Austin, John R
2003-10-01
Previous research on transactive memory has found a positive relationship between transactive memory system development and group performance in single project laboratory and ad hoc groups. Closely related research on shared mental models and expertise recognition supports these findings. In this study, the author examined the relationship between transactive memory systems and performance in mature, continuing groups. A group's transactive memory system, measured as a combination of knowledge stock, knowledge specialization, transactive memory consensus, and transactive memory accuracy, is positively related to group goal performance, external group evaluations, and internal group evaluations. The positive relationship with group performance was found to hold for both task and external relationship transactive memory systems.
Do transactive memory and participative teamwork improve nurses' quality of work life?
Brunault, Paul; Fouquereau, Evelyne; Colombat, Philippe; Gillet, Nicolas; El-Hage, Wissam; Camus, Vincent; Gaillard, Philippe
2014-03-01
Improvement in nurses' quality of work life (QWL) has become a major issue in health care organizations. We hypothesized that the level of transactive memory (defined as the way groups collectively encode, store, and retrieve knowledge) and participative teamwork (an organizational model of care based on vocational training, a specific service's care project, and regular interdisciplinary staffing) positively affect nurses' QWL. This cross-sectional study enrolled 84 ward-based psychiatric nurses. We assessed transactive memory, participative teamwork, perceived organizational justice, perceived organizational support, and QWL using psychometrically reliable and valid scales. Participative teamwork and transactive memory were positively associated with nurses' QWL. Perceived organizational support and organizational justice fully mediated the relationship between participative teamwork and QWL, but not between transactive memory and QWL. Improved transactive memory could directly improve nurses' QWL. Improved participative teamwork could improve nurses' QWL through better perceived organizational support and perceived organizational justice.
NASA Astrophysics Data System (ADS)
Elbaz, Reouven; Torres, Lionel; Sassatelli, Gilles; Guillemin, Pierre; Bardouillet, Michel; Martinez, Albert
The bus between the System on Chip (SoC) and the external memory is one of the weakest points of computer systems: an adversary can easily probe this bus in order to read private data (data confidentiality concern) or to inject data (data integrity concern). The conventional way to protect data against such attacks and to ensure data confidentiality and integrity is to implement two dedicated engines: one performing data encryption and another data authentication. This approach, while secure, prevents parallelizability of the underlying computations. In this paper, we introduce the concept of Block-Level Added Redundancy Explicit Authentication (BL-AREA) and we describe a Parallelized Encryption and Integrity Checking Engine (PE-ICE) based on this concept. BL-AREA and PE-ICE have been designed to provide an effective solution to ensure both security services while allowing for full parallelization on processor read and write operations and optimizing the hardware resources. Compared to standard encryption which ensures only confidentiality, we show that PE-ICE additionally guarantees code and data integrity for less than 4% of run-time performance overhead.
Secure Distributed Human Computation
NASA Astrophysics Data System (ADS)
Gentry, Craig; Ramzan, Zulfikar; Stubblebine, Stuart
In Peha’s Financial Cryptography 2004 invited talk, he described the Cyphermint PayCash system (see www.cyphermint.com), which allows people without bank accounts or credit cards (a sizeable segment of the U.S. population) to automatically and instantly cash checks, pay bills, or make Internet transactions through publicly-accessible kiosks. Since PayCash offers automated financial transactions and since the system uses (unprotected) kiosks, security is critical. The kiosk must decide whether a person cashing a check is really the person to whom the check was made out, so it takes a digital picture of the person cashing the check and transmits this picture electronically to a central office, where a human worker compares the kiosk’s picture to one that was taken when the person registered with Cyphermint. If both pictures are of the same person, then the human worker authorizes the transaction.
76 FR 17843 - Intent To Compromise Claim Against the District of Columbia Public Schools
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-31
...' accounting system with transaction detail, and copies of corresponding checks to support $556,033 in accrued expenses billed to Title I, ITQ, and IDEA-B. In addition, DCPS provided printouts from its accounting system with transaction detail and copies of corresponding checks demonstrating that expenditures under...
Michinov, E; Olivier-Chiron, E; Rusch, E; Chiron, B
2008-03-01
There is an increasing awareness in the medical community that human factors are involved in effectiveness of anaesthesia teams. Communication and coordination between physicians and nurses seems to play a crucial role in maintaining a good level of performance under time pressure, particularly for anaesthesia teams, who are confronted with uncertainty, rapid changes in the environment, and multi-tasking. The aim of this study was to examine the relationship between a specific form of implicit coordination--the transactive memory system--and perceptions of team effectiveness and work attitudes such as job satisfaction and team identification. A cross-sectional study was conducted among 193 nurse and physician anaesthetists from eight French public hospitals. The questionnaire included some measures of transactive memory system (coordination, specialization, and credibility components), perception of team effectiveness, and work attitudes (Minnesota Job Satisfaction Questionnaire, team identification scale). The questionnaire was designed to be filled anonymously, asking only biographical data relating to sex, age, status, and tenure. Hierarchical multiple regression analyses revealed as predicted that transactive memory system predicted members' perceptions of team effectiveness, and also affective outcomes such as job satisfaction and team identification. Moreover, the results demonstrated that transactive memory processes, and especially the coordination component, were a better predictor of teamwork perceptions than socio-demographic (i.e. gender or status) or contextual variables (i.e. tenure and size of team). These findings provided empirical evidence of the existence of a transactive memory system among real anaesthesia teams, and highlight the need to investigate whether transactive memory is actually linked with objective measures of performance.
Transactive memory systems scale for couples: development and validation
Hewitt, Lauren Y.; Roberts, Lynne D.
2015-01-01
People in romantic relationships can develop shared memory systems by pooling their cognitive resources, allowing each person access to more information but with less cognitive effort. Research examining such memory systems in romantic couples largely focuses on remembering word lists or performing lab-based tasks, but these types of activities do not capture the processes underlying couples’ transactive memory systems, and may not be representative of the ways in which romantic couples use their shared memory systems in everyday life. We adapted an existing measure of transactive memory systems for use with romantic couples (TMSS-C), and conducted an initial validation study. In total, 397 participants who each identified as being a member of a romantic relationship of at least 3 months duration completed the study. The data provided a good fit to the anticipated three-factor structure of the components of couples’ transactive memory systems (specialization, credibility and coordination), and there was reasonable evidence of both convergent and divergent validity, as well as strong evidence of test–retest reliability across a 2-week period. The TMSS-C provides a valuable tool that can quickly and easily capture the underlying components of romantic couples’ transactive memory systems. It has potential to help us better understand this intriguing feature of romantic relationships, and how shared memory systems might be associated with other important features of romantic relationships. PMID:25999873
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Seyong; Vetter, Jeffrey S
Computer architecture experts expect that non-volatile memory (NVM) hierarchies will play a more significant role in future systems including mobile, enterprise, and HPC architectures. With this expectation in mind, we present NVL-C: a novel programming system that facilitates the efficient and correct programming of NVM main memory systems. The NVL-C programming abstraction extends C with a small set of intuitive language features that target NVM main memory, and can be combined directly with traditional C memory model features for DRAM. We have designed these new features to enable compiler analyses and run-time checks that can improve performance and guard againstmore » a number of subtle programming errors, which, when left uncorrected, can corrupt NVM-stored data. Moreover, to enable recovery of data across application or system failures, these NVL-C features include a flexible directive for specifying NVM transactions. So that our implementation might be extended to other compiler front ends and languages, the majority of our compiler analyses are implemented in an extended version of LLVM's intermediate representation (LLVM IR). We evaluate NVL-C on a number of applications to show its flexibility, performance, and correctness.« less
Code of Federal Regulations, 2010 CFR
2010-07-01
... maintenance within the United States, including the payment of living expenses and the acquisition of goods for personal consumption in the United States; (3) All transactions on behalf of aircraft or vessels... banking transactions involving foreign currency drafts, travelers' checks, or other instruments negotiated...
Code of Federal Regulations, 2011 CFR
2011-07-01
... maintenance within the United States, including the payment of living expenses and the acquisition of goods for personal consumption in the United States; (3) All transactions on behalf of aircraft or vessels... banking transactions involving foreign currency drafts, travelers' checks, or other instruments negotiated...
Code of Federal Regulations, 2014 CFR
2014-07-01
... maintenance within the United States, including the payment of living expenses and the acquisition of goods for personal consumption in the United States; (3) All transactions on behalf of aircraft or vessels... banking transactions involving foreign currency drafts, travelers' checks, or other instruments negotiated...
Code of Federal Regulations, 2012 CFR
2012-07-01
... maintenance within the United States, including the payment of living expenses and the acquisition of goods for personal consumption in the United States; (3) All transactions on behalf of aircraft or vessels... banking transactions involving foreign currency drafts, travelers' checks, or other instruments negotiated...
Code of Federal Regulations, 2013 CFR
2013-07-01
... maintenance within the United States, including the payment of living expenses and the acquisition of goods for personal consumption in the United States; (3) All transactions on behalf of aircraft or vessels... banking transactions involving foreign currency drafts, travelers' checks, or other instruments negotiated...
NASA Astrophysics Data System (ADS)
Mohan, C.
In this paper, I survey briefly some of the recent and emerging trends in hardware and software features which impact high performance transaction processing and data analytics applications. These features include multicore processor chips, ultra large main memories, flash storage, storage class memories, database appliances, field programmable gate arrays, transactional memory, key-value stores, and cloud computing. While some applications, e.g., Web 2.0 ones, were initially built without traditional transaction processing functionality in mind, slowly system architects and designers are beginning to address such previously ignored issues. The availability, analytics and response time requirements of these applications were initially given more importance than ACID transaction semantics and resource consumption characteristics. A project at IBM Almaden is studying the implications of phase change memory on transaction processing, in the context of a key-value store. Bitemporal data management has also become an important requirement, especially for financial applications. Power consumption and heat dissipation properties are also major considerations in the emergence of modern software and hardware architectural features. Considerations relating to ease of configuration, installation, maintenance and monitoring, and improvement of total cost of ownership have resulted in database appliances becoming very popular. The MapReduce paradigm is now quite popular for large scale data analysis, in spite of the major inefficiencies associated with it.
2 CFR 180.425 - When do I check to see if a person is excluded or disqualified?
Code of Federal Regulations, 2010 CFR
2010-01-01
... excluded or disqualified? 180.425 Section 180.425 Grants and Agreements OFFICE OF MANAGEMENT AND BUDGET... tier covered transaction; (b) Approve a principal in a primary tier covered transaction; (c) Approve a...) Approve a principal in connection with a lower tier transaction if your agency's approval of the principal...
