have received more attention recently. These panels usually are placed in public places such as streets, ...

Nazeran Motlagh, A Ali; Hashemi, B Massoud Reza

2010-01-01T23:59:59.000Z

249

Lighted display devices for producing static or animated visual displays, including animated facial features  

DOE Patents (OSTI)

An illuminated display device with a base member with a plurality of cavities therein. Illumination devices illuminate the cavities and emit light through an opening of the cavities in a pattern, and a speaker can emit sounds in synchronization with the pattern. A panel with translucent portions can overly the base member and the cavities. An animated talking character can have an animated mouth cavity complex with multiple predetermined mouth lighting configurations simulative of human utterances. The cavities can be open, or optical waveguide material or positive members can be disposed therein. Reflective material can enhance internal reflectance and light emission.

Heilbron, Valerie J; Clem, Paul G; Cook, Adam Wade

2014-02-11T23:59:59.000Z

250

Compatibility of Display Products with Stereoscopic Display Methods Andrew J. Woods  

E-Print Network (OSTI)

for Marine Science & Technology, Curtin University of Technology, GPO Box U1987, Perth 6845 AUSTRALIA surface. The observer wears a pair of liquid crystal shutter (LCS) 3D glasses whose lenses switch

251

GT40 Utility Pograms and the LISP Display Slave  

E-Print Network (OSTI)

This memo describes two GT40 programs: URUG, an octal micro-debugger: and VT07, a Datapoint simulator and general display package. There is also a description of the MITAI LISP display slave, and how it uses VT07 as a ...

Beeler, Michael

252

Organic experiences: (re)shaping interactions with deformable displays  

Science Journals Connector (OSTI)

Display technology developments mean the next generation of visual output devices will extend beyond the rigid, flat surfaces with which we are familiar to those that the user or the machine can deform. These will allow users to physically push, pull, ... Keywords: deformable displays, machine-initiated shape change, organic user experience, organic user interfaces, user-deformation

Jason Alexander; Ryan Brotman; David Holman; Audrey Younkin; Roel Vertegaal; Johan Kildal; Andrés A. Lucero; Anne Roudaut; Sriram Subramanian

2013-04-01T23:59:59.000Z

253

Electronic displays using optically pumped luminescent semiconductor nanocrystals  

SciTech Connect

A multicolor electronic display is based on an array of luminescent semiconductor nanocrystals. Nanocrystals which emit tight of different colors are grouped into pixels. The nanocrystals are optically pumped to produce a multicolor display. Different sized nanocrystals are used to produce the different colors. A variety of pixel addressing systems can be used.

Weiss, Shimon; Schlam, Michael C; Alivisatos, A. Paul

2014-03-25T23:59:59.000Z

254

Immersive Planar Display using Roughly Aligned Projectors Ramesh Raskar  

E-Print Network (OSTI)

://www.cs.unc.edu/~raskar/Planar/ Abstract When a projector is oblique with respect to a planar dis- playsurface, it creates keystoning is not perpendicular to the display screen, the resultant image is keystoned and ap- pears distorted (Fig 1). We rectangular images (b) Oblique projectors create keystoned images. positioned in large display systems, after

North Carolina at Chapel Hill, University of

255

Covered Product Category: ENERGY STAR Displays | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Displays Displays Covered Product Category: ENERGY STAR Displays October 7, 2013 - 10:56am Addthis Did you know? Enabling the power management features on displays substantially reduces energy use and related operating cost. FEMP provides acquisition guidance and Federal efficiency requirements across a variety of product categories, including displays, which are covered by the ENERGY STAR® program. Federal laws and executive orders mandate that agencies meet these efficiency requirements in all procurement and acquisition actions that are not specifically exempted by law. This acquisition guidance and associated ENERGY STAR product specifications apply to products such as computer monitors, digital picture frames, and professional signage. Products with screen sizes greater than 60 inches and

256

DISPLAYING AND INTERPRETING FLUID INCLUSION STRATIGRAPHY ANALYSES ON MUDLOG  

Open Energy Info (EERE)

DISPLAYING AND INTERPRETING FLUID INCLUSION STRATIGRAPHY ANALYSES ON MUDLOG DISPLAYING AND INTERPRETING FLUID INCLUSION STRATIGRAPHY ANALYSES ON MUDLOG GRAPHS Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Conference Proceedings: DISPLAYING AND INTERPRETING FLUID INCLUSION STRATIGRAPHY ANALYSES ON MUDLOG GRAPHS Details Activities (1) Areas (1) Regions (0) Abstract: This is the fourth paper in a series on developing fluid inclusion stratigraphy (FIS) as a logging tool for geothermal bore holes. Here we address methods of displaying analyses and plotting gas ratios used for data interpretation on mudlog plots. The goal is to develop a rapid method of data display and interpretation for the up to 10,000 analyses returned by a geothermal well FIS analysis. Author(s): Norman, D.I.; Dilley, L.M.; McCulloch, J. Published: PROCEEDINGS, Thirtieth Workshop on Geothermal Reservoir

257

Commercial Display Systems: Proposed Penalty (2013-CE-5350) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Display Systems: Proposed Penalty (2013-CE-5350) Display Systems: Proposed Penalty (2013-CE-5350) Commercial Display Systems: Proposed Penalty (2013-CE-5350) February 21, 2013 DOE alleged in a Notice of Proposed Civil Penalty that Commercial Display Systems, LLC failed to certify a variety of walk-in cooler or freezer components as compliant with the applicable energy conservation standards. DOE regulations require a manufacturer (which includes importers) to submit reports certifying that its products have been tested and meet the applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Commercial Display Systems: Proposed Penalty (2013-CE-5350) More Documents & Publications

258

Solar Field Powers Historic Garden Holiday Display | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Field Powers Historic Garden Holiday Display Field Powers Historic Garden Holiday Display Solar Field Powers Historic Garden Holiday Display December 21, 2011 - 2:58pm Addthis This is part of the holiday light display at Longwood Gardens in Pennsylvania's Brandwine Valley. This year, they commissioned an American-made 1.2 megawatt, 10.7-acre solar field as part of their goal to generate three megawatts of renewable energy by 2018. | Photo courtesy of Longwood Gardens/W. Hill This is part of the holiday light display at Longwood Gardens in Pennsylvania's Brandwine Valley. This year, they commissioned an American-made 1.2 megawatt, 10.7-acre solar field as part of their goal to generate three megawatts of renewable energy by 2018. | Photo courtesy of Longwood Gardens/W. Hill Kristin Swineford Communication Specialist, Weatherization and Intergovernmental Programs

259

P-66: Personal Communication System Hand-set with Organic Light Emitting Diode Display  

E-Print Network (OSTI)

Light Emitting Diodes (OLED) display panel. As a result, OLEDs technology was applied to a display for a

Seungeun Lee; Wonseok Oh; Sungchul Lee; Jongchan Choi

260

Chapter 7 - Hacking the Network  

Science Journals Connector (OSTI)

Abstract This chapter covers the many malicious activities an attacker can use to gain access and maintain a foothold in a network. It will also cover various attacks and the thought process an attacker may go through when penetrating your environment.

Nicholas Grant; Joseph W. Shaw II

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Organizing Large Scale Hacking Competitions  

Science Journals Connector (OSTI)

Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting. In recent years, a number of different security competitions and challenges wer...

Nicholas Childers; Bryce Boe…

2010-01-01T23:59:59.000Z

262

Mac Hack and Transposition Tables  

Science Journals Connector (OSTI)

Following the success of the Kotok/McCarthy Program at MIT, a new effort was initiated there by undergraduate Richard Greenblatt. When visiting Stanford in late 1966, Greenblatt saw a listing of the moves from on...

Monty Newborn

1997-01-01T23:59:59.000Z

263

Copyright 1999 The Association of Universities for Research in Astronomy, Inc. All Rights Reserved. Instrument Science Report ACS 2002-10  

E-Print Network (OSTI)

. Instrument Science Report ACS 2002-10 ACS software tool development W.B. Sparks, W.J. Hack, R.N. Hook, A pipeline operations are described in ACS ISRs 99-03 (Hack), 99-04 (Mutchler et al) and 99-08 (Hack

Sirianni, Marco

264

Operated by the Association of Universities for Research in Astronomy, Inc., for the National Aeronautics and Space Administration Space Telescope Science Institute  

E-Print Network (OSTI)

Dencheva, Michael Dulude, Andy Fruchter, Shireen Gonzaga, Warren Hack, Kevin Lindsay, Ray Lucas, Jennifer, and Leonardo Ubeda. Citation: In publications, refer to this document as: Gonzaga, S., Hack, W., Fruchter, ADrizzle and the enhancements to the FITS format it has introduced, please reference: A.S. Fruchter, W. Hack, N. Dencheva, M

Sirianni, Marco

265

Selective posttranslational modification of phage-displayed polypeptides  

DOE Patents (OSTI)

The invention relates to posttranslational modification of phage-displayed polypeptides. These displayed polypeptides comprise at least one unnatural amino acid, e.g., an aryl-azide amino acid such as p-azido-L-phenylalanine, or an alkynyl-amino acid such as para-propargyloxyphenylalanine, which are incorporated into the phage-displayed fusion polypeptide at a selected position by using an in vivo orthogonal translation system comprising a suitable orthogonal aminoacyl-tRNA synthetase and a suitable orthogonal tRNA species. These unnatural amino acids advantageously provide targets for posttranslational modifications such as azide-alkyne [3+2]cycloaddition reactions and Staudinger modifications.

Tsao, Meng-Lin; Tian, Feng; Schultz, Peter

2013-02-05T23:59:59.000Z

266

Selective posttranslational modification of phage-displayed polypeptides  

DOE Patents (OSTI)

The invention relates to posttranslational modification of phage-displayed polypeptides. These displayed polypeptides comprise at least one unnatural amino acid, e.g., an aryl-azide amino acid such as p-azido-L-phenylalanine, or an alkynyl-amino acid such as para-propargyloxyphenylalanine, which are incorporated into the phage-displayed fusion polypeptide at a selected position by using an in vivo orthogonal translation system comprising a suitable orthogonal aminoacyl-tRNA synthetase and a suitable orthogonal tRNA species. These unnatural amino acids advantageously provide targets for posttranslational modifications such as azide-alkyne [3+2] cycloaddition reactions and Staudinger modifications.

Tsao, Meng-Lin; Tian, Feng; Schultz, Peter

2013-11-19T23:59:59.000Z

267

Zhicheng Yang, yangzhicheng@wustl.edu (A project report written under the guidance of Prof. Raj Jain) Download  

E-Print Network (OSTI)

-crime, Cyber crime, Computer crime 1. Introduction 2. Target Cybercrime 2.1 Hacking 2.1.1. Hack Faces to Find Social Security Numbers (SSN) 2.1.2. Hack On Universal Serial Bus (USB) Cable 2.2 Malware 2.2.1. Duqu clear. For example, if someone uses high-tech hacking into a computer or server, getting something

Jain, Raj

268

Enhanced Bioaccumulation of Heavy Metals by Bacterial Cells Displaying  

E-Print Network (OSTI)

Enhanced Bioaccumulation of Heavy Metals by Bacterial Cells Displaying Synthetic Phytochelatins for enhanced bioaccumulation of toxic metals. Synthetic genes encoding for several metal strategy for develop- ing high-affinity bioadsorbents suitable for heavy metal removal. © 2000 John Wiley

Chen, Wilfred

269

Display of probability densities for data from a continuous distribution  

E-Print Network (OSTI)

Based on cumulative distribution functions, Fourier series expansion and Kolmogorov tests, we present a simple method to display probability densities for data drawn from a continuous distribution. It is often more efficient than using histograms.

Bernd A. Berg

2011-05-03T23:59:59.000Z

270

Modified Cooper Harper scales for assessing unmanned vehicle displays  

E-Print Network (OSTI)

Unmanned vehicle (UV) displays are often the only information link between operators and vehicles, so their design is critical to mission success. However, there is currently no standardized methodology for operators to ...

Donmez, Birsen

271

Haptic overlay device for flat panel touch displays  

Science Journals Connector (OSTI)

In an effort to present users with an increasing amount of information, many industries including automotive and aerospace are adopting flat panel touch displays as a user interface. These interfaces are becoming popular due to their reconfigurability ...

David Wang; Kevin Tuer; Mauro Rossi; Joseph Shu

2004-03-01T23:59:59.000Z

272

Training Room Equipment Instructions Projector and TV Display  

E-Print Network (OSTI)

Training Room Equipment Instructions Projector and TV Display The control panel on the wall are connected to a training room computer and room is equipped with a keyboard, mouse and clicker. Connect USB

Crawford, T. Daniel

273

Space to Think: Large, High-Resolution Displays for Sensemaking  

SciTech Connect

Space supports human cognitive abilities in a myriad of ways. The note attached to the side of the monitor, the papers spread out on the desk, diagrams scrawled on a whiteboard, and even the keys left out on the counter are all examples of using space to recall, reveal relationships, and think. Technological advances have made it possible to construct large display environments in which space has real meaning. This paper examines how increased space affects the way displays are regarded and used within the context of the cognitively demanding task of sensemaking. A study was conducted observing analysts using a prototype large, high-resolution display to solve an analytic problem. This paper reports on the results of this study and suggests a number of potential design criteria for future sensemaking tools developed for large, high-resolution displays.

Andrews, Christopher P.; Endert, Alexander; North, Chris

2010-05-05T23:59:59.000Z

274

WESTERN GREAT PLAINS BIG RIVER FLOODPLAIN extent exaggerated for display  

E-Print Network (OSTI)

WESTERN GREAT PLAINS BIG RIVER FLOODPLAIN G.Kittel extent exaggerated for display CAREX/GRAVEL SHORE SPARSELY VEGETATED ALLIANCE Riverine Gravel Flats Great Plains Sparse Vegetation POPULUS DELTOIDES Southern Plains Herbaceous Vegetation SYMPHORICARPOS OCCIDENTALIS TEMPORARILY FLOODED SHRUBLAND ALLIANCE

275

PAPILLON: Designing Curved Display Surfaces With Printed Optics  

E-Print Network (OSTI)

. It is based on 3D printed optics, where the surface of the display is constructed as a bundle of printed light Interfaces - Graphical user interfaces; Input devices and strategies. Keywords: 3D printing, fabrication

Poupyrev, Ivan

276

pCubee: a perspective-corrected handheld cubic display  

Science Journals Connector (OSTI)

In this paper, we describe the design of a personal cubic display that offers novel interaction techniques for static and dynamic 3D content. We extended one-screen Fish Tank VR by arranging five small LCD panels into a box shape that is light and compact ... Keywords: 3d visualization, fish tank vr, handheld device, multi-screen display, physical interaction, user evaluation, user interface

Ian Stavness; Billy Lam; Sidney Fels

2010-04-01T23:59:59.000Z

277

Two poplar methyl salicylate esterases display comparable biochemical properties but divergent expression patterns  

NLE Websites -- All DOE Office Websites (Extended Search)

Two Two poplar methyl salicylate esterases display comparable biochemical properties but divergent expression patterns Nan Zhao a , Ju Guan a , Farhad Forouhar b , Timothy J. Tschaplinski c , Zong-Ming Cheng a , Liang Tong b , Feng Chen a, * a Department of Plant Sciences, University of Tennessee, 252 Ellington Plant Science Bldg., 2431 Joe Johnson Drive, Knoxville, TN 37996, USA b Department of Biological Sciences, Northeast Structural Genomics Consortium, Columbia University, New York, NY 10027, USA c Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA a r t i c l e i n f o Article history: Received 3 June 2008 Received in revised form 27 October 2008 Available online 10 January 2009 Keywords: Black cottonwood Populus trichocarpa Methyl esterase SABP2 Methyl salicylate Salicylic acid Gene family Molecular modeling a b s t r a c t Two genes encoding proteins

278

Chameleon: A Color-Adaptive Web Browser for Mobile OLED Displays  

Science Journals Connector (OSTI)

Displays based on organic light-emitting diode (OLED) technology are appearing on many mobile devices. Unlike liquid crystal displays (LCD), OLED displays consume dramatically different power for showing different colors. In particular, OLED displays ... Keywords: OLED display, web browser, color transformation, low power.

