latest technology news


latest news:
MRC Technology joins project UTIL to enable medical breakthroughs from European funded research


MRC Technology is committed to ensuring that promising medical research is protected and progressed to benefit patients. We are therefore 

Download  about this information
pleased to announce that we are funding partners in an international technology transfer consortium set up to enable translation of health research into new diagnostics and medicines. The UTILE Project will facilitate partnering and licensing opportunities for research funded under the Seventh Framework Programme (FP7) Health and Societal Challenge 1 of Horizon 2020.
UTILE, a Horizon 2020 funded project, will develop an online marketplace to bring together innovation providers and innovation developers, combining technology push and market pull approaches. It aims to add value to promising research to maximise results. UTILE will also provide recommendations to the European Commission for future research and technology transfer within the health sector.


The international consortium is led by PNO Consultants BV (NL) and includes technology transfer organisations: Ascenion GmbH (DE); ASTP Proton (NL); Bergen Teknologioverforing AS (BTO) (NO); Karolinska Institutet Innovations AB (SE); MRC Technology (UK); Tech Transfer Summit Ltd. (UK); and commercial organisations: Ciaotech Srl (IT); Europroject Ood (BG); Europe Unlimited SA (BE); and Innovation Engineering Srl (IT). The US National Institute of Health (NIH) is also actively involved in the project.


History of drone/UAV use cases
The first generally used drone was a full-size retooling of the de Havilland DH82B "Queen Bee" biplane, which was fitted out with a radio and servo-operated controls in the back seat. The plane could be conventionally piloted from the front seat, but, generally, the plane flew unmanned and was shot at by artillery gunners in training. The term drone dates to this initial use, a play on the "Queen Bee" nomenclature.


In late 2012, Chris Anderson, editor in chief of Wired magazine, retired to dedicate himself to his drones company, 3D Robotics Inc. The company, which started off specializing in hobbyist personal drones, now markets its solutions to photography and film companies, construction, utilities and telecom businesses, and public safety companies, among others.

In late 2013, Amazon was one of the first organizations to announce a plan to use commercial drones for delivery activities. Others have since followed suit; for example, in September 2016, Virginia Polytechnic Institute and State University began a test with Project Wing, a unit of Google owner Alphabet Inc., to make deliveries, starting with burritos produced at a local Chipotle restaurant.
Other common drone applications include drone surveillance and drone journalism, as unmanned aircraft systems can often access locations that would be impossible for a human to get to.
Drone education is also expanding; Embry-Riddle Aeronautical University, long a training ground for the aviation industry, now offers a Bachelor of Science in Unmanned Systems Applications, a Master of Science in Unmanned Systems and an undergraduate minor in Unmanned Aerial Systems.

Drones in the enterprise
A 2016 Business Insider BI Intelligence report forecasted the growth of enterprise drone use to outpace the consumer drone sector in both shipments and revenues by 2021, reaching 29 million shipments worldwide.
The integration of drones and internet of things technology has created numerous enterprise use cases; drones working with on-ground IoT sensor networks can help agricultural companies monitor land and crops, energy companies survey power lines and operational equipment, and insurance companies monitor properties for claims and/or policies.


A 2015 experiment in Austin, Texas, showed how drones can potentially "connect the dots" using IoT. A security tech company teamed up with a drone startup to hunt for ZigBee beacons to try to provide an overview of what IoT networks were present in residential and business areas of the city. The companies reported that the results were quick and instructive.
From logistics to agriculture to security, unmanned aerial vehicles and IoT are frequently part of the same discussion; offering a component in ubiquitous connectivity and interactivity.