A novel cognitive intervention for compulsive checking: Targeting maladaptive beliefs about memory.
Alcolado, Gillian M; Radomsky, Adam S
2016-12-01
Compulsive checking is one of the most common symptoms of obsessive-compulsive disorder (OCD). Recently it has been proposed that those who check compulsively may believe their memory is poor, rather than having an actual memory impairment. The current study sought to develop and assess a brief cognitive intervention focused on improving maladaptive beliefs about memory, as they pertain to both checking symptoms and memory performance. Participants (N = 24) with a diagnosis of OCD and clinical levels of checking symptomatology were randomly assigned either to receive two weekly 1-hour therapy sessions or to self-monitor during a similar waitlist period. Time spent checking, checking symptoms, maladaptive beliefs about memory, and visuospatial memory were assessed both pre- and post-treatment/waitlist. Results showed that compared to the waitlist condition, individuals in the treatment condition displayed significant decreases in their maladaptive beliefs about memory and checking symptoms from pre- to post-intervention. They also exhibited increased recall performance on a measure of visuospatial memory. Changes in beliefs about memory were predictors of reduced post-intervention checking, but were not predictive of increased post-intervention memory scores. The lack of long term follow-up data and use of a waitlist control leave questions about the stability and specificity of the intervention. Findings provide preliminary evidence that strategies targeting beliefs about memory may be worthy of inclusion in cognitive-behavioural approaches to treating compulsive checking. Copyright © 2015 Elsevier Ltd. All rights reserved.
1991-05-01
or may not bypass the editing function. At present, editing rules beyond those required for translation have not been stipulated. 2When explicit... editing rules become defined, the editor at a site LGN may perform two levels of edit checking: warning, which would insert blanks or pass as submitted...position image transactions into a transaction set. This low-level edit checking is performed at the site LGN to reduce transmission costs and to
NASA Astrophysics Data System (ADS)
Wang, Xiao-Tian; Wu, Min; Zhou, Ze-Min; Jing, Wei-Shu
2012-02-01
This paper deals with the problem of discrete time option pricing using the fractional long memory stochastic volatility model with transaction costs. Through the 'anchoring and adjustment' argument in a discrete time setting, a European call option pricing formula is obtained.
Systems and methods for performing wireless financial transactions
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCown, Steven Harvey
2012-07-03
A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature tomore » the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction.« less
25 CFR 542.14 - What are the minimum internal control standards for the cage?
Code of Federal Regulations, 2011 CFR
2011-04-01
..., collecting and recording checks returned to the gaming operation after deposit, re-deposit, and write-off... person approving the counter check transaction. (4) When traveler's checks or other guaranteed drafts... identity, including photo identification. (8) A file for customers shall be prepared prior to acceptance of...
ERIC Educational Resources Information Center
London, Manuel; Polzer, Jeffrey T.; Omoregie, Heather
2005-01-01
This article presents a multilevel model of group learning that focuses on antecedents and consequences of interpersonal congruence, transactive memory, and feedback processes. The model holds that members' self-verification motives and situational conditions (e.g., member diversity and task demands) give rise to identity negotiation behaviors…
Scripting for Construction of a Transactive Memory System in Multidisciplinary CSCL Environments
ERIC Educational Resources Information Center
Noroozi, Omid; Biemans, Harm J. A.; Weinberger, Armin; Mulder, Martin; Chizari, Mohammad
2013-01-01
Establishing a Transactive Memory System (TMS) is essential for groups of learners, when they are multidisciplinary and collaborate online. Environments for Computer-Supported Collaborative Learning (CSCL) could be designed to facilitate the TMS. This study investigates how various aspects of a TMS (i.e., specialization, coordination, and trust)…
Temporality and Affect: Useful Starting Points in Interpretation.
ERIC Educational Resources Information Center
Schiller, Susan
Empirical research into reading theory suggests people begin a reading transaction with an affective response and then primarily rely on memory. They may elect to use imagination as an option to influence the process, but when the affective response is overwhelming, the imagination lies dormant while memory dominates the transaction. A research…
High-throughput state-machine replication using software transactional memory.
Zhao, Wenbing; Yang, William; Zhang, Honglei; Yang, Jack; Luo, Xiong; Zhu, Yueqin; Yang, Mary; Luo, Chaomin
2016-11-01
State-machine replication is a common way of constructing general purpose fault tolerance systems. To ensure replica consistency, requests must be executed sequentially according to some total order at all non-faulty replicas. Unfortunately, this could severely limit the system throughput. This issue has been partially addressed by identifying non-conflicting requests based on application semantics and executing these requests concurrently. However, identifying and tracking non-conflicting requests require intimate knowledge of application design and implementation, and a custom fault tolerance solution developed for one application cannot be easily adopted by other applications. Software transactional memory offers a new way of constructing concurrent programs. In this article, we present the mechanisms needed to retrofit existing concurrency control algorithms designed for software transactional memory for state-machine replication. The main benefit for using software transactional memory in state-machine replication is that general purpose concurrency control mechanisms can be designed without deep knowledge of application semantics. As such, new fault tolerance systems based on state-machine replications with excellent throughput can be easily designed and maintained. In this article, we introduce three different concurrency control mechanisms for state-machine replication using software transactional memory, namely, ordered strong strict two-phase locking, conventional timestamp-based multiversion concurrency control, and speculative timestamp-based multiversion concurrency control. Our experiments show that speculative timestamp-based multiversion concurrency control mechanism has the best performance in all types of workload, the conventional timestamp-based multiversion concurrency control offers the worst performance due to high abort rate in the presence of even moderate contention between transactions. The ordered strong strict two-phase locking mechanism offers the simplest solution with excellent performance in low contention workload, and fairly good performance in high contention workload.
High-throughput state-machine replication using software transactional memory
Yang, William; Zhang, Honglei; Yang, Jack; Luo, Xiong; Zhu, Yueqin; Yang, Mary; Luo, Chaomin
2017-01-01
State-machine replication is a common way of constructing general purpose fault tolerance systems. To ensure replica consistency, requests must be executed sequentially according to some total order at all non-faulty replicas. Unfortunately, this could severely limit the system throughput. This issue has been partially addressed by identifying non-conflicting requests based on application semantics and executing these requests concurrently. However, identifying and tracking non-conflicting requests require intimate knowledge of application design and implementation, and a custom fault tolerance solution developed for one application cannot be easily adopted by other applications. Software transactional memory offers a new way of constructing concurrent programs. In this article, we present the mechanisms needed to retrofit existing concurrency control algorithms designed for software transactional memory for state-machine replication. The main benefit for using software transactional memory in state-machine replication is that general purpose concurrency control mechanisms can be designed without deep knowledge of application semantics. As such, new fault tolerance systems based on state-machine replications with excellent throughput can be easily designed and maintained. In this article, we introduce three different concurrency control mechanisms for state-machine replication using software transactional memory, namely, ordered strong strict two-phase locking, conventional timestamp-based multiversion concurrency control, and speculative timestamp-based multiversion concurrency control. Our experiments show that speculative timestamp-based multiversion concurrency control mechanism has the best performance in all types of workload, the conventional timestamp-based multiversion concurrency control offers the worst performance due to high abort rate in the presence of even moderate contention between transactions. The ordered strong strict two-phase locking mechanism offers the simplest solution with excellent performance in low contention workload, and fairly good performance in high contention workload. PMID:29075049
The long memory and the transaction cost in financial markets
NASA Astrophysics Data System (ADS)
Li, Daye; Nishimura, Yusaku; Men, Ming
2016-01-01
In the present work, we investigate the fractal dimensions of 30 important stock markets from 2006 to 2013; the analysis indicates that the Hurst exponent of emerging markets shifts significantly away from the standard Brownian motion. We propose a model based on the Hurst exponent to explore the considerable profits from the predictable long-term memory. We take the transaction cost into account to justify why the market inefficiency has not been arbitraged away in the majority of cases. The empirical evidence indicates that the majority of the markets are efficient with a certain transaction cost under the no-arbitrage assumption. Furthermore, we use the Monte Carlo simulation to display "the efficient frontier" of the Hurst exponent with different transaction costs.
ERIC Educational Resources Information Center
Yilmaz, Ramazan; Karaoglan Yilmaz, Fatma Gizem; Kilic Cakmak, Ebru
2017-01-01
The purpose of this study is to examine the impacts of transactive memory system (TMS) and interaction platforms in computer-supported collaborative learning (CSCL) on social presence perceptions and self-regulation skills of learners. Within the scope of the study, social presence perceptions and self-regulation skills of students in…
Content-addressable memory based enforcement of configurable policies
Berg, Michael J
2014-05-06
A monitoring device for monitoring transactions on a bus includes content-addressable memory ("CAM") and a response policy unit. The CAM includes an input coupled to receive a bus transaction tag based on bus traffic on the bus. The CAM stores data tags associated with rules of a security policy to compare the bus transaction tag to the data tags. The CAM generates an output signal indicating whether one or more matches occurred. The response policy unit is coupled to the CAM to receive the output signal from the CAM and to execute a policy action in response to the output signal.
12 CFR 741.222 - Credit union service organizations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Credit union service organizations. 741.222 Section 741.222 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS..., including check cashing services, sale of negotiable checks, money orders, and electronic transaction...
ERIC Educational Resources Information Center
Michinov, Estelle; Michinov, Nicolas; Huguet, Pascal
2009-01-01
This experiment was designed to examine the effects of gender role and task content on performance in learning dyads and to test the potential mediator effect of an intragroup process related to transactive memory. A total of 44 same-gender dyads participated in the study and were asked to collaborate on a stereotypically masculine or feminine…
5 CFR 919.425 - When do I check to see if a person is excluded or disqualified?
Code of Federal Regulations, 2010 CFR
2010-01-01
... excluded or disqualified? 919.425 Section 919.425 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT... before you— (a) Enter into a primary tier covered transaction; (b) Approve a principal in a primary tier... is required; or (d) Approve a principal in connection with a lower tier transaction if agency...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Virgin Islands, and the Northern Mariana Islands at which deposits are received or checks paid or money... relating to transactions in which deposits are received or checks paid or money lent. A messenger service... with the FDIC to determine if the messenger service constitutes a branch. (2) A mobile branch, other...