Mian Dong; Lin Zhong

2012-05-01T23:59:59.000Z

279

Resourceful Kansas Puts Energy Efficient Technology on Display,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Resourceful Kansas Puts Energy Efficient Technology on Display, Resourceful Kansas Puts Energy Efficient Technology on Display, Demonstrates Cost-Saving Benefits Resourceful Kansas Puts Energy Efficient Technology on Display, Demonstrates Cost-Saving Benefits June 2, 2011 - 3:45pm Addthis One of Riley County Public Works' new wind turbines. | Courtesy of: Riley County Public Works One of Riley County Public Works' new wind turbines. | Courtesy of: Riley County Public Works Lindsey Geisler Lindsey Geisler Public Affairs Specialist, Office of Public Affairs It turns out there's more to harvest in Kansas than just the wheat and soybeans. As one of the windiest states in the country, it's a great place to harness wind and solar power. And through the Department of Energy's Energy Efficiency and Conservation Block Grant program, the

280

Resourceful Kansas Puts Energy Efficient Technology on Display,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Resourceful Kansas Puts Energy Efficient Technology on Display, Resourceful Kansas Puts Energy Efficient Technology on Display, Demonstrates Cost-Saving Benefits Resourceful Kansas Puts Energy Efficient Technology on Display, Demonstrates Cost-Saving Benefits June 2, 2011 - 3:45pm Addthis One of Riley County Public Works' new wind turbines. | Courtesy of: Riley County Public Works One of Riley County Public Works' new wind turbines. | Courtesy of: Riley County Public Works Lindsey Geisler Lindsey Geisler Public Affairs Specialist, Office of Public Affairs It turns out there's more to harvest in Kansas than just the wheat and soybeans. As one of the windiest states in the country, it's a great place to harness wind and solar power. And through the Department of Energy's Energy Efficiency and Conservation Block Grant program, the

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Spatial resolution and noise in organic light-emitting diode displays for medical imaging applications  

Science Journals Connector (OSTI)

We report on the resolution and noise characteristics of handheld and workstation organic light-emitting diode (OLED) displays in comparison with liquid crystal displays (LCDs). The...

Yamazaki, Asumi; Wu, Chih-Lei; Cheng, Wei-Chung; Badano, Aldo

2013-01-01T23:59:59.000Z

282

Sent April 30, 2012 Is this email not displaying correctly?  

E-Print Network (OSTI)

Imaging (formerly Radiology) as a national leader in medical imaging. The scanner was installed recently at The University of Arizona Medical Center ­ University Campus. MRI Goggles Reduce Anxiety for Pediatric Patients

Arizona, University of

283

ESSES 2003 2003, Carla Schlatter Ellis Display Management  

E-Print Network (OSTI)

1 ESSES 2003© 2003, Carla Schlatter Ellis Display Management: Sensing User Intention and Context (HOTOS 2003) 2ESSES 2003© 2003, Carla Schlatter Ellis Outline · Motivation and Research Objective · Face · Related Work ­ ACPI ­ Dark Windows #12;2 3ESSES 2003© 2003, Carla Schlatter Ellis Motivation · Current

Ellis, Carla

284

COLORADO PLATEAU PINYON-JUNIPER WOODLAND extent exaggerated for display  

E-Print Network (OSTI)

and foothills of the Colorado Plateau region from the Western Slope of Colorado to the Wasatch Range, and southCOLORADO PLATEAU PINYON-JUNIPER WOODLAND S.Kettler extent exaggerated for display JUNIPERUS at all (Reid et al. 1999). COLORADO PLATEAU PINYON-JUNIPER WOODLAND 1 REVISED: SEPTEMBER 2005 #12;A

285

COLORADO PLATEAU HANGING GARDEN extent exaggerated for display  

E-Print Network (OSTI)

are a small patch community type in the canyons of western Colorado. These highly localized environmentsCOLORADO PLATEAU HANGING GARDEN R.Rondeau extent exaggerated for display AQUILEGIA MICRANTHA differ somewhat in geology and species composition from those of the Colorado Plateau to the south

286

Retrieval models for audience selection in display advertising  

Science Journals Connector (OSTI)

Web applications often rely on user profiles of observed user actions, such as queries issued, page views, etc. In audience selection for display advertising, the audience that is likely to be responsive to a given ad campaign is identified via such ... Keywords: ad targeting, audience selection, retrieval models

Sarah K. Tyler; Sandeep Pandey; Evgeniy Gabrilovich; Vanja Josifovski

2011-10-01T23:59:59.000Z

287

Colour, design and reward: phenotypic integration of fleshy fruit displays  

E-Print Network (OSTI)

Colour, design and reward: phenotypic integration of fleshy fruit displays A. VALIDO*, H. M pivot around complex structures such as flowers and fruits, a central question is to what extent.g. Murren, 2002; Herrera et al., 2002; Pe´rez-Barrales et al., 2007; Pe´rez et al., 2007). Fleshy fruits

Jordano, Pedro

288

might not believe that someday soon your TV will display  

E-Print Network (OSTI)

" computer. For data like a Web page, this is no big deal. The computers can keep communicating, taking many your TV will display crisp-looking movies and sitcoms sent via the Internet. But electrical engineering for television and movies because it is nearly ubiquitous and handles digital data with incredible versatility

Girod, Bernd

289

Visualising Internet Traffic Data with Three-Dimensional Spherical Display  

E-Print Network (OSTI)

successful in this respect has proven to give good predictions about structural features of the InternetVisualising Internet Traffic Data with Three-Dimensional Spherical Display Ben Yip1 , Shea Goyette1 of visualising internet traffic data using the underlying spherical nature of the globe. The method uses data

Hong,Seokhee

290

SMART PodiumTM 500 Interactive pen display  

E-Print Network (OSTI)

register your SMART product, we'll notify you of new features and software upgrades. Register online environment. This equipment generates, uses and can radiate radio frequency energy and, if not installed interactive pen display, read and understand the safety warnings and precautions in this user's guide

291

THE EFFECT OF FLORAL DISPLAY SIZE ON POLLINATOR VISITATION Introduction  

E-Print Network (OSTI)

. Hence they achieve higher fitness through the female function (= seed production). Another hypothesis is heritable, and pollinator behavior can drive selection for large display size. Rubber Rabbitbrush inflorescences. The flowers are pollinated by a variety of insects. Flower production exceeds seed production

Cavitt, John F.

292

Microporous Patterned Electrodes for Color-Matched Electrochromic Polymer Displays  

E-Print Network (OSTI)

Microporous Patterned Electrodes for Color-Matched Electrochromic Polymer Displays Pierre of electroactive and conducting polymers offers new opportunities for the design of materials for electrochromic the most promising electrochromic (EC) properties. Here, we report the use of highly porous metallized

Tanner, David B.

293

Person Aware Advertising Displays: Emotional, Cognitive, Physical Adaptation Capabilities  

E-Print Network (OSTI)

Person Aware Advertising Displays: Emotional, Cognitive, Physical Adaptation Capabilities advertising. In the future however, the ever more demanding audience will not be satisfied by today's contents the efficiency of outdoor advertising. The paper starts with a vision of out-of-home- media in the year 2034

294

ON THE IDENTIFICATION AND HAPTIC DISPLAY OF FRICTION  

E-Print Network (OSTI)

ON THE IDENTIFICATION AND HAPTIC DISPLAY OF FRICTION A DISSERTATION SUBMITTED TO THE DEPARTMENT by Christopher Richard All Rights Reserved #12;iv Abstract Although friction is an important phenomenon and greatly affects the way in which individ- uals interact with the world, friction is all but absent from

Stanford University

295

Interactive Weather Simulation and Visualization on a Display Wall  

E-Print Network (OSTI)

.hoai.ha,john.markus.bjorndalen,otto.anshus}@uit.no, {tormsh,daniels}@cs.uit.no Abstract. Numerical Weather Prediction models (NWP) used for op- erational Weather Model, WRF, Tiled Display Walls, Live Data Sets, On-Demand Computation. 1 Introduction Numerical Weather Prediction models for use in weather forecasting centers are often computed for a fixed static

Ha, Phuong H.

296

Toward Characterizing the Productivity Benefits of Very Large Displays  

E-Print Network (OSTI)

dramatically over the next four years. This price drop has already begun and the average computer consumer can power of the PC has fueled a powerful demand for ever larger and more capable display devices. Cathode models to measure their effectiveness for productivity applications. One approach to garnering extra

Rajamani, Sriram K.

297

The TV Turtle A Logo Graphics System for Raster Displays  

E-Print Network (OSTI)

The TV Turtle A Logo Graphics System for Raster Displays Henry Lieberman Logo Group MIT Artificial programming for raster and vector systems are illustrated with a description of the author's TV Turtle-like interactive programming language designed for use by kids, and is based on Logo's turtle geometry approach

Lieberman, Henry

298

Investigation of Energy-Efficient Supermarket Display Cases  

SciTech Connect

Supermarkets represent one of the largest energy-intensive building groups in the commercial sector, consuming 2 to 3 million kWh/yr per store (ES-1). Over half of this energy use is for the refrigeration of food display cases and storage coolers. Display cases are used throughout a supermarket for the merchandising of perishable food products. The cases are maintained at air temperatures ranging from -10 to 35 F, depending upon the type of product stored. The operating characteristics and energy requirements of the refrigeration system are directly related to the refrigeration load. The sources of the display case refrigeration load consist of: (1) Moist and warm air infiltration through the open front of the case--air curtains are employed to inhibit this infiltration, but some ambient air is entrained, which adds a substantial portion to the refrigeration load. (2) Heat conduction through case panels and walls. (3) Thermal radiation from the ambient to the product and display case interior. (4) Internal thermal loads--the use of lights, evaporator fans, periodic defrosts, and antisweat heaters adds to the refrigeration load of the display case as well as directly consuming electric energy. The impact of each of these elements on the refrigeration load is very dependent upon case type (Figure ES-1). For example, air infiltration is the most significant portion of the refrigeration load for open, multi-deck cases, while radiation is the largest part of the load for tub-type cases. The door anti-sweat heaters represent a major share of the refrigeration load for frozen food door reach-in cases. Figure ES-2 shows the distribution of display cases in a typical supermarket (ES-2). Open, multi-deck, medium temperature display cases typically comprise about half of the refrigerated fixtures in a store (ES-3). In addition, medium temperature fixtures and storage coolers account for roughly 70 to 75 percent of the total store refrigeration load with open, multi-deck cases contributing about 3/4 of that fraction. Consequently, the focus of this investigation has tilted toward the open, vertical, multi-deck medium temperature case type. Various technologies and control methods are energy efficiency measures (EEMs) that could be applied to display cases and result in the reduction of the refrigeration load and of the energy consumption of the supermarket refrigeration system. An extensive evaluation of the EEMs was conducted in order to select those that met the following criteria: (1) Near-term implementation--All EEMs considered could be implemented with existing refrigeration hardware and technology. (2) Potential for energy-efficiency improvements--Energy savings and/or refrigeration load reduction must be obtained by the implementation of the EEM. (3) Enhancement of the ability to maintain target product temperature--Proper operation of the display case and maintenance of the stored product temperature could not be compromised by the use of the EEM. The energy impact of a number of viable display case EEMs was quantified by performing whole building hourly simulations. A special version of the U.S. Department of Energy's (DOE-2.3) program was used to develop a model of a supermarket. The model was then calibrated using available end-use monitored data to increase confidence in simulation results.

Walker, D.H.

2005-01-21T23:59:59.000Z

299

E-Print Network 3.0 - antihistamines Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Epinephrine Antihistamine *Throat: Tightening of throat, hoarseness, hacking cough Epinephrine Source: Farritor, Shane - Department of Mechanical Engineering, University...

300

E-Print Network 3.0 - antihistaminics Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Epinephrine Antihistamine *Throat: Tightening of throat, hoarseness, hacking cough Epinephrine Source: Farritor, Shane - Department of Mechanical Engineering, University...

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

E-Print Network 3.0 - administered antihistamines bepotastine...  

NLE Websites -- All DOE Office Websites (Extended Search)

Epinephrine Antihistamine *Throat: Tightening of throat, hoarseness, hacking cough Epinephrine Source: Farritor, Shane - Department of Mechanical Engineering, University...

302

PDF Display Problems and Solutions, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Adobe PDF Help Document Adobe PDF Help Document ITD Home | ITD Helpdesk User Notice: This guide is provided for reference only. Technical support will not be available except to the Brookhaven National Laboratory user community. What to do when PDF files do not open correctly or when your browser displays a blank white screen after trying to open the PDF file... If the Adobe Acrobat viewer doesn't display PDF files inside your Web browser as expected, try Solution 1 or update to the latest version of the Acrobat viewer. Some PDF's use security features that may not run in older versions. If Solution 1 does not work, I would try Solution 2 and make sure that the Acrobat viewer can read the PDF file by downloading it to your hard disk. If these solutions do not fix your problem, try applying one or more of the other solutions listed below.

303

Dose factor entry and display tool for BNCT radiotherapy  

DOE Patents (OSTI)

A system for use in Boron Neutron Capture Therapy (BNCT) radiotherapy planning where a biological distribution is calculated using a combination of conversion factors and a previously calculated physical distribution. Conversion factors are presented in a graphical spreadsheet so that a planner can easily view and modify the conversion factors. For radiotherapy in multi-component modalities, such as Fast-Neutron and BNCT, it is necessary to combine each conversion factor component to form an effective dose which is used in radiotherapy planning and evaluation. The Dose Factor Entry and Display System is designed to facilitate planner entry of appropriate conversion factors in a straightforward manner for each component. The effective isodose is then immediately computed and displayed over the appropriate background (e.g. digitized image).

Wessol, Daniel E. (Bozeman, MT); Wheeler, Floyd J. (Idaho Falls, ID); Cook, Jeremy L. (Greeley, CO)

1999-01-01T23:59:59.000Z

304

Seattle University University Recreation  

E-Print Network (OSTI)

2013-2014 022113 Seattle University University Recreation Assumption of Risk, Waiver, and Release and recreation activities, services, equipment and/or facilities including, but not limited to, club and intramural sports, fitness programs, outdoor recreation, Connolly Center and Eisiminger Fitness Center, I

Carter, John

305

Method and apparatus for providing simultaneous displays in panoramic radiography  

SciTech Connect

Two different areas of a focal trough of a dental arch structure are simultaneously displayed on a radiograph when tubehead-camera assembly of an x-ray machine panoramically scans the dental arch structure. The different areas of the focal trough are obtained when a pair of parallel disposed film holding devices within the camera are caused to travel in proximate relationship to each other at different speeds. The x-rays activate and pass through one film before activating the other immediately therebehind.

Cushman, R.H.

1980-03-18T23:59:59.000Z

306

L&E: Refrigerated Display Case | The Better Buildings Alliance  

NLE Websites -- All DOE Office Websites (Extended Search)

Lighting & Electrical » Adopt the Lighting & Electrical » Adopt the refrigerated display case lighting performance specification and start saving on your case lighting costs Activities Technology Solutions Teams Lighting & Electrical Space Conditioning Plug & Process Loads Food Service Refrigeration Laboratories Energy Management & Information Systems Public Sector Teams Market Solutions Teams Adopt the refrigerated display case lighting performance specification and start saving on your case lighting costs The LED Refrigerated Display Case Lighting Specification delivers nearly 50% energy savings compared to typical display case lighting. If all retail refrigerated display cases switched today to LED systems, over 2.1 TWh of electricity could be saved annually. LED Refrigerated Display Case Lighting Specification

307

Retargeting Vector Animation for Small Displays Vidya Setlur  

E-Print Network (OSTI)

Research Center Xuejin Chen USTC and Microsoft Research Asia Yingqing Xu Microsoft Research Asia Bruce is held by the HIT Lab NZ, University of Canterbury MUM 2005 Christchurch, New Zealand ISBN 0

Gooch, Bruce

308

Fast oscillatory behavior of the excited xenon density in the discharge cells of a plasma display panel  

SciTech Connect

Fast oscillation of the excited xenon density occurs universally after an electrical discharge in the cells of a plasma display panel. A theoretical model based on ion plasma oscillation simulates this oscillatory behavior of the excited xenon density reasonably well. The magnitude and lifetime of the excited xenon density in a metastable state depend highly on the electrode configuration. Particularly, T-type electrodes provide better generation and confinement of excited xenon atoms for an abundant emission of 173 nm ultraviolet light at a high level of efficiency.