Drones and security
The rapid adoption of drones has sparked complaints and concerns. From a privacy standpoint, drones have been used by voyeurs and paparazzi to obtain images of individuals in their homes or other locations once assumed to be private. Drones have also been deployed in areas deemed to be potentially unsafe, such as urban areas and near airports.

that is now not due to the fact TCP is ideal or due to the fact computer scientists have had problem developing with viable alternatives; it is due to the fact those options are too hard to test. The routers in statistics middle networks have their traffic management protocols hardwired into them. testing a brand new protocol means replacing the existing network hardware with either reconfigurable chips, which might be labor-in depth to program, or software-managed routers, which are so gradual that they render huge-scale trying out impractical.



at the Usenix Symposium on Networked systems layout and Implementation later this month, researchers from MIT's pc technological know-how and synthetic Intelligence Laboratory will gift a gadget for testing new visitors control protocols that requires no alteration to community hardware but nevertheless works at practical speeds -- 20 instances as speedy as networks of software program-managed routers.


The machine maintains a compact, efficient computational version of a community walking the new protocol, with virtual data packets that bounce around amongst digital routers. On the idea of the version, it schedules transmissions at the actual network to produce the identical site visitors styles. Researchers ought to thus run real net applications at the network servers and get an correct feel of ways the new protocol would affect their overall performance.
"The manner it really works is, whilst an endpoint wants to send a [data] packet, it first sends a request to this centralized emulator," says Amy Ousterhout, a graduate scholar in electrical engineering and laptop technology (EECS) and first author on the new paper. "The emulator emulates in software program the scheme which you want to experiment with on your network. Then it tells the endpoint while to ship the packet which will arrive at its vacation spot as though it had traversed a network strolling the programmed scheme."




Ousterhout is joined on the paper via her advisor, Hari Balakrishnan, the Fujitsu Professor in electrical Engineering and laptop technological know-how; Jonathan Perry, a graduate pupil in EECS; and Petr Lapukhov of facebook.

site visitors manipulate

every packet of statistics despatched over a pc community has  elements: the header and the payload. The payload carries the information the recipient is interested in -- image records, audio information, text data, and so on. The header contains the sender's address, the recipient's cope with, and other statistics that routers and stop customers can use to manipulate transmissions.


while more than one packets reach a router on the equal time, they are put into a queue and processed sequentially. With TCP, if the queue receives too long, subsequent packets are actually dropped; they in no way reach their recipients. when a sending laptop realizes that its packets are being dropped, it cuts its transmission fee in 1/2, then slowly ratchets it lower back up.

A better protocol may enable a router to flip bits in packet headers to let give up customers recognize that the network is congested, so that it will throttle lower back transmission costs earlier than packets get dropped. Or it might assign exceptional forms of packets distinct priorities, and hold the transmission quotes up as long as the high-precedence site visitors remains getting via. these are the kinds of techniques that pc scientists are interested by testing out on actual networks.

speedy simulation

With the MIT researchers' new system, called Flexplane, the emulator, which models a network running the brand new protocol, makes use of only packets' header statistics, lowering its computational burden. In reality, it does not necessarily use all of the header facts -- simply the fields which are relevant to implementing the brand new protocol.

while a server on the actual network wants to transmit statistics, it sends a request to the emulator, which sends a dummy packet over a virtual community ruled by using the new protocol. whilst the dummy packet reaches its destination, the emulator tells the actual server that it may go ahead and send its actual packet.

If, while passing thru the virtual network, a dummy packet has some of its header bits flipped, the actual server flips the corresponding bits inside the actual packet before sending it. If a clogged router at the digital network drops a dummy packet, the corresponding real packet is by no means despatched. And if, at the virtual network, a higher-priority dummy packet reaches a router after a lower-priority packet but jumps ahead of it inside the queue, then at the real community, the higher-precedence packet is sent first.

The servers on the community hence see the same packets inside the identical sequence that they could if the actual routers were strolling the new protocol. there's a mild delay between the first request issued through the primary server and the first transmission education issued with the aid of the emulator. however thereafter, the servers trouble packets at normal network speeds.


The potential to apply actual servers jogging actual web applications gives a extensive gain over every other famous method for trying out new community management schemes: software program simulation, which typically uses statistical patterns to represent the packages' behavior in a computationally efficient manne

Comments

Post a Comment