Code of Federal Regulations, 2011 CFR
2011-01-01
... Virgin Islands, and the Northern Mariana Islands at which deposits are received or checks paid or money... relating to transactions in which deposits are received or checks paid or money lent. A messenger service... with the FDIC to determine if the messenger service constitutes a branch. (2) A mobile branch, other...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Virgin Islands, and the Northern Mariana Islands at which deposits are received or checks paid or money... relating to transactions in which deposits are received or checks paid or money lent. A messenger service... with the FDIC to determine if the messenger service constitutes a branch. (2) A mobile branch, other...
Code of Federal Regulations, 2013 CFR
2013-01-01
... Virgin Islands, and the Northern Mariana Islands at which deposits are received or checks paid or money... relating to transactions in which deposits are received or checks paid or money lent. A messenger service... with the FDIC to determine if the messenger service constitutes a branch. (2) A mobile branch, other...
Code of Federal Regulations, 2012 CFR
2012-01-01
... Virgin Islands, and the Northern Mariana Islands at which deposits are received or checks paid or money... relating to transactions in which deposits are received or checks paid or money lent. A messenger service... with the FDIC to determine if the messenger service constitutes a branch. (2) A mobile branch, other...
Performance of Compiler-Assisted Memory Safety Checking
2014-08-01
software developer has in mind a particular object to which the pointer should point, the intended referent. A memory access error occurs when an ac...Performance of Compiler-Assisted Memory Safety Checking David Keaton Robert C. Seacord August 2014 TECHNICAL NOTE CMU/SEI-2014-TN...based memory safety checking tool and the performance that can be achieved with two such tools whose source code is freely available. The note then
Code of Federal Regulations, 2011 CFR
2011-04-01
... INTERNATIONAL DEVELOPMENT GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Responsibilities of Participants Regarding Transactions Doing Business with Other Persons § 208.300 What must I do before I enter... to do business is not excluded or disqualified. You do this by: (a) Checking the EPLS; or (b...
Code of Federal Regulations, 2010 CFR
2010-04-01
... INTERNATIONAL DEVELOPMENT GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Responsibilities of Participants Regarding Transactions Doing Business with Other Persons § 208.300 What must I do before I enter... to do business is not excluded or disqualified. You do this by: (a) Checking the EPLS; or (b...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-19
... institutions to bring those individuals and families who have rarely, if ever, held a checking account, a savings account or other type of transaction or check cashing account at an insured depository institution... size and worth of the ``unbanked'' market in the United States.'' The Household Survey is designed to...
41 CFR 105-68.425 - When do I check to see if a person is excluded or disqualified?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false When do I check to see... Management Federal Property Management Regulations System (Continued) GENERAL SERVICES ADMINISTRATION... disqualified before you— (a) Enter into a primary tier covered transaction; (b) Approve a principal in a...
Building effective critical care teams
2011-01-01
Critical care is formulated and delivered by a team. Accordingly, behavioral scientific principles relevant to teams, namely psychological safety, transactive memory and leadership, apply to critical care teams. Two experts in behavioral sciences review the impact of psychological safety, transactive memory and leadership on medical team outcomes. A clinician then applies those principles to two routine critical care paradigms: daily rounds and resuscitations. Since critical care is a team endeavor, methods to maximize teamwork should be learned and mastered by critical care team members, and especially leaders. PMID:21884639
[The Role of Distinctiveness of Stimulus in Memory Distrust as a Function of Repeated Checking].
Demirsöz, Talat; Ayvaşık, H Belgin
2017-01-01
Recent literature proposes that repeated checking increases familiarity with the material, making recollections less vivid and detailed and promoting distrust in memory. The aim of the current study is to investigate the possible underlying mechanisms of low confidence in memory. The Padua Inventory-Washington State University Revision (PI-WSUR) was applied in a cohort of university students. Among the students who completed the PI-WSUR, 84 participants were selected and assigned to low Obsessive-Compulsive Symptomatology (OCS) group or high OCS group according to their PI-WSUR scores. An interactive computer animation was developed to test repeated checking behavior. Participants were randomly assigned to two experimental conditions: "Feedback condition" and "no feedback condition". The participants were all asked to carry out checking rituals on a virtual gas ring. However, half of the participants were given feedback indicating that checking activity was successful and complete and half of the participants were not. While there was no significant difference in terms of memory accuracy, memory detail and memory vividness between feedback condition and no feedback condition, there was a significant difference in terms of memory confidence between two experimental groups. Results are discussed in the light of a different explanation offering that the level of distinctiveness of recollections plays crucial role in memory distrust rather than the explanation of low confidence hypothesis.
NASA Technical Reports Server (NTRS)
1978-01-01
In the photo, employees of the UAB Bank, Knoxville, Tennessee, are using Teller Transaction Terminals manufactured by SCI Systems, Inc., Huntsville, Alabama, an electronics firm which has worked on a number of space projects under contract with NASA. The terminals are part of an advanced, computerized financial transaction system that offers high efficiency in bank operations. The key to the system's efficiency is a "multiplexing" technique developed for NASA's Space Shuttle. Multiplexing is simultaneous transmission of large amounts of data over a single transmission link at very high rates of speed. In the banking application, a small multiplex "data bus" interconnects all the terminals and a central computer which stores information on clients' accounts. The data bus replaces the maze-of wiring that would be needed to connect each terminal separately and it affords greater speed in recording transactions. The SCI system offers banks real-time data management through constant updating of the central computer. For example, a check is immediately cancelled at the teller's terminal and the computer is simultaneously advised of the transaction; under other methods, the check would be cancelled and the transaction recorded at the close of business. Teller checkout at the end of the day, conventionally a time-consuming matter of processing paper, can be accomplished in minutes by calling up a summary of the day's transactions. SCI manufactures other types of terminals for use in the system, such as an administrative terminal that provides an immediate printout of a client's account, and another for printing and recording savings account deposits and withdrawals. SCI systems have been installed in several banks in Tennessee, Arizona, and Oregon and additional installations are scheduled this year.
We Remember, We Forget: Collaborative Remembering in Older Couples
ERIC Educational Resources Information Center
Harris, Celia B.; Keil, Paul G.; Sutton, John; Barnier, Amanda J.; McIlwain, Doris J. F.
2011-01-01
Transactive memory theory describes the processes by which benefits for memory can occur when remembering is shared in dyads or groups. In contrast, cognitive psychology experiments demonstrate that social influences on memory disrupt and inhibit individual recall. However, most research in cognitive psychology has focused on groups of strangers…
31 CFR 103.39 - Person outside the United States.
Code of Federal Regulations, 2010 CFR
2010-07-01
... of currency, other monetary instruments, checks, investment securities, or credit to the domestic... transaction on the books of a domestic financial institution involving the account of a customer of such...
Leveraging the cost of HIPPA..
Hoppszallern, Suzanna; Arges, George
2002-01-01
HIPAA's administrative simplification rule was introduced to reduce the costs of handling provider-payer transactions by standardizing them. The transaction rules are predicted to save billions of dollars. To get the biggest payoff, providers will need to overhaul their business processes as part of electronic transaction processing. By eliminating redundant and inefficient administrative processes, staff time can be focused on processes that improve financial performance and customer satisfaction. If your organization needs to have an extension beyond the original compliance date, you must file a plan before Oct. 16 to show how you'll come into compliance by Oct. 16, 2003. Check the roadmap and timetable for HIPAA compliance and see where your organization is and where it needs to be.
76 FR 43393 - Debit Card Interchange Fees and Routing
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-20
... have increased at a faster pace. \\20\\ Card-not-present transactions occur when the card is not...; \\32\\ faster availability of funds; faster check-out at the point-of-sale; increased sales value and...
Comment on id-based remote data integrity checking with data privacy preserving
NASA Astrophysics Data System (ADS)
Zhang, Jianhong; Meng, Hongxin
2017-09-01
Recently, an ID-based remote data integrity checking protocol with perfect data privacy preserving (IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2016.2615853) was proposed to achieve data privacy protection and integrity checking. Unfortunately, in this letter, we demonstrate that their protocol is insecure. An active hacker can modify the stored data without being detected by the verifier in the auditing. And we also show malicious cloud server can convince the verifier that the stored data are kept intact after the outsourced data blocks are deleted. Finally, the reasons to produce such attacks are given.
12 CFR Appendix A to Part 216 - Model Privacy Form
Code of Federal Regulations, 2010 CFR
2010-01-01
... claim history; medical information; overdraft history; purchase history; account transactions; risk...; checking account information; employment information; wire transfer instructions. (c) General instructions... account; enter into an investment advisory contract; give us your income information; provide employment...
12 CFR Appendix A to Part 332 - Model Privacy Form
Code of Federal Regulations, 2010 CFR
2010-01-01
... claim history; medical information; overdraft history; purchase history; account transactions; risk...; checking account information; employment information; wire transfer instructions. (c) General instructions... account; enter into an investment advisory contract; give us your income information; provide employment...
Optimizing revenue at a cosmetic surgery centre
Funk, Joanna M; Verheyden, Charles N; Mahabir, Raman C
2011-01-01
BACKGROUND: The demand for cosmetic surgery and services has diminished with recent fluctuations in the economy. To stay ahead, surgeons must appreciate and attend to the fiscal challenges of private practice. A key component of practice economics is knowledge of the common methods of payment. OBJECTIVE: To review methods of payment in a five-surgeon group practice in central Texas, USA. METHODS: A retrospective chart review of the financial records of a cosmetic surgery centre in Texas was conducted. Data were collected for the five-year period from 2003 to 2008, and included the method of payment, the item purchased (product, service or surgery) and the dollar amount. RESULTS: More than 11,000 transactions were reviewed. The most common method of payment used for products and services was credit card, followed by check and cash. For procedures, the most common form of payment was personal check, followed by credit card and financing. Of the credit card purchases for both products and procedures, an overwhelming majority of patients (more than 75%) used either Visa (Visa Inc, USA) or MasterCard (MasterCard Worldwide, USA). If the amount of the individual transaction surpassed US$1,000, the most common method of payment transitioned from credit card to personal check. CONCLUSIONS: In an effort to maximize revenue, surgeons should consider limiting the credit cards accepted by the practice and encourage payment through personal check. PMID:22942656
Optimizing revenue at a cosmetic surgery centre.
