Journal articles on the topic 'MS Windows Server'

To see the other types of publications on this topic, follow the link: MS Windows Server.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 33 journal articles for your research on the topic 'MS Windows Server.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Garg, Shivi, and Manoj Kumar. "Application Scanning and Ipv6 Assessment For MS-SQL Server." International Research Journal of Electronics and Computer Engineering 2, no. 2 (June 15, 2016): 25. http://dx.doi.org/10.24178/irjece.2016.2.2.25.

Full text
Abstract:
This paper attempts to present a solution that allows the users to scan the remote host machine on a network and to assess IPv6 enablement for MS-SQL. It aims to detect the hardware and the software installed on that machine. This goal is achieved by the use of Windows Application Programming Interface (API) through Windows Management Instrumentation (WMI) Scripts which handles the registry. WMI Scripts are used to connect to the registry of a remote host machine that reads the installed path of the software and hardware details of that machine. First, it will detect the underlying Operating System whether it can support IPv6 or not. If the underlying operating system can support IPv6, then only applications running on it can run on IPv6 enabled network. So for this the system also assesses the IPv6 enablement of MS-SQL Server.
APA, Harvard, Vancouver, ISO, and other styles
2

Cahyaningrum, Yuliana, and Indrastanti Ratna Widiasari. "Analisis Performa Container Berplatform Docker atas SeranganMalicious Software (Malware)." Jurnal Buana Informatika 11, no. 1 (May 1, 2020): 47. http://dx.doi.org/10.24002/jbi.v11i1.3279.

Full text
Abstract:
Abstract. As a new virtualization technology, many things about container technology need to be explored . One of them is data security issue when this technology is applied in a network. The study aims to discover a container performance when a server is being attacked by a malware. In this research, the container is installed natively on Windows Server 2016 and using Docker as the platform. Two groups of malware are used that each group has different effect on the server system. The results show that the malware used in this research does not affect the container performance yet it affects the network used by the container. The calculation results point out an increasing delay at HTTP protocol when the server is being attacked by malware group A which is from 0.028335 ms to 2.2698161 ms. The attack of group B malware on the server caused the website inside the container inaccessible. This is because group B malware also attacked the network server where the container is holding to.Keywords : Virtualization, Container, Malware, Native, Windows Server 2016, Docker.Abstrak. Sebagai teknologi virtualisasi yang baru, banyak hal yang perlu digali tentang teknologi container. Salah satunya adalah masalah keamanan data jika teknologi ini diterapkan dalam jaringan. Penelitian bertujuan untuk mengetahui performa container bila server mendapat serangan dari malware. Pada penelitian ini container dipasang secara native pada Windows Server 2016 dan menggunakan Docker sebagai platform. Dua kelompok malware digunakan dalam penelitian ini dimana setiap kelompok memiliki efek yang berbeda pada sistem server. Hasil menunjukkan bahwa malware yang digunakan dalam penelitian ini tidak mempengaruhi kinerja container, tetapi mempengaruhi network yang digunakan oleh container. Hasil penghitungan menunjukkan kenaikan delay pada protokol HTTP pada saat server mengalami serangan malware kelompok A yaitu dari 0.028335 ms sampai 2.2698161 ms. Serangan malware kelompok B pada server menyebabkan website yang ada di dalam container tersebut tidak dapat diakses. Hal ini disebabkan malware kelompok B juga menyerang network server dimana container tersebut menginduk.Kata Kunci : Virtualisasi, Container, Malware, Native, Windows Server 2016, Docker.
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Jim-Min, Zeng-Wei Hong, Guo-Ming Fang, and Che-Tai Lee. "A style for integrating MS-Windows software applications to client–server systems using Java technology." Software: Practice and Experience 37, no. 4 (2007): 417–40. http://dx.doi.org/10.1002/spe.775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Larosa, Fati Gratianus Nafiri, and Ofelius Laia. "ANALISIS QUALITY OF SERVICE (QoS) LIVE STREAMING WIRELESS IP CAMERA XONZ BERBASIS SMARTPHONE ANDROID." METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi 5, no. 2 (September 10, 2019): 17–24. http://dx.doi.org/10.46880/mtk.v5i2.422.

Full text
Abstract:
Quality of Service (QoS) on Live Streaming has the main parameters, namely bandwidth, jitter, loss and delay, which are measured on the implementation of Wireless IP Camera based on Android Smartphone. The test tools used iperf and ping software, to capture data packets. The network design in this study uses Xonz Wireless IP Camera, wifi router, Server/Laptop and Android Smartphone to monitor or access the services provided. Surveillance/reconnaissance or surveillance by accessing live streaming can be done from anywhere as long as there is still an intranet network. wifi router provides DHCP service, Server/Laptop provides a Virtual Machine using MS Windows Server 2003 Operating System. Web Server is not installed on Real Machine but on Virtual Machine. The smartphone used has the Android Operating System version 4.4.2. IP Camera Xonz model XZ-12Z-HR/W has one major drawback that it can only be accessed via Internet Explorer Browser which can only run on MS Windows Operating System. Some applications that are already available on Google Play and installed on Android Smartphones cannot detect the Wireless IP Camera. The outcome or impact of this research is the creation of a simple Live Streaming application that can be accessed by all browsers on all platforms including Android Smartphones. Measurements were made using iperf and ping. The results showed that the Xonz IP Camera can still be used for mobile room monitoring as far as a maximum of about 20 m from the wifi router and still meets the standard QoS values ​​set by TIPHON and ITU-T G.114.
APA, Harvard, Vancouver, ISO, and other styles
5

Sarkar, Nurul I., and Burjiz K. Soorty. "Evaluating IPv6 in Peer-to-Peer Gigabit Ethernet for TCP using Modern Windows and Linux Systems." International Journal of Business Data Communications and Networking 9, no. 1 (January 2013): 50–63. http://dx.doi.org/10.4018/jbdcn.2013010104.

Full text
Abstract:
IPv6 is the next generation Internet protocol that is already in process of replacing the current IPv4 on corporate networks worldwide. Most of the latest MS Windows and Linux-based client/server operating systems (OSs) support IPv6. However, deploying IPv6 in a corporate network requires an evaluation to determine which modern OS will give the best bandwidth-latency for TCP applications. The main objective of this paper is to evaluate IPv6 against IPv4 in a peer-to-peer Gigabit Ethernet for TCP using four of the latest Windows and Linux systems and to find out the OS that provides the best system performance over IPv6 networks. It is obvious that implementing IPv6 on a Gigabit Ethernet will have drawbacks of lower bandwidth and higher latency as a result of its larger address space. In this paper the authors quantify the performance degradation of IPv6 using empirical study. They measure the quality of service (QoS) parameters, such as TCP throughput, round-trip-time, jitter, and CPU utilization using a customized testbed setting. The effect of packet length on system performance is also reported. The analysis and empirical results reported in this paper provide some insights into IPv6 performance with respect to the impact of modern client/server OS on system performance. This study may help network researchers and engineers to overcome the remaining challenging issues in the deployment of IPv6 on corporate networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Indah, Sarwindah. "LAYANAN INFORMASI PEREKRUTAN DAN PENYALUR TENAGA KERJA BERBASIS SHORT MESSAGE SERVICE." ILKOM Jurnal Ilmiah 10, no. 3 (December 20, 2018): 267–73. http://dx.doi.org/10.33096/ilkom.v10i3.359.267-273.

Full text
Abstract:
With the increasing public demand for information and entertainment, the use of SMS media as a means of requesting and distributing information services is very efficient and innovative. For this purpose, businesses and offices that want to provide SMS-based information services require applications that can support this service. MS Workforce Distribution is one of the services to recruit workers through SMS. Besides that, it is also easier to get interview schedules for candidates or job seekers. This application runs after the system receives SMS that enters via mobile as the server. After being processed by a computer, the results will be sent back to the client or candidate who requested via mobile. In addition, there are broadcast systems that are announcements that inform clients or candidates. Java programming is multi-platform which can be used in a variety of System Operations and Windows. With the development of this application, it is expected to help clients or candidates to get the desired information faster.
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Shu Ren, and Peng Peng. "Application of GeogrAaphic Information System Technique in the Design of Gas Pipe Network Plan." Applied Mechanics and Materials 195-196 (August 2012): 933–37. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.933.

Full text
Abstract:
Geographic Information System is widely used in different fields and it has different backgrounds and models these are introduced briefly in this article. Based on the analysis of development background, application and the related trends of development both at home and abroad for pipe network system, some problems are indicated, such as, building the pipe network geographic information system needs to grasp the key technology, including component technology, object-oriented design, databases and pipe network modeling technology, according to the data characteristics of gas pipe network and using MS Windows 2000 (Advance) Server or UNIX as operating system. The overall design plan of Daqing gas company pipe network information system based on the way of Web is put forward and selecting Windows 2000 Professional as client computing operating system for running the ArcInfo 9.x application program and using other geographic information system software to build the geographic information development platform that gives priority to the ArcGIS of ESRI company. The management method of geographic information system is mainly database, elaborating the implementation of all systematic functions and the management process of data and corresponding software and the development of user interface, the access to the database are finished as well. Design of user-interface is practical and convenient, which has the characteristics of easy and flexible operation situation and high visibility. Therefore, it indicates the application of geographic information system technique is to lay a solid foundation for the standardization of enterprises, in the meantime, it can effectively promote the urban construction and economic development.
APA, Harvard, Vancouver, ISO, and other styles
8

Bouyssié, David, Anne-Marie Hesse, Emmanuelle Mouton-Barbosa, Magali Rompais, Charlotte Macron, Christine Carapito, Anne Gonzalez de Peredo, et al. "Proline: an efficient and user-friendly software suite for large-scale proteomics." Bioinformatics 36, no. 10 (February 25, 2020): 3148–55. http://dx.doi.org/10.1093/bioinformatics/btaa118.

Full text
Abstract:
Abstract Motivation The proteomics field requires the production and publication of reliable mass spectrometry-based identification and quantification results. Although many tools or algorithms exist, very few consider the importance of combining, in a unique software environment, efficient processing algorithms and a data management system to process and curate hundreds of datasets associated with a single proteomics study. Results Here, we present Proline, a robust software suite for analysis of MS-based proteomics data, which collects, processes and allows visualization and publication of proteomics datasets. We illustrate its ease of use for various steps in the validation and quantification workflow, its data curation capabilities and its computational efficiency. The DDA label-free quantification workflow efficiency was assessed by comparing results obtained with Proline to those obtained with a widely used software using a spiked-in sample. This assessment demonstrated Proline’s ability to provide high quantification accuracy in a user-friendly interface for datasets of any size. Availability and implementation Proline is available for Windows and Linux under CECILL open-source license. It can be deployed in client–server mode or in standalone mode at http://proline.profiproteomics.fr/#downloads. Supplementary information Supplementary data are available at Bioinformatics online.
APA, Harvard, Vancouver, ISO, and other styles
9

Contrino, Bruno, Eric Miele, Ronald Tomlinson, M. Paola Castaldi, and Piero Ricchiuto. "DOSCHEDA: a web application for interactive chemoproteomics data analysis." PeerJ Computer Science 3 (August 28, 2017): e129. http://dx.doi.org/10.7717/peerj-cs.129.