Uhm, Han S. [Department of Molecular Science and Technology, Ajou University, Suwon 443-749 (Korea, Republic of); Choi, Eun H. [Department of Electrophysics, PDP Research Center, Kwangwoon University, Seoul 139-701 (Korea, Republic of)

2009-03-15T23:59:59.000Z

309

Magnetic Affinity Immunoassay Based Enzyme-labeled Phage Displayed Antibody  

Science Journals Connector (OSTI)

Abstract A novel magnetic affinity immunoassay (MAIA) strategy on the basis of enzyme-labeled phage displayed antibody was developed. The assay consisted of a sandwich format in which immobilized polyclonal antibody (pcAb) on magnetic microparticle was used as capture probe, and enzyme-labeled phage displayed antibody as specific detection probe to increase enzyme amount and enhance detection signal. By the proposed method, ?-bungarotoxin (?-BGT) was successfully detected. A linear relationship between absorbance value and the concentration of ?-BGT in the range of 0.016–62.5 ?g L?1 was obtained. The linear regression equation was Y = 0.641X + 1.355 (R = 0.9925, n = 13, p < 0.0001) with a detection limit of 0.016 ?g L?1. In comparison with the traditional ELISA, this method provided a 10-fold better sensitivity in ?-BGT detection. Also this method provided a 4-fold better sensitivity comparing with the MAIA based on enzyme labeled monoclonal antibody (mcAb). Due to the low detection limit, high accuracy and specificity, this method holds great promise in toxin trace detection.

Xi-Hui MU; Zhao-Yang TONG; Qi-Bin HUANG; Bing LIU; Zhi-Wei LIU; Lan-Qun HAO; Jin-Ping ZHANG

2014-01-01T23:59:59.000Z

310

A modified formulation of fractional stratiform condensation rate in the NCAR Community Atmospheric Model (CAM2)  

E-Print Network (OSTI)

Sciences, University of Washington, Seattle, Washington, USA James J. Hack and Phillip J. Rasch National, Community Atmospheric Model (CAM) Citation: Zhang, M., W. Lin, C. Bretherton, J. Hack, and P. J. Rasch

Zhang, Minghua

311

university of saskatchewan alumni handbook university of  

E-Print Network (OSTI)

university of saskatchewan alumni handbook university of saskatchewan alumni handbook university of saskatchewan alumni handbook university of saskatchewan alumni handbook university of saskatchewan alumni handbook university of saskatchewan alumni handbook university of saskatchewan alumni handbook university

Saskatchewan, University of

312

Literature List Arabatzis, T. 2006. Representing Electrons: A Biographical Approach to Theoretical  

E-Print Network (OSTI)

(Springer), pp. 13-28. Hacking, I. 1983. Representing and Intervening (Cambridge University Press), pp. 149-185, 210-232. Hacking, I. 1999. The Social Construction of What? (Harvard University Press), pp. 1-34, 63-99. Hacking, I. 2000. "How Inevitable Are the Results of Successful Science?" Philosophy of Science 67

313

Effect of fluorescent lighting on the color of liquid-crystal displays  

Science Journals Connector (OSTI)

Liquid-crystal displays (LCDs) are used for displaying medical images under various illuminance conditions and with ambient-lighting colors. Our purpose in this study was ... of the chromaticity in LCDs under dif...

Yudai Yano; Junji Morishita; Hiroshi Akamine…

2014-07-01T23:59:59.000Z

314

Programmable window : a large-scale transparent electronic display using SPD film  

E-Print Network (OSTI)

This research demonstrates that Suspended Particle Device (SPD) film is a viable option for the development of large-scale transparent display systems. The thesis analyzes the SPD film from an architectural display application ...

Ramos, Martin (Ramos Rizo-Patron)

2004-01-01T23:59:59.000Z

315

Copyright 1999 The Association of Universities for Research in Astronomy, Inc. All Rights Reserved. Instrument Science Report ACS 2001-10  

E-Print Network (OSTI)

. Instrument Science Report ACS 2001-10 ACS software tool development W.B. Sparks, W.J. Hack, M. Clampin-3 (Sparks et al). The ACS pipeline operations are described in ACS ISRs 99-03 (Hack), 99-04 (Mutchler et al) and 99-08 (Hack). #12;Instrument Science Report ACS 2001-10 2 PyDrizzle and calacs We expect OPUS 13

Sirianni, Marco

316

HIPerPaper: Introducing Pen and Paper Interfaces for Ultra-Scale Wall Displays  

E-Print Network (OSTI)

.8 by 7.5 foot tiled wall display of 268,720,000 pixels. HIPerPaper provides a flexible, portable cost of displays and growing power of graph- ics processing units (GPUs) are enabling visualization (HIPerSpace1 ) is a 31.8 foot wide by 7.5 foot tall wall dis- play. Seventy tiled 30" Dell LCD displays

Wang, Deli

317

Pinch-drag-flick vs. spatial input: rethinking zoom & pan on mobile displays  

Science Journals Connector (OSTI)

The multi-touch-based pinch to zoom, drag and flick to pan metaphor has gained wide popularity on mobile displays, where it is the paradigm of choice for navigating 2D documents. But is finger-based navigation really the gold standard' In this paper, ... Keywords: mobile displays, multi-touch input, spatial input, spatially aware displays, user study

Martin Spindler; Martin Schuessler; Marcel Martsch; Raimund Dachselt

2014-04-01T23:59:59.000Z

318

Oxygen Atoms Display Novel Behavior on Common Catalyst  

NLE Websites -- All DOE Office Websites (Extended Search)

11, 2008 11, 2008 Oxygen Atoms Display Novel Behavior on Common Catalyst Like waltzing dancers, the two atoms of an oxygen molecule usually behave identically when they separate on the surface of a catalyst. However, new research from the Environmental Molecular Sciences Laboratory reveals that on a particular catalyst, the oxygen atoms act like a couple dancing the tango: one oxygen atom plants itself while the other shimmies away, probably with energy partially stolen from the stationary one. Scientists from EMSL and Pacific Northwest National Laboratory discovered this unanticipated behavior while studying how oxygen interacts with reduced titanium oxide, a popular catalyst and a model oxide. Their research began with a slice of titanium oxide crystal, oriented so that titanium and oxygen

319

Development and evaluation of a function-oriented display system  

SciTech Connect

Although no clear design philosophy for screen-based HSIs exist, Screen-based Human System Interfaces (HSI) are gradually replacing the conventional panel-based HSIs. The current paper presents a comprehensive design philosophy where a function-analysis of the plant forms the backbone of the information requirements, information presentation and display organization. The main characteristics of the concept are described as well as the development process behind the first prototype. Findings from the first usability test of the prototype are reported and potential benefits of the HSI are discussed. Ideas and problem areas for a future improved prototype are also described in the paper. The work is part of OECD Halden Reactor Project's ongoing research on innovative design for advanced NPP control-rooms and is conducted in close co-operation with Electricite de France. (authors)

Andresen, G.; Broberg, H.; Kvalem, J. [IFE, OECD HRP (Norway)

2006-07-01T23:59:59.000Z

320

Stable and metastable nanowires displaying locally controllable properties  

DOE Patents (OSTI)

Vapor-liquid-solid growth of nanowires is tailored to achieve complex one-dimensional material geometries using phase diagrams determined for nanoscale materials. Segmented one-dimensional nanowires having constant composition display locally variable electronic band structures that are determined by the diameter of the nanowires. The unique electrical and optical properties of the segmented nanowires are exploited to form electronic and optoelectronic devices. Using gold-germanium as a model system, in situ transmission electron microscopy establishes, for nanometer-sized Au--Ge alloy drops at the tips of Ge nanowires (NWs), the parts of the phase diagram that determine their temperature-dependent equilibrium composition. The nanoscale phase diagram is then used to determine the exchange of material between the NW and the drop. The phase diagram for the nanoscale drop deviates significantly from that of the bulk alloy.

Sutter, Eli Anguelova; Sutter, Peter Werner

2014-11-18T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

University Library University of Saskatchewan  

E-Print Network (OSTI)

University Library University of Saskatchewan Core Competencies for University of Saskatchewan Librarians This document defines the basic knowledge and skills librarians at the University of Saskatchewan as reflected in Promise and Potential: The Third Integrated Plan 2012 to 2016 , University of Saskatchewan

Saskatchewan, University of

322

Brock University Department of Computer Science  

E-Print Network (OSTI)

of Computer Science St. Catharines, Ontario Canada L2S 3A1 www.cosc.brocku.ca #12;1 Task Performance Metrics. Catharines, Ontario, Canada L2S 3A1 bockusd@brocku.ca Jg03zr@brocku.ca Abstract Twenty participants performedBrock University Department of Computer Science Task Performance Metrics on Liquid Crystal Displays

323

Abstract Red is a common colour signal in both aposematic warning displays, and in fruit displays. One common feature is that red is conspicuous against the natural  

E-Print Network (OSTI)

Abstract Red is a common colour signal in both aposematic warning displays, and in fruit displays. One common feature is that red is conspicuous against the natural background of the prey and fruits. However, there is a potential conflict between fruits and aposematic prey in how a bird predator should

Tullberg, Birgitta

324

Vibration Enhances Geometry Perception with Tactile Shape Displays Mara Oyarzbal *  

E-Print Network (OSTI)

of Engineering and Applied Sciences, Harvard University, Cambridge, MA, USA E-mail: maria@oyarzabal.com, nakatani@star could not perceive a 0.1 mm deep central indentation when it was presented statically.1 mm above the surrounding surface with similar bars projecting to each side (Figure 1a). For central

Tachi, Susumu

325

Policy Name: Weapons Policy Originating/Responsible Department: University Safety  

E-Print Network (OSTI)

Policy Name: Weapons Policy Originating/Responsible Department: University Safety Approval the following concerns, obstacles, and risks: · Weapons (such as Firearms and Replica Weapons) have to display Weapons as an illustration or statement of their research; · Carleton University owns Weapons

Carleton University

326

Intelligent head-down display design for the smart cockpit  

E-Print Network (OSTI)

overload has become a highly important area of research. One such research program exists at Texas A&M University which deals extensively with the information overload problem through the concept of the "Smart Cue+it". This thesis follows the format of... be directly measured. These state variables include altitude, heading, indicated airspeed, pitch and roll attitude, and turn rate. One significantly beneficial component of the sensor suites is the Global Positioning System (GPS). By integrating GPS...

Branham, Paul Anthony

2012-06-07T23:59:59.000Z

327

TOM NEDOROST FACULTY ADVISOR  

E-Print Network (OSTI)

Team, and is the faculty advisor for Hack@UCF. Dr. Nedorost lauds the team's success. "Seeing a team at the University of Central Florida (also known as Hack@UCF). In just two years, the team has won the 2013 and 2014, spyware and other malicious hacking methods. As the threats are presented, the team responds as they would

Stanley, Kenneth O.

328

42.22 n, 83.75 w by Dan Shine  

E-Print Network (OSTI)

- sity of Michigan group dedicated to computer hacking. But this isn't the rise of the next Anonymous economic and national security challenges we face as a nation." It's computer hacking. So some might be surprised to hear hacking is alive and well at the University of Michigan. In fact, there's even a new

Michigan, University of

329

DOE Solar Decathlon: Purdue University  

NLE Websites -- All DOE Office Websites (Extended Search)

Purdue University Purdue University Purdue University's INhome-short for Indiana home-earned an overall second-place finish at the U.S. Department of Energy Solar Decathlon 2011. After the competition, the house was relocated to Chatham Square, a new housing development in Lafayette, Indiana, that is part of a broader neighborhood revitalization effort. The house is unchanged from its Solar Decathlon configuration except that the garage was moved to the opposite side of the house to accommodate the shape of the lot. The house was on display throughout 2012 and is currently offered for sale. The INhome provides a realistic and balanced vision for ultra-efficient housing. It is fully functional yet practical and features efficient systems and sustainable design without sacrificing modern comforts and

330

Final Report of Project Nanometer Structures for Fuel Cells and Displays, etc.  

E-Print Network (OSTI)

Nanometer Structures for Fuel Cells and Displays, etc. Qingtechnologies (solar and fuel cells, lithium batteries). Intechnologies (solar and fuel cells, lithium batteries), and

Ji, Qing

2012-01-01T23:59:59.000Z

331

Visualizing Audio in a First-Person Shooter With Directional Sound Display  

E-Print Network (OSTI)

Visualizing Audio in a First-Person Shooter With Directional Sound Display Alexandra Holloway representation of audio information for deaf and hearing impaired individuals. Specifically, it determines

California at Santa Cruz, University of

332

On Semantics, Compiler Generation, and Hacking  

Science Journals Connector (OSTI)

Compiler generation is a meeting point for theory and practice in computing. On the one hand it is theoretical, because it tries to find a framework in which the semantics of programming languages can be expre...

Mads Tofte Ph. D.

1990-01-01T23:59:59.000Z

333

Chapter 15 - Hacking as a Career  

Science Journals Connector (OSTI)

Abstract: This chapter examines the steps needed to obtain a job within the Information System Security profession, including that of a professional penetration testing engineer. Different methods of obtaining job experience, identifying the correct certifications needed to get into one’s desired profession, and organizing one’s career path are discussed.

Thomas Wilhelm

2013-01-01T23:59:59.000Z

334

Chapter 3 - Hacking the Smart Grid  

Science Journals Connector (OSTI)

Abstract This chapter describes the potential methods and motives behind an attack on the Smart Grid. Knowing who might attack the grid and how they might proceed is imperative for understanding how to defend it. Since the Smart Grid is such an important infrastructure component, this understanding is vital to its proper implementation and continued operation.

Eric D. Knapp; Raj Samani

2013-01-01T23:59:59.000Z

335

Semantic Hacking and Intelligence and Security Informatics  

Science Journals Connector (OSTI)

In the context of information warfare Libicki first characterized attacks on computer systems as being physical, syntactic, and semantic, where software agents were misled by an adversary’s misinformation [1]. Re...

Paul Thompson

2003-01-01T23:59:59.000Z

336

Compiler Hacking for Source Code Analysis  

Science Journals Connector (OSTI)

Many activities related to software quality assessment and improvement, such as empirical model construction, data flow analysis, testing or reengineering, rely on static source code analysis as the first and ...

G. Antoniol; M. Di Penta; G. Masone; U. Villano

2004-12-01T23:59:59.000Z

337

Chapter 7 - Hacking Industrial Control Systems  

Science Journals Connector (OSTI)

Abstract An in-depth discussion on how an industrial network might be attacked, including possible target systems, and the potential consequences should those targets be compromised. Learn how a hacker thinks, how malware works, and what to do if your industrial network becomes infected.

Eric D. Knapp; Joel Thomas Langill

2015-01-01T23:59:59.000Z

338

Flow in Computer Hacking: A Model  

Science Journals Connector (OSTI)

In this study hackers’ motivation is investigated, using the flow paradigm. It was hypothesized that flow increases with the increase of hackers’ competence in the IT use. An on-line research was administered wit...

Alexander E. Voiskounsky; Olga V. Smyslova

2003-01-01T23:59:59.000Z

339

Heart Don’t Panic! Hack it!  

Science Journals Connector (OSTI)

It seems appropriate that the Ars Electronica, whose overarching motto this year is “InfoWar”, would host a “Hackertreff” (Hackers’ meeting) as part of the Festival. The time is right: hackers are back. And si...