Funk, Joanna M; Verheyden, Charles N; Mahabir, Raman C
2011-01-01
The demand for cosmetic surgery and services has diminished with recent fluctuations in the economy. To stay ahead, surgeons must appreciate and attend to the fiscal challenges of private practice. A key component of practice economics is knowledge of the common methods of payment. To review methods of payment in a five-surgeon group practice in central Texas, USA. A retrospective chart review of the financial records of a cosmetic surgery centre in Texas was conducted. Data were collected for the five-year period from 2003 to 2008, and included the method of payment, the item purchased (product, service or surgery) and the dollar amount. More than 11,000 transactions were reviewed. The most common method of payment used for products and services was credit card, followed by check and cash. For procedures, the most common form of payment was personal check, followed by credit card and financing. Of the credit card purchases for both products and procedures, an overwhelming majority of patients (more than 75%) used either Visa (Visa Inc, USA) or MasterCard (MasterCard Worldwide, USA). If the amount of the individual transaction surpassed US$1,000, the most common method of payment transitioned from credit card to personal check. In an effort to maximize revenue, surgeons should consider limiting the credit cards accepted by the practice and encourage payment through personal check.
SALT: The Simulator for the Analysis of LWP Timing
NASA Technical Reports Server (NTRS)
Springer, Paul L.; Rodrigues, Arun; Brockman, Jay
2006-01-01
With the emergence of new processor architectures that are highly multithreaded, and support features such as full/empty memory semantics and split-phase memory transactions, the need for a processor simulator to handle these features becomes apparent. This paper describes such a simulator, called SALT.
Confidence in memory and other cognitive processes in obsessive-compulsive disorder.
Nedeljkovic, Maja; Kyrios, Michael
2007-12-01
Previous studies have implicated beliefs about one's memory (i.e., meta-memory), in maintaining the symptoms of obsessive-compulsive disorder (OCD), particularly with respect to checking rituals. However, most research has focused on task- or situation-specific perceptions about memory performance. Expanding on this research, we undertook two studies with analogue and clinical cohorts to examine the relationship between general 'trait' beliefs about memory and related processes and OCD symptoms. Trait meta-memory as measured in the current study was conceptualised as a multi-dimensional construct encompassing a range of beliefs about memory and related processes including confidence in one's general memory abilities, decision-making abilities, concentration and attention, as well as perfectionistic standards regarding one's memory. Meta-memory factors were associated with OCD symptoms, predicting OCD symptoms over-and-above mood and other OCD-relevant cognitions. Meta-memory factors were found to be particularly relevant to checking symptoms. Implications for theory and research are discussed.
FPGA-Based, Self-Checking, Fault-Tolerant Computers
NASA Technical Reports Server (NTRS)
Some, Raphael; Rennels, David
2004-01-01
A proposed computer architecture would exploit the capabilities of commercially available field-programmable gate arrays (FPGAs) to enable computers to detect and recover from bit errors. The main purpose of the proposed architecture is to enable fault-tolerant computing in the presence of single-event upsets (SEUs). [An SEU is a spurious bit flip (also called a soft error) caused by a single impact of ionizing radiation.] The architecture would also enable recovery from some soft errors caused by electrical transients and, to some extent, from intermittent and permanent (hard) errors caused by aging of electronic components. A typical FPGA of the current generation contains one or more complete processor cores, memories, and highspeed serial input/output (I/O) channels, making it possible to shrink a board-level processor node to a single integrated-circuit chip. Custom, highly efficient microcontrollers, general-purpose computers, custom I/O processors, and signal processors can be rapidly and efficiently implemented by use of FPGAs. Unfortunately, FPGAs are susceptible to SEUs. Prior efforts to mitigate the effects of SEUs have yielded solutions that degrade performance of the system and require support from external hardware and software. In comparison with other fault-tolerant- computing architectures (e.g., triple modular redundancy), the proposed architecture could be implemented with less circuitry and lower power demand. Moreover, the fault-tolerant computing functions would require only minimal support from circuitry outside the central processing units (CPUs) of computers, would not require any software support, and would be largely transparent to software and to other computer hardware. There would be two types of modules: a self-checking processor module and a memory system (see figure). The self-checking processor module would be implemented on a single FPGA and would be capable of detecting its own internal errors. It would contain two CPUs executing identical programs in lock step, with comparison of their outputs to detect errors. It would also contain various cache local memory circuits, communication circuits, and configurable special-purpose processors that would use self-checking checkers. (The basic principle of the self-checking checker method is to utilize logic circuitry that generates error signals whenever there is an error in either the checker or the circuit being checked.) The memory system would comprise a main memory and a hardware-controlled check-pointing system (CPS) based on a buffer memory denoted the recovery cache. The main memory would contain random-access memory (RAM) chips and FPGAs that would, in addition to everything else, implement double-error-detecting and single-error-correcting memory functions to enable recovery from single-bit errors.
Pearsall, Matthew J; Ellis, Aleksander P J; Bell, Bradford S
2010-01-01
The primary purpose of this study was to extend theory and research regarding the emergence of mental models and transactive memory in teams. Utilizing Kozlowski, Gully, Nason, and Smith's (1999) model of team compilation, we examined the effect of role identification behaviors and posited that such behaviors represent the initial building blocks of team cognition during the role compilation phase of team development. We then hypothesized that team mental models and transactive memory would convey the effects of these behaviors onto team performance in the team compilation phase of development. Results from 60 teams working on a command-and-control simulation supported our hypotheses. Copyright 2009 APA, all rights reserved.
Recordkeeping alters economic history by promoting reciprocity
Basu, Sudipta; Dickhaut, John; Hecht, Gary; Towry, Kristy; Waymire, Gregory
2009-01-01
We experimentally demonstrate a causal link between recordkeeping and reciprocal exchange. Recordkeeping improves memory of past interactions in a complex exchange environment, which promotes reputation formation and decision coordination. Economies with recordkeeping exhibit a beneficially altered economic history where the risks of exchanging with strangers are substantially lessened. Our findings are consistent with prior assertions that complex and extensive reciprocity requires sophisticated memory to store information on past transactions. We offer insights on this research by scientifically demonstrating that reciprocity can be facilitated by information storage external to the brain. This is consistent with the archaeological record, which suggests that prehistoric transaction records and the invention of writing for recordkeeping were linked to increased complexity in human interaction. PMID:19147843
Measuring Transactiving Memory Systems Using Network Analysis
ERIC Educational Resources Information Center
King, Kylie Goodell
2017-01-01
Transactive memory systems (TMSs) describe the structures and processes that teams use to share information, work together, and accomplish shared goals. First introduced over three decades ago, TMSs have been measured in a variety of ways. This dissertation proposes the use of network analysis in measuring TMS. This is accomplished by describing…
Assessing neurocognitive function in psychiatric disorders: A roadmap for enhancing consensus
Ahmari, Susanne E.; Eich, Teal; Cebenoyan, Deniz; Smith, Edward E.; Simpson, H. Blair
2014-01-01
It has been challenging to identify core neurocognitive deficits that are consistent across multiple studies in patients with Obsessive Compulsive Disorder (OCD). In turn, this leads to difficulty in translating findings from human studies into animal models to dissect pathophysiology. In this article, we use primary data from a working memory task in OCD patients to illustrate this issue. Working memory deficiencies have been proposed as an explanatory model for the evolution of checking compulsions in a subset of OCD patients. However, findings have been mixed due to variability in task design, examination of spatial vs. verbal working memory, and heterogeneity in patient populations. Two major questions therefore remain: first, do OCD patients have disturbances in working memory? Second, if there are working memory deficits in OCD, do they cause checking compulsions?. In order to investigate these questions, we tested 19 unmedicated OCD patients and 23 matched healthy controls using a verbal working memory task that has increased difficulty/task-load compared to classic digit-span tasks. OCD patients did not significantly differ in their performance on this task compared to healthy controls, regardless of the outcome measure used (i.e. reaction time or accuracy). Exploratory analyses suggest that a subset of patients with predominant doubt/checking symptoms may have decreased memory confidence despite normal performance on trials with the highest working memory load. These results suggest that other etiologic factors for checking compulsions should be considered. In addition, they serve as a touchstone for discussion, and therefore help us to generate a roadmap for increasing consensus in the assessment of neurocognitive function in psychiatric disorders. PMID:24994503
Do familiar teammates request and accept more backup? Transactive memory in air traffic control.
Smith-Jentsch, Kimberly A; Kraiger, Kurt; Cannon-Bowers, Janis A; Salas, Eduardo
2009-04-01
The present study investigated factors that explain when and why different groups of teammates are more likely to request and accept backup from one another when needed in an environment characterized by extreme time pressure and severe consequences of error: commercial air traffic control (ATC). Transactive memory theory states that teammates develop consensus regarding the distribution of their relative expertise as well as confidence in that expertise over time and that this facilitates coordination processes. The present study investigated whether this theory could help to explain between-team differences in requesting and accepting backup when needed. The present study used cross-sectional data collected from 51 commercial ATC teams. Hypotheses were tested using multiple regression analysis. Teammates with greater experience working together requested and accepted backup from one another more than those with lesser experience working together. Teammate knowledge consensus and perceived team efficacy appear to have mediated this relationship. Transactive memory theory extends to high-stress environments in which members' expertise is highly overlapping. Teammates' shared mental models about one another increase the likelihood that they will request and accept backup. Teammate familiarity should be considered when choosing among potential replacement team members. Training strategies that accelerate the development of teammate knowledge consensus and team efficacy are warranted.
Time Series Model Identification and Prediction Variance Horizon.
1980-06-01
stationary time series Y(t). -6- In terms of p(v), the definition of the three time series memory types is: No Memory Short Memory Long Memory X IP (v)I 0 0...X lp(v)l < - I IP (v) = v=1 v=l v=l Within short memory time series there are three types whose classification in terms of correlation functions is...1974) "Some Recent Advances in Time Series Modeling", TEEE Transactions on Automatic ControZ, VoZ . AC-19, No. 6, December, 723-730. Parzen, E. (1976) "An
ERIC Educational Resources Information Center
Hart, Joseph T.
Two basic tests for checking memory skills are included in these appendices. The first, the General Information Test, uses the same 150 items for each of its two versions. One version is a completion-type test which measures recall by requiring the examinee to supply a specific response. The other version supplements each of the 150 items with…
Cache as point of coherence in multiprocessor system
Blumrich, Matthias A.; Ceze, Luis H.; Chen, Dong; Gara, Alan; Heidelberger, Phlip; Ohmacht, Martin; Steinmacher-Burow, Burkhard; Zhuang, Xiaotong
2016-11-29
In a multiprocessor system, a conflict checking mechanism is implemented in the L2 cache memory. Different versions of speculative writes are maintained in different ways of the cache. A record of speculative writes is maintained in the cache directory. Conflict checking occurs as part of directory lookup. Speculative versions that do not conflict are aggregated into an aggregated version in a different way of the cache. Speculative memory access requests do not go to main memory.