Full text
Abstract:
Background Mass Spectrometry (MS) based chemoproteomics has recently become a main tool to identify and quantify cellular target protein interactions with ligands/drugs in drug discovery. The complexity associated with these new types of data requires scientists with a limited computational background to perform systematic data quality controls as well as to visualize the results derived from the analysis to enable rapid decision making. To date, there are no readily accessible platforms specifically designed for chemoproteomics data analysis. Results We developed a Shiny-based web application named DOSCHEDA (Down Stream Chemoproteomics Data Analysis) to assess the quality of chemoproteomics experiments, to filter peptide intensities based on linear correlations between replicates, and to perform statistical analysis based on the experimental design. In order to increase its accessibility, DOSCHEDA is designed to be used with minimal user input and it does not require programming knowledge. Typical inputs can be protein fold changes or peptide intensities obtained from Proteome Discover, MaxQuant or other similar software. DOSCHEDA aggregates results from bioinformatics analyses performed on the input dataset into a dynamic interface, it encompasses interactive graphics and enables customized output reports. Conclusions DOSCHEDA is implemented entirely in R language. It can be launched by any system with R installed, including Windows, Mac OS and Linux distributions. DOSCHEDA is hosted on a shiny-server at https://doscheda.shinyapps.io/doscheda and is also available as a Bioconductor package (http://www.bioconductor.org/).
APA, Harvard, Vancouver, ISO, and other styles
10

FREEMAN, WALTER J., and BRIAN C. BURKE. "A NEUROBIOLOGICAL THEORY OF MEANING IN PERCEPTION PART IV: MULTICORTICAL PATTERNS OF AMPLITUDE MODULATION IN GAMMA EEG." International Journal of Bifurcation and Chaos 13, no. 10 (October 2003): 2857–66. http://dx.doi.org/10.1142/s0218127403008302.

Full text
Abstract:
The aim of this study is to find spatial patterns of EEG amplitude in the gamma range of the EEGs from multiple sensory and limbic areas that demonstrate multisensory convergence and integration. 64 electrodes spread in small arrays were fixed on or in the olfactory, visual, auditory, somatomotor and entorhinal areas of cats and rabbits. The subjects were trained to discriminate 2 visual and then 2 auditory conditioned stimuli, one reinforced (CS+), the other not (CS-). A moving window was applied to the 6-s records from 20 trials of each CS including a 3-s prestimulus control (CS0). The root mean square amplitude was calculated for each signal in the gamma range, so each window gave a point in 64-space. EEG patterns from the CS+, CS- and CS0 conditions gave 3 clusters of points in 64-space. The Euclidean distance of each point to the nearest center of gravity of a cluster served for classification and estimation of the probability of correct classification. The results showed that the gamma activity (35–60 Hz in cats, 20–80 Hz in rabbits) in all five areas formed global patterns of amplitude modulation (AM) in time windows lasting ~100–200 ms and recurring at 2–4 Hz, which were correctly classified above chance levels (p<0.01). All areas contributed information to the AM patterns that served to classify the EEG epochs in the windows with respect to the conditioned stimuli. In conclusion, multisensory integration took place over the greater part of the hemisphere, despite lack of phase coherence among the gamma waves. The integration occurred rapidly enough that, within 300 ms of CS onset, activity in every sensory area was modified by what took place in every other sensory area.
APA, Harvard, Vancouver, ISO, and other styles
11

Riemenschneider, Morten, Lars G. Hvid, Egon Stenager, and Ulrik Dalgas. "Is there an overlooked “window of opportunity” in MS exercise therapy? Perspectives for early MS rehabilitation." Multiple Sclerosis Journal 24, no. 7 (June 2018): 886–94. http://dx.doi.org/10.1177/1352458518777377.

Full text
Abstract:
While early medical treatment has proven effective in MS, early-phase MS rehabilitation has not gained much attention in MS research and clinical practice. Exercise therapy is one of the most promising treatment strategies in MS rehabilitation. Here, we provide a topical review investigating when exercise therapy is initiated in existing MS studies, showing that exercise is initiated at a rather late disease stage, where it predominantly serves as a symptomatic treatment. Recent findings in MS suggest that exercise may have neuroprotective and disease-modifying effects. Such findings along with the findings from medical trials that an early-stage “window of opportunity” exists leads to the proposal that early exercise therapy should be an increased focus in research and clinical practice for persons with MS. A further perspective relates to other rehabilitation interventions that are also initiated at a later disease stage, as these may also take advantage of an early-phase approach.
APA, Harvard, Vancouver, ISO, and other styles
12

Bölte, Jens, Thomas M. Hösker, Gerrit Hirschfeld, and Meinald T. Thielsch. "Electrophysiological correlates of aesthetic processing of webpages: a comparison of experts and laypersons." PeerJ 5 (June 6, 2017): e3440. http://dx.doi.org/10.7717/peerj.3440.

Full text
Abstract:
We investigated whether design experts or laypersons evaluate webpages differently. Twenty participants, 10 experts and 10 laypersons, judged the aesthetic value of a webpage in an EEG-experiment. Screenshots of 150 webpages, judged as aesthetic or as unaesthetic by another 136 participants, served as stimulus material. Behaviorally, experts and laypersons evaluated unaesthetic webpages similarly, but they differed in their evaluation of aesthetic ones: experts evaluated aesthetic webpages as unaesthetic more often than laypersons did. The ERP-data show main effects of level of expertise and of aesthetic value only. There was no interaction of expertise and aesthetics. In a time-window of 110–130 ms after stimulus onset, aesthetic webpages elicited a more negative EEG-amplitude than unaesthetic webpages. In the same time window, experts had more negative EEG-amplitudes than laypersons. This patterning of results continued until a time window of 600–800 ms in which group and aesthetic differences diminished. An interaction of perceiver characteristics and object properties that several interactionist theories postulate was absent in the EEG-data. Experts seem to process the stimuli in a more thorough manner than laypersons. The early activation differences between aesthetic and unaesthetic webpages is in contrast with some theories of aesthetic processing and has not been reported before.
APA, Harvard, Vancouver, ISO, and other styles
13

Maloy, Rebecca. "The Roles of Notation in Frutolf of Michelsberg's Tonary." Journal of Musicology 19, no. 4 (2002): 641–93. http://dx.doi.org/10.1525/jm.2002.19.4.641.

Full text
Abstract:
Munich, Bayerische Staatsbibliothek clm. 14965b, copied in the early 12th century, consists of a treatise and lengthy tonary attributed to Frutolf of Michelsberg (d. 1103). With its ample list of mass and office chants, sequences, and processional antiphons, the tonary of the Munich MS has long been recognized as the most significant of its kind. A modern edition was produced by Coelestin Vivell in 1919. Because this edition is widely available, scholars have given little attention to one of the manuscript's most striking features, namely its substantial use of St. Gall neumes and letter notation. Vivell based his edition of the tonary on the Munich MS but omitted most of its notation, believing it served no practical purpose. Although Urbanus Bomm discussed the notation in his study of modality and chant, no comprehensive study of it exists. In its scope and significance, the notation in the Munich tonary far exceeds the traditional roles of tonary notation. In addition to incipits and finals, the scribe notated internal passages of many chants. A close examination of these passages reveals that they were carefully chosen and that they correspond precisely to problematic points in the repertory. The passages singled out for notation pose either practical or theoretical difficulties, and the notation serves to clarify the scribe's preferred solutions. Through comparison of the Munich tonary with a wide range of other sources, this essay illustrates the nature of these problems and the ways in which the notation clarifies them. The scribe emends traditional versions of melodies to present readings more compatible with modal theory, often reflecting the specific perspectives articulated in Frutolf's theoretical writings. In effect, the tonary serves a dual role as a theoretical work and practical performance guide. It opens a window onto a vigorous discussion and debate that surrounded the chant tradition in the late 11th century and offers a remarkable witness to the interaction between theory and practice in the Middle Ages.
APA, Harvard, Vancouver, ISO, and other styles
14

Schiepers, Christiaan, Paul Van Hecke, Rik Vandenberghe, Sylvie Van Oostende, Patrick Dupont, Philippe Demaerel, Guy Bormans, and Herwig Carton. "Positron emission tomography, magnetic resonance imaging and proton NMR spectroscopy of white matter in multiple sclerosis." Multiple Sclerosis Journal 3, no. 1 (February 1997): 8–17. http://dx.doi.org/10.1177/135245859700300102.

Full text
Abstract:
Objective: To assess characteristics of MS lesions and normal appearing white matter (NAWM) with various imaging modalities. Glucose metabolism was investigated with FDG - PET, metabolite concentration with proton NMR spectroscopy, and lesion detection with routine brain MRI. Methods: Thirteen patients were studied in a stable phase of their disease, and two during an acute episode. Nine healthy volunteers served as controls. Results: Three patients had a normal brain MRI, 12 had typical lesions. MR images were registered to the PET planes. Lesions and contra-lateral control areas were analyzed, 10/15 lesions showed relative hyper-metabolism and 2 hypo-metabolism. NAA concentration was significantly decreased in both lesions and NAWM. Conclusion: In stable MS, most large lesions have a relatively increased glucose utilization and decreased NAA concentration. NAWM showed a significantly decreased NAA concentration compared to healthy subjects, but no difference in glucose metabolism. Active lesions in acute MS are also hyper-metabolic. This finding opens a new window on the classification of white matter lesions based on glucose utilization.
APA, Harvard, Vancouver, ISO, and other styles
15

Pentillä, Hannu. "Architectural-IT and Educational Curriculumns – A European Overview." International Journal of Architectural Computing 1, no. 1 (January 2003): 102–11. http://dx.doi.org/10.1260/147807703322467469.