Patrice Riemens

1998-01-01T23:59:59.000Z

340

The Universe Adventure - Today's Universe  

NLE Websites -- All DOE Office Websites (Extended Search)

4: Today's Accelerating Universe 4: Today's Accelerating Universe The Universe Today Dark matter has aided in forming the universe we see today; however, many questions regarding the cosmos remain. What is the status of the Universe today? We know the Universe is expanding... But what do we know about the expansion? Supernova survey. Surveys of supernova provide scientists with information about the history of the Universe. Classroom Cosmology Classroom Cosmology: Toilet Paper Cosmology In 1997 advances in telescope technology allowed astronomers to conduct redshift surveys of very distant type Ia supernovae. This enabled them to look further back into the Universe's history than previously possible. Their stunning results rivaled Hubble's original discovery and turned cosmology on its head. While most theoretical models predicted that the

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Copyright 1999 The Association of Universities for Research in Astronomy, Inc. All Rights Reserved. Instrument Science Report ACS 2000-03  

E-Print Network (OSTI)

relating to each item. The present ACS pipeline operations are described in ACS ISRs 99-03 (Hack), 99-04 (Mutchler et al) and 99-08 (Hack). #12;Instrument Science Report ACS 2000-03 2 II. The Geometric Issues ACS

Sirianni, Marco

342

Laser Pointer System Intuitive Interaction for Large High-Res Displays  

E-Print Network (OSTI)

Laser Pointer System Intuitive Interaction for Large High-Res Displays LEDs Accelerometer Vibration Buttons Laser & LEDs Unlike conventional input devices like mouse and keyboard, laser pointers do that are displayed on large high-resolution screens. The laser pointer technology was developed in cooperation

Reiterer, Harald

343

Interactive opinion polls on public displays: studying privacy requirements in the wild  

Science Journals Connector (OSTI)

Interactive opinion polls are a promising novel use case for public urban displays. However, voicing one's opinion at such a public installation poses special privacy requirements. In this paper, we introduce our ongoing work on investigating the roles ... Keywords: mobile interaction, privacy, public display, public poll

Matthias Baldauf, Stefan Suette, Peter Fröhlich, Ulrich Lehner

2014-09-01T23:59:59.000Z

344

Exploring user preferences for indoor navigation support through a combination of mobile and fixed displays  

Science Journals Connector (OSTI)

In this paper we explore, through a formative study, user preferences for indoor navigation support using a combination of mobile and fixed displays along with a range of navigation content such as digital 2D maps, 3D route visualizations (presented ... Keywords: 3D visualization, digital displays, digital maps, graphical directional signage, indoor navigation, mobile phones

Faisal Taher; Keith Cheverst

2011-08-01T23:59:59.000Z

345

Autopoiesic Content: A Conceptual Model for Enabling Situated Self-generative Content for Public Displays  

E-Print Network (OSTI)

that are not part of themselves ­ such as a car factory. #12;A set of carefully crafted matching templates would- able) "ambient displays", e.g., colored orbs2 showing stock trends, water fountains3 indicating information. A more power- ful concept (b) is the idea of connecting different display systems based

Krause, Rolf

346

DISPLAY OF FRICTION IN VIRTUAL ENVIRONMENTS BASED ON HUMAN FINGER PAD CHARACTERISTICS  

E-Print Network (OSTI)

DISPLAY OF FRICTION IN VIRTUAL ENVIRONMENTS BASED ON HUMAN FINGER PAD CHARACTERISTICS A. Nahvi, J City, UT 84112 ABSTRACT A friction display system is proposed for virtual environ- ments. Since a user the frictional properties of the human finger pad on 9 subjects by simultaneously recording force and movement

Hollerbach, John M.

347

Eye Contact Communication System between Mobile Robots Using Invisible Code Display  

E-Print Network (OSTI)

Eye Contact Communication System between Mobile Robots Using Invisible Code Display Takeru Furukawa. To solve this problem, this paper describes an information transmission system using an invisible code on displays which show an expression of robot's eyes. Keywords: 2D code, polarized invisible code, polarized

Paris-Sud XI, Université de

348

Lunch line: using public displays and mobile devices to encourage healthy eating in an organization  

Science Journals Connector (OSTI)

In this paper, we explore using large digital displays in combination with a personal mobile application to publicly and privately encourage people to make healthy choices. We designed, built, and deployed an experimental system called Lunch Line that ... Keywords: health challenges, healthy eating, mobile devices, persuasive technology, public displays

Kerry Shih-Ping Chang, Catalina M. Danis, Robert G. Farrell

2014-09-01T23:59:59.000Z

349

Design, implementation and evaluation of a novel public display for pedestrian navigation: the rotating compass  

Science Journals Connector (OSTI)

Important drawbacks of map-based navigation applications for mobile phones are their small screen size and that users have to associate the information provided by the mobile phone with the real word. Therefore, we designed, implemented and evaluated ... Keywords: mobile navigation, public displays, synchronized displays

Enrico Rukzio; Michael Müller; Robert Hardy

2009-04-01T23:59:59.000Z

350

ADMINISTRATIVE UNIVERSITY POLICY  

E-Print Network (OSTI)

ADMINISTRATIVE UNIVERSITY POLICY FACULTY UNIVERSITY POLICY STUDENT UNIVERSITY POLICY Issue stakeholder list "Log-In" of Proposed University Policy with the University Compliance Committee (UCC) UCC identifies which track (i.e., Administrative, Faculty, or Student) the proposed University Policy

351

Final approach guidance using an altimeter-aided Loran-C display system  

E-Print Network (OSTI)

Introduction: The goal of this thesis is to test the flyability of a display system that uses a King Radio KEAO-346 altimeter and Micrologic ML-3000 LORAN-C receiver for final approach guidance and to model the dynamics ...

Dogan, Norry

1986-01-01T23:59:59.000Z

352

In Vivo Bacteriophage Peptide Display to Tailor Pharmacokinetics of Biological Nanoparticles  

Science Journals Connector (OSTI)

Clinical use of most radiolabeled targeting agents has been limited because of the uptake and retention in kidney and/or liver. We hypothesized that bacteriophage (phage) display could be exploited to select f...

Jessica R. Newton-Northup; Marie T. Dickerson…

2014-12-01T23:59:59.000Z

353

Comparison of Pilots'' Situational Awareness While Monitoring Autoland Approaches Using Conventional and Advanced Flight Display Formats  

Science Journals Connector (OSTI)

A simulation experiment was performed to assess situation awareness (SA) and workload of pilots while monitoring simulated autoland operations in Instrument Meteorological Conditions with three advanced display concepts: two enhanced electronic flight ...

Kramer Lynda J.; Busquets Anthony M.

2000-05-01T23:59:59.000Z

354

An optical see-through head mounted display with addressable focal planes  

Science Journals Connector (OSTI)

Most existing stereoscopic head mounted displays (HMDs), presenting a pair of stereoscopic images at a fixed focal distance, lack the ability to correctly render the naturally coupled accommodation and convergence cues. Psychophysical studies have shown ...

Sheng Liu; Dewen Cheng; Hong Hua

2008-09-01T23:59:59.000Z

355

Beyond Parallax Barriers: Applying Formal Optimization Methods to Multi-Layer Automultiscopic Displays  

E-Print Network (OSTI)

with arbitrary opacities on each layer. Second, we consider general multi-layer architectures containing three. The High-Rank 3D (HR3D) display contains a stacked pair of LCD panels; rather than using heuristically

Heidrich, Wolfgang

356

A Study on Users' Preference on Interruption When Using Wearable Computers and Head Mounted Displays  

E-Print Network (OSTI)

Displays Marcus Nilsson1 , Mikael Drugge1 , Urban Liljedahl2 , Kre Synnes1 , Peter Parnes1 Lule°a Technology, 2 Division of Computer Science and Networking SE­971 87 Lule°a, Sweden {marcus.nilsson, mikael

Madiraju, Praveen

357

B&W Y-12 historian assists in LMU display design | Y-12 National...  

NLE Websites -- All DOE Office Websites (Extended Search)

related to the early years of Oak Ridge is all in a day's work for Y-12 historian Ray Smith. Recently Smith's flair for historical detail was incorporated in a permanent display...

358

Global versus Structured Interpretation of Motion: Moving Light Displays Jeffrey E. Boyd \\Lambda  

E-Print Network (OSTI)

Global versus Structured Interpretation of Motion: Moving Light Displays Jeffrey E. Boyd \\Lambda structure. However, recent work by Little and Boyd has shown that it is possible to recognize individual

Boyd, Jeffrey E.

359

Sublimate: State-Changing Virtual and Physical Rendering to Augment Interaction with Shape Displays  

E-Print Network (OSTI)

Recent research in 3D user interfaces pushes towards immersive graphics and actuated shape displays. Our work explores the hybrid of these directions, and we introduce sublimation and deposition, as metaphors for the ...

Leithinger, Daniel

360

Towards a unified treatment of 3D display using partially coherent light  

E-Print Network (OSTI)

This thesis develops a novel method of decomposing a 3D phase space description of light into multiple partially coherent modes, and applies this decomposition to the creation of a more flexible 3D display format. Any type ...

Horstmeyer, Roarke (Roarke William)

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

DOE Solar Decathlon: News Blog » Blog Archive » New Contest Data Displays  

NLE Websites -- All DOE Office Websites (Extended Search)

New Contest Data Displays Provide Insight into Competition Scoring New Contest Data Displays Provide Insight into Competition Scoring Saturday, October 5, 2013 By Solar Decathlon New contest data displays are now available on the U.S. Department of Energy Solar Decathlon website. If you are interested in the real-time performance of each house and want to keep a close eye on the competition, check out the Contests section pages. In the Contests section, the pages for the measured contests (Comfort Zone, Hot Water, Appliances, Home Entertainment, and Energy Balance) explain the contest requirements and provide real-time graphical displays of the accumulated measurements/scores for each team. Roll your cursor over the graphics to see more detailed information about each contest. For example, in the Appliances Contest graphic, the scores for running the refrigerator,

362

High-speed temporal characterization and visualization of spatial light modulators and flat-panel displays  

Science Journals Connector (OSTI)

An apparatus that can characterize and visualize temporal dynamics of spatial light modulators (SLM’s) and flat-panel displays is constructed and evaluated by use of a commercially...

Paek, Eung G; Wilson, C L; Roberts, J W; Watson, C I

1998-01-01T23:59:59.000Z

363

Efficient Selection of \\{DARPins\\} with Sub-nanomolar Affinities using SRP Phage Display  

Science Journals Connector (OSTI)

There is an ever-increasing demand to select specific, high-affinity binding molecules against targets of biomedical interest. The success of such selections depends strongly on the design and functional diversity of the library of binding molecules employed, and on the performance of the selection strategy. We recently developed SRP phage display that employs the cotranslational signal recognition particle (SRP) pathway for the translocation of proteins to the periplasm. This system allows efficient filamentous phage display of highly stable and fast-folding proteins, such as designed ankyrin repeat proteins (DARPins) that are virtually refractory to conventional phage display employing the post-translational Sec pathway. \\{DARPins\\} comprise a novel class of binding molecules suitable to complement or even replace antibodies in many biotechnological or biomedical applications. So far, all \\{DARPins\\} have been selected by ribosome display. Here, we harnessed SRP phage display to generate a phage \\{DARPin\\} library containing more than 1010 individual members. We were able to select well behaved and highly specific \\{DARPins\\} against a broad range of target proteins having affinities as low as 100 pM directly from this library, without affinity maturation. We describe efficient selection on the Fc domain of human IgG, TNF?, ErbB1 (EGFR), ErbB2 (HER2) and ErbB4 (HER4) as examples. Thus, SRP phage display makes filamentous phage display accessible for DARPins, allowing, for example, selection under harsh conditions or on whole cells. We envision that the use of SRP phage display will be beneficial for other libraries of stable and fast-folding proteins.

Daniel Steiner; Patrik Forrer; Andreas Plückthun

2008-01-01T23:59:59.000Z

364

A digital color CRT image and graphics display for data analysis  

E-Print Network (OSTI)

changing information as projected arrival and departure times and ticket availability. The CRT terminal provides a concise display of this frequently up-dated information that both the ticket agent and the public can readily un- derstand. Research... to the non-technical public. For example, many real estate offices now employ computers to store and re- trieve information on listed properties. With the addition of a color image display, the agent could call up color- coded maps of cities...

Bruns, Francis Joseph

2012-06-07T23:59:59.000Z

365

A direct method for air kerma–length product measurement in CT for verification of dose display calibrations  

Science Journals Connector (OSTI)

......kerma-length product measurement in CT for verification of dose display calibrations...kerma-length product measurement in CT for verification of dose display calibrations...practice, this means doing measurements in the standard phantoms......

Katja Merimaa; Hannu Järvinen; Mika Kortesniemi; Juhani Karppinen

2010-08-01T23:59:59.000Z

366

University of Maine at Farmington University of Southern Maine  

E-Print Network (OSTI)

State University Western State College of Colorado Southern Utah University Utah Valley University Colorado Mesa University University of Northern Colorado Southern University Louisiana State University Adams State College University of Colorado at Colorado Springs Colorado State University-Pueblo Northern

New Hampshire, University of

367

University Research  

Office of Science (SC) Website

university-research The Office of Science is the single largest supporter of basic research in the physical sciences in the United States, providing more than 40 percent of total...

368

University of Connecticut University Postdoctoral Fellow  

E-Print Network (OSTI)

University of Connecticut University Postdoctoral Fellow The Department of Ecology & Evolutionary Biology at the University of Connecticut invites applications Schlichting at: schlicht@uconn.edu. The University of Connecticut is an EEO

Holsinger, Kent

369

What Do Facts Have to Do with It? A Case Study of News Literacy at Stony Brook University  

E-Print Network (OSTI)

Brennen, B. S. (2000). What the hacks say. Journalism, 1(1),Carr, N. (2010). The shallows: What the internet is doing tohtml Curran, J. (2005). What democracy requires of the

Fleming, Jennifer

2012-01-01T23:59:59.000Z

370

University of Colorado University of Colorado Boulder  

E-Print Network (OSTI)

University of Colorado Boulder University of Colorado Boulder University of Colorado Boulder University of Colorado Boulder University of Colorado Boulder Catalog 2012­13 Redefining Teaching & Learning­13 UNIVERSITY OF COLORADO BOULDER CATALOG contains a summary of campus offerings, policies, and requirements

Mojzsis, Stephen J.

371

Turning film for widening the viewing angle of a blue phase liquid crystal display  

E-Print Network (OSTI)

of Optics and Photonics, University of Central Florida, Orlando, Florida 32816, USA 2 AU Optronics Corp

Wu, Shin-Tson

372

Zeb: Software for integration, display, and management of diverse environmental datasets  

SciTech Connect

This paper describes the Zeb software for integration, display, and management of diverse environmental datasets. Zeb's primary use is for the superpositioning of observational datasets (such as those collected by satellite, radar, mesonet, and aircraft) and analysis products (such as model results, dual-Doppler synthesis, or algorithm output). Data may be overlaid on a variety of display types, including constant altitude planes, vertical cross sections, X-Y graphs, skew T plots, and time-height profiles. The fields for display, color tables, contour intervals, and various other display options are defined using an icon-based user interface. This highly flexible system allows scientific investigators to interactively superimpose and highlight diverse datasets, thus aiding data interpretation. Data handling capabilities permit external analysis programs to be easily linked with display and data storage processes. The data store accepts incoming data, stores it on disk, and makes it available to processes that need it. An application library is available for data handling. The library functions allow data storage, retrieval, and queries using a single applications interface, regardless of the data's source and organization. The software system runs Unix and the X Window system. Zeb has been used for real-time project control as well as data interpretation at investigator's home institutions. Features and implementation are explained along with examples of graphic output. 15 refs., 2 figs., 3 tabs.

Corbet, J.; Mueller, C.; Burghart, C.; Gould, K.; Granger, G. (National Center for Atmospheric Research, Boulder, CO (United States))

1994-05-01T23:59:59.000Z

373

E-Print Network 3.0 - asociado al virus Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

University of Warwick Collection: Mathematics 16 Introduction: Molecular Bio-Hacking Department of Bioengineering Summary: infection DNA RNA protein (host DNA) + (virus...

374

E-Print Network 3.0 - anticuerpos al virus Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

University of Warwick Collection: Mathematics 12 Introduction: Molecular Bio-Hacking Department of Bioengineering Summary: infection DNA RNA protein (host DNA) + (virus...

375

E-Print Network 3.0 - asocia al virus Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

University of Warwick Collection: Mathematics 3 Introduction: Molecular Bio-Hacking Department of Bioengineering Summary: infection DNA RNA protein (host DNA) + (virus...

376

E-Print Network 3.0 - al virus vhs-1 Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

University of Warwick Collection: Mathematics 7 Introduction: Molecular Bio-Hacking Department of Bioengineering Summary: infection DNA RNA protein (host DNA) + (virus...

377

Display computers  

E-Print Network (OSTI)

?effectively invisibleÂ?, available at a glance, and seamlessly integrated into the environment. A DC should be an example of WeiserÂ?s calm technology: encalming to the user, providing peripheral awareness without information overload. A DC should provide unremarkable...

Smith, Lisa Min-yi Chen

2006-08-16T23:59:59.000Z

378

STATEMENT OF CONSIDERATIONS REQUEST BY DUPONT DISPLAYS, INC. FORAN ADVANCE WAIVER OF DOMESTIC  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DUPONT DISPLAYS, INC. FORAN ADVANCE WAIVER OF DOMESTIC DUPONT DISPLAYS, INC. FORAN ADVANCE WAIVER OF DOMESTIC AND FOREIGN INVENTION RIGHTS UNDER DOE CONTRACT NO. DE-EE0001269; W(A)-09-055, CH-1520 The Petitioner, DuPont Displays, Inc. was awarded this cooperative agreement for the performance of work entitled, "Solution-Processed Small-Molecule OLED (Organic Light Emitting Diode) Luminaire for Interior Illumination." According to its response to question 2, DuPont states that the work under this agreement will significantly improve the manufacturability of an OLED lighting panel based on solution processing of small molecule OLED materials; demonstrate and evaluate the cost effectiveness of solution processing techniques using small molecule OLED materials for SSL applications; and, improve efficiencies, lifetimes, and color rendering of OLED

379

Using an IIDC/DCAM camera for beam display and analysis  

SciTech Connect

An IIDC/DCAM camera is used to the RHIC beams as they pass through a hydrogen jet. The data is transferred over a 1394 bus to a computer with a Linux operating system. A software process on that computer collects the individual frames and packages them into parameters within the RHIC control system's framework. This information is packaged to continuously update two primary types of clients: One type is responsible for near-real-time display of the images; useful in comfort displays, etc. The second is responsible for collecting data used in analysis of beam dynamics and properties like luminosity.