ATIP Report: Cyber Security Research in China
2015-06-05
vulnerabilities. ATIP Document ID: 150605AR CYBER SECURITY RESEARCH IN CHINA 17 Le GUAN et al. at SKLOIS of IIE, CAS proposed a solution named “ Mimosa ...that protects RSA private keys against the above software-based and physical memory attacks. When the Mimosa service is in idle, private keys are...encrypted and reside in memory as ciphertext. During the cryptographic computing, Mimosa uses hardware transactional memory (HTM) to ensure that (a
Continuous Time Random Walks with memory and financial distributions
NASA Astrophysics Data System (ADS)
Montero, Miquel; Masoliver, Jaume
2017-11-01
We study financial distributions from the perspective of Continuous Time Random Walks with memory. We review some of our previous developments and apply them to financial problems. We also present some new models with memory that can be useful in characterizing tendency effects which are inherent in most markets. We also briefly study the effect on return distributions of fractional behaviors in the distribution of pausing times between successive transactions.
On-orbit observations of single event upset in Harris HM-6508 1K RAMs, reissue A
NASA Astrophysics Data System (ADS)
Blake, J. B.; Mandel, R.
1987-02-01
The Harris HM-6508 1K x 1 RAMs are part of a subsystem of a satellite in a low, polar orbit. The memory module, used in the subsystem containing the RAMs, consists of three printed circuit cards, with each card containing eight 2K byte memory hybrids, for a total of 48K bytes. Each memory hybrid contains 16 HM-6508 RAM chips. On a regular basis all but 256 bytes of the 48K bytes are examined for bit errors. Two different techniques were used for detecting bit errors. The first technique, a memory check sum, was capable of automatically detecting all single bit and some double bit errors which occurred within a page of memory. A memory page consists of 256 bytes. Memory check sum tests are performed approximately every 90 minutes. To detect a multiple error or to determine the exact location of the bit error within the page the entire contents of the memory is dumped and compared to the load file. Memory dumps are normally performed once a month, or immediately after the check sum routine detects an error. Once the exact location of the error is found, the correct value is reloaded into memory. After the memory is reloaded, the contents of the memory location in question is verified in order to determine if the error was a soft error generated by an SEU or a hard error generated by a part failure or cosmic-ray induced latchup.
Evaluating Non-In-Place Update Techniques for Flash-Based Transaction Processing Systems
NASA Astrophysics Data System (ADS)
Wang, Yongkun; Goda, Kazuo; Kitsuregawa, Masaru
Recently, flash memory is emerging as the storage device. With price sliding fast, the cost per capacity is approaching to that of SATA disk drives. So far flash memory has been widely deployed in consumer electronics even partly in mobile computing environments. For enterprise systems, the deployment has been studied by many researchers and developers. In terms of the access performance characteristics, flash memory is quite different from disk drives. Without the mechanical components, flash memory has very high random read performance, whereas it has a limited random write performance because of the erase-before-write design. The random write performance of flash memory is comparable with or even worse than that of disk drives. Due to such a performance asymmetry, naive deployment to enterprise systems may not exploit the potential performance of flash memory at full blast. This paper studies the effectiveness of using non-in-place-update (NIPU) techniques through the IO path of flash-based transaction processing systems. Our deliberate experiments using both open-source DBMS and commercial DBMS validated the potential benefits; x3.0 to x6.6 performance improvement was confirmed by incorporating non-in-place-update techniques into file system without any modification of applications or storage devices.
2017-03-01
models of software execution, for example memory access patterns, to check for security intrusions. Additional research was performed to tackle the...considered using indirect models of software execution, for example memory access patterns, to check for security intrusions. Additional research ...deterioration for example , no longer corresponds to the model used during verification time. Finally, the research looked at ways to combine hybrid systems
17 CFR 260.11b-4 - Definition of “cash transaction” in section 311(b)(4).
Code of Federal Regulations, 2010 CFR
2010-04-01
... transaction”, as used in section 311(b)(4), means any transaction in which full payment for goods or securities sold is made within 7 days after delivery of the goods or securities in currency or in checks or...
Analysis of reference transactions using packaged computer programs.
Calabretta, N; Ross, R
1984-01-01
Motivated by a continuing education class attended by the authors on the measurement of reference desk activities, the reference department at Scott Memorial Library initiated a project to gather data on reference desk transactions and to analyze the data by using packaged computer programs. The programs utilized for the project were SPSS (Statistical Package for the Social Sciences) and SAS (Statistical Analysis System). The planning, implementation and development of the project are described.
31 CFR 103.25 - Reports of transactions with foreign financial agencies.
Code of Federal Regulations, 2010 CFR
2010-07-01
... individually identifiable account information concerning a customer, as defined by the Right to Financial... the designated foreign financial agency or agencies and to any other party. (b) Information subject to... one or more of the following categories of information to be reported: (1) Checks or drafts, including...
12 CFR 226.4 - Finance charge.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) of this section: (1) Interest, time price differential, and any amount payable under an add-on or... any charge imposed on a checking or other transaction account to the extent that the charge exceeds... other credit loss. (6) Charges imposed on a creditor by another person for purchasing or accepting a...
19 CFR 19.4 - CBP and proprietor responsibility and supervision over warehouses.
Code of Federal Regulations, 2010 CFR
2010-04-01
... inventory category of each article under FIFO procedures. Merchandise covered by a given unique identifier..., quantity counts of goods in warehouse inventories, spot checks of selected warehouse transactions or...) Maintain the inventory control and recordkeeping system in accordance with the provisions of § 19.12 of...
Model Checking, Abstraction, and Compositional Verification
1993-07-01
the ( alois connections used by Bensalrnu el al. [6], and also has some relation to Kurshan’s automata homonuor- phisms [62]. (Actually. we can impose a...multiprocessor simulation model. ACM Transactions on Computer Systems, 4(4):273-298, November 1986. [41 D. L. Beatty, R. E. Bryant, and C.-J. Seger
Reader set encoding for directory of shared cache memory in multiprocessor system
Ahn, Dnaiel; Ceze, Luis H.; Gara, Alan; Ohmacht, Martin; Xiaotong, Zhuang
2014-06-10
In a parallel processing system with speculative execution, conflict checking occurs in a directory lookup of a cache memory that is shared by all processors. In each case, the same physical memory address will map to the same set of that cache, no matter which processor originated that access. The directory includes a dynamic reader set encoding, indicating what speculative threads have read a particular line. This reader set encoding is used in conflict checking. A bitset encoding is used to specify particular threads that have read the line.
Interpreter composition issues in the formal verification of a processor-memory module
NASA Technical Reports Server (NTRS)
Fura, David A.; Cohen, Gerald C.
1994-01-01
This report describes interpreter composition techniques suitable for the formal specification and verification of a processor-memory module using the HOL theorem proving system. The processor-memory module is a multichip subsystem within a fault-tolerant embedded system under development within the Boeing Defense and Space Group. Modeling and verification methods were developed that permit provably secure composition at the transaction-level of specification, significantly reducing the complexity of the hierarchical verification of the system.
Low-Density Parity-Check Code Design Techniques to Simplify Encoding
NASA Astrophysics Data System (ADS)
Perez, J. M.; Andrews, K.
2007-11-01
This work describes a method for encoding low-density parity-check (LDPC) codes based on the accumulate-repeat-4-jagged-accumulate (AR4JA) scheme, using the low-density parity-check matrix H instead of the dense generator matrix G. The use of the H matrix to encode allows a significant reduction in memory consumption and provides the encoder design a great flexibility. Also described are new hardware-efficient codes, based on the same kind of protographs, which require less memory storage and area, allowing at the same time a reduction in the encoding delay.
Diabetes: Unique to Older Adults
... quickly. The earlier depression is treated, the better. Memory Loss Problems with memory and brain function can be more common in ... provider may do some tests to check for memory loss. Be sure to let your provider know ...
How to Balance Your Checkbook. The CIRcular: Consumer Information Report 1.
ERIC Educational Resources Information Center
Bank of America NT & SA, San Francisco, CA.
This report presents information on checking accounts, describes how to read a monthly statement from the bank, and provides guidelines for balancing a checkbook. Topics covered include: how banks record transactions; the importance of keeping personal records and of balancing the checkbook promptly; what happens when there are insufficient funds…
Virlouvet, Laetitia; Ding, Yong; Fujii, Hiroaki; Avramova, Zoya; Fromm, Michael
2014-07-01
Plants subjected to a prior dehydration stress were seen to have altered transcriptional responses during a subsequent dehydration stress for up to 5 days after the initial stress. The abscisic acid (ABA) inducible RD29B gene of Arabidopsis thaliana was strongly induced after the first stress and displayed transcriptional memory with transcript levels nine-fold higher during the second dehydration stress. These increased transcript levels were due to an increased rate of transcription and are associated with an altered chromatin template during the recovery interval between the dehydration stresses. Here we use a combination of promoter deletion/substitutions, mutants in the trans-acting transcription factors and their upstream protein kinases, and treatments with exogenous ABA or dehydration stress to advance our understanding of the features required for transcriptional memory of RD29B. ABA Response Elements (ABREs) are sufficient to confer transcriptional memory on a minimal promoter, although there is a context effect from flanking sequences. Different mutations in Snf1 Related Protein Kinase 2 (SnRK2) genes positively and negatively affected the response, suggesting that this effect is important for transcriptional memory. Although exogenous ABA treatments could prime transcriptional memory, a second ABA treatment was not sufficient to activate transcriptional memory. Therefore, we concluded that transcriptional memory requires ABA and an ABA-independent factor that is induced or activated by a subsequent dehydration stress and directly or indirectly results in a more active RD29B chromatin template. These results advance our knowledge of the cis- and trans-acting factors that are required for transcriptional memory of RD29B. © 2014 The Authors The Plant Journal © 2014 John Wiley & Sons Ltd.
Formal verification of a set of memory management units
NASA Technical Reports Server (NTRS)
Schubert, E. Thomas; Levitt, K.; Cohen, Gerald C.
1992-01-01
This document describes the verification of a set of memory management units (MMU). The verification effort demonstrates the use of hierarchical decomposition and abstract theories. The MMUs can be organized into a complexity hierarchy. Each new level in the hierarchy adds a few significant features or modifications to the lower level MMU. The units described include: (1) a page check translation look-aside module (TLM); (2) a page check TLM with supervisor line; (3) a base bounds MMU; (4) a virtual address translation MMU; and (5) a virtual address translation MMU with memory resident segment table.