Full text
Abstract:
The paper summarizes the analysis of data on european architecture schools, collected in the eCAADe-conferences during the 1990s. Computer-Aided Design has developed into architectural information and communication technology (ICT), to become commonplace in architectural education. However, the general held views on new media use in the schools seems to be slightly optimistic. On the other hand, the invisible more common ICT use (writing, surfing, emailing) accounts for a lot more of the volume of activity than generally appreciated. The major hardware platform in european architecture schools is PC/Windows (90–95%) with Linux and Unix commonly used in servers (25–35%). Macintoshes are also widely used (50–55%). MS Office (90–95%) and PhotoShop (85–90%), are used widely in the schools. The Graphic and DTP tools PageMaker, QuarkXpress, Illustrator, Freehand are also common (30–50%). AutoCAD is the market leader in CAD platforms (80–90%), followed by ArchiCAD. MicroStation/Bentley also has a significant presence in the schools (35–40%). 3DStudio is the most common 3D-modelling tool (80–85%), followed by formZ (35–40%). Less common (15–25%) are Rhino, Maya, Alias, Lightscape and Radiance.
APA, Harvard, Vancouver, ISO, and other styles
16

Grigor’ev, R. A., and F. Sh Akhmetzyanov. "Compilation of medical data in the MS Excel program using the procedure of multifactorial «intermediate outcomes»." Kazan medical journal 93, no. 4 (August 15, 2012): 692–98. http://dx.doi.org/10.17816/kmj1575.

Full text
Abstract:
Aim. To optimize the compilation of statistical data on oncology patients according to survival and mortality. Methods. Compilation of statistical data by using the multifactorial «intermediate outcomes». Results. A program code has been used from 1990 to the present time to compile statistical data on survival and mortality of patients with gastric cancer operated on at the Kazan City Oncology Dispensary. This code makes it possible to evaluate the sensitivity of selected statistical indicators to the factors specified by the researcher, which makes it possible to regard it as a universal method for analysis of the databases in cases where the number of combinations of factors is large. The method has a high processing speed and reduces the total amount of operator commands. The universality of the program intends the use of its functions to compile the results of iterative calculations. The procedure of multifactor intermediate outcomes was implemented on the basis of MS Excel by means of Visual Basic for Applications. The proposed program of three-factor «intermediate outcomes» serves as a convenient and fast tool for finding relevant factors. Reliability of the analysis of the effectiveness of the treatment strategy for oncology patients increases significantly during application of the proposed program. Conclusion. Testing of the algorithm for analysis of the database of results in medicine and summarizing the results of iterative calculations (for example, a recursive method and the moving window method) and the equations with different combinations of time series in econometrics may indicate the viability of the algorithm as an extremely powerful tool of analysis and generalization of databases.
APA, Harvard, Vancouver, ISO, and other styles
17

Algermissen, Stephan, and Max Hörnlein. "Person Identification by Footstep Sound Using Convolutional Neural Networks." Applied Mechanics 2, no. 2 (May 11, 2021): 257–73. http://dx.doi.org/10.3390/applmech2020016.

Full text
Abstract:
Human gait is very individual and it may serve as biometric to identify people in camera recordings. Comparable results can be achieved while using the acoustic signature of human footstep sounds. This acoustic solution offers the opportunity of less installation space and the use of cost-efficient microphones when compared to visual system. In this paper, a method for person identification based on footstep sounds is proposed. First, step sounds are isolated from microphone recordings and separated into 500 ms samples. The samples are transformed with a sliding window into mel-frequency cepstral coefficients (MFCC). The result is represented as an image that serves as input to a convolutional neural network (CNN). The dataset for training and validating the CNN is recorded with five subjects in the acoustic lab of DLR. These experiments identify a total number of 1125 steps. The validation of the CNN reveals a minimum F1-score of 0.94 for all five classes and an accuracy of 0.98. The Grad-CAM method is applied to visualize the background of its decision in order to verify the functionality of the proposed CNN. Subsequently, two challenges for practical implementations, noise and different footwear, are discussed using experimental data.
APA, Harvard, Vancouver, ISO, and other styles
18

Musoga, Brenda, Louise Ngugi, and Kenneth Lawrence Wanjau. "Moderating role of service innovation on the relationship between corporate reputation and performance of hotels in Kenya." International Journal of Research in Business and Social Science (2147- 4478) 10, no. 1 (February 11, 2021): 47–59. http://dx.doi.org/10.20525/ijrbs.v10i1.1016.

Full text
Abstract:
The study aims to evaluate the moderating role of service innovation on the relationship between corporate reputation and the performance of hotels in Kenya. The study design used was cross-sectional descriptive utilizing the mixed approach. The target that served as the study population, was General Managers of all the 4-star hotels in Kenya. Primary data was collected by the use of a self-administered semi-structured questionnaire and secondary data from hotel records, journals, and government publications. Data analysis involved qualitative and quantitative techniques, analyses of variance (ANOVA), and Structural Equation Modelling (SEM) which tested the hypothesized relationship in this study. Statistical software such as Statistical Package for Social Sciences version 21, MS-Excel for Windows 8, Analysis of Moment Structures version 17, and SmartPLS version 2.0 was used for analysis. The theoretical models and hypotheses were tested based on empirical data gathered from 43 General Managers. The study findings indicate that corporate reputation positively and significantly influences performance (C.R = 5.907 at 5% ?-level) and service innovation moderates (R2 change = 0.054) the relationship between corporate reputation and performance. The study results are meant to benefit hotel industry policymakers, academicians, and other opportunistic entrepreneurs. The recommendation is that the hotel industry should invest seriously in corporate reputation so as to influence customer purchase behavior and improved performance.
APA, Harvard, Vancouver, ISO, and other styles
19

Gorliczay, Edit, János Tamás, Sándor Kun, László Huzsvai, and László Bárány. "Examination and statistical evaluation of physico-chemical parameters of windrow composting." Acta Agraria Debreceniensis, no. 1 (May 20, 2020): 33–38. http://dx.doi.org/10.34101/actaagrar/1/3726.

Full text
Abstract:
The treatment and utilization of plant and animal waste and by-products from agriculture is very diverse. Traditional environmental management practices for waste management have been retained through soil conservation and the applied of recycle degradable organic substances in soil. The management of by-products from agriculture (animal husbandry) is important because a closed loop can be created to utilize by-products (manure, feathers) from the production of the main product (eggs, meat, milk) and to form a raw material for a new product. It is important to treat the resulting by-products, especially deep-litter manure, as it has served as a basis for compost-treated manure to develop an organic-based, soil-conditioning product line. Poultry manure by itself is not suitable as a substrate for aerobic decomposition, so it has to be mixed with other substances (zeolite, bentonite, soil), because of its high nutrient capacity, it is an acidifying substance. The aim of this study was to compost the mixture of poultry manure and hen manure by the addition of zeolite and to monitor the composting process. It was also our aim to statistically determine the effect of the zeolite on parameters describing the composting process. The windrow composting experiments were set up in the composting area of the University of Debrecen, Institute of Water and Environmental Management. The composting experiment was 62 days long, during which the main parameters describing the composting process were continuously monitored: temperature (°C), moisture content (w/w%), electrical conductivity (mS/cm), organic matter content (w/w%), examination of nitrogen forms (w/w%). In this study, three factors were investigated: temperature, humidity, and pH. For statistical evaluation, R software and RStudio user interface were used. We developed a repeated measurement model, in which the fixed and random effects were determined for our parameters under study, and the resulting relationships were shown on interaction plots. Based on our results, the temperature of the prisms has become independent of the ambient temperature and the composting stages can be separated in both the control and the zeolite treated prisms. In the repeated measurement model, we proved that treatment, time and treatment: time interaction were significant at both temperature and pH.
APA, Harvard, Vancouver, ISO, and other styles
20

Oliveira, Evaldo Hipólito de, Elison Costa Holanda, Maria do Socorro Viana do Nascimento, and Leonardo Ferreira Soares. "Análise da prevalência do câncer de colo uterino em mulheres do Estado do Piauí, Brasil." Research, Society and Development 9, no. 10 (September 25, 2020): e2509108540. http://dx.doi.org/10.33448/rsd-v9i10.8540.

Full text
Abstract:
Trata-se de um retrospectivo com objetivo de identificar a prevalência do câncer de colo uterino em mulheres no estado do Piauí através de um rastreamento realizado por meio de análise de dados no SISCOLO/MS, referente ao período de e 2010 a 2014, sendo coletado as variáveis epidemiológicas da quantidade de casos, escolaridade, faixa etária, etnia,tempo de realização do exame e ao tipo de exame, de acordo com o critério cronológico dos atendimentos das mulheres no estado do Piauí no período compreendido entre janeiro de 2010 a dezembro de 2014. Tabularam-se os dados, utilizando os programa Microsoft Office e Microsoft Excel 2019 e Tab para Windows (TabWin) versão 4.14. Resultado e discussão: Observou-se 5540 casos de CCU.O ano que apresentou o maior número de casos foi 2013, totalizando 1469 (26,5%)notificações, e o menor correspondeu 2014 (n=818; 14,8%).Os indivíduos mais acometidos pela doença foi com faixa etária entre 25 a 34 anos (28,3%)e destes 29,1% com lesão intra epitelial debaixo grau. A etnia predominante foi à parda (11,6%) e 12,74% dos pacientes apresentaram grau Ensino médio incompleto com 80,0% e 26,0 procederam adenocarcinoma in situ, respectivamente. Em relação ao intervalo de realização do exame o prevalente foi de 0 a 30 dias (87,2%) com 95,7% carcinoma epidermóide invasor. Conclusão: Sugere-se que novos estudos sejam realizados sobre a temática almejando contribuir de forma significativa para a prevenção desta doença, bem como servir como aporte aos gestores dos serviços de saúde pública.
APA, Harvard, Vancouver, ISO, and other styles
21

Papassotiriou, Ioannis, Christos Poziopoulos, Georgia Avgerinou, Claudia R. Morris, and Ersi Voskaridou. "A Pilot Data Analysis of a Metabolomic Liquid Chromatography-Tandem Mass Spectrometry (LC/MS/MS) Based Study of Patients with Sickle Cell/Beta Thalassemia." Blood 132, Supplement 1 (November 29, 2018): 4912. http://dx.doi.org/10.1182/blood-2018-99-111445.