Olsen,R.H.; Gassner, D.; Hoff, L. T.

2009-10-12T23:59:59.000Z

380

Constancy of built-in luminance meter measurements in diagnostic displays  

SciTech Connect

Purpose: Liquid crystal displays used to interpret medical images are often equipped with built-in luminance meters to evaluate luminance response and Grayscale Standard Display Function conformance. This work evaluates agreement between luminance reported by the built-in meters and external measurements. Methods: The white level luminance was measured using a built-in meter and an external meter for 93 primary review workstations (Models MFGD 3420 and MDCG 3120-CB) with between 117 and 49?336 backlight hours (BLH). Measured luminance values were compared viat-test for displays with less than 25?000 BLH and those with more than 25?000 BLH. Bias between meters was also evaluated. Changes in luminance uniformity with increasing backlight hours were explored by determining the maximum luminance deviation (MLD) for subsets of these displays with less than 800 BLH and greater than 35?000 BLH. Results: The mean difference between built-in and external luminance measurements was 5.84% and 38.92% for displays with less than 25?000 and greater than 25?000 BLH, respectively, with a statistically significant difference in the means (p < 0.001). For displays with low BLH, a statistically significant bias was observed (p < 0.001) between built-in and external measurements. A high degree of correlation was observed between measurements made with two separate external meters (r = 0.999). The mean MLD was 9.5% and 11.2% for MDCG 3120-CB displays with less than 800 and greater than 35?000 BLH, respectively. The difference in the mean values was not statistically significant (p < 0.001). Conclusions: Disagreement between the white level luminance measured using the built-in and external meter increased with BLH. Consequently, reliance on values reported by the built-in luminance meter may result in a reduction in image contrast with time. Recommendations have been proposed regarding luminance response testing and corrective action for failing displays.

Silosky, M., E-mail: michael.silosky@ucdenver.edu; Marsh, R. M. [Department of Radiology, University of Colorado, School of Medicine Aurora, Colorado 80045 (United States)] [Department of Radiology, University of Colorado, School of Medicine Aurora, Colorado 80045 (United States)

2013-12-15T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

University of Wisconsin Milwaukee University Recreation  

E-Print Network (OSTI)

University of Wisconsin ­ Milwaukee University Recreation FALL Semester - Student Employee that either I (after a two week notice) or University Recreation (following UWM policy) may terminate my this application to: Jamie Grenoble ­ Assistant Director University Recreation University of Wisconsin ­ Milwaukee

Saldin, Dilano

382

University of Wisconsin Milwaukee University Recreation  

E-Print Network (OSTI)

University of Wisconsin ­ Milwaukee University Recreation SUMMER Semester - Student Employee) or University Recreation(following UWM policy) may terminate my employment at any time. I further understand Director University Recreation University of Wisconsin ­ Milwaukee P.O. Box 413 Milwaukee, WI 53201 03

Saldin, Dilano

383

Adding Haptic Feedback to Mobile TV With the abundance of large-screen displays, mobile  

E-Print Network (OSTI)

-1-4503-0268-5/11/05. Jason Alexander Interaction and Graphics Group Department of Computer Science University of Bristol

Subramanian, Sriram

384

A synthetic peptide with estrogen-like activity derived from a phage-display peptide library  

E-Print Network (OSTI)

A synthetic peptide with estrogen-like activity derived from a phage- display peptide library. ER and ER exhibit a high degree of homology at the DNA binding domain (97%) whereas at the ligand agonists or antagonists are mainly synthetic compounds prepared by modifications that retain the core

Kasher, Roni

385

An overview of auditory display to assist comprehension of molecular information  

Science Journals Connector (OSTI)

......display is a relatively young branch of computer science...greater support from younger computer scientists that...Brooks F.P. , Ouh-Young M., Battert J.J...Proceedings of the 17th Nordic Internet Conference Nordunet98...reflections on the use and abuse of molecular models......

Miguel Angel Garcia-Ruiz; Jorge Rafael Gutierrez-Pulido

2006-07-01T23:59:59.000Z

386

Flat-panel electronic displays: a triumph of physics, chemistry and engineering  

Science Journals Connector (OSTI)

...see the major display players establish lighting divisions. The two applications have...manufacturers have made many improvements in back lighting, power consumption and angle of view...Ltd, which published many legal and medical tomes. These were expensive to produce...

2010-01-01T23:59:59.000Z

387

Roll-to-Roll Nanomanufacturing Processes and Applications to Display and Solar Cell Devices  

E-Print Network (OSTI)

Roll-to-Roll Nanomanufacturing Processes and Applications to Display and Solar Cell Devices% enhanced the power efficiency in organic solar cells as compared with devices made by ITO. BIOGRAPHY L. Jay related to nanotechnologies and photonics, including symposium chair of two MRS topical conferences

Keaveny, Tony

388

One of the world's smallest functioning electron accelerators, on display at Paris' Trocadro  

E-Print Network (OSTI)

One of the world's smallest functioning electron accelerators, on display at Paris' Trocadéro science exhibition allows science enthusiasts to see-- and even control--a real electron accelerator countries. But around Paris, it is a tabletop accelerator that has locals amped up. Near the Trocadéro

Paris-Sud XI, Université de

389

Sunday, March 11, 2007 OPEN HOUSE EDUCATION AND PUBLIC OUTREACH DISPLAYS  

E-Print Network (OSTI)

supplementing NASA's Mars Exploration Program. This poster features mission science, engineering, managementSunday, March 11, 2007 OPEN HOUSE EDUCATION AND PUBLIC OUTREACH DISPLAYS 5:00 p.m. LPI Berkner W. V. Mars GRS Formal and Informal Educational Products [#1964] The Mars Odyssey GRS E/PO team

Rathbun, Julie A.

390

On the Effects of Haptic Display in Brush and Ink Simulation for Chinese Painting and Calligraphy  

E-Print Network (OSTI)

On the Effects of Haptic Display in Brush and Ink Simulation for Chinese Painting and Calligraphy Jeng-sheng Yeh jsyeh@cmlab.csie.ntu.edu.tw Ting-yu Lien andie@cmlab.csie.ntu.edu.tw Ming Ouhyoung ming@csie.ntu

Ouhyoung, Ming

391

INTER-MOUNTAIN BASINS MIXED SALT DESERT SCRUB extent exaggerated for display  

E-Print Network (OSTI)

INTER-MOUNTAIN BASINS MIXED SALT DESERT SCRUB R.Rondeau extent exaggerated for display ATRIPLEX., Lycium ssp., Suaeda spp., Yucca glauca, and Tetradymia spinosa. Dwarf- shrubs include Gutierrezia and Holmgren 1984). Forb cover is generally sparse. Perennial forbs that might occur include INTER-MOUNTAIN

392

Fast bilateral filtering for the display of high-dynamic-range images  

Science Journals Connector (OSTI)

We present a new technique for the display of high-dynamic-range images, which reduces the contrast while preserving detail. It is based on a two-scale decomposition of the image into a base layer, encoding large-scale variations, and a detail layer. ... Keywords: contrast reduction, edge-preserving filtering, image processing, tone mapping, weird maths

Frédo Durand; Julie Dorsey

2002-07-01T23:59:59.000Z

393

Direct Conversion of Xylan to Ethanol by Recombinant Saccharomyces cerevisiae Strains Displaying an Engineered Minihemicellulosome  

Science Journals Connector (OSTI)

...constructed a xylan-fermenting yeast...hemicellulases on the surface of xylose-utilizing...biocatalyst for xylan degradation through cell-surface xylanase display...Construction of a xylan-fermenting yeast...enzymes on the surface of xylose-utilizing...

Jie Sun; Fei Wen; Tong Si; Jian-He Xu; Huimin Zhao

2012-03-23T23:59:59.000Z

394

Web-based framework for spatiotemporal screen real estate management of interactive public displays  

Science Journals Connector (OSTI)

In this paper we present a web-based framework for spatiotemporal screen real estate management of interactive public displays. The framework facilitates dynamic partitioning of the screen real estate into virtual screens assigned for multiple concurrent ... Keywords: ubi-hotspot, ubiquitous computing, urban computing

Tomas Linden; Tommi Heikkinen; Timo Ojala; Hannu Kukka; Marko Jurmu

2010-04-01T23:59:59.000Z

395

Exploring Personal Mobile Phones and Digital Display Systems to Support Indoor Navigation by Formative Study Methods  

Science Journals Connector (OSTI)

A significant difference exists between wayfinding support services available in outdoor and indoor locations. Users in outdoor locations can access services like Google Maps via a mobile phone and in-car GPS, which allows them to examine unknown locations ... Keywords: 3D Fly-Throughs, Digital 2D Maps, Hand-Held Devices, Indoor Wayfinding, Personal Mobile Devices, Pervasive Digital Displays

Faisal Taher; Keith Cheverst; Mike Harding

2010-07-01T23:59:59.000Z

396

Battery driven 8 channel pulse height analyzer with compact, single gamma-peak display  

DOE Patents (OSTI)

The invention comprises a hand-held wand including an l.e.d. display and a aI photomultiplier tube encased in lead or other suitable gamma shielding material, and an electronics and battery back-pack package connected to the wand.

Morgan, John P. (Idaho Falls, ID); Piper, Thomas C. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

397

Pinlight displays: wide field of view augmented reality eyeglasses using defocused point light sources  

Science Journals Connector (OSTI)

We present a novel design for an optical see-through augmented reality display that offers a wide field of view and supports a compact form factor approaching ordinary eyeglasses. Instead of conventional optics, our design uses only two simple hardware ...

Andrew Maimone; Douglas Lanman; Kishore Rathinavel; Kurtis Keller; David Luebke; Henry Fuchs

2014-07-01T23:59:59.000Z

398

Application of Nanotechnology to liquid crystal displays H S Kwok, Z L Xie and Fion Yeung  

E-Print Network (OSTI)

Application of Nanotechnology to liquid crystal displays H S Kwok, Z L Xie and Fion Yeung Center shall report new results on the application of nanotechnology to LCD. Specifically we shall discuss as the alignment layer. Summary We describe here two experiments on the application of nanotechnology to liquid

399

Polymer Thermodynamics and Chain Structure Polymers display some similarities and some differences with nano-aggregates.  

E-Print Network (OSTI)

for aggregates and by the late Paul Flory of Stanford for polymer coils. Since the spring constant of a polymer of a polymer coil is largely determined by entropy, an individual polymer coil displays an increasing spring an aggregate in nanomaterials and a polymer coil in Polymer Science. The mass-fractal or minimum dimension

Beaucage, Gregory

400

Engineering the next generation of large-area displays: prospects and pitfalls  

Science Journals Connector (OSTI)

...non-emitter liquid crystal active matrix passive matrix...technologies. CRT, cathode-ray tube; DMD, digital...cholesteric texture. into cathode-ray tube (CRT) and...non-emitter-based FPDs, such as active matrix liquid-crystal...OLEDs. OLED-based materials and displays have been...

2003-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Effects of Long-Term Exposure on Sensitivity and Comfort with Stereoscopic Displays  

Science Journals Connector (OSTI)

Stereoscopic 3D media has recently increased in appreciation and availability. This popularity has led to concerns over the health effects of habitual viewing of stereoscopic 3D content; concerns that are largely hypothetical. Here we examine the effects ... Keywords: S3D, Stereoscopic 3D, depth discrimination, stereo displays, stereopsis

Debi Stransky, Laurie M. Wilcox, Robert S. Allison

2014-04-01T23:59:59.000Z

402

Camera Based Interactive Wall Display With Hand Detection Using LED Lights  

E-Print Network (OSTI)

Camera Based Interactive Wall Display With Hand Detection Using LED Lights Sit Chu Wah, Sin Kwok our system. Also, three LED lights are required to put on the fingers to help the system to detect immediately and produces associated output. Output Hand detection using LED lights X-Y Coordination analysis

Wu, Dekai

403

Safety Science Article HER2-targeted liposomal doxorubicin displays enhanced anti-tumorigenic effects  

E-Print Network (OSTI)

Safety Science Article HER2-targeted liposomal doxorubicin displays enhanced anti-derived cardiomyocytes Doxorubicin Preclinical safety HER2-targeted liposomal doxorubicin Cardiotoxicity Safety sciences safety profile, we applied a human stem cell-derived cardiomyocyte platform to evaluate the doxorubicin

Zandstra, Peter W.

404

Displays for Exploration and Comparison of Nested or Intersecting Christopher Charles Weigle  

E-Print Network (OSTI)

the surfaces are displayed such that they do intersect. For instance, the relationships between radiation iso-dose require simultaneous estimation of individual global shape, estimation of point or feature correspondences: Tumor Radiation Treatment Planning . . . . . . . . . . . . . . . 7 2.1.3 Materials Science: Atomic

North Carolina at Chapel Hill, University of

405

Ris-PhD-8(EN) Design of Process Displays based on  

E-Print Network (OSTI)

Risø-PhD-8(EN) Design of Process Displays based on Risk Analysis Techniques Jette Lundtang Paulsen in partial fulfilment of the re- quirements for the Ph.D. degree at The Technical Univer- sity of Denmark, a combination of a Goal-Tree and a Fault-Tree, is described in some detail. Finally we address the problem

406

A study of degradation of indium tin oxide thin films on glass for display applications  

Science Journals Connector (OSTI)

Indium tin oxide (ITO) has been widely used in liquid crystal displays (LCD). Contamination and moisture have proved to have the adverse effect of causing ITO corrosion/degradation. The purpose of this paper is to determine if scratching the surface ... Keywords: Accelerated degradation test, ITO corrosion, ITO degradation, Scratching

W. S. Leung; Y. C. Chan; S. M. Lui

2013-01-01T23:59:59.000Z

407

Power Minimization in a Backlit TFT-LCD Display by Concurrent Brightness and Contrast Scaling  

E-Print Network (OSTI)

Brightness and Contrast Scaling (CBCS) technique for a cold cathode fluorescent lamp (CCFL) backlit TFT out that the cold cathode fluorescent lamp (CCFL) backlight of an LCD display dominates the energy be used to characterize the optical power emitted from a spot light source, such as a light bulb

Pedram, Massoud

408

Power Minimization in a Backlit TFT-LCD Display by Concurrent Brightness and Contrast Scaling  

E-Print Network (OSTI)

Brightness and Contrast Scaling (CBCS) technique for a cold cathode fluorescent lamp (CCFL) backlit TFT fluorescent lamp (CCFL) backlight of an LCD display dominates the energy consumption of the whole system [1 be used to characterize the optical power emitted from a spot light source, such as a light bulb

Pedram, Massoud

409

First International Symposium on Cold Cathodes Dielectric Science and Technology/Electronics/Luminescent and Display Materials  

E-Print Network (OSTI)

/Electronics/Luminescent and Display Materials 198th Meeting of the Electrochemical Society Date: October 22­27, 2000 Location: Phoenix Noise (flicker, shot), ffl Emitters (e.g., Spindt­type field emitters, Negative electron affinity abstract to the ECS headquarters and also to K. L. Jensen at the address below. #12; Electrochemical

Cahay, Marc

410

Fort Meade demonstration test LEDS in freezer rooms, fiber optics in display cases  

SciTech Connect

Demonstration projects at Fort George G. Meade, MD, substituted LED lighting for incandescent bulbs in commisary wal-in freezers and fiber optic lighting in reach-in display cases. The goal was to reduce energy consumption and the results were positive. Journal article published in Public Works Digest

Parker, Steven; Parker, Graham B.

2008-10-25T23:59:59.000Z

411

3D Haptic Modeling System using Ungrounded Pen-shaped Kinesthetic Display  

E-Print Network (OSTI)

3D Haptic Modeling System using Ungrounded Pen-shaped Kinesthetic Display Sho Kamuro 1) Kouta-dimensional (3D) haptic modeling system that enables a user to create 3D models as though he/she is drawing and intuitively create various 3D shapes by drawing closed curves in air using the device. The created shapes

Tachi, Susumu

412

Hear-Through and Mic-Through Augmented Reality: Using Bone Conduction to Display Spatialized Audio  

E-Print Network (OSTI)

Hear-Through and Mic-Through Augmented Reality: Using Bone Conduction to Display Spatialized Audio-generated audio for augmented reality (AR) applications. Analogous to optical-see-through and video-see-through techniques in the visual domain, we present Hear-Through and Mic-Through audio AR. Hear-Through AR uses

Lindeman, Robert W.

