101 |
A study of the development of a food production and conservation program in Blacksburg, Virginia, 1943-1944Johnson, Mayo Crew January 1945 (has links)
The food standard of the National Nutrition Council was met much more nearly by users of the community canning center than by non-users.
Nearly all meat canned by the one hundred families interviewed was canned at the community canning center.
The Food Production War Training courses were, in 1943, their first year, composed largely of people who had not gardened or processed foods before. They averaged more quarts canned than did experienced gardeners not attending classes. The families of those not attending these classes averaged a greater annual consumption of potatoes and dried beans than was recommended for a healthful diet.
Evening School classes, which followed the interviews in 1943, were composed of members of families whose diet had shown an over-supply of potatoes and dried beans and a shortage of tomatoes. They made plans for 1944 gardens in which food in recommended proportions was to be produced. They planned to use improved methods of production. Row space and seeds ordered were "tailored to fit” the particular families concerned. They used improved practices recommended and increased their use of the canning center.
Families of the V. P. I. faculty provided the most adequate supply of vegetables in 1943. The negro group came second in this.
All groups needed an addition of tomatoes.
By using the canning center, the High Top and faculty groups led in the number of quarts of vegetables, apples, and meat canned.
Professional and farmer groups provided the most vegetables but the latter canned them very little.
Enumeration data show that lack of proper foods was more common among those not attending classes than among those attending.
Interest in diet, food production and conservation shown during the interviews seemed genuine. Lack of sufficient information on these subjects was prevalent. However, classes in 1943 and in 1944 were lightly attended.
As teaching aids, graphic means were most effective. Many such films, charts, and pictures are available.
No means of getting adequate whole grains into the diet has been established in the community studied.
The annual family food budget is of great value in covering the needs adequately and efficiently.
Information and facilities for a competent food conservation program are not lacking in the community of Blacksburg, yet a large proportion of its families have not yet become aware of their needs or of the means of providing for such needs.
Where interest is aroused, the group studying together find much information that is "news" to them and proceed, with improved practices, to gratifying results.
A valuable development of democracy is found in such groups where mutual interest and shared work bring people of many classes, occupations, and backgrounds together in the neighborhood and in the community.
Basic food needs are common to all people and interest in them is seldom lacking.
The integration of community life has a great opportunity in the food conservation program. Individual health and national coordination lie in such a program in the community. / M.S.
|
102 |
Privacy Preserving Authentication Schemes and ApplicationsAsokan, Pranav 23 June 2017 (has links)
With the advent of smart devices, Internet of things and cloud computing the amount of information collected about an individual is enormous. Using this meta-data, a complete profile about a person could be created - professional information, personal information like his/her choices, preferences, likes/dislikes etc. The concept of privacy is totally lost with this gamut of technology. The ability to separate one's on-line identity from their personal identity is near impossible. The conflicting interests of the two parties - service providers' need for authentication and the users' privacy needs - is the cause for this problem. Privacy Preserving Authentication could help solve both these problems by creating valid and anonymous identities for the users. And simply by proving the authenticity and integrity of this anonymous identity (without revealing/exposing it) the users can obtain services whilst protecting their privacy. In this thesis, I review and analyze the various types of PPA schemes leading to the discussion of our new scheme 'Lightweight Anonymous Attestation with Efficient Revocation'. Finally, the scenarios where these schemes are applicable are discussed in detail. / Master of Science / With the advent of smart devices, people are almost always connected to the Internet. These smart devices and applications collect information about the user on a massive scale. When all such meta-data are put together, a complete profile of the user - professional and personal information, his/her choices, preferences, likes/dislikes etc. could be created. And all this data is stored somewhere on the Internet. The concept of privacy loses its meaning as this entity knows more about the user than they do themselves. The main reason for this is the inability to separate one’s on-line identity from their personal identity. Service providers need to authenticate the users - the process by which one entity is assured of the identity of the second entity it is interacting with - to ensure only valid members are allowed to use their service. This leads to invasion of the user’s privacy/anonymity as authentication often needs details like address, date-of-birth, credit card details etc. Privacy Preserving Authentication could help solve both these problems by creating valid but anonymous identities for the users. PPA works by issuing the users a secret credential if they can prove their identity. And simply by proving the authenticity and integrity of these secret credentials (without revealing/exposing it) the users can obtain services whilst protecting their privacy. In this thesis, I review and analyze the various types of PPA schemes leading to the discussion of our new scheme Lightweight Anonymous Attestation with Efficient Revocation. Finally, the application scenarios where these schemes are applicable are discussed in detail.