Full text
Abstract:
Abstract Background: The complex pathophysiology of Sickle Cell Disease (SCD) makes unlikely that a single therapeutic agent will prevent or reverse all SCD complications. Metabolomic analysis might help in the characterization of the endogenous and exogenous effects of potential new treatments. Metabolites are small molecules that are chemically transformed during metabolism and provide a functional readout of cellular state. Metabolites serve as direct signatures of biochemical activity and are therefore easier to correlate with phenotype. The metabolome is typically defined as the collection of small molecules produced by cells and offers a window for investigating how mechanistic biochemistry relates to cellular phenotype. There are very few reports associated with SCD providing comprehensive measurements of metabolites present in blood. Low arginine bioavailability has been associated with a clinical phenotype of increased hemolytic rate, pulmonary hypertension risk and early mortality. Recently, the FDA approved the use of L-glutamine for the treatment of adults and children with SCD, on the basis of the results of randomized phase 3 clinical trials1, while L-arginine's involvement is under investigation2,3. In this context we aimed to quantify targeted metabolites' abnormalities in patients with Sickle Cell/beta thalassemia (HbS/βThal), to identify pathways that might be of interest to prevent disease complications. Patients and Methods: Thirty adult Caucasian patients with HbS/βThal aged 45.6±10.9y, (43% male), at steady-state were enrolled in the study, while 20 age-matched healthy individuals (45% male) served as controls. Along with measurements of hematologic and blood chemistry parameters, targeted metabolome analyses for 13 aminoacids and 2 aminoacid's derivatives were performed after extraction from dry blood spots (DBSs) on filter paper using LC/MS/MS, with derivatization (AB SCIEX 5500 triple quadrupole QTRAP® LC/MS/MS Systems, Framingham, MA, USA). Results: Multiple metabolite differences are identified in HbS/βThal vs. Controls (Figure1). From metabolites involved in the biosynthesis of glutathione, only L-glutamine's levels were lower in patients with HbS/βThal compared to controls, while 5-oxyproline levels, a catabolic product of glutathione metabolism, were markedly increased in patients with HbS/βThal compared to controls. Urea cycle amino acids, also involved in the production of nitric oxide, L-arginine and L-ornithine concentrations were significantly lower in patients with HbS/βThal compared to controls, with a trend towards lower L-citrulline in patients with HbS/βThal p=0.06). Finally, amino acids involved in catecholamines (dopamine, nor-epinephrine and epinephrine) biosynthesis, such as L-phenylalanine and L-tyrosine and its metabolite succinylacetone levels were significantly lower in patients with HbS/βThal compared to controls. No significant correlations were found between any metabolites and markers of hemolysis, HbF levels or iron burden. Conclusions: This study confirms prior observations concerning aberrations in multiple blood specific amino acid levels in patients with SCD compared to controls, but this is the first report on Caucasian patients with HbS/βThal and on whole blood from DBS. We also identified for the first time in Caucasian patients with HbS/βThal important metabolic abnormalities of glutathione and nitric oxide biosynthesis pathways associated with altered concentrations of the metabolites serving of substrates in these cycles. Importantly, we also demonstrate low levels of L-phenylanine and L-tyrosine, which are essential sources for multiple neurotransmitters biosynthesis and neurobehavioral health. The latter novel observation should be confirmed in larger studies, while measurements of urinary amino acid clearances are necessary to evaluate for potential etiologies of the deficiencies through urinary losses vs. low substrate availability, increased utilization or abnormal metabolism. Patients with SCD are in a precarious state with respect to many amino acid deficiencies, all of which may have clinical consequences warranting further investigation. 1N Engl J Med. 2018 Jul 19;379(3):226-235. 2Anesth Analg. 2017 Apr;124(4):1369-1370. 3Haematologica. 2013 Sep;98(9):1375-82. Figure 1. Figure 1. Disclosures Morris: Pfizer: Consultancy; Calithera: Consultancy; MAST Therapeutics: Research Funding; UCSF-Benioff Children's Hospital Oakland: Patents & Royalties: For nutritional supplement licensed to Lifetrients; FDA: Research Funding; NIH/NHLBI: Research Funding. Voskaridou:Celgene Corp: Membership on an entity's Board of Directors or advisory committees, Research Funding; Acceleron: Membership on an entity's Board of Directors or advisory committees, Research Funding.
APA, Harvard, Vancouver, ISO, and other styles
22

Bian, Jingfang, Ying-Hon Sze, Dennis Yan-Yin Tse, Chi-Ho To, Sally A. McFadden, Carly Siu-Yin Lam, King-Kit Li, and Thomas Chuen Lam. "SWATH Based Quantitative Proteomics Reveals Significant Lipid Metabolism in Early Myopic Guinea Pig Retina." International Journal of Molecular Sciences 22, no. 9 (April 29, 2021): 4721. http://dx.doi.org/10.3390/ijms22094721.

Full text
Abstract:
Most of the previous myopic animal studies employed a single-candidate approach and lower resolution proteomics approaches that were difficult to detect minor changes, and generated limited systems-wide biological information. Hence, a complete picture of molecular events in the retina involving myopic development is lacking. Here, to investigate comprehensive retinal protein alternations and underlying molecular events in the early myopic stage, we performed a data-independent Sequential Window Acquisition of all Theoretical Mass Spectra (SWATH) based proteomic analysis coupled with different bioinformatics tools in pigmented guinea pigs after 4-day lens-induced myopia (LIM). Myopic eyes compared to untreated contralateral control eyes caused significant changes in refractive error and choroid thickness (p < 0.05, n = 5). Relative elongation of axial length and the vitreous chamber depth were also observed. Using pooled samples from all individuals (n = 10) to build a species-specific retinal ion library for SWATH analysis, 3202 non-redundant proteins (with 24,616 peptides) were identified at 1% global FDR. For quantitative analysis, the 10 individual retinal samples (5 pairs) were analyzed using a high resolution Triple-TOF 6600 mass spectrometry (MS) with technical replicates. In total, 37 up-regulated and 21 down-regulated proteins were found significantly changed after LIM treatment (log2 ratio (T/C) > 0.26 or < −0.26; p ≤ 0.05). Data are accepted via ProteomeXchange with identifier PXD025003. Through Ingenuity Pathways Analysis (IPA), “lipid metabolism” was found as the top function associated with the differentially expressed proteins. Based on the protein abundance and peptide sequences, expression patterns of two regulated proteins (SLC6A6 and PTGES2) identified in this pathway were further successfully validated with high confidence (p < 0.05) using a novel Multiple Reaction Monitoring (MRM) assay on a QTRAP 6500+ MS. In summary, through an integrated discovery and targeted proteomic approach, this study serves as the first report to detect and confirm novel retinal protein changes and significant biological functions in the early LIM mammalian guinea pigs. The study provides new workflow and insights for further research to myopia control.
APA, Harvard, Vancouver, ISO, and other styles
23

Kakkassery, Vinodh, Timo Gemoll, Miriam M. Kraemer, Thorben Sauer, Aysegül Tura, Mahdy Ranjbar, Salvatore Grisanti, Stephanie C. Joachim, Stefan Mergler, and Jacqueline Reinhard. "Protein Profiling of WERI-RB1 and Etoposide-Resistant WERI-ETOR Reveals New Insights into Topoisomerase Inhibitor Resistance in Retinoblastoma." International Journal of Molecular Sciences 23, no. 7 (April 6, 2022): 4058. http://dx.doi.org/10.3390/ijms23074058.

Full text
Abstract:
Chemotherapy resistance is one of the reasons for eye loss in patients with retinoblastoma (RB). RB chemotherapy resistance has been studied in different cell culture models, such as WERI-RB1. In addition, chemotherapy-resistant RB subclones, such as the etoposide-resistant WERI-ETOR cell line have been established to improve the understanding of chemotherapy resistance in RB. The objective of this study was to characterize cell line models of an etoposide-sensitive WERI-RB1 and its etoposide-resistant subclone, WERI-ETOR, by proteomic analysis. Subsequently, quantitative proteomics data served for correlation analysis with known drug perturbation profiles. Methodically, WERI-RB1 and WERI-ETOR were cultured, and prepared for quantitative mass spectrometry (MS). This was carried out in a data-independent acquisition (DIA) mode. The raw SWATH (sequential window acquisition of all theoretical mass spectra) files were processed using neural networks in a library-free mode along with machine-learning algorithms. Pathway-enrichment analysis was performed using the REACTOME-pathway resource, and correlated to the molecular signature database (MSigDB) hallmark gene set collections for functional annotation. Furthermore, a drug-connectivity analysis using the L1000 database was carried out to associate the mechanism of action (MOA) for different anticancer reagents to WERI-RB1/WERI-ETOR signatures. A total of 4756 proteins were identified across all samples, showing a distinct clustering between the groups. Of these proteins, 64 were significantly altered (q < 0.05 & log2FC |>2|, 22 higher in WERI-ETOR). Pathway analysis revealed the “retinoid metabolism and transport” pathway as an enriched metabolic pathway in WERI-ETOR cells, while the “sphingolipid de novo biosynthesis” pathway was identified in the WERI-RB1 cell line. In addition, this study revealed similar protein signatures of topoisomerase inhibitors in WERI-ETOR cells as well as ATPase inhibitors, acetylcholine receptor antagonists, and vascular endothelial growth factor receptor (VEGFR) inhibitors in the WERI-RB1 cell line. In this study, WERI-RB1 and WERI-ETOR were analyzed as a cell line model for chemotherapy resistance in RB using data-independent MS. Analysis of the global proteome identified activation of “sphingolipid de novo biosynthesis” in WERI-RB1, and revealed future potential treatment options for etoposide resistance in RB.
APA, Harvard, Vancouver, ISO, and other styles
24

Papassotiriou, Ioannis, Fottes Panetsos, Theodora Livadara, Maria Dimopoulou, Andreas Tzivaras, and Ersi Voskaridou. "Targeted Metabolomic Profiles Are Strongly Correlated With Metabolic Alterations In Patients With Sickle Cell/Beta Thalassemia Disease." Blood 122, no. 21 (November 15, 2013): 4675. http://dx.doi.org/10.1182/blood.v122.21.4675.4675.

Full text
Abstract:
Background The complex pathophysiology of Sickle Cell Disease (SCD) makes unlikely that a single therapeutic agent will prevent or reverse all SCD complications. Metabolomic analysis might help in the characterization of the endogenous and exogenous effects of potential new treatments. Metabolites are small molecules that are chemically transformed during metabolism and provide a functional readout of cellular state. Metabolites serve as direct signatures of biochemical activity and are therefore easier to correlate with phenotype. The metabolome is typically defined as the collection of small molecules produced by cells and offers a window for interrogating how mechanistic biochemistry relates to cellular phenotype. There are very few reports providing comprehensive measurements of metabolites present in blood and almost no reports on metabolites changes associated with SCD. In this context we aimed to detect and to quantify targeted metabolites’ abnormalities in patients with Sickle Cell/beta thalassemia disease (HbS/βThal) and their implication in pathways that might be of interest to prevent vaso-occlusion and/or to monitor the effects of new therapies on SCD. Patients and Methods Twenty adult patients with HbS/βThal were enrolled in the study, while 20 apparently healthy individuals matched for age served as controls. Targeted metabolome analyses based on aminoacids and carnitines were performed after extraction from dry blood spots (DBSs) on filter paper using High Performance Liquid Chromatography followed by tandem Mass Spectrometry (LC/MS/MS), with derivatization (AB SCIEX 5500 triple quadrupole and QTRAP® LC/MS/MS Systems, Framingham, MA, USA) with reagents provided by Chromsystems Instruments & Chemicals, Germany. The injection volume was 10 µL and the analysis lasted ca. 2 min. Results The main results of the study showed that: a) fifty metabolites were separated in patients and controls samples, b) mapping the results of analyses, patients with HbS/βThal compared to controls had 17 metabolites with significantly lower concentration, 10 metabolites with comparable concentration and 23 metabolites with significantly higher concentration, c) L-arginine and L-ornithine concentrations were significantly lower in patients HbS/βThal compared to controls, 9.3±2.6 vs 14.7±3.7 µmoles/L, (p<0.01), and 116.0±15.0 vs 211.2±19.5 µmoles/L, (p<0.001), respectively, while L-citrulline was lower in patients HbS/βThal compared to controls but no significantly 21.8±2.5 vs 25.1±2.5 µmoles/L, (p>0.06) and d) carnitine, acetylcarnitine and propionylcarnitine correlated significantly positive with reticulocyte production index (p<0.001). Conclusions Our findings showed significant alterations in whole blood metabolome of patients with HbS/βThal. Also we demonstrated the very important metabolic abnormality of Nitric Oxide biosynthesis pathway due to the low concentration of the aminoacids serving of substrates in this cycle and disturbances in carnitine and acylcarnitines homeostasis. These abnormalities in the metabolome reflected the hemolysis, inflammatory process and pulmonary hypertension observed in these patients. Disclosures: No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
25

Bass, John. "Would Caccini approve?" Early Music 36, no. 1 (February 1, 2008): 81–94. http://dx.doi.org/10.1093/em/cam120.