Delivering Coordinated Cancer Care by Building Transactive Memory in a Team of Teams.
Henry, Elizabeth; Silva, Abigail; Tarlov, Elizabeth; Czerlanis, Cheryl; Bernard, Margie; Chauhan, Cynthia; Schalk, Denise; Stewart, Greg
2016-11-01
Cancer care delivery is highly complex. Treatment involves coordination within oncology health-care teams and across other teams of referring primary and specialty providers (a team of teams). Each team interfaces with patients and caregivers to offer component parts of comprehensive care. Because patients frequently obtain specialty care from divergent health-care systems resulting in cross-system health-care use, oncology teams need mechanisms to coordinate and collaborate within and across health-care systems to optimize clinical outcomes for all cancer patients. Transactive memory is one potential strategy that can help improve comprehensive patient care delivery. Transactive memory is a process by which two or more team professionals develop a shared system for encoding, storing, and retrieving information. Each professional is responsible for retaining only part of the total information. Applying this concept to a team of teams results in system benefits wherein all teams share an understanding of specialized knowledge held by each component team. The patient's role as the unifying member of the team of teams is central to successful treatment delivery. This clinical case presents a patient who is receiving oral treatment for advanced prostate cancer within two health systems. The case emphasizes the potential for error when multiple teams function without a point team (the team coordinating efforts of all other primary and specialty teams) and when the specialty knowledge of providers and patients is not well integrated into all phases of the care delivery process.
Wang, Qi; Lee, Dasom; Hou, Yubo
2017-07-01
Internet technology provides a new means of recalling and sharing personal memories in the digital age. What is the mnemonic consequence of posting personal memories online? Theories of transactive memory and autobiographical memory would make contrasting predictions. In the present study, college students completed a daily diary for a week, listing at the end of each day all the events that happened to them on that day. They also reported whether they posted any of the events online. Participants received a surprise memory test after the completion of the diary recording and then another test a week later. At both tests, events posted online were significantly more likely than those not posted online to be recalled. It appears that sharing memories online may provide unique opportunities for rehearsal and meaning-making that facilitate memory retention.
Doyle, Katie L.; Loft, Shayne; Morgan, Erin E.; Weber, Erica; Cushman, Clint; Johnston, Elaine; Grant, Igor; Woods, Steven Paul
2013-01-01
Strategic monitoring during a delay interval is theorized to be an essential feature of time-based prospective memory (TB PM), the cognitive architecture of which is thought to rely heavily on frontostriatal systems and executive functions. This hypothesis was examined in 55 individuals with HIV-associated neurocognitive disorders (HAND) and 108 seronegative comparison participants who were administered the Memory for Intentions Screening Test (MIST), during which time monitoring (clock checking) behavior was measured. Results revealed a significant interaction between HAND group and the frequency of clock checking, in which individuals with HAND monitored checked the clock significantly less often than the comparison group across the TB PM retention intervals of the MIST. Subsequent analyses in the HAND sample revealed that the frequency of clocking checking was positively related to overall TB performance, as well as to standard clinical measures of retrospective memory and verbal fluency. These findings add support to a growing body of research elucidating TB PM’s reliance on strategic monitoring processes dependent upon intact frontostriatal systems. HIV-associated TB strategic time monitoring deficits may manifest in poorer functioning outcomes, including medication non-adherence and dependence in activities of daily living. Future research is needed to further delineate the cognitive mechanisms underlying strategic time monitoring in order to advise rehabilitation strategies for reducing HAND related TB PM deficits. PMID:23465043
Roth, R L
1995-01-01
The United States Supreme Court agreed with the Secretary of Health and Human Services that Guernsey Memorial Hospital's advance refunding transaction costs would be subject to a medicare reimbursement policy that is not based upon generally accepted accounting principles. According to the sharp dissent in this case, this policy, set forth in a manual provision, contradicts federal regulations.
Credit Card Fraud Detection: A Realistic Modeling and a Novel Learning Strategy.
Dal Pozzolo, Andrea; Boracchi, Giacomo; Caelen, Olivier; Alippi, Cesare; Bontempi, Gianluca
2017-09-14
Detecting frauds in credit card transactions is perhaps one of the best testbeds for computational intelligence algorithms. In fact, this problem involves a number of relevant challenges, namely: concept drift (customers' habits evolve and fraudsters change their strategies over time), class imbalance (genuine transactions far outnumber frauds), and verification latency (only a small set of transactions are timely checked by investigators). However, the vast majority of learning algorithms that have been proposed for fraud detection rely on assumptions that hardly hold in a real-world fraud-detection system (FDS). This lack of realism concerns two main aspects: 1) the way and timing with which supervised information is provided and 2) the measures used to assess fraud-detection performance. This paper has three major contributions. First, we propose, with the help of our industrial partner, a formalization of the fraud-detection problem that realistically describes the operating conditions of FDSs that everyday analyze massive streams of credit card transactions. We also illustrate the most appropriate performance measures to be used for fraud-detection purposes. Second, we design and assess a novel learning strategy that effectively addresses class imbalance, concept drift, and verification latency. Third, in our experiments, we demonstrate the impact of class unbalance and concept drift in a real-world data stream containing more than 75 million transactions, authorized over a time window of three years.
Group practices explore EDI options.
McCormack, J
1999-04-01
Although physician groups have been relatively slow to take advantage of electronic commerce, more are discovering the benefits. Once group practice administrators get beyond their initial trepidation and realize that EDI is efficient, many are pleased with the results. And some are automating other transactions, including verifying patient eligibility for insurance coverage, gaining insurance authorization for referrals to specialists and checking the status of claims.
Profitability of simple technical trading rules of Chinese stock exchange indexes
NASA Astrophysics Data System (ADS)
Zhu, Hong; Jiang, Zhi-Qiang; Li, Sai-Ping; Zhou, Wei-Xing
2015-12-01
Although technical trading rules have been widely used by practitioners in financial markets, their profitability still remains controversial. We here investigate the profitability of moving average (MA) and trading range break (TRB) rules by using the Shanghai Stock Exchange Composite Index (SHCI) from May 21, 1992 through December 31, 2013 and Shenzhen Stock Exchange Component Index (SZCI) from April 3, 1991 through December 31, 2013. The t-test is adopted to check whether the mean returns which are conditioned on the trading signals are significantly different from unconditioned returns and whether the mean returns conditioned on the buy signals are significantly different from the mean returns conditioned on the sell signals. We find that TRB rules outperform MA rules and short-term variable moving average (VMA) rules outperform long-term VMA rules. By applying White's Reality Check test and accounting for the data snooping effects, we find that the best trading rule outperforms the buy-and-hold strategy when transaction costs are not taken into consideration. Once transaction costs are included, trading profits will be eliminated completely. Our analysis suggests that simple trading rules like MA and TRB cannot beat the standard buy-and-hold strategy for the Chinese stock exchange indexes.
Performance modeling for large database systems
NASA Astrophysics Data System (ADS)
Schaar, Stephen; Hum, Frank; Romano, Joe
1997-02-01
One of the unique approaches Science Applications International Corporation took to meet performance requirements was to start the modeling effort during the proposal phase of the Interstate Identification Index/Federal Bureau of Investigations (III/FBI) project. The III/FBI Performance Model uses analytical modeling techniques to represent the III/FBI system. Inputs to the model include workloads for each transaction type, record size for each record type, number of records for each file, hardware envelope characteristics, engineering margins and estimates for software instructions, memory, and I/O for each transaction type. The model uses queuing theory to calculate the average transaction queue length. The model calculates a response time and the resources needed for each transaction type. Outputs of the model include the total resources needed for the system, a hardware configuration, and projected inherent and operational availability. The III/FBI Performance Model is used to evaluate what-if scenarios and allows a rapid response to engineering change proposals and technical enhancements.
17 CFR 260.11b-4 - Definition of “cash transaction” in section 311(b)(4).
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Definition of âcash transactionâ in section 311(b)(4). 260.11b-4 Section 260.11b-4 Commodity and Securities Exchanges SECURITIES... securities sold is made within 7 days after delivery of the goods or securities in currency or in checks or...
ERIC Educational Resources Information Center
Marcovitz, Alan B., Ed.
Four computer programs written in FORTRAN and BASIC develop theoretical predictions and data reduction for a junior-senior level heat exchanger experiment. Programs may be used at the terminal in the laboratory to check progress of the experiment or may be used in the batch mode for interpretation of final information for a formal report. Several…
Energy reduction through voltage scaling and lightweight checking
NASA Astrophysics Data System (ADS)
Kadric, Edin
As the semiconductor roadmap reaches smaller feature sizes and the end of Dennard Scaling, design goals change, and managing the power envelope often dominates delay minimization. Voltage scaling remains a powerful tool to reduce energy. We find that it results in about 60% geomean energy reduction on top of other common low-energy optimizations with 22nm CMOS technology. However, when voltage is reduced, it becomes easier for noise and particle strikes to upset a node, potentially causing Silent Data Corruption (SDC). The 60% energy reduction, therefore, comes with a significant drop in reliability. Duplication with checking and triple-modular redundancy are traditional approaches used to combat transient errors, but spending 2--3x the energy for redundant computation can diminish or reverse the benefits of voltage scaling. As an alternative, we explore the opportunity to use checking operations that are cheaper than the base computation they are guarding. We devise a classification system for applications and their lightweight checking characteristics. In particular, we identify and evaluate the effectiveness of lightweight checks in a broad set of common tasks in scientific computing and signal processing. We find that the lightweight checks cost only a fraction of the base computation (0-25%) and allow us to recover the reliability losses from voltage scaling. Overall, we show about 50% net energy reduction without compromising reliability compared to operation at the nominal voltage. We use FPGAs (Field-Programmable Gate Arrays) in our work, although the same ideas can be applied to different systems. On top of voltage scaling, we explore other common low-energy techniques for FPGAs: transmission gates, gate boosting, power gating, low-leakage (high-Vth) processes, and dual-V dd architectures. We do not scale voltage for memories, so lower voltages help us reduce logic and interconnect energy, but not memory energy. At lower voltages, memories become dominant, and we get diminishing returns from continuing to scale voltage. To ensure that memories do not become a bottleneck, we also design an energy-robust FPGA memory architecture, which attempts to minimize communication energy due to mismatches between application and architecture. We do this alongside application parallelism tuning. We show our techniques on a wide range of applications, including a large real-time system used for Wide-Area Motion Imaging (WAMI).