|
103 |
Iterative Rational Krylov Algorithm for Unstable Dynamical Systems and Genaralized Coprime FactorizationsSinani, Klajdi 08 January 2016 (has links)
Generally, large-scale dynamical systems pose tremendous computational difficulties when applied in numerical simulations. In order to overcome these challenges we use several model reduction techniques. For stable linear models these techniques work very well and provide good approximations for the full model. However, large-scale unstable systems arise in many applications. Many of the known model reduction methods are not very robust, or in some cases, may not even work if we are dealing with unstable systems. When approximating an unstable system by a reduced order model, accuracy is not the only concern. We also need to consider the structure of the reduced order model. Often, it is important that the number of unstable poles in the reduced system is the same as the number of unstable poles in the original system. The Iterative Rational Krylov Algorithm (IRKA) is a robust model reduction technique which is used to locally reduce stable linear dynamical systems optimally in the ℋ₂-norm. While we cannot guarantee that IRKA reduces an unstable model optimally, there are no numerical obstacles to the reduction of an unstable model via IRKA. In this thesis, we investigate IRKA's behavior when it is used to reduce unstable models. We also consider systems for which we cannot obtain a first order realization of the transfer function. We can use Realization-independent IRKA to obtain a reduced order model which does not preserve the structure of the original model. In this paper, we implement a structure preserving algorithm for systems with nonlinear frequency dependency. / Master of Science
|
104 |
Inclusion of Priority Access in a Privacy-preserving ESC-based DSA SystemLu, Chang 21 August 2018 (has links)
According to the Federal Communications Commission's rules and recommendations set forth for the 3.5 GHz Citizens Broadband Radio Service, a three-tiered structure shall govern the newly established shared wireless band. The three tiers are comprised of three different levels of spectrum access; Incumbent Access, Priority Access and General Authorized Access. In accordance and fulfillment with this dynamic spectrum access framework, we present the inclusion of Priority Access tier into a two-tiered privacy-preserving ESC-based dynamic spectrum access system. / Master of Science / With the development of wireless communication technologies, the number of wireless communication reliant applications has been increasing. Most of these applications require dedicated spectrum frequencies as communication channels. As such, the radio frequency spectrum, utilized and allocated for these wireless applications, is depleting. This problem can be alleviated by adopting dynamic spectrum access schemes. The current static spectrum allocation scheme assigns designated spectrum frequencies to specific users. This static frequency management approach leads to inefficient frequency utilization as the occupation of frequency channels may vary depending upon time periods. Dynamic spectrum access schemes allow unlicensed users opportunistic access to vacant spectrum spaces. Thus, the adoption of these spectrum sharing schemes will increase the efficiency of spectrum utilization, and slow down the spectrum depletion. However, the design and implementation of these schemes face different challenges. These spectrum sharing systems need to guarantee the privacy of the involved parties while maintaining specific functionalities required and recommended by the Federal Communications Commission. In this thesis, we present the inclusion of a three-tiered frame, approved by the Federal Communications Commission, into a privacy-preserving dynamic spectrum system.
|
105 |
Evaluation of an Appearance-Preserving Mesh Simplification Scheme for CET DesignerHedin, Rasmus January 2018 (has links)
To decrease the rendering time of a mesh, Level of Detail can be generated by reducing the number of polygons based on some geometrical error. While this works well for most meshes, it is not suitable for meshes with an associated texture atlas. By iteratively collapsing edges based on an extended version of Quadric Error Metric taking both spatial and texture coordinates into account, textured meshes can also be simplified. Results show that constraining edge collapses in the seams of a mesh give poor geometrical appearance when it is reduced to a few polygons. By allowing seam edge collapses and by using a pull-push algorithm to fill areas located outside the seam borders of the texture atlas, the appearance of the mesh is better preserved.
|
106 |
An Analytical Nodal Discrete Ordinates Solution to the Transport Equation in Cartesian GeometryRocheleau, Joshua 07 October 2020 (has links)
No description available.