Full text
Abstract:
Abstract Although it is known that improvisation was an important part of musical performance in the 16th and 17th centuries, studying how extemporaneous elements were incorporated into real-world situations has proven to be difficult. Improvisers, by nature, do not record what they do, but there is evidence that points to some of these individuals attempting to document their approach to music, namely in ornamentation manuals and individual pieces with written-out embellishment. Among these sources is British Library Ms. Egerton 2971, a 37-folio volume probably dating from the second or third decade of the 17th century, which contains, among other things, embellished versions of Giulio Caccini’s Amarilli, mia bella and Dolcissimo sospiro, first published in Le nuove musiche (Florence, 1602). Sources like this, despite some inherent problems, offer the clearest window into the minds of improvisers of the time, and warrant further study. The research in this article serves two purposes. First, the versions of Amarilli, mia bella and Dolcissimo sospiro contained in Egerton 2971 will be examined and compared to those published in Le nuove musiche as a case study of early 17th-century improvisation. Second, because of Caccini’s open disdain for singers taking liberties with his compositions, an attempt will be made to see if these pieces might be examples of such treatments. The crux of the article aims to show that ornamentation of the time, at least as shown in these examples, was not a random act of substituting stereotyped musical patterns for given intervals, but instead points to a more robust idea of improvisatory thought. Rather than looking at individual ornaments or how specific musical gestures might have painted certain words, the overall structure of the ornamentation is examined to show that it is subject to deeper and subtler intellectual considerations of poetic structure, overall musical structure, and rhetoric.
APA, Harvard, Vancouver, ISO, and other styles
26

Ngayo, Musa Otieno, Margaret Oluka, Zachari Arochi Kwena, Wallace Dimbuson Bulimo, and Faith Apolot Okalebo. "Effects of cytochrome P450 2B6 and constitutive androstane receptor genetic variation on Efavirenz plasma concentrations among HIV patients in Kenya." PLOS ONE 17, no. 3 (March 2, 2022): e0260872. http://dx.doi.org/10.1371/journal.pone.0260872.

Full text
Abstract:
The effects of genetic variation of cytochrome P450 2B6 (CYP2B6) and constitutive androstane receptor (CAR) on efavirenz (EFV) plasma concentration was evaluated among 312 HIV patients in Nairobi Kenya. The EFV plasma concentration at steady-state were determined using ultra-high-performance liquid chromatography with a tandem quadruple mass spectrometer (LC-MS/MS). Thirteen CYP2B6 (329G>T, 341T>C, 444 G>T/C, 15582C>T, 516G>T, 548T>G, 637T>C, 785A>G, 18492C>T, 835G>C, 1459C>T and 21563C>T) and one CAR (540C>T) single nucleotide polymorphisms (SNPs) were genotyped using real-time polymerase chain reaction. HIV drug resistance mutations were detected using an in-house genotypic assay. The EFV concentration of patients ranged from 4 ng/mL to 332697 ng/mL (median 2739.5 ng/mL, IQR 1878–4891.5 ng/mL). Overall, 22% patients had EFV concentrations beyond therapeutic range of 1000–4000 ng/mL (4.5%% < 1000 ng/mL and 31.7% > 4000 ng/mL). Five SNPs (15582C>T, 516G>T, 785A>G, 983T>C and 21563C>T) were associated with higher EFV plasma concentration while 18492C>T with lower EFV plasma concentration (p<0.05). Strong linkage disequilibrium (LD) was observed for 15582C>T, 516G>T, 785A>G, 18492C>T, 983T>C, 21563C>T, 1459C>T and CAR 540C>T. Sixteen haplotypes were observed and CTGCTTCC, CTGCTTCT, TTGCTTCT and CGACCCCT were associated with high EFV plasma concentration. In multivariate analysis, factors significantly associated with EFV plasma concentration included; the presence of skin rash (β = 1379, 95% confidence interval (CI) = 3216.9–3416.3; p < 0.039), T allele of CYP2B6 516G>T (β = 1868.9, 95% CI 3216.9–3416.3; p < 0.018), the C allele of CYP2B6 983T>C (β = 2638.3, 95% CI = 1348–3929; p < 0.0001), T allele of CYP2B6 21563C>T (β = 1737, 95% CI = 972.2–2681.9; p < 0.0001) and the presence of 5 to 7 numbers of SNPs per patient (β = 570, 95% CI = 362–778; p < 0.0001) and HIV viral load ≤1000 cells/mL (β = -4199.3, 95% CI = -7914.9 –-483.6; p = 0.027). About 36.2% of the patients had EFV plasma concentrations beyond therapeutic window, posing high risk of treatment failure or toxicity. The SNPs of CYP2B6 516G>T, CYP2B6 983T>C, 21563C>T, presence of higher numbers of SNPs per patient and haplotypes CTGCTTCC, CTGCTTCT, TTGCTTCT and CGACCCCT could efficiently serves as genetic markers for EFV plasma concentration and could guide personalization of EFV based ART treatment in Kenya.
APA, Harvard, Vancouver, ISO, and other styles
27