413

Tacticycle A Tactile Display for Supporting Tourists on a Bicycle Trip  

E-Print Network (OSTI)

Tacticycle ­ A Tactile Display for Supporting Tourists on a Bicycle Trip Benjamin Poppinga, Martin, tourists, exploration, bicycle 1. BACKGROUND AND MOTIVATION Going on a bicycle trip is a common leisure for bicycles used in touristic trips. Figure 1: A group of tourists on a bicycle trip on an island. In order

Boll, Susanne

414

University of Rochester University Health Service  

E-Print Network (OSTI)

to health care following graduation. · Students enrolled in the University-sponsored Aetna Student Health by the Accreditation Association for Ambulatory Health Care, Inc. 12University of Rochester University Health Service Insurance for Graduating Students Graduating

Mahon, Bradford Z.

415

Open University  

ScienceCinema (OSTI)

Michel Pentz est née en Afrique du Sud et venu au Cern en 1957 comme physicien et président de l'associaion du personnel. Il est également fondateur du mouvement Antiapartheid de Genève et a participé à la fondation de l'Open University en Grande-Bretagne. Il nous parle des contextes pédagogiques, culturels et nationaux dans lesquels la méthode peut s'appliquer.

None

2011-04-25T23:59:59.000Z

416

Participating University of Connecticut  

E-Print Network (OSTI)

Participating Schools University of Connecticut Trinity College Yale University University of Bridgeport Southern Connecticut State University Participating Corporations United Technologies Research Coherent-DEOS JDS-Uniphase C-Cor ASML Jetek, LLC Connecticut Symposium on Microelectronics

Alpay, S. Pamir

417

The Ohio State University Readies for its Encore at the Solar Decathlon |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Ohio State University Readies for its Encore at the Solar The Ohio State University Readies for its Encore at the Solar Decathlon The Ohio State University Readies for its Encore at the Solar Decathlon April 15, 2011 - 5:03pm Addthis The Ohio State University displayed their design model at the International Builders' Show in Orlando, Florida from January 12-15, 2011. | Credit: All Commercial Photography/U.S. Department of Energy Solar Decathlon The Ohio State University displayed their design model at the International Builders' Show in Orlando, Florida from January 12-15, 2011. | Credit: All Commercial Photography/U.S. Department of Energy Solar Decathlon Erik Hyrkas Erik Hyrkas Media Relations Specialist, Office of Energy Efficiency & Renewable Energy How can I participate? The next Solar Decathlon will be held Sept. 23-Oct. 2, 2011, at

418

University of Wisconsin Milwaukee University Recreation  

E-Print Network (OSTI)

University of Wisconsin ­ Milwaukee University Recreation SUMMER Semester - Student Employee) or University Recreation(following UWM policy) may terminate my employment at any time. I further understand Director Recreational Sports & Facilities University of Wisconsin ­ Milwaukee P.O. Box 413 Milwaukee, WI

Saldin, Dilano

419

University of Wisconsin Milwaukee University Recreation  

E-Print Network (OSTI)

University of Wisconsin ­ Milwaukee University Recreation SPRING Semester - Student Employee) or University Recreation (following UWM policy) may terminate my employment at any time. I further understand Director Recreational Sports & Facilities University of Wisconsin ­ Milwaukee P.O. Box 413 Milwaukee, WI

Saldin, Dilano

420

University of Wisconsin-Milwaukee University Recreation  

E-Print Network (OSTI)

1 07/16/2013 University of Wisconsin-Milwaukee University Recreation Emergency Action Plan #12;2 UWM University Recreation EMERGENCY ACTION PLAN INTRODUCTION 1. Purpose The purpose of the Emergency Action Plan, for the Department of University Recreation (UREC), is to provide an organizational

Saldin, Dilano

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Argonne CNM News: CNM Displays Strong Presence at Argonne's Energy Showcase  

NLE Websites -- All DOE Office Websites (Extended Search)

CNM Displays Strong Presence at Argonne's Energy Showcase CNM Displays Strong Presence at Argonne's Energy Showcase Visitors at Argonne's 2012 Energy Showcase Volker Rose Argonne opened its gates to about 12,000 members of the community on Saturday, September 15, 2012. The Center for Nanoscale Materials was enthusiastically represented by nearly 25 staff volunteers during the Energy Showcase. The CNM exhibits covered solar energy, computational nanoscience, nanostructured carbons for nanoelectronics, visualization at the nanoscale, nanobio materials for energy applications, and general outreach in nanoscience and nanotechnology. The demonstrations of how solar energy can be used to power devices at the "Solar Energy: Today and Tomorrow" booth inspired people to consider how to incorporate solar power in their own lives now and in the future. On the

422

Flat panel display using Ti-Cr-Al-O thin film  

DOE Patents (OSTI)

Thin films of Ti--Cr--Al--O are used as a resistor material. The films are rf sputter deposited from ceramic targets using a reactive working gas mixture of Ar and O.sub.2. Resistivity values from 10.sup.4 to 10.sup.10 Ohm-cm have been measured for Ti--Cr--Al--O film <1 .mu.m thick. The film resistivity can be discretely selected through control of the target composition and the deposition parameters. The application of Ti--Cr--Al--O as a thin film resistor has been found to be thermodynamically stable, unlike other metal-oxide films. The Ti--Cr--Al--O film can be used as a vertical or lateral resistor, for example, as a layer beneath a field emission cathode in a flat panel display; or used to control surface emissivity, for example, as a coating on an insulating material such as vertical wall supports in flat panel displays.

Jankowski, Alan F. (Livermore, CA); Schmid, Anthony P. (Solan Beach, CA)

2002-01-01T23:59:59.000Z

423

Method and apparatus for the simultaneous display and correlation of independently generated images  

DOE Patents (OSTI)

An apparatus and method for location by location correlation of multiple images from Non-Destructive Evaluation (NDE) and other sources. Multiple images of a material specimen are displayed on one or more monitors of an interactive graphics system. Specimen landmarks are located in each image and mapping functions from a reference image to each other image are calcuated using the landmark locations. A location selected by positioning a cursor in the reference image is mapped to the other images and location identifiers are simultaneously displayed in those images. Movement of the cursor in the reference image causes simultaneous movement of the location identifiers in the other images to positions corresponding to the location of the reference image cursor.

Vaitekunas, Jeffrey J. (Chicago, IL); Roberts, Ronald A. (Crown Point, IN)

1991-01-01T23:59:59.000Z

424

The Impact of Visual Appearance on User Response in Online Display Advertising  

E-Print Network (OSTI)

Display advertising has been a significant source of revenue for publishers and ad networks in online advertising ecosystem. One of the main goals in display advertising is to maximize user response rate for advertising campaigns, such as click through rates (CTR) or conversion rates. Although in the online advertising industry we believe that the visual appearance of ads (creatives) matters for propensity of user response, there is no published work so far to address this topic via a systematic data-driven approach. In this paper we quantitatively study the relationship between the visual appearance and performance of creatives using large scale data in the world's largest display ads exchange system, RightMedia. We designed a set of 43 visual features, some of which are novel and some are inspired by related work. We extracted these features from real creatives served on RightMedia. We also designed and conducted a series of experiments to evaluate the effectiveness of visual features for CTR prediction, ra...

Azimi, Javad; Zhou, Yang; Navalpakkam, Vidhya; Mao, Jianchang; Fern, Xiaoli

2012-01-01T23:59:59.000Z

425

http://www.jstor.org A Test of the Bicolored Fruit Display Hypothesis: Berry Removal with Artificial Fruit Flags  

E-Print Network (OSTI)

http://www.jstor.org A Test of the Bicolored Fruit Display Hypothesis: Berry Removal with Artificial Fruit Flags Author(s): Jennifer M. Cramer, Maria L. Cloud, Nathan C. Muchhala, Anastasia E. Ware Botanical Society 130(1), 2003, pp. 30-33 A test of the bicolored fruit display hypothesis: Berry removal

Muchhala, Nathan

426

Symbology development for a 3D conformal synthetic vision helmet-mounted display for helicopter operations in degraded visual environment  

Science Journals Connector (OSTI)

To increase situation awareness for helicopter pilots in poor visibility symbology for a helmet-mounted display was developed. The symbology comprises the conformal presentation of obstacles, route information and threat areas. In an online survey 48 ... Keywords: conformal symbology, degraded visual environment, helicopter operations, helmet-mounted display, synthetic vision systems

Patrizia Knabl; Helmut Többen

2013-07-01T23:59:59.000Z

427

Data Driven Recommendations for Display Advertising Rushi P. Bhatt, Kevin L. Chang, Vijay K. Narayanan, Rajesh G. Parekh  

E-Print Network (OSTI)

Data Driven Recommendations for Display Advertising Rushi P. Bhatt, Kevin L. Chang, Vijay K|klchang|vnarayan|rparekh}@yahoo-inc.com ABSTRACT Advertisers running display advertising campaigns often re- quest actionable recommendations. Typically, the recommendations desired by advertisers fall into two broad categories: improved per- formance

Chang, Kevin L.

428

A Comparison of Immersive HMD, Fish Tank VR and Fish Tank with Haptics Displays for Volume Visualization  

E-Print Network (OSTI)

A Comparison of Immersive HMD, Fish Tank VR and Fish Tank with Haptics Displays for Volume: (1) head-mounted display (HMD); (2) fish tank VR (fish tank); and (3) fish tank VR augmented its structure. Fish tank and haptic participants saw the entire volume on-screen and rotated

Healey, Christopher G.

429

A practical framework for ethics: the PD-net approach to supporting ethics compliance in public display studies  

Science Journals Connector (OSTI)

Research involving public displays often faces the need to study the effects of a deployment in the wild. While many organizations have institutionalized processes for ensuring ethical compliance of such human subject experiments, these may fail to stimulate ... Keywords: data protection, ethical awareness, human subject experiments, in-the-wild studies, public displays

Marc Langheinrich; Albrecht Schmidt; Nigel Davies; Rui José

2013-06-01T23:59:59.000Z

430

The New Mexico State University Stern-Gerlach Apparatus  

Science Journals Connector (OSTI)

A simple version of the Stern-Gerlach experiment on space quantization of atomic angular momentum utilizing a potassium atomic beam and a movable “hot-wire” detector has been developed. A vacuum system of Corning glass pipe simplifies construction and displays the operation of the device. A general description of the apparatus is given as is performance data and information on its use in undergraduate laboratories. A detailed construction and use manual including shop drawings is available from the University.

Melvin D. Daybell

1967-01-01T23:59:59.000Z

431

Development of advanced direct perception displays for nuclear power plants to enhance monitoring, control and fault management. Progress report  

SciTech Connect

With recent theoretical and empirical research in basic and applied psychology, human factors, and engineering, it is now sufficient to define an integrated approach to the deign of advanced displays for present and future nuclear power plants. Traditionally, the conventional displays have shown operators the individual variables on gauges, meters, strip charts, etc. This design approach requires the operators to mentally integrate the separately displayed variables and determine the implications for the plant state. This traditional approach has been known as the single-sensor-single-indicator display design and it places an intolerable amount of mental workload on operators during transients and abnormal conditions. This report discusses a new alternative approach which is the use of direct perception interfaces. Direct perception a interfaces display the underlying physical and system constraints of the situation in a directly perceptual way, such that the viewer need not reason about what is seen to identify system states, but can identify the state of the system perceptually. It is expected that displays which show the dynamics of fundamental physical laws should better support operator decisions and diagnoses of plant states. The purpose of this research project is to develop a suite of direct perception displays for PWR nuclear power plant operations.

Jones, B.; Shaheen, S.; Moray, N.; Sanderson, P.; Reising, D.V.

1993-05-21T23:59:59.000Z

432

DuPont Displays Develops Low-Cost Method of Printing OLED Panels  

Energy.gov (U.S. Department of Energy (DOE))

DuPont Displays Inc. (DDI) has developed a novel way of printing color-tunable OLED lighting panels that keeps manufacturing costs low. The method involves processing the organic layers from solution, with most of the process steps taking place under atmospheric conditions rather than in a high vacuum. Industry-standard slot-coating methods are used in conjunction with nozzle printing—in which the solutions of organic materials are continuously jetted through an array of nozzles moving at high speed—allowing the light-emitting materials to be spatially patterned.

433

Printed assemblies of ultrathin, microscale inorganic light emitting diodes for deformable and semitransparent displays  

DOE Patents (OSTI)

Described herein are printable structures and methods for making, assembling and arranging electronic devices. A number of the methods described herein are useful for assembling electronic devices where one or more device components are embedded in a polymer which is patterned during the embedding process with trenches for electrical interconnects between device components. Some methods described herein are useful for assembling electronic devices by printing methods, such as by dry transfer contact printing methods. Also described herein are GaN light emitting diodes and methods for making and arranging GaN light emitting diodes, for example for display or lighting systems.

Rogers, John A; Nuzzo, Ralph; Kim, Hoon-sik; Brueckner, Eric; Park, Sang Il; Kim, Rak Hwan

2014-10-21T23:59:59.000Z

434

Oak Ridge Associated Universities  

NLE Websites -- All DOE Office Websites (Extended Search)

BIBLIOGRAPHY Partnerships for Innovation Oak Ridge Associated Universities (ORAU) is a university consortium leveraging the scientific strength of major research institutions to...

435

Columbia University Biotechnology Association  

E-Print Network (OSTI)

Columbia University Biotechnology Association Biotechnology Career Conference Friday, April 20th for members, Non-members fee $10 Sponsored by Columbia University GSAC and MA Biotechnology Program, Dept

Tong, Liang

436

University Partners Panel  

Energy.gov (U.S. Department of Energy (DOE))

Matt Tirrell, Pritzker Director and Professor, Institute for Molecular Engineering, University of Chicago Thomas Glasmacher, Facility for Rare Isotope Beams (FRIB) Project Manager, Michigan State University

437

How do I display the Map of Wind Farms csv coordinates in ArcMap software?  

Open Energy Info (EERE)

display the Map of Wind Farms csv coordinates in ArcMap software? display the Map of Wind Farms csv coordinates in ArcMap software? Home > Groups > Geospatial I downloaded the Map of Wind Farms data as a .csv from http://en.openei.org/wiki/Map_of_Wind_Farms/Data. The downloaded data contains the latitude and longitude values in a single column. ArcMap requires separate fields for lat/long. Also, there is a strange character at the end of the coordinate values, °. It looks like this might be due to using the degree symbol? Will this cause an issue when attempting to import the downloaded data into ESRI ArcMap software? Thanks for any guidance you can provide! Submitted by Scourer on 10 September, 2013 - 09:40 1 answer Points: 1 Hi- Yes, you are correct with determining why the ° characters appear in the CSV. This is an artifact of transforming the coordinates to values for the

438

Does the Utility Rates service on OpenEI return/display the latest data or  

Open Energy Info (EERE)

Does the Utility Rates service on OpenEI return/display the latest data or Does the Utility Rates service on OpenEI return/display the latest data or only approved data? Home > Groups > Utility Rate I'm using SAM to download OpenEI utility rates and was wondering if I'm downloading the latest rates that have been entered, or only downloading the rates that have been approved. Submitted by Sfomail on 11 July, 2012 - 13:53 2 answers Points: 1 The web service at http://en.openei.org/services/, which is used by SAM, currently uses the "ask query" method of accessing OpenEI data. That runs through http://en.openei.org/wiki/Special:Ask. In the future (2013 or after?) we may use a different method of back-end data access through our SPARQL endpoint - time will tell. Performing a test on this data, I discovered that Special:Ask, and thus OpenEI utility rate services and SAM,

439

Visual display of reservoir parameters affecting enhanced oil recovery. Third quarterly report, [April 1995--June 1995  

SciTech Connect

This project will provide a detailed example, based on a field trial, of how to evaluate a field for enhanced oil recovery (EOR) operations utilizing data typically available in a filed that has undergone primary development. The approach will utilize readily available, affordable computer software and analytical services. The GeoGraphix Exploration System (GES) software package was acquired this quarter and installed. Well logging, formation tops and other data are being loaded into the program. We also acquired and installed GeoGraphix`s well-log evaluation package, QLA2. Miocene tops for the entire Pioneer Anticline were loaded into the GES system and contour maps and 3D surface visualizations were constructed. Fault data have been digitized and will soon be loaded into the GeoGraphix mapping module and combined with formation-top data to produce structure maps which will display all fault traces. The versatile program MatLab can be used to perform time series analysis and to produce spatial displays of data. MatLab now has a 3D volume visualization package. In the coming quarter we will test MatLab using Pioneer data set.