|
107 |
Modélisation, approximation numérique et couplage du transfert radiatif avec l'hydrodynamiqueDubois, Joanne 15 December 2009 (has links)
Le présent travail est consacré à l’approximation numérique des solutions du modèle aux moments M1 pour le transfert radiatif. Il s’agit, ici, de développer des solveurs numériques performants et précis capables de prédire avec précision et robustesse des écoulements où le transfert radiatif joue un rôle essentiel. Dans ce sens, plusieurs méthodes numériques ont été envisagées pour la dérivation des schémas numériques de type solveur de Godunov. Une attention particulière a été portée sur les solveurs préservant les ondes de contact stationnaires. En particulier, un schéma de relaxation et un solveur HLLC sont présentés dans ce travail. Pour chacun de ces solveurs, la robustesse de la méthode a été établie (positivité de l’énergie radiative et limitation du flux radiatif). La validation et l’intérêt des méthodes abordées sont exhibés à travers de nombreuses expériences numériques mono et multidimensionelles. / The present work is dedicated to the numerical approximation of the M1 moments model solutions for radiative transfer. The objective is to develop efficient and accurate numerical solvers, able to provide with precise and robust computations of flows where radiative transfer effects are important. With this aim, several numerical methods have been considered in order to derive numerical schemes based on Godunov type solvers. A particular attention has been paid to solvers preserving the stationary contact waves. Namely, a relaxation scheme and a HLLC solver are presented in this thesis. The robustness of each of these solvers has been established (radiative energy positivity and radiative flux limitation). Several numerical experiments in one and two space dimensions validate the developed methods and outline their interest.
|
108 |
A Framework for Property-preserving Encryption in Wide Column Store DatabasesWaage, Tim 05 May 2017 (has links)
No description available.
|
109 |
Microbiological Treatment of Wastewater from a Wood-Preserving PlantRalston, James R. 08 1900 (has links)
This research investigates interacting biological, chemical, and physical factors affecting the efficiency of microbiological wastewater treatment at the W. J. Smith Wood- Preserving Company in Denison, Texas. The treatment process consisted of collecting exhaust boiler water containing unidentified boiler treatment compounds, steam condensate contaminated with preservatives and wood extracts, plant process waters, and rainfall runoff from plant grounds. With a 5-minute residence time, wastewater was passed over 2 oxidation towers in series, each containing approximately 47,000 square feet of surface area. Suspended solids were removed from the wastewater before discharge. Various amino acids such as serine, aspartate, cysteine, phenylalanine, alanine, proline, glycine, histidine, and tyrosine significantly stimulated phenol degradation in the laboratory. The plant wastewater contained approximately 0.1 mg/l of several of the stimulatory amino acids. It was assumed that these concentrations provided maximal stimulation in the field situation. The plant wastewater also contained sufficient nitrogen to permit the organisms to degrade up to 100 mg phenol/1 of water examined. Amino acids in the wastewater probably serve as a source of microbial nutrition. Toxicity of the wastewater to fish was not caused by the presence of phenol, phenol degradation products, or traces of pentachlorophenol. The wastewater was rendered non-toxic by diluting with between 4 to 9 volumes of stream water. Toxicity could also be removed by chemical coagulation followed by activated carbon adsorption. As a result of biological treatment, the plant now discharges the treated wastewater into the municipal sewage treatment facility.
|
110 |
THE STATUS OF THE PROJECTION PRINCIPLE IN GOVERNMENT-BINDING THEORYVinger, Gift January 2008 (has links)
Published Article / The role of the Projection Principle within Chomsky's Government-Binding
(GB) Theory is to preserve the subcategorisation properties of lexical items at
all levels of syntactic representation, viz. D-structure, S-structure, and Lexical
Form. Arguments have been made that the Projection Principle is a new
concept that is simply an extension of theTransformational Component (XFM)
and Emonds' Structure-Preserving Constraint (SPC), and that it does not
deserve the high status it has been accorded in GB theory. This paper
provides evidence, based on sentences involving movement operations, that
the Projection Principle is innovative and that it convincingly addresses what
theXFMandSPChave failed to address.
|
Page generated in 0.0982 seconds