K K A, Abdullah, Robert A B C, and Adeyemo A B. "August 2016 VOLUME 5, ISSUE 8, AUGUST 2016 5th Generation Wi-Fi Shatha Ghazal, Raina S Alkhlailah Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5801 ECG Arrhythmia Detection Using Choi-Williams Time-Frequency Distribution and Artificial Neural Network Sanjit K. Dash, G. Sasibhushana Rao Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5802 Data Security using RSA Algorithm in Cloud Computing Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5803 Detection Algorithms in Medical Imaging Priyanka Pareek, Pankaj Dalal Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5804 A Review Study on the CPU Scheduling Algorithms Shweta Jain, Dr. Saurabh Jain Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5805 Healthcare Biosensors - A Paradigm Shift To Wireless Technology Taha Mukhtar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5806 Congestion Control for Peer to Peer Application using Random Early Detection Algorithm Sonam Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5807 Quantitative and Qualitative Analysis of Milk Parameters using Arduino Controller Y.R. Bhamare, M.B. Matsagar, C.G. Dighavkar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5808 Ardunio Based Security and Safety using GSM as Fault Alert System for BTS (Base Transceiver Station) Umeshwari Khot, Prof. Venkat N. Ghodke Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5809 Automatic Single and Multi Topic Summarization and Evolution to Generate Timeline Mrs. V. Meenakshi, Ms. S. Jeyanthi Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5810 Data Hiding in Encrypted HEVC/AVC Video Streams Saltanat Shaikh, Prof. Shahzia Sayyad Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5811 A Study of Imbalanced Classification Problem P. Rajeshwari, D. Maheshwari Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5812 Design of PTL based Area Efficient and Low Power 4-bit ALU Saraabu Narendra Achari, Mr. C. Pakkiraiah Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5813 The Design of Driver Safety Awareness and Assistance System through Sleep Activated and Auto Brake System for Vehicle Control D. Sivabalaselvamani, Dr. A. Tamilarasi, L. Rahunathan and A.S. Harishankher Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5814 Parameters Selection, Applications & Convergence Analysis of PSO Algorithms Sachin Kumar, Mr. N.K. Gupta Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5815 Effective Pattern Deploying Model for the Document Restructuring and Classification Niketa, Jharna Chopra Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5816 Cataloging Telugu Sentences by Hidden Morkov Techniques V. Suresh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5817 Biometrics for Cell Phone Safety Jyoti Tiwari, Santosh Kumar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5818 Digital Image Watermarking using Modified DWT&DCT Combination and Bi Linear Interpolation Yannam .Nagarjuna, K. Chaitanya Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5819 Comparative Study and Analysis on the Techniques of Web Mining Dipika Sahu, Yamini Chouhan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5820 A Review of MIL-STD-1553 Bus Trends and Future K. Padmanabham, Prabhakar Kanugo, Dr. K. Nagabhushan Raju, M. Chandrashekar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5821 Design of QPSK Digital Modulation Scheme Using Turbo Codes for an Air Borne System D. Sai Brunda, B. Geetha Rani Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5822 An Efficient Locally Weighted Spectral Cluster for Automatic Image Segmentation Vishnu Priya M, J Santhosh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5823 An Efficient Sliding Window Based Micro Cluster Over Data Streams Nancy Mary, A. Venugopal Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5824 Comparative Analysis of Traditional Frequency Reuse Techniques in LTE Network Neelam Rani, Dr. Sanjeev Kumar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5825 Score Level Integration of Fingerprint and Hand Geometry Biometrics Jyoti Tiwari, Santosh Kumar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5826 CHARM: Intelligently Cost and Bandwidth Detection for FTP Servers using Heuristic Algorithm Shiva Urolagin Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5827 Image Enhancement Using Modified Exposure Based Histogram SK. Nasreen, N. Anupama Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5828 Human Gesture Based Recognition and Classification Using MATLAB Suman, Er. Kapil Sirohi Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5829 Image Denoising- A Novel Approach Dipali D. Sathe, Prof. K.N. Barbole Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5830 Design of Low Pass Digital FIR Filter Using Nature Inspired Technique Nisha Rani, Balraj Singh, Darshan Singh Sidhu Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5831 Issues and Challenges in Software Quality Assurance Himangi, Surender singh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5832 Hybridization of GSA and AFSA to Detect Black Hole Attack in Wireless Sensor Network Soni Rani, Charanjit Singh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5833 Reversible Watermarking Technique for Data Hiding, Accurate Tamper Detection in ROI and Exact Recovery of ROI Y. Usha Madhuri, K. Chaitanya Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5834 Fault Tolerance and Concurrency Control in Heterogeneous Distributed Database Systems Sagar Patel, Meghna Burli, Nidhi Shah, Prof. (Mrs.) Vinaya Sawant Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5835 Collection of Offline Tamil Handwriting Samples and Database Creation D. Rajalakshmi, Dr. S.K. Jayanthi Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5836 Overview of Renewable Energy in Maharashtra Mr. Sagar P. Thombare, Mr. Vishal Gunjal, Miss. Snehal Bhandarkar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5837 Comparative Analysis of Efficient Image Steganographic Technique with the 2-bit LSB Algorithm for Color Images K. S. Sadasiva Rao, Dr A. Damodaram Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5838 An Efficient Reverse Converter Design for Five Moduli Set RNS Y. Ayyavaru Reddy, B. Sekhar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5839 VLSI Design of Area Efficient High Performance SPMV Accelerator using VBW-CBQCSR Scheme N. Narasimharao, A. Mallaiah Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5840 Customer Retention of MCDR using 3SCDM Approaches Suban Ravichandran, Chandrasekaran Ramasamy Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5841 User Privacy and Data Trustworthiness in Mobile Crowd Sensing Ms. T. Sharadha, Dr. R. Vijaya Bhanu Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5842 A Safe Anti-Conspiracy Data Model For Changing Groups in Cloud G. Ajay Kumar, Devaraj Verma C Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5843 Scope and Adoption of M-Commerce in India Anurag Mishra, Sanjay Medhavi, Khan Shah Mohd, P.C. Mishra Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5844 A Secure Data Hiding Scheme For Color Image Mrs. S.A. Bhavani Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5845 A Study of Different Content Based Image Retrieval Techniques C. Gururaj, D. Jayadevappa, Satish Tunga Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5846 Cache Management for Big Data Applications: Survey Kiran Grover, Surender Singh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5847 Survey on Energy Efficient Protocols and Challenges in IOT Syeda Butool Fatima, Sayyada Fahmeeda Sultana, Sadiya Ansari Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5848 Educational Data Mining For Evaluating Students Performance Sampreethi P.K, VR. Nagarajan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5849 Iterative Pareto Principle for Software Test Case Prioritization Manas Kumar Yogi, G. Vijay Kumar, D. Uma Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5850 Localization Techniques in Wireless Sensor Networks: A Review Abhishek Kumar, Deepak Prashar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5851 Ensemble Averaging Filter for Noise Reduction Tom Thomas Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5852 Survey Paper on Get My Route Application Shubham A. Purohit, Tushar R. Khandare, Prof. Swapnil V. Deshmukh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5853 Design and Implementation of Smart Car with Self-Navigation and Self-Parking Systems using Sensors and RFID Technology Madhuri M. Bijamwar, Prof. S.G. Kole, Prof. S.S. Savkare Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5854 Comparison Study of Induction Motor Drives using Microcontroller and FPGA Sooraj M S, Sreerag K T V Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5855 A Survey on Text Categorization Senthil Kumar B, Bhavitha Varma E Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5856 Multirate Signal Reconstruction Using Two Channel Orthogonal Filter Bank Sijo Thomas, Darsana P Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5857 The Multi-keyword Synonym Search for Encrypted Cloud Data Using Clustering Method Monika Rani H G, Varshini Vidyadhar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5858 A Review on Various Speech Enhancement Techniques Alugonda Rajani, Soundarya .S.V.S Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5859 A Survey on Various Spoofing Attacks and Image Fusion Techniques Pravallika .P, Dr. K. Satya Prasad Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5860 Non-Invasive Vein Detection using Infra-red Rays Aradhana Singh, Dr. S.C. Prasanna Kumar, Dr. B.G. Sudershan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5861 Boundary-Polygons for Minutiae based Fingerprinst Recognition Kusha Maharshi, Prashant Sahai Saxena Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5862 Image Forgery Detection on Digital Images Nimi Susan Saji, Ranjitha Rajan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5863 Enhancing Information Security in Big Data Renu Kesharwani Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5864 Secure Multi-Owner Data Sharing for Dynamic Groups in Cloud Ms. Nilophar M. Masuldar, Prof. V. P. Kshirsagar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5865 Compact Microstrip Octagonal Slot Antenna for Wireless Communication Applications Thasneem .H, Midhun Joy Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5866 ‘Aquarius’- Smart IOT Technology for Water Level Monitoring System Prof. A. M. Jagtap, Bhaldar Saniya Sikandar, Shinde Sharmila Shivaji, Khalate Vrushali Pramod, Nirmal Kalyani Sarangdhar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5867 Future of Results in Select Search Engine Peerzada Mohammad Iqbal, Dr. Abdul Majid Baba, Aasim Bashir Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5868 Semantic Indexing Techniques on Information Retrieval of Web Content." IJARCCE 5, no. 8 (August 30, 2016): 347–52. http://dx.doi.org/10.17148/ijarcce.2016.5869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Wintolo, Hero, and Lalu Suwandi Yusuf. "IMPLEMENTASI LOAD BALANCING BERBASIS CLOUD COMPUTING UNTUK MENDUKUNG INFRASTRUCTURE AS A SERVICE MENGGUNAKAN METODE QUICK SORT." Compiler 7, no. 1 (May 31, 2018). http://dx.doi.org/10.28989/compiler.v7i1.260.

Full text
Abstract:
Implementation of load balancing in cloud computing applications using quick sort method is a study to determine the access speed of each server. Design a cloud computing application using 4 laptops as application users and 3 laptops or PCs as servers in data storage. In sending data performed by the user application, the data will be distributed to the server that has been selected by the system with a quick sort method that sort the rest of the server capacity and then choose the server with the largest capacity. The stored data is placed in the htdocs file on the server. Based on the tests performed, cloud computing applications can run on at least 2 laptops using the windows version. Testing the server is also done by directly using the command prompt. During testing each server receives ping from the application to determine server performance in using load balancing. Testing without load balancing that sends data 50 times of 10 Mb to one server yields speed 15 ms, with 2 server divided by two in its data delivery that is as much as 25 times 10 Mb then speed 12 ms.
APA, Harvard, Vancouver, ISO, and other styles
29

"IoT Implementation in Manufacturing using Data Analysis and Data Managemnt." International Journal of Innovative Technology and Exploring Engineering 9, no. 1 (November 10, 2019): 371–75. http://dx.doi.org/10.35940/ijitee.a4137.119119.

Full text
Abstract:
Since The Mechanical Miracle Happened In Light Of The Fact That Most Of The Calculations And Estimations Of The Segments Required For The Collecting And Limit Of A Particular Thing Has Been Done Physically But At This Point This Example Has Changed With The Introduction Of Iot Devices In Organizations. These Gadgets Impart And Share Information With One Another Over Web To Make The Way Toward Assembling Less Confounds And Efficient. For Instance, A Sensor Has Been Appended To The Machine Which Estimates The Measure Of Vibrations Which Are Delivered While The Machine Is Working. This information is then moved to a server over WLAN which can be viewed to or by any individual who is working in the organization and after that be examinations to know the state of the said machine. Along the lines any meltdown or breakage in system or in process that can occur because of unseemly use of the machine can be avoided. This information can be seen by individuals who work for the organization, who has a login id and secret key and has a gadget with a working web association as this information is visible or displayed on a site that can be gotten to on any gadget utilizing any working framework. The server that stores the information is kept running on MS Windows and the webpage from which the information can be gotten to is made utilizing different web improvement dialects.
APA, Harvard, Vancouver, ISO, and other styles
30

"Network Traffic Monitoring Analysis System with Built-in Monitoring Data Gathering." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S3 (August 23, 2019): 694–99. http://dx.doi.org/10.35940/ijitee.i3143.0789s319.

Full text
Abstract:
Networking, that is one among the foremost vital aspects of knowledge technology revolution, is developing progressively day when day. this is often as a result of it offers an enormous quantity of information, resources and human experiences. On the one hand, it contains a substantial quantity of harmful content, due to misusing. On the opposite hand, sitting for an extended time ahead of PC’s or alternative network-based devices will have an effect on body badly. As enterprise computing environments become a lot of network-oriented, the importance of network traffic observation and analysis intensifies. Most existing traffic observation and analysis tools specialise in measure the traffic a lot of individual network segments. Further, they generally have sophisticated user interfaces. This paper introduces associated presents the planning associate application and implementation of an MS Windows-compatible software system tool that's accustomed manage networks usage and keep track of each network user activity. associate application consists of 2 components consumer and server. The consumer aspect could be a backgroundapplication runs whenever the computer is run, it turns off only if the computer is turned off and launched with its startup. The server aspect is a lot of complex-GUI application that's accountable in the main for receiving information sent by purchasers cluster, managing and change information to produce network owner up to this point read. The effectiveness of associate application has been verified by applying it to associate enterprise network atmosphere.
APA, Harvard, Vancouver, ISO, and other styles
31

Forokoro, Koné, Mouneri Maïga, and Mohamed S. Maïga. "Interoperable and Distributed Processing in GIS to Sustain the Development of Local Authorities in Mali." Journal of Scientific Research and Reports, December 31, 2020, 10–16. http://dx.doi.org/10.9734/jsrr/2021/v26i1230336.

Full text
Abstract:
Since 1992, implement decentralization reformin Mali has made it possible to empower populations in their own development planning. Resources distribution to local authorities requires detailed information of the constraints and the assets linked to their development. Data collected on rural area are often poorly defined, redundant or incomplete and inefficiencies for sharing due to a lack of applied standard tools. The information is too descriptive and it is difficult to extract useful one for decision making process. There is inadequate information upon which to base resource allocation decisions. The purpose of this paper is to define data that can be collected on rural municipalities or localities and handled by GIS to make information available for decision-makers, planners and beneficiaries. The data used from Malian poverty survey performed in 2001-2002 focused on the satisfaction of basic household needs. This concept is based on meeting those who lack access to basic living needs, which generally include clean water, sanitation, nutrition, primary health services, and basic education. The method used the platform of "MapGIS IGS, IIS6, Windows Server 2003, ASP.NET and MS SQL Server 2000" to develop an application GIS Web Service. Data are integrated and published as services by the platform. The product output have been tested successfully on the intranet of Wuhan Zondy Cyber in the term of interoperability and extraction of the information needed. With this tool, each local authority can be a potential collector of his own data and participates to update the database. The Web Services model of the GIS systems described provides to users, services and data they need, without having to install, learn, or pay for any unused functionalities. The extension of this standardization in all ECOWAS countries would be a great advantage regarding the sharing of geographic information between countries.
APA, Harvard, Vancouver, ISO, and other styles
32

Cummings, Alycia E., Ying C. Wu, and Diane A. Ogiela. "Phonological Underspecification: An Explanation for How a Rake Can Become Awake." Frontiers in Human Neuroscience 15 (February 17, 2021). http://dx.doi.org/10.3389/fnhum.2021.585817.