Wood, J.R.

1995-07-01T23:59:59.000Z

440

Improving the reliability of electronic paper display using FMEA and Taguchi methods: A case study  

Science Journals Connector (OSTI)

Abstract The increase of e-book readers in recent years has driven the rapid growth of the application market of the electronic paper. The electronic paper is gradually regarded as a substitute for conventional papers because of its suitability for lengthy reading and for energy saving. However, the second generation electronic paper display (EPD) proved to be unreliable in a high-stress environment test, and failed to meet the requirement for mass production. Generally, adjusting the parameters through the trial and error method can delay the development schedule of the new product. Therefore, this study proposes a combined approach integrating failure mode and effect analysis (FMEA) and Taguchi methods to improve the reliability of the thin-film transistor liquid crystal display products. Considering the issues during design and manufacturing phases simultaneously, the proposed approach provides a systematic framework to find the causes of failure, to conduct experiments, and to optimize the process output. The actual case study demonstrates the effectiveness of the proposed approach in improving the EPD reliability. The implementation results show that the mean time between failures has improved from 1867 to 4852 h and the development period has shortened by more than half a year. Further, the case company has earned revenues of approximately $800,000 by fulfilling a rush order.

Chao-Ton Su; Hung-Chun Lin; Po-Wen Teng; Taho Yang

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Does the Utility Rates service on OpenEI return/display the latest data or  

Open Energy Info (EERE)

Does the Utility Rates service on OpenEI return/display the latest data or Does the Utility Rates service on OpenEI return/display the latest data or only approved data? Home > Groups > Utility Rate I'm using SAM to download OpenEI utility rates and was wondering if I'm downloading the latest rates that have been entered, or only downloading the rates that have been approved. Submitted by Sfomail on 11 July, 2012 - 13:53 2 answers Points: 1 The web service at http://en.openei.org/services/, which is used by SAM, currently uses the "ask query" method of accessing OpenEI data. That runs through http://en.openei.org/wiki/Special:Ask. In the future (2013 or after?) we may use a different method of back-end data access through our SPARQL endpoint - time will tell. Performing a test on this data, I discovered that Special:Ask, and thus OpenEI utility rate services and SAM,

442

How do I display the Map of Wind Farms csv coordinates in ArcMap software?  

Open Energy Info (EERE)

How do I display the Map of Wind Farms csv coordinates in ArcMap software? How do I display the Map of Wind Farms csv coordinates in ArcMap software? Home > Groups > Geospatial I downloaded the Map of Wind Farms data as a .csv from http://en.openei.org/wiki/Map_of_Wind_Farms/Data. The downloaded data contains the latitude and longitude values in a single column. ArcMap requires separate fields for lat/long. Also, there is a strange character at the end of the coordinate values, °. It looks like this might be due to using the degree symbol? Will this cause an issue when attempting to import the downloaded data into ESRI ArcMap software? Thanks for any guidance you can provide! Submitted by Scourer on 10 September, 2013 - 09:40 1 answer Points: 1 Hi- Yes, you are correct with determining why the ° characters appear in the

443

Display rules for expressed emotion within organizations and gender: implications for emotional labor and social place marking  

E-Print Network (OSTI)

' expressed (rather than felt) responses to emotional exchanges within the organization. The role of gender in shaping intraorganizational emotional display rules is examined as it interplays at social, organizational and individual normative levels...

Griffin, Andrea Eugenie Charlotte

2004-09-30T23:59:59.000Z

444

*s.watt@bangor.ac.uk Achieving near-correct focus cues in a 3-D display using multiple  

E-Print Network (OSTI)

*s.watt@bangor.ac.uk Achieving near-correct focus cues in a 3-D display using multiple image planes Simon J. Watt* a , Kurt Akeley b , Ahna R. Girshick c , Martin S. Banks c a School of Psychology

Banks, Marty

445

An updatable three-dimensional display via direct optical fringe writing of computer - generated holographic stereograms in photorefractive polymer  

E-Print Network (OSTI)

This thesis aims to assess the feasibility of an updatable three-dimensional display based on the direct fringe writing of computer-generated holographic gratings into a novel photorefractive polymer. The photorefractive ...

Jolly, Sundeep (Sundeep Kumar)

2012-01-01T23:59:59.000Z

446

University of Tennessee, USA Georgia State University, USA Johns Hopkins Medicine Institute, USA University of Virginia, USA  

E-Print Network (OSTI)

#12; : University of Tennessee, USA Georgia State University, USA Johns Hopkins Medicine Institute, USA University of Virginia, USA Columbia University, USA Queen's University, Canada University of Akron, USA

Wang, Jianbo

447

DIMACS Center Rutgers University  

E-Print Network (OSTI)

Eliana S. Antoniu, William Patterson University Mariah Birgen, Wartburg College Brad Chin, West Valley

448

PHILADELPHIA UNIVERSITY 160  

E-Print Network (OSTI)

. . . . 2005/2006 " " . 2004/2005 CNC . #12;PHILADELPHIA UNIVERSITY . : : - CNC. - . - . - . 2006 . . : (1281

449

University Park Data Dashboard  

Energy.gov (U.S. Department of Energy (DOE))

The data dashboard for University Park, Maryland, a partner in the Better Buildings Neighborhood Program.

450

University and Educational Intelligence  

Science Journals Connector (OSTI)

... of Jews to these universities is severely restricted by applying what is known as the “Numerus ...

1924-07-19T23:59:59.000Z

451

PHILADELPHIA UNIVERSITY 1995  

E-Print Network (OSTI)

of polycyclic aromatic hydrocarbons (PAHs) in King Talal Water Dam in Jordan) . #12;PHILADELPHIA UNIVERSITY

452

Engineering yeast consortia for surface-display of complex cellulosome structures  

SciTech Connect

As our society marches toward a more technologically advanced future, energy and environmental sustainability are some of the most challenging problems we face today. Biomass is one of the most abundant renewable-feedstock for sustainable production of biofuels. However, the main technological obstacle to more widespread uses of this resource is the lack of low-cost technologies to overcome the recalcitrant nature of the cellulosic structure, especially the hydrolysis step on highly ordered celluloses. In this proposal, we successfully engineered several efficient and inexpensive whole-cell biocatalysts in an effort to produce economically compatible and sustainable biofuels, namely cellulosic ethanol. Our approach was to display of a highly efficient cellulolytic enzyme complex, named cellulosome, on the surface of a historical ethanol producer Saccharomyces cerevisiae for the simultaneous and synergistic saccharification and fermentation of cellulose to ethanol. We first demonstrated the feasibility of assembling a mini-cellulosome by incubating E. coli lysates expressing three different cellulases. Resting cells displaying mini-cellulosomes produced 4-fold more ethanol from phosphoric acid-swollen cellulose (PASC) than cultures with only added enzymes. The flexibility to assemble the mini-cellulosome structure was further demonstrated using a synthetic yeast consortium through intracellular complementation. Direct ethanol production from PASC was demonstrated with resting cell cultures. To create a microorganism suitable for a more cost-effective process, called consolidated bioprocessing (CBP), a synthetic consortium capable of displaying mini-cellulosomes on the cell surface via intercellular complementation was created. To further improve the efficiency, a new adaptive strategy of employing anchoring and adaptor scaffoldins to amplify the number of enzymatic subunits was developed, resulting in the creation of an artificial tetravalent cellulosome on the yeast surface and a significant improvement in cellulosic ethanol production. Although this adaptive strategy is ideal for assembling more complex cellulosome for large-scale production of cellulosic ethanol, a substantially larger number of enzymes (up to 10 to 12) is needed to better mimic the natural cellulosome structures for practical usage of the technology.

Chen, Wilfred [University of Delaware

2014-03-31T23:59:59.000Z

454

The Universe Adventure - The Modern Universe  

NLE Websites -- All DOE Office Websites (Extended Search)

Modern Universe Modern Universe Like astronomers throughout history, modern cosmologists are interested in making an accurate model of the Universe. Starting with the laws of physics which explain how fundamental particles and forces interact, physicists derive general equations describing the evolution of the Universe's structure. Cosmologists use experimental evidence to select a set of initial conditions enabling them to solve the general equations, and calculate the state of the Universe at times in the past, present, or future. This generates a possible model, which can be tested by comparing the phenomena it predicts with observational data. In this manner, following the rigorous scientific method, cosmologists work to build a successful Universal model. In the next section we will examine evidence for the current Big Bang

455

Two-phase power-law modeling of pipe flows displaying shear-thinning phenomena  

SciTech Connect

This paper describes work in modeling concentrated liquid-solids flows in pipes. COMMIX-M, a three-dimensional transient and steady-state computer program developed at Argonne National Laboratory, was used to compute velocities and concentrations. Based on the authors` previous analyses, some concentrated liquid-solids suspension flows display shear-thinning rather than Newtonian phenomena. Therefore, they developed a two-phase non-Newtonian power-law model that includes the effect of solids concentration on solids viscosity. With this new two-phase power-law solids-viscosity model, and with constitutive relationships for interfacial drag, virtual mass effect, shear lift force, and solids partial-slip boundary condition at the pipe walls, COMMIX-M is capable of analyzing concentrated three-dimensional liquid-solids flows.

Ding, Jianmin; Lyczkowski, R.W.; Sha, W.T.

1993-12-31T23:59:59.000Z

456

Method for determining and displaying the spacial distribution of a spectral pattern of received light  

DOE Patents (OSTI)

An imaging Fourier transform spectrometer is described having a Fourier transform infrared spectrometer providing a series of images to a focal plane array camera. The focal plane array camera is clocked to a multiple of zero crossing occurrences as caused by a moving mirror of the Fourier transform infrared spectrometer and as detected by a laser detector such that the frame capture rate of the focal plane array camera corresponds to a multiple of the zero crossing rate of the Fourier transform infrared spectrometer. The images are transmitted to a computer for processing such that representations of the images as viewed in the light of an arbitrary spectral ``fingerprint`` pattern can be displayed on a monitor or otherwise stored and manipulated by the computer. 2 figs.

Bennett, C.L.

1996-07-23T23:59:59.000Z

457

Method for determining and displaying the spacial distribution of a spectral pattern of received light  

DOE Patents (OSTI)

An imaging Fourier transform spectrometer (10, 210) having a Fourier transform infrared spectrometer (12) providing a series of images (40) to a focal plane array camera (38). The focal plane array camera (38) is clocked to a multiple of zero crossing occurrences as caused by a moving mirror (18) of the Fourier transform infrared spectrometer (12) and as detected by a laser detector (50) such that the frame capture rate of the focal plane array camera (38) corresponds to a multiple of the zero crossing rate of the Fourier transform infrared spectrometer (12). The images (40) are transmitted to a computer (45) for processing such that representations of the images (40) as viewed in the light of an arbitrary spectral "fingerprint" pattern can be displayed on a monitor (60) or otherwise stored and manipulated by the computer (45).

Bennett, Charles L. (Livermore, CA)

1996-01-01T23:59:59.000Z

458

Core-free rolled actuators for Braille displays using P(VDF–TrFE–CFE)  

Science Journals Connector (OSTI)

Refreshable Braille displays require many small diameter actuators to move the pins. The electrostrictive P(VDF–TrFE–CFE) terpolymer can provide the high strain and actuation force under modest electric fields that are required for this application. In this paper, we develop core-free tubular actuators and integrate them into a 3 ? 2 Braille cell. The terpolymer films are solution cast, stretched to 6 ?m thick, electroded, laminated into a bilayer, rolled into a 2 mm diameter tube, bonded, and provided with top and bottom contacts. Experimental testing of 17 actuators demonstrates significant strains (up to 4%) and blocking forces (1 N) at moderate electric fields (100 MV m?1). A novel Braille cell is designed and fabricated using six of these actuators.

Thomas Levard; Paul J Diglio; Sheng-Guo Lu; Christopher D Rahn; Q M Zhang

2012-01-01T23:59:59.000Z

459

Method of forming a spacer for field emission flat panel displays  

DOE Patents (OSTI)

Spacers are disclosed for applications such as field emission flat panel displays and vacuum microelectronics, and which involves the application of aerogel/xerogel technology to the formation of the spacer. In a preferred approach the method uses a mold and mold release agent wherein the gel precursor is a liquid which can be applied to the mold filling holes which expose the substrate (either the baseplate or the faceplate). A release agent is applied to the mold prior to precursor application to ease removal of the mold after formation of the dielectric spacer. The shrinkage of the gel during solvent extraction also improves mold removal. The final spacer material is a good dielectric, such as silica, secured to the substrate. 3 figs.

Bernhardt, A.F.; Contolini, R.J.

1997-08-19T23:59:59.000Z

460

Colorado State University Colorado State University  

E-Print Network (OSTI)

Colorado State University _______________ 1.1 Page 1 Colorado State University In 1870, the Territorial Council and House of Representatives of the Territory of Colorado created the Colorado that same year as Colorado's land-grant college under the Morrill Act of 1862. The Morrill Act provided

Stephens, Graeme L.

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Colorado State University Colorado State University  

E-Print Network (OSTI)

Colorado State University Colorado State University In 1870, the Territorial Council and House of Representatives of the Territory of Colorado created the Colorado Agricultural College. When the Territory became. The College admitted its first students in 1879 and received designation that same year as Colorado's land

Collett Jr., Jeffrey L.

462

, UNIVERSITY Brigham Young University Geology Studies  

E-Print Network (OSTI)

, UNIVERSITY #12;Brigham Young University Geology Studies Volume 1 5 - 1968 Part 2 Studies; and depositing of sedi- ments in an Ice-Age lake called Lake Bonneville which intermittently filled the valley-transported sediment more than a mile in thickness (Text-fig. 2). At the;ery top of this accumulation of valley

Seamons, Kent E.

463

Engineering Waseda UniversityWaseda University  

E-Print Network (OSTI)

Science & Engineering Library Waseda UniversityWaseda University Library Guidance September 2013 #12;Contents 1 Overview of WU Libraries 2 Science & Engineering Library and the Student Reading Room 3 ImportantImportant And... so many Documents, Microfilm, Audio-Visual materials 22 National Treasures

Kaji, Hajime

464

DOE Solar Decathlon: Team Ontario: Queen's University, Carleton University,  

NLE Websites -- All DOE Office Websites (Extended Search)

Team Ontario: Queen's University, Carleton University, and Algonquin Team Ontario: Queen's University, Carleton University, and Algonquin College Team website: ontariosd.ca Photo of members of the Queen's University, Carleton University, and Algonquin College Solar Decathlon 2013 team on the deck of their partially constructed house. Several members are laughing and throwing snowballs. Enlarge image The Queen's University, Carleton University, and Algonquin College Solar Decathlon 2013 team (Courtesy of the Queen's University, Carleton University, and Algonquin College Solar Decathlon 2013 team) he Queen's University, Carleton University, and Algonquin College audiovisual presentation Jury Feedback Architecture Contest Market Appeal Contest Engineering Contest Communications Contest Team Deliverables Project Manual Construction Drawings

465

University of Nebraska-Lincoln and University of Florida (Building...  

Open Energy Info (EERE)

Nebraska-Lincoln and University of Florida (Building Energy Efficient Homes for America) Jump to: navigation, search Name: University of Nebraska-Lincoln and University of Florida...

466

The Universe Adventure - Expansion  

NLE Websites -- All DOE Office Websites (Extended Search)

Expansion: Chunk-by-Chunk Expansion: Chunk-by-Chunk A sample of the Universe. A very small portion of the Universe. In order to better understand the significance of expansion, let's look at a cubic sample of space. By considering a finite volume we can follow changes in the size of the Universe as we move forwards and backwards in time. Remember, only the size of the cube will change. The galaxies inside the cube stay the same size. This animation illustrates how our cubic piece of the Universe changes with time. If the Universe followed the simplest expansionary models, its size would increase linearly with time. The Universe would continue to expand at a constant rate forever. If you look at only a narrow time-slice of the Universe's history, it does, in fact, appear that this is how the Universe

467

CAMPUS RECREATION CLEMSON UNIVERSITY  

E-Print Network (OSTI)

CAMPUS RECREATION CLEMSON UNIVERSITY sponsorship program #12;From acquiring new customers to developing long-term relationships with the Clemson University community, Clemson Campus Recreation can market research � Support wellness through fitness and recreation Clemson Campus Recreation boasts one

Stuart, Steven J.