Tuzovic, Sven; Kuppelwieser, Volker
2016-01-01
From retail health clinics and online appointment scheduling to (mobile) kiosks that enable patient check-in and automate the collection of copays and open balances, convenience has become an important topic in the health care sector over the last few years. While service convenience has also gained much interest in academia, one common limitation is that authors have adopted a "goods-centered" perspective focusing primarily on retail settings. Results of this exploratory study reveal that health care service convenience encompasses seven different dimensions: decision, access, scheduling, registration and check-in, transaction, care delivery, and postconsultation convenience. Implications and future research suggestions are discussed.
Protecting quantum memories using coherent parity check codes
NASA Astrophysics Data System (ADS)
Roffe, Joschka; Headley, David; Chancellor, Nicholas; Horsman, Dominic; Kendon, Viv
2018-07-01
Coherent parity check (CPC) codes are a new framework for the construction of quantum error correction codes that encode multiple qubits per logical block. CPC codes have a canonical structure involving successive rounds of bit and phase parity checks, supplemented by cross-checks to fix the code distance. In this paper, we provide a detailed introduction to CPC codes using conventional quantum circuit notation. We demonstrate the implementation of a CPC code on real hardware, by designing a [[4, 2, 2
BCH codes for large IC random-access memory systems
NASA Technical Reports Server (NTRS)
Lin, S.; Costello, D. J., Jr.
1983-01-01
In this report some shortened BCH codes for possible applications to large IC random-access memory systems are presented. These codes are given by their parity-check matrices. Encoding and decoding of these codes are discussed.
Understanding Memory Loss | NIH MedlinePlus the Magazine
... urine. She or he also checks your memory, problem solving, counting, and language skills. The doctor also may suggest a brain scan to show the normal and problem areas in the brain. Once the cause of ...
Low-density parity-check codes for volume holographic memory systems.
Pishro-Nik, Hossein; Rahnavard, Nazanin; Ha, Jeongseok; Fekri, Faramarz; Adibi, Ali
2003-02-10
We investigate the application of low-density parity-check (LDPC) codes in volume holographic memory (VHM) systems. We show that a carefully designed irregular LDPC code has a very good performance in VHM systems. We optimize high-rate LDPC codes for the nonuniform error pattern in holographic memories to reduce the bit error rate extensively. The prior knowledge of noise distribution is used for designing as well as decoding the LDPC codes. We show that these codes have a superior performance to that of Reed-Solomon (RS) codes and regular LDPC counterparts. Our simulation shows that we can increase the maximum storage capacity of holographic memories by more than 50 percent if we use irregular LDPC codes with soft-decision decoding instead of conventionally employed RS codes with hard-decision decoding. The performance of these LDPC codes is close to the information theoretic capacity.
Egocentric-updating during navigation facilitates episodic memory retrieval.
Gomez, Alice; Rousset, Stéphane; Baciu, Monica
2009-11-01
Influential models suggest that spatial processing is essential for episodic memory [O'Keefe, J., & Nadel, L. (1978). The hippocampus as a cognitive map. London: Oxford University Press]. However, although several types of spatial relations exist, such as allocentric (i.e. object-to-object relations), egocentric (i.e. static object-to-self relations) or egocentric updated on navigation information (i.e. self-to-environment relations in a dynamic way), usually only allocentric representations are described as potentially subserving episodic memory [Nadel, L., & Moscovitch, M. (1998). Hippocampal contributions to cortical plasticity. Neuropharmacology, 37(4-5), 431-439]. This study proposes to confront the allocentric representation hypothesis with an egocentric updated with self-motion representation hypothesis. In the present study, we explored retrieval performance in relation to these two types of spatial processing levels during learning. Episodic remembering has been assessed through Remember responses in a recall and in a recognition task, combined with a "Remember-Know-Guess" paradigm [Gardiner, J. M. (2001). Episodic memory and autonoetic consciousness: A first-person approach. Philosophical Transactions of the Royal Society B: Biological Sciences, 356(1413), 1351-1361] to assess the autonoetic level of responses. Our results show that retrieval performance was significantly higher when encoding was performed in the egocentric-updated condition. Although egocentric updated with self-motion and allocentric representations are not mutually exclusive, these results suggest that egocentric updating processing facilitates remember responses more than allocentric processing. The results are discussed according to Burgess and colleagues' model of episodic memory [Burgess, N., Becker, S., King, J. A., & O'Keefe, J. (2001). Memory for events and their spatial context: models and experiments. Philosophical Transactions of the Royal Society of London. Series B: Biological Sciences, 356(1413), 1493-1503].
Hopfield, J J
2008-05-01
The algorithms that simple feedback neural circuits representing a brain area can rapidly carry out are often adequate to solve easy problems but for more difficult problems can return incorrect answers. A new excitatory-inhibitory circuit model of associative memory displays the common human problem of failing to rapidly find a memory when only a small clue is present. The memory model and a related computational network for solving Sudoku puzzles produce answers that contain implicit check bits in the representation of information across neurons, allowing a rapid evaluation of whether the putative answer is correct or incorrect through a computation related to visual pop-out. This fact may account for our strong psychological feeling of right or wrong when we retrieve a nominal memory from a minimal clue. This information allows more difficult computations or memory retrievals to be done in a serial fashion by using the fast but limited capabilities of a computational module multiple times. The mathematics of the excitatory-inhibitory circuits for associative memory and for Sudoku, both of which are understood in terms of energy or Lyapunov functions, is described in detail.
Research on registration algorithm for check seal verification
NASA Astrophysics Data System (ADS)
Wang, Shuang; Liu, Tiegen
2008-03-01
Nowadays seals play an important role in China. With the development of social economy, the traditional method of manual check seal identification can't meet the need s of banking transactions badly. This paper focus on pre-processing and registration algorithm for check seal verification using theory of image processing and pattern recognition. First of all, analyze the complex characteristics of check seals. To eliminate the difference of producing conditions and the disturbance caused by background and writing in check image, many methods are used in the pre-processing of check seal verification, such as color components transformation, linearity transform to gray-scale image, medium value filter, Otsu, close calculations and labeling algorithm of mathematical morphology. After the processes above, the good binary seal image can be obtained. On the basis of traditional registration algorithm, a double-level registration method including rough and precise registration method is proposed. The deflection angle of precise registration method can be precise to 0.1°. This paper introduces the concepts of difference inside and difference outside and use the percent of difference inside and difference outside to judge whether the seal is real or fake. The experimental results of a mass of check seals are satisfied. It shows that the methods and algorithmic presented have good robustness to noise sealing conditions and satisfactory tolerance of difference within class.
A generalized memory test algorithm
NASA Technical Reports Server (NTRS)
Milner, E. J.
1982-01-01
A general algorithm for testing digital computer memory is presented. The test checks that (1) every bit can be cleared and set in each memory work, and (2) bits are not erroneously cleared and/or set elsewhere in memory at the same time. The algorithm can be applied to any size memory block and any size memory word. It is concise and efficient, requiring the very few cycles through memory. For example, a test of 16-bit-word-size memory requries only 384 cycles through memory. Approximately 15 seconds were required to test a 32K block of such memory, using a microcomputer having a cycle time of 133 nanoseconds.
ERIC Educational Resources Information Center
Banisaeid, Maryam
2013-01-01
The present study was conducted to compare the effect of memory and cognitive strategies training on vocabulary learning of intermediate proficiency group of Iranian learners of English as a foreign language. It is to check how memory and cognitive strategies training affect word learning of EFL intermediate learners (N = 60) who were homogenized…
Wang, Kang; Gu, Huaxi; Yang, Yintang; Wang, Kun
2015-08-10
With the number of cores increasing, there is an emerging need for a high-bandwidth low-latency interconnection network, serving core-to-memory communication. In this paper, aiming at the goal of simultaneous access to multi-rank memory, we propose an optical interconnection network for core-to-memory communication. In the proposed network, the wavelength usage is delicately arranged so that cores can communicate with different ranks at the same time and broadcast for flow control can be achieved. A distributed memory controller architecture that works in a pipeline mode is also designed for efficient optical communication and transaction address processes. The scaling method and wavelength assignment for the proposed network are investigated. Compared with traditional electronic bus-based core-to-memory communication, the simulation results based on the PARSEC benchmark show that the bandwidth enhancement and latency reduction are apparent.
NASA Technical Reports Server (NTRS)
1982-01-01
Barnett Banks of Florida, Inc. operates 150 banking offices in 80 Florida cities. Banking offices have computerized systems for processing deposits or withdrawals in checking/savings accounts, and for handling commercial and installment loan transactions. In developing a network engineering design for the terminals used in record processing, an affiliate, Barnett Computing Company, used COSMIC's STATCOM program. This program provided a reliable network design tool and avoided the cost of developing new software.
2016-07-08
Systems Using Automata Theory and Barrier Certifi- cates We developed a sound but incomplete method for the computational verification of specifications...method merges ideas from automata -based model checking with those from control theory including so-called barrier certificates and optimization-based... Automata theory meets barrier certificates: Temporal logic verification of nonlinear systems,” IEEE Transactions on Automatic Control, 2015. [J2] R
Smart Markets for Water Resources
NASA Astrophysics Data System (ADS)
Raffensperger, John
2017-04-01
Commercial water users often want to trade water, but their trades can hurt other users and the environment. So government has to check every transaction. This checking process is slow and expensive. That's why "free market" water trading doesn't work, especially with trading between a single buyer and a single seller. This talk will describe a water trading mechanism designed to solve these problems. The trading mechanism is called a "smart market". A smart market allows simultaneous many-to-many trades. It can reduce the transaction costs of water trading, while improving environmental outcomes. The smart market depends on a combination of recent technologies: hydrology simulation, computer power, and the Internet. Our smart market design uses standard hydrological models, user bids from a web page, and computer optimization to maximize the economic value of water while meeting all environmental constraints. Before the smart market can be implemented, however, users and the water agency must meet six critical prerequisites. These prerequisites may be viewed as simply good water management that should be done anyway. I will describe these prerequisites, and I will briefly discuss common arguments against water markets. This talk will be an abstract of a forthcoming book, "Smart Markets for Water Resources: A Manual for Implementation," by John F. Raffensperger and Mark W. Milke, from Springer Publishing.
14 CFR 121.315 - Cockpit check procedure.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Cockpit check procedure. 121.315 Section 121.315 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED... emergencies. The procedures must be designed so that a flight crewmember will not need to rely upon his memory...