Full text
Abstract:
Neural markers, such as the mismatch negativity (MMN), have been used to examine the phonological underspecification of English feature contrasts using the Featurally Underspecified Lexicon (FUL) model. However, neural indices have not been examined within the approximant phoneme class, even though there is evidence suggesting processing asymmetries between liquid (e.g., /ɹ/) and glide (e.g., /w/) phonemes. The goal of this study was to determine whether glide phonemes elicit electrophysiological asymmetries related to [consonantal] underspecification when contrasted with liquid phonemes in adult English speakers. Specifically, /ɹɑ/ is categorized as [+consonantal] while /wɑ/ is not specified [i.e., (–consonantal)]. Following the FUL framework, if /w/ is less specified than /ɹ/, the former phoneme should elicit a larger MMN response than the latter phoneme. Fifteen English-speaking adults were presented with two syllables, /ɹɑ/ and /wɑ/, in an event-related potential (ERP) oddball paradigm in which both syllables served as the standard and deviant stimulus in opposite stimulus sets. Three types of analyses were used: (1) traditional mean amplitude measurements; (2) cluster-based permutation analyses; and (3) event-related spectral perturbation (ERSP) analyses. The less specified /wɑ/ elicited a large MMN, while a much smaller MMN was elicited by the more specified /ɹɑ/. In the standard and deviant ERP waveforms, /wɑ/ elicited a significantly larger negative response than did /ɹɑ/. Theta activity elicited by /ɹɑ/ was significantly greater than that elicited by /wɑ/ in the 100–300 ms time window. Also, low gamma activation was significantly lower for /ɹɑ/ vs. /wɑ/ deviants over the left hemisphere, as compared to the right, in the 100–150 ms window. These outcomes suggest that the [consonantal] feature follows the underspecification predictions of FUL previously tested with the place of articulation and voicing features. Thus, this study provides new evidence for phonological underspecification. Moreover, as neural oscillation patterns have not previously been discussed in the underspecification literature, the ERSP analyses identified potential new indices of phonological underspecification.
APA, Harvard, Vancouver, ISO, and other styles
33

Bowles-Smith, Emily. "Recovering Love’s Fugitive: Elizabeth Wilmot and the Oscillations between the Sexual and Textual Body in a Libertine Woman’s Manuscript Poetry." M/C Journal 11, no. 6 (November 28, 2008). http://dx.doi.org/10.5204/mcj.73.