468

Environmental State University  

E-Print Network (OSTI)

Biology Water Science Nursery Management Plant Breeding Biofuel Feedstocks OUR DEPARTMENT The PLANT specialties, including plant breeding, genetic engineering, sustainable agriculture, ornamental production State University is the only land-grant, Hispanic serving university in the contiguous United States

469

University Services Pamela Wheelock  

E-Print Network (OSTI)

and Engineering Jerome Malmquist open position Business Services * Bruce Gritters September 2013 Public SafetyUniversity Services Pamela Wheelock Vice President MANAGEMENT SYSTEMS University Services Human Resources Linda Bjornberg Director open position CIO OPERATIONS Auxiliary Services Laurie Scheich

Amin, S. Massoud

470

Mathematical Statistics Stockholm University  

E-Print Network (OSTI)

, University of Dar es Salaam, Postal address: Box 35062, Dar es Salaam, Tanzania. E-mail: shabanmbare

Britton, Tom

471

UNIVERSITY OF SUSSEX Advertisement  

E-Print Network (OSTI)

-Vice-Chancellors. The Registrar and Secretary heads the Professional Services of the University. In addition, under the UniversityUNIVERSITY OF SUSSEX Advertisement Ref: 297 School of Life Sciences - Genome Damage and Stability the three Pro-Vice-Chancellors, the Registrar and Secretary, the Director of Finance and the Director

Jensen, Max

472

University Buildings Landmark Buildings  

E-Print Network (OSTI)

KEY University Buildings Landmark Buildings The Lanyon Building Roads Footpath Cafe University Accommodation Queen's University Belfast Campus Map The Lanyon Building The Students' Union The David Keir Building School Offices A Biological Sciences B Chemistry and Chemical Engineering C Education D

Müller, Jens-Dominik

473

BRANDEIS UNIVERSITY FACULTY SENATE  

E-Print Network (OSTI)

Brandeis's story to the public. When questioned about the University's brand and identity, Ms. Miles answered that the logo is the University's brand identity. Brandeis is a research university with a long to the marketing of his image. Ms. Miles said that Brandeis had a real connection with Albert Einstein. She added

Fraden, Seth

474

Characterization of Epitaxial Film Silicon Solar Cells Grown on Seeded Display Glass: Preprint  

SciTech Connect

We report characterizations of epitaxial film crystal silicon (c-Si) solar cells with open-circuit voltages (Voc) above 560 mV. The 2-um absorber cells are grown by low-temperature (<750 degrees C) hot-wire CVD (HWCVD) on Corning EAGLE XG display glass coated with a layer-transferred (LT) Si seed. The high Voc is a result of low-defect epitaxial Si (epi-Si) growth and effective hydrogen passivation of defects. The quality of HWCVD epitaxial growth on seeded glass substrates depends on the crystallographic quality of the seed and the morphology of the epitaxial growth surface. Heterojunction devices consist of glass/c-Si LT seed/ epi n+ Si:P/epi n- Si:P/intrinsic a-Si:H/p+ a-Si:H/ITO. Similar devices grown on electronically 'dead' n+ wafers have given Voc {approx}630 mV and {approx}8% efficiency with no light trapping features. Here we study the effects of the seed surface polish on epi-Si quality, how hydrogenation influences the device character, and the dominant junction transport physics.

Young, D. L.; Grover, S.; Teplin, C.; Stradins, P.; LaSalvia, V.; Chuang, T. K.; Couillard, J. G.; Branz, H. M.

2012-06-01T23:59:59.000Z

475

Display device for indicating the value of a parameter in a process plant  

DOE Patents (OSTI)

An advanced control room complex for a nuclear power plant, including a discrete indicator and alarm system (72) which is nuclear qualified for rapid response to changes in plant parameters and a component control system (64) which together provide a discrete monitoring and control capability at a panel (14-22, 26, 28) in the control room (10). A separate data processing system (70), which need not be nuclear qualified, provides integrated and overview information to the control room and to each panel, through CRTs (84) and a large, overhead integrated process status overview board (24). The discrete indicator and alarm system (72) and the data processing system (70) receive inputs from common plant sensors and validate the sensor outputs to arrive at a representative value of the parameter for use by the operator during both normal and accident conditions, thereby avoiding the need for him to assimilate data from each sensor individually. The integrated process status board (24) is at the apex of an information hierarchy that extends through four levels and provides access at each panel to the full display hierarchy. The control room panels are preferably of a modular construction, permitting the definition of inputs and outputs, the man machine interface, and the plant specific algorithms, to proceed in parallel with the fabrication of the panels, the installation of the equipment and the generic testing thereof.

Scarola, Kenneth (Windsor, CT); Jamison, David S. (Windsor, CT); Manazir, Richard M. (North Canton, CT); Rescorl, Robert L. (Vernon, CT); Harmon, Daryl L. (Enfield, CT)

1993-01-01T23:59:59.000Z

476

The University of Wisconsin-Milwaukee Department of University Recreation  

E-Print Network (OSTI)

The University of Wisconsin-Milwaukee Department of University Recreation Agreement for Assumption, ________________________________________ (print name), age ________, desire to participate voluntarily in recreational activities and programs for programming, by the University of Wisconsin ­ Milwaukee, Department of University Recreation. I UNDERSTAND

Saldin, Dilano

477

ARIZONA STATE UNIVERSITY STETSON UNIVERSITY Phoenix, AZ Deland, FL  

E-Print Network (OSTI)

English Literature English BOWLING GREEN STATE UNIVERSITY Bowling Green, OH SYRACUSE UNIVERSITY Industrial OF BRISTOL Mount Pleasant, MI Bristol, UK Communication/English Cinema Studies EASTERN KENTUCKY UNIVERSITY STATE UNIVERSITY Technical Communication Murfreesboro, TN Theater Mass Communications Visual Language

Wu, Shin-Tson

478

Analysis of Internet Banking Security Crack Through Messenger Hacking  

Science Journals Connector (OSTI)

The messenger is a free information and communication means for easy information exchange with acquaintances connected to the Internet during ordinary work process. Therefore, acquaintances (automatically) connec...

Dea-Woo Park; Kyong-Ha Roo

2013-01-01T23:59:59.000Z

479

The Interrogation Machine: NSK, Source Codes and Temporal Hacking  

Science Journals Connector (OSTI)

Writing about technology and its appropriation by the popular imagination William Gibson once famously stated, “the street finds a use for things.” That is, corporate technologies are regularly and intensively...

Alexei Monroe

2005-01-01T23:59:59.000Z

480

Hacking into bacterial biofilms: a new therapeutic challenge  

Science Journals Connector (OSTI)

Microbiologists have extensively worked during the past decade on a particular phase of the bacterial cell cycle known as biofilm, in which single-celled individuals gather together to form a sedentary but dyn...

Christophe Bordi; Sophie de Bentzmann

2011-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "hack universal display" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Response Against Hacking and Malicious Code in P2P  

Science Journals Connector (OSTI)

We have analyzed attacks on and threats to information security, and analyzed information security service in order to provide safe P2P service from these threats. And we have proposed a method to provide info...

Wongoo Lee; Sijung Kim; Bonghan Kim

2006-01-01T23:59:59.000Z

482

Optimised quantum hacking of superconducting nanowire single-photon detectors  

E-Print Network (OSTI)

We explore optimised control of superconducting nanowire single-photon detectors (SNSPDs) through bright illumination. We consider the behaviour of the SNSPD in the shunted configuration (a practical measure to avoid latching) in long-running quantum key distribution experiments. We propose and demonstrate an effective bright-light attack on this realistic configuration, by applying transient blinding illumination lasting for a fraction of a microsecond and producing several deterministic fake clicks during this time. We show that this attack does not lead to elevated timing jitter in the spoofed output pulse, and is hence not introducing significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

Tanner, Michael G; Hadfield, Robert H

2013-01-01T23:59:59.000Z

483

Optimised quantum hacking of superconducting nanowire single-photon detectors  

Science Journals Connector (OSTI)

We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we...

Tanner, Michael G; Makarov, Vadim; Hadfield, Robert H

2014-01-01T23:59:59.000Z

484

Preventing Quantum Hacking in Continuous Variable Quantum Key Distribution  

Science Journals Connector (OSTI)

Security loopholes have been shown for discrete-variable Quantum Key Distribution (QKD). Here, we propose and provide experimental evidence of an attack targeting a continuous-variable...

Jouguet, Paul; Diamanti, Eleni; Kunz-Jacques, Sébastien

485

Quantum hacking on quantum key distribution using homodyne detection  

Science Journals Connector (OSTI)

Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength-dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot-noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2014-03-05T23:59:59.000Z

486

HACking the centromere chromatin code: insights from human artificial chromosomes  

Science Journals Connector (OSTI)

The centromere is a specialized chromosomal region that serves as the assembly site of the kinetochore. At the centromere, CENP-A nucleosomes form part of a chromatin landscape termed centrochromatin. This chr...

Jan H. Bergmann; Nuno M. C. Martins; Vladimir Larionov…

2012-07-01T23:59:59.000Z

487

CYBER SECURITY Software firm identifies hacking program against chemical makers  

Science Journals Connector (OSTI)

A cyber-attack campaign emanating from China targeted private companies involved in the research, development, and manufacture of chemicals and advanced materials between July and September of this year, according to a report from the computer security ...

RICK MULLIN

2011-11-07T23:59:59.000Z

488

Want to rob a bank? Hack your way in  

Science Journals Connector (OSTI)

Forget shotguns and ski masks – today's bank robbers turn to an arsenal of electronic attacks to steal vast sums of money

Jacob Aron

2013-01-01T23:59:59.000Z

489

Geoengineers are free to legally hack the climate  

Science Journals Connector (OSTI)

Field tests of technologies to cool the climate seem to be permitted under international law, fuelling calls for new regulations

Michael Marshall

2013-01-01T23:59:59.000Z

490

Hacking commercial quantum cryptography systems by tailored bright illumination  

E-Print Network (OSTI)

The peculiar properties of quantum mechanics allow two remote parties to grow a private, secret key, even if the eavesdropper can do anything permitted by the laws of nature. In quantum key distribution (QKD) the parties exchange non-orthogonal or entangled quantum states to generate quantum correlated classical data. Consequently, QKD implementations always rely on detectors to measure the relevant quantum property of the signal states. However, practical detectors are not only sensitive to quantum states. Here we show how an eavesdropper can exploit such deviations from the ideal behaviour: We demonstrate experimentally how the detectors in two commercially available QKD systems can be fully remote controlled using specially tailored bright illumination. This makes it possible to acquire the full secret key without leaving any trace; we propose an eavesdropping apparatus built of off-the-shelf components. The loophole is likely to be present in most QKD systems using avalanche photo diodes (APDs) to detect ...

Lydersen, Lars; Wittmann, Christoffer; Elser, Dominique; Skaar, Johannes; Makarov, Vadim; 10.1038/NPHOTON.2010.214

2010-01-01T23:59:59.000Z

491

Hacking commercial quantum cryptography systems by tailored bright illumination  

E-Print Network (OSTI)

The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to measure the relevant quantum property of single photons. Here we demonstrate experimentally that the detectors in two commercially available QKD systems can be fully remote-controlled using specially tailored bright illumination. This makes it possible to tracelessly acquire the full secret key; we propose an eavesdropping apparatus built of off-the-shelf components. The loophole is likely to be present in most QKD systems using avalanche photodiodes to detect single photons. We believe that our findings are crucial for strengthening the security of practical QKD, by identifying and patching technological deficiencies.

Lars Lydersen; Carlos Wiechers; Christoffer Wittmann; Dominique Elser; Johannes Skaar; Vadim Makarov

2010-08-26T23:59:59.000Z

492

Quantum Hacking on Quantum Key Distribution using Homodyne Detection  

E-Print Network (OSTI)

Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

Jing-Zheng Huang; Sébastien Kunz-Jacques; Paul Jouguet; Christian Weedbrook; Zhen-Qiang Yin; Shuang Wang; Wei Chen; Guang-Can Guo; Zheng-Fu Han

2014-02-27T23:59:59.000Z

493

UNIVERSITY OF CONNECTICUT UNIVERSITY OF CONNECTICUT HEALTH CENTER  

E-Print Network (OSTI)

UNIVERSITY OF CONNECTICUT UNIVERSITY OF CONNECTICUT HEALTH CENTER HUMAN STEM CELL RESEARCH COST.....................................................................................12 #12;University of Connecticut and the University of Connecticut Health Center Human Stem Cell that is ineligible for federal support. The University of Connecticut and the University of Connecticut Health Center

Kim, Duck O.

494

Measuring Excellence at Concordia University  

E-Print Network (OSTI)

Measuring Excellence at Concordia University Prepared by the Institutional Planning Office May 2006 #12;Concordia University May 2006 Measuring Excellence at Concordia] #12;Concordia University May 2006 Measuring Excellence at Concordia University First Annual Report

Chvátal, Va�ek

495

UNIVERSITY OF VIRGINIA ENGINEERING FOUNDATION  

E-Print Network (OSTI)

UNIVERSITY OF VIRGINIA ENGINEERING FOUNDATION I __________________________________________ pledge to contribute or make possible a gift to the University of Virginia Engineering Foundation for the University: ________________________________________________________ ________________________________________________________________ Please make check payable to the Engineering Foundation and return to the University of Virginia

Acton, Scott

496

Correlated evolution of mating system and floral display traits in flowering plants and its implications for the  

E-Print Network (OSTI)

: floral display, flower size, mating system evolution, resource allocation, sex allocation, trade in the outcrossing rate database was compared with that of a random sam- ple of the same flora. · The outcrossing and total allocation to attraction can explain the deviation from expected trade-offs between flower size

Kalisz, Susan

497

Construction of whole-cell biocatalyst for xylan degradation through cell-surface xylanase display in Saccharomyces cerevisiae  

Science Journals Connector (OSTI)

We constructed a yeast-based whole-cell biocatalyst displaying Trichoderma reesei xylanase II (XYNII) on the cell-surface and endowed the yeast-cells with the ability to degrade xylan. The fusion gene encoding the mature region of XYNII and the C-terminal half (320 amino acid residues from the C-terminal end) of yeast ?-agglutinin (XYNII-?-agglutinin) was constructed and expressed in Saccharomyces cerevisiae under the control of a glyceraldehyde-3-phosphate dehydrogenase (GAPDH) promoter. The expression system of fusion gene encoding XYNII-?-agglutinin tagged with \\{RGSHis6\\} consisting of arginine, glycine, serine, and histidine hexamer (RGSHis6-XYNII-?-agglutinin) was also constructed. Immunofluorescence labeling to confirm cell-surface display of the RGSHis6-XYNII-?-agglutinin fusion protein, and confirmation of similar xylanase activity in yeast-cells expressing XYNII-?-agglutinin and RGSHis6-XYNII-?-agglutinin but not in the culture medium, indicated that XYNII was displayed on the cell-surface in the active form. The XYNII-displaying yeast-based whole-cell biocatalyst showed highest XYNII activity at pH 5.0 and 40 °C, respectively. This whole-cell biocatalyst is expected to find application not only in the first step of fermentation of xylan to ethanol but also in xylooligosaccharide production.

Yasuya Fujita; Satoshi Katahira; Mitsuyoshi Ueda; Atsuo Tanaka; Hirofumi Okada; Yasushi Morikawa; Hideki Fukuda; Akihiko Kondo

2002-01-01T23:59:59.000Z

498

Synthesis and properties of Sr2CeO4 blue emission powder phosphor for field emission displays  

E-Print Network (OSTI)

for publication 19 January 1999 A blue emission powder phosphor Sr2CeO4 for field emission displays was preparedV. The emission peak of this phosphor is at 470 nm and Commission International de l'Eclairage coordinates are x 0

Wang, Zhong L.

499

Phage display selection of recombinant antibodies derived from a chicken immune library against cryopreserved Eimeria tenella sporozoites  

E-Print Network (OSTI)

An antibody library against Eimeria tenella sporozoites was constructed by phage display. Total RNA was isolated from the spleen, bone marrow, and ceca of immune chickens, and was used to reverse-transcribe cDNA. Heavy and light antibody variable...

Abi Ghanem, Daad Ali

2009-06-02T23:59:59.000Z

500

fMRI Responses to Video and Point-Light Displays of Moving Humans and Manipulable Objects  

E-Print Network (OSTI)

that the lateral temporal cortex is the cortical locus for processing complex visual motion. Within the lateral gyrus (MTG) and the inferior temporal sulcus responded strongly to tool videos and tool point. In contrast, in the lateral temporal cortex, the MTG responded as strongly to point-light displays

Baker, Chris I.