Opportunities for nonvolatile memory systems in extreme-scale high-performance computing
Vetter, Jeffrey S.; Mittal, Sparsh
2015-01-12
For extreme-scale high-performance computing systems, system-wide power consumption has been identified as one of the key constraints moving forward, where DRAM main memory systems account for about 30 to 50 percent of a node's overall power consumption. As the benefits of device scaling for DRAM memory slow, it will become increasingly difficult to keep memory capacities balanced with increasing computational rates offered by next-generation processors. However, several emerging memory technologies related to nonvolatile memory (NVM) devices are being investigated as an alternative for DRAM. Moving forward, NVM devices could offer solutions for HPC architectures. Researchers are investigating how to integratemore » these emerging technologies into future extreme-scale HPC systems and how to expose these capabilities in the software stack and applications. In addition, current results show several of these strategies could offer high-bandwidth I/O, larger main memory capacities, persistent data structures, and new approaches for application resilience and output postprocessing, such as transaction-based incremental checkpointing and in situ visualization, respectively.« less
Cache directory look-up re-use as conflict check mechanism for speculative memory requests
Ohmacht, Martin
2013-09-10
In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.
ERP to chess stimuli reveal expert-novice differences in the amplitudes of N2 and P3 components.
Wright, Michael J; Gobet, Fernand; Chassy, Philippe; Ramchandani, Payal Nanik
2013-10-01
ERP experiments were conducted to analyze the underlying neural events when chess players make simple judgments of a board position. Fourteen expert players and 14 age-matched novices viewed, for each of four tasks, 128 unique positions on a mini (4 × 4) chess board each presented for 0.5 s. The tasks were to respond: (a) if white king was in check, (b) if black knight was present, (c) if white king was not in check, and (d) if no black knight was present. Experts showed an enhanced N2 with check targets and a larger P3 with knight targets, relative to novices. Expert-novice differences in posterior N2 began as early as 240 ms on check-related searches. Results were consistent with the view that prolonged N2 components reflect matching of current perceptual input to memory, and thus are sensitive to experts' superior pattern recognition and memory retrieval of chunks. Copyright © 2013 Society for Psychophysiological Research.
Fault-tolerant computer study. [logic designs for building block circuits
NASA Technical Reports Server (NTRS)
Rennels, D. A.; Avizienis, A. A.; Ercegovac, M. D.
1981-01-01
A set of building block circuits is described which can be used with commercially available microprocessors and memories to implement fault tolerant distributed computer systems. Each building block circuit is intended for VLSI implementation as a single chip. Several building blocks and associated processor and memory chips form a self checking computer module with self contained input output and interfaces to redundant communications buses. Fault tolerance is achieved by connecting self checking computer modules into a redundant network in which backup buses and computer modules are provided to circumvent failures. The requirements and design methodology which led to the definition of the building block circuits are discussed.
Taming the Viper: Software Upgrade for VFAUser and Viper
DOE Office of Scientific and Technical Information (OSTI.GOV)
DORIN,RANDALL T.; MOSER III,JOHN C.
2000-08-08
This report describes the procedure and properties of the software upgrade for the Vibration Performance Recorder. The upgrade will check the 20 memory cards for proper read/write operation. The upgrade was successfully installed and uploaded into the Viper and the field laptop. The memory checking routine must run overnight to complete the test, although the laptop need only be connected to the Viper unit until the downloading routine is finished. The routine has limited ability to recognize incomplete or corrupt header and footer files. The routine requires 400 Megabytes of free hard disk space. There is one minor technical flawmore » detailed in the conclusion.« less
Hardware for Accelerating N-Modular Redundant Systems for High-Reliability Computing
NASA Technical Reports Server (NTRS)
Dobbs, Carl, Sr.
2012-01-01
A hardware unit has been designed that reduces the cost, in terms of performance and power consumption, for implementing N-modular redundancy (NMR) in a multiprocessor device. The innovation monitors transactions to memory, and calculates a form of sumcheck on-the-fly, thereby relieving the processors of calculating the sumcheck in software
Proposal for an IT Security Standard for Preventing Tax Fraud in Cash Registers
NASA Astrophysics Data System (ADS)
Neuhaus, Mathias; Wolff, Jörg; Zisky, Norbert
This paper describes a technology solution for preventing tax fraud in electronic cash registers (ECR) and point of sale (POS) systems. The solution is based on electronic signatures, and as a result, any alterations to protected data will be detected. The signed transaction data can be stored on various electronic memory devices. Technical provisions enable the estimation of transaction volumes, even after tampering or loss of data. In this way the solution presented here differs significantly from other fiscal solutions where a pattern of approvals for ECRs and permanent technical supervision of the market is necessary. This paper is focused on the architecture, the protocols and the usability of the proposed system.
Program Model Checking: A Practitioner's Guide
NASA Technical Reports Server (NTRS)
Pressburger, Thomas T.; Mansouri-Samani, Masoud; Mehlitz, Peter C.; Pasareanu, Corina S.; Markosian, Lawrence Z.; Penix, John J.; Brat, Guillaume P.; Visser, Willem C.
2008-01-01
Program model checking is a verification technology that uses state-space exploration to evaluate large numbers of potential program executions. Program model checking provides improved coverage over testing by systematically evaluating all possible test inputs and all possible interleavings of threads in a multithreaded system. Model-checking algorithms use several classes of optimizations to reduce the time and memory requirements for analysis, as well as heuristics for meaningful analysis of partial areas of the state space Our goal in this guidebook is to assemble, distill, and demonstrate emerging best practices for applying program model checking. We offer it as a starting point and introduction for those who want to apply model checking to software verification and validation. The guidebook will not discuss any specific tool in great detail, but we provide references for specific tools.
Association Analysis with One Scan of Databases
2006-01-01
frequency list . 2. After the first and only scan of the database, we sort according to item supports. The restructure of the P- tree consists of similar...tree can be created in two steps: Step 1: Construct a P-tree and obtain the item frequency list . (1) Root (2) (3) For each transaction in...those infrequent items from item frequency list . Next, we prune the P-tree to exclude the infrequent nodes by checking the frequency of each node
Singer, Y
1997-08-01
A constant rebalanced portfolio is an asset allocation algorithm which keeps the same distribution of wealth among a set of assets along a period of time. Recently, there has been work on on-line portfolio selection algorithms which are competitive with the best constant rebalanced portfolio determined in hindsight (Cover, 1991; Helmbold et al., 1996; Cover and Ordentlich, 1996). By their nature, these algorithms employ the assumption that high returns can be achieved using a fixed asset allocation strategy. However, stock markets are far from being stationary and in many cases the wealth achieved by a constant rebalanced portfolio is much smaller than the wealth achieved by an ad hoc investment strategy that adapts to changes in the market. In this paper we present an efficient portfolio selection algorithm that is able to track a changing market. We also describe a simple extension of the algorithm for the case of a general transaction cost, including the transactions cost models recently investigated in (Blum and Kalai, 1997). We provide a simple analysis of the competitiveness of the algorithm and check its performance on real stock data from the New York Stock Exchange accumulated during a 22-year period. On this data, our algorithm outperforms all the algorithms referenced above, with and without transaction costs.
Efficient frequent pattern mining algorithm based on node sets in cloud computing environment
NASA Astrophysics Data System (ADS)
Billa, V. N. Vinay Kumar; Lakshmanna, K.; Rajesh, K.; Reddy, M. Praveen Kumar; Nagaraja, G.; Sudheer, K.
2017-11-01
The ultimate goal of Data Mining is to determine the hidden information which is useful in making decisions using the large databases collected by an organization. This Data Mining involves many tasks that are to be performed during the process. Mining frequent itemsets is the one of the most important tasks in case of transactional databases. These transactional databases contain the data in very large scale where the mining of these databases involves the consumption of physical memory and time in proportion to the size of the database. A frequent pattern mining algorithm is said to be efficient only if it consumes less memory and time to mine the frequent itemsets from the given large database. Having these points in mind in this thesis we proposed a system which mines frequent itemsets in an optimized way in terms of memory and time by using cloud computing as an important factor to make the process parallel and the application is provided as a service. A complete framework which uses a proven efficient algorithm called FIN algorithm. FIN algorithm works on Nodesets and POC (pre-order coding) tree. In order to evaluate the performance of the system we conduct the experiments to compare the efficiency of the same algorithm applied in a standalone manner and in cloud computing environment on a real time data set which is traffic accidents data set. The results show that the memory consumption and execution time taken for the process in the proposed system is much lesser than those of standalone system.
What Scientific Applications can Benefit from Hardware Transactional Memory?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schindewolf, M; Bihari, B; Gyllenhaal, J
2012-06-04
Achieving efficient and correct synchronization of multiple threads is a difficult and error-prone task at small scale and, as we march towards extreme scale computing, will be even more challenging when the resulting application is supposed to utilize millions of cores efficiently. Transactional Memory (TM) is a promising technique to ease the burden on the programmer, but only recently has become available on commercial hardware in the new Blue Gene/Q system and hence the real benefit for realistic applications has not been studied, yet. This paper presents the first performance results of TM embedded into OpenMP on a prototype systemmore » of BG/Q and characterizes code properties that will likely lead to benefits when augmented with TM primitives. We first, study the influence of thread count, environment variables and memory layout on TM performance and identify code properties that will yield performance gains with TM. Second, we evaluate the combination of OpenMP with multiple synchronization primitives on top of MPI to determine suitable task to thread ratios per node. Finally, we condense our findings into a set of best practices. These are applied to a Monte Carlo Benchmark and a Smoothed Particle Hydrodynamics method. In both cases an optimized TM version, executed with 64 threads on one node, outperforms a simple TM implementation. MCB with optimized TM yields a speedup of 27.45 over baseline.« less
A Cross-Cultural Multi-agent Model of Opportunism in Trade
NASA Astrophysics Data System (ADS)
Hofstede, Gert Jan; Jonker, Catholijn M.; Verwaart, Tim
According to transaction cost economics, contracts are always incomplete and offer opportunities to defect. Some level of trust is a sine qua non for trade. If the seller is better informed about product quality than the buyer, the buyer has to rely on information the seller provides or has to check the information by testing the product or tracing the supply chain processes, thus incurring extra transaction cost. An opportunistic seller who assumes the buyer to trust, may deliver a lower quality product than agreed upon. In human decisions to deceive and to show trust or distrust, issues like mutual expectations, shame, self