Full text
Abstract:
Elizabeth Wilmot, Countess of Rochester, is best known to most modern readers as the woman John Wilmot, Earl of Rochester, abducted and later wed. As Samuel Pepys memorably records in his diary entry for 28 May 1665:Thence to my Lady Sandwich’s, where, to my shame, I had not been a great while before. Here, upon my telling her a story of my Lord Rochester’s running away on Friday night last with Mrs Mallet, the great beauty and fortune of the North, who had supped at Whitehall with Mrs Stewart, and was going home to her lodgings with her grandfather, my Lord Haly, by coach; and was at Charing Cross seized on by both horse and footmen, and forcibly taken from him, and put into a coach with six horses, and two women provided to receive her, and carried away. Upon immediate pursuit, my Lord of Rochester (for whom the King had spoke to the lady often, but with no success) was taken at Uxbridge; but the lady is not yet heard of, and the King mighty angry and the Lord sent to the Tower. (http://www.pepysdiary.com/)Here Pepys provides an anecdote that offers what Helen Deutsch has described in another context as “the elusive possibility of truth embodied by ‘things in themselves,’ by the things, that is, preserved in anecdotal form” (28). Pepys’s diary entry yields up an “elusive possibility” of embodied truth; his version of Wilmot’s abduction solidifies what he perceives to be the most notable features of her identity: her beauty, her wealth, and her sexual trajectory.Pepys’s conclusion that “the lady is not yet heard of” complicates this idea of anecdotal preservation, for he neatly ties up his story of Wilmot’s body by erasing her from it: she is removed, voiceless and disembodied, from even this anecdote of her own abduction. Pepys’s double maneuver demonstrates the complex set of interactions surrounding the preservation of early modern women’s sexual and textual selves. Written into Pepys’s diary and writing in conversation with her husband, Wilmot has generally been treated as a subordinate historical and literary figure—a character rather than an agent or an author. The richness of Wilmot’s own writing has been largely ignored; her manuscript poetry has been treated as an artefact and a source of autobiographical material, whereas Rochester’s poetry—itself teeming with autobiographical details, references to material culture, and ephemera—is recognised and esteemed as literary. Rochester’s work provides a tremendous resource, a window through which we can read and re-read his wife’s work in ways that enlighten and open up readings rather than closing them down, and her works similarly complicate his writings.By looking at Wilmot as a case study, I would like to draw attention to some of the continued dilemmas that scholars face when we attempt to recover early modern women’s writing. With this study, I will focus on distinct features of Wilmot’s sexual and textual identity. I will consider assumptions about female docility; the politics and poetics of erotic espionage; and Wilmot’s construction of fugitive desires in her poetry. Like the writings of many early modern women, Wilmot’s manuscript poetry challenges assumptions about the intersections of gender, sexuality, and authorship. Early Modern Women’s Docile Bodies?As the entry from Pepys’s diary suggests, Wilmot has been constructed as a docile female body—she is rendered “ideal” according to a set of gendered practices by which “inferior status has been inscribed” on her body (Bartky 139). Contrasting Pepys’s references to Wilmot’s beauty and marriageability with Wilmot’s own vivid descriptions of sexual desire highlights Wilmot’s tactical awareness and deployment of her inscribed form. In one of her manuscript poems, she writes:Nothing ades to Loves fond fireMore than scorn and cold disdainI to cherish your desirekindness used but twas in vainyou insulted on your SlaveTo be mine you soon refusedHope hope not then the power to haveWhich ingloriously you used. (230)This poem yields up a wealth of autobiographical information and provides glimpses into Wilmot’s psychology. Rochester spent much of his married life having affairs with women and men, and Wilmot represents herself as embodying her devotion to her husband even as he rejects her. In a recent blog entry about Wilmot’s poetry, Ellen Moody suggests that Wilmot “must maintain her invulnerable guard or will be hurt; the mores damn her whatever she does.” Interpretations of Wilmot’s verse typically overlay such sentiments on her words: she is damned by social mores, forced to configure her body and desire according to rigorous social codes that expect women to be pure and inviolable yet also accessible to their lovers and “invulnerable” to the pain produced by infidelity. Such interpretations, however, deny Wilmot the textual and sexual agency accorded to Rochester, begging the question of whether or not we have moved beyond reading women’s writing as essential, natural, and embodied. Thus while these lines might in fact yield up insights into Wilmot’s psychosocial and sexual identities, we continue to marginalise her writing and by extension her author-self if we insist on taking her words at face value. Compare, for example, Wilmot’s verse to the following song by her contemporary Aphra Behn:Love in Fantastique Triumph satt,Whilst Bleeding Hearts a round him flow’d,For whom Fresh paines he did Create,And strange Tyranick power he show’d;From thy Bright Eyes he took his fire,Which round about, in sports he hurl’d;But ’twas from mine, he took desire,Enough to undo the Amorous World. (53) This poem, which first appeared in Behn’s tragedy Abdelazer (1677) and was later printed in Poems upon Several Occasions (1684), was one of Behn’s most popular lyric verses. In the 1920s and 1930s Ernest Bernbaum, Montague Summers, Edmund Gosse, and others mined Behn’s works for autobiographical details and suggested that such historical details were all that her works offered—a trend that continued, disturbingly, into the later half of the twentieth century. Since the 1980s, Paula R. Backscheider, Ros Ballaster, Catherine Gallagher, Robert Markley, Paul Salzman, Jane Spencer, and Janet Todd have shown that Behn’s works are not simple autobiographical documents; they are the carefully crafted productions of a literary professional. Even though Behn’s song evokes a masochistic relationship between lover and beloved much like Wilmot’s song, critics treat “Love Arm’d” as a literary work rather than a literal transcription of female desire. Of course there are material differences between Wilmot’s song and Behn’s “Love Arm’d,” the most notable of which involves Behn’s self-conscious professionalism and her poem’s entrenchment in the structures of performance and print culture. But as scholars including Kathryn King and Margaret J. M. Ezell have begun to suggest, print publication was not the only way for writers to produce and circulate literary texts. King has demonstrated the ways in which female authors of manuscripts were producing social texts (563), and Ezell has shown that “collapsing ‘public’ into ‘publication’” leads modern readers to “overlook the importance of the social function of literature for women as well as men” (39). Wilmot’s poems did not go through the same material, ideological, and commercial processes as Behn’s poems did, but they participated in a social and cultural network of exchange that operated according to its own rules and that, significantly, was the same network that Rochester himself used for the circulation of his verses. Wilmot’s writings constitute about half of the manuscript Portland PwV 31, held by Hallward Library, University of Nottingham—a manuscript catalogued in the Perdita Project but lacking a description and biographical note. Teresa D. Kemp has discussed the impact of the Perdita Project on the study of early modern women’s writing in Feminist Teacher, and Jill Seal Millman and Elizabeth Clarke (both of whom are involved with the project) have also written articles about the usability of the database. Like many of the women writers catalogued by the Perdita Project, Wilmot lacks her own entry in the Dictionary of National Biography and is instead relegated to the periphery in Rochester’s entry.The nineteen-page folio includes poems by both Rochester and Wilmot. The first eight poems are autograph manuscript poems by Rochester, and a scene from a manuscript play ‘Scaene 1st, Mr. Daynty’s chamber’ is also included. The remaining poems, excluding one without attribution, are by Wilmot and are identified on the finding aid as follows:Autograph MS poem, entitled ‘Song’, by Elizabeth WilmotAutograph MS poem, entitled ‘Song’, by Elizabeth WilmotAutograph MS poem, entitled ‘Song’, by Elizabeth WilmotMS poem, untitled, not ascribed Autograph MS poem, entitled ‘Song’, by Elizabeth WilmotAutograph MS poem, untitled, by Elizabeth WilmotAutograph MS poem, untitled, by Elizabeth WilmotAutograph MS poem, untitled, by Elizabeth Wilmot Autograph MS poem, untitled, by Elizabeth WilmotTwo of the songs (including the lyric quoted above) have been published in Kissing the Rod with the disclaimer that marks of revision reveal that “Lady Rochester was not serving as an amanuensis for her husband” yet the editors maintain that “some sort of literary collaboration cannot be ruled out” (230), implying that Rochester helped his wife write her poetry. Establishing a non-hierarchical strategy for reading women’s collaborative manuscript writing here seems necessary. Unlike Behn, who produced works in manuscript and in print and whose maximization of the slippages between these modes has recently been analyzed by Anne Russell, Wilmot and Rochester both wrote primarily in manuscript. Yet only Rochester’s writings have been accorded literary status by historians of the book and of manuscript theory such as Harold Love and Arthur Marotti. Even though John Wilders notes that Rochester’s earliest poems were dialogues written with his wife, the literariness of her contributions is often undercut. Wilders offers a helpful suggestion that the dialogues set up by these poems helps “hint … at further complexities in the other” (51), but the complexities are identified as sexual rather than textual. Further, the poems are treated as responses to Rochester rather than conversations with him. Readers like Moody, moreover, draw reflections of marital psychology from Wilmot’s poems instead of considering their polysemic qualities and other literary traits. Instead of approaching the lines quoted above from Wilmot’s song as indications of her erotic and conjugal desire for her husband, we can consider her confident deployment of metaphysical conceits, her careful rhymes, and her visceral imagery. Furthermore, we can locate ways in which Wilmot and Rochester use the device of the answer poem to build a complex dialogue rather than a hierarchical relationship in which one voice dominates the other. The poems comprising Portland PwV 31 are written in two hands and two voices; they complement one another, but neither contains or controls the other. Despite the fact that David Farley-Hills dismissively calls this an “‘answer’ to this poem written in Lady Rochester’s handwriting” (29), the verses coexist in playful exchange textually as well as sexually. Erotic Exchange, Erotic EspionageBut does a reorientation of literary criticism away from Wilmot’s body and towards her body of verse necessarily entail a loss of her sexual and artefactual identity? Along with the account from Pepys’s diary mentioned at the outset of this study, letters from Rochester to his wife survive that provide a prosaic account of the couple’s married life. For instance, Rochester writes to her: “I love not myself as much as you do” (quoted in Green 159). Letters from Rochester to his wife typically showcase his playfulness, wit, and ribaldry (in one letter, he berates the artist responsible for two miniatures of Wilmot in strokes that are humorous yet also charged with a satire that borders on invective). The couple’s relationship was beleaguered by the doubts, infidelities, and sexual double standards that an autobiographical reading of Wilmot’s songs yields up, therefore it seems as counterproductive for feminist literary theory, criticism, and recovery work to entirely dispense with the autobiographical readings as it seems reductive to entirely rely on them. When approaching works like these manuscript poems, then, I propose using a model of erotic exchange and erotic espionage in tandem with more text-bound modes of literary criticism. To make this maneuver, we might begin by considering Gayle Rubin’s proposition that “If women are the gifts, then it is men who are the exchange partners. And it is the partners, not the presents, upon whom reciprocal exchange confers its quasi-mystical power of social linkage” (398). Wilmot’s poetry relentlessly unsettles the binary set up between partner and present, thereby demanding a more pluralistic identification of sexual and textual economies. Wilmot constructs Rochester as absent (“Thats caused by absence norished by despaire”), which is an explicit inversion of the gendered terms stereotypically deployed in poetry (the absent woman in works by Rochester as well as later satirists like Jonathan Swift and Alexander Pope often catalyzes sexual desire) that also registers Wilmot’s autobiographical contexts. She was, during most of her married life, living with his mother, her own mother, and Rochester’s nieces in his house at Adderbury while he stayed in London. The desire in Wilmot’s poetry is textualised as much as it is sexualised; weaving this doublebraid of desires and designs together ultimately provides the most complete interpretation of the verses. I read the verses as offering a literary form of erotic espionage in which Wilmot serves simultaneously as erotic object and author. That is, she both is and is not the Cloris of her (and Rochester’s) poetry, capable of looking on and authorizing her desired and desiring body. The lyric in which Wilmot writes “He would return the fugitive with Shame” provides the clearest example of the interpretive tactic that I am proposing. The line, from Wilmot’s song “Cloris misfortunes that can be exprest,” refers to the deity of Love in its complete context:Such conquering charmes contribute to my chainAnd ade fresh torments to my lingering painThat could blind Love juge of my faithful flameHe would return the fugitive with ShameFor having bin insenceable to loveThat does by constancy it merritt prove. (232)The speaker of the poem invokes Cupid and calls on “blind Love” to judge “my faithful flame.” The beloved would then be returned “fugitive with Shame” because “blind Love” would have weighed the lover’s passion and the beloved’s insensibility. Interestingly, the gender of the beloved and the lover are not marked in this poem. Only Cupid is marked as male. Although the lover is hypothetically associated with femaleness in the final stanza (“She that calls not reason to her aid / Deserves the punishmentt”), the ascription could as easily be gendering the trait of irrationality as gendering the subject/author of the poem. Desire, complaint, and power circulate in the song in a manner that lacks clear reference; the reader receives glimpses into an erotic world that is far more ornately literary than it is material. That is, reading the poem makes one aware of tropes of power and desire, whereas actual bodies recede into the margins of the text—identifiable because of the author’s handwriting, not a uniquely female perspective on sexuality or (contrary to Moody’s interpretation) a specifically feminine acquiescence to gender norms. Strategies for Reading a Body of VerseWilmot’s poetry participates in what might be described as two distinct poetic and political modes. On one hand, her writing reproduces textual expectations about Restoration answer poems, songs and lyrics, and romantic verses. She crafts poetry that corresponds to the same textual conventions that men like Rochester, John Dryden, Abraham Cowley, and William Cavendish utilised when they wrote in manuscript. For Wilmot, as for her male contemporaries, such manuscript writing would have been socially circulated; at the same time, the manuscript documents had a fluidity that was less common in print texts. Dryden and Behn’s published writings, for instance, often had a more literary context (“Love Arm’d” refers to Abdelazer, not to Behn’s sexual identity), whereas manuscript writing often referred to coteries of readers and writers, friends and lovers.As part of the volatile world of manuscript writing, Wilmot’s poetry also highlights her embodied erotic relationships. But over-reading—or only reading—the poetry as depicting a conjugal erotics limits our ability to recover Wilmot as an author and an agent. Feminist recovery work has opened many new tactics for incorporating women’s writing into existing literary canons; it has also helped us imagine ways of including female domestic work, sexuality, and other embodied forms into our understanding of early modern culture. By drawing together literary recovery work with a more material interest in recuperating women’s sexual bodies, we should begin to recuperate women like Wilmot not simply as authors or bodies but as both. The oscillations between the sexual and textual body in Wilmot’s poetry, and in our assessments of her life and writings, should help us approach her works (like the works of Rochester) as possessing a three-dimensionality that they have long been denied. ReferencesBartky, Sandra Lee. “Foucault, Femininity, and the Modernization of Patriarchal Power.” In Writing on the Body: Female Embodiment and Feminist Theory. Ed. Katie Conboy, Nadia Medina, and Sarah Stanbury. New York: Columbia University Press, 1997. 129-54.Behn, Aphra. “Song. Love Arm’d.” The Works of Aphra Behn. Volume 1: Poetry. Ed. Janet Todd. London: William Pickering, 1992. 53.Clarke, Elizabeth. “Introducing Hester Pulter and the Perdita Project.” Literature Compass 2.1 (2005). ‹http://www.blackwell-compass.com/subject/literature/article_view?article_id=lico_articles_bsl159›. Deutsch, Helen. Loving Doctor Johnson. Chicago: University of Chicago Press, 2005.Diamond, Irene, Ed. Feminism and Foucault: Reflections on Resistance. Boston: Northeastern University Press, 1988.Ezell, Margaret J. M. Social Authorship and the Advent of Print. Baltimore: Johns Hopkins University Press, 1999.Farley-Hill, David. Rochester’s Poetry. Totowa: Rowman and Littlefield, 1978. Greene, Graham. Lord Rochester’s Monkey. New York: Penguin, 1974. Greer, Germaine, Susan Hastings, Jeslyn Medoff, and Melinda Sansone, Ed. Kissing the Rod: An Anthology of Seventeenth-Century Women’s Verse. New York: Noonday Press, 1988. Kemp, Theresa D. “Early Women Writers.” Feminist Teacher 18.3 (2008): 234-39.King, Kathryn. “Jane Barker, Poetical Recreations, and the Sociable Text.” ELH 61 (1994): 551-70.Love, Harold, and Arthur F. Marotti. "Manuscript Transmission and Circulation." The Cambridge History of Early Modern English Literature. Cambridge, England: Cambridge University Press, 2002. 55-80. Love, Harold. "Systemizing Sigla." English Manuscript Studies 1100-1700. 11 (2002): 217-230. Marotti, Arthur F. "Shakespeare's Sonnets and the Manuscript Circulation of Texts in Early Modern England." A Companion to Shakespeare's Sonnets. Oxford: Blackwell, 2007. 185-203.McNay, Lois. Foucault And Feminism: Power, Gender, and the Self. Boston: Northeastern, 1992.Moody, Ellen. “Elizabeth Wilmot (neé Mallet), Countess of Rochester, Another Woman Poet.” Blog entry 16 March 2006. 11 Nov. 2008 ‹http://server4.moody.cx/index.php?id=400›. Pepys, Samuel. The Diary of Samuel Pepys. 23 Aug. 2008 ‹http://www.pepysdiary.com/archive/1665/05/28/index.php›. Rubin, Gayle. “The Traffic in Women: Notes on the ‘Political Economy’ of Sex.” Feminist Literary Theory and Criticism: A Norton Reader, ed. Sandra M. Gilbert and Susan Gubar, 392-413. New York: Norton, 2007.Russell, Anne. “Aphra Behn, Textual Communities, and Pastoral Sobriquets.” English Language Notes 40.4 (June 2003): 41-50.———. “'Public' and 'Private' in Aphra Behn's Miscellanies: Women Writers, Print, and Manuscript.” Write or Be Written: Early Modern Women Poets and Cultural Constraints. Ed. Barbara Smith and Ursula Appelt. Aldershot: Ashgate, 2001. 29-48. Sawicki, Jana. Disciplining Foucault: Feminism, Power and the Body. New York: Routledge, 1991.Seal, Jill. "The Perdita Project—A Winter's Report." Early Modern Literary Studies 6.3 (January, 2001): 10.1-14. ‹http://purl.oclc.org/emls/06-3/perdita.htm›.Wilders, John. “Rochester and the Metaphysicals.” In Spirit of Wit: Reconsiderations of Rochester. Ed. Jeremy Treglown. Hamden: Archon, 1982. 42-57.Wilmot, Elizabeth, Countess of Rochester. “Song” (“Nothing Ades to Love's Fond Fire”) and “Song” (“Cloris Misfortunes That Can Be Exprest”) in Kissing the Rod. 230-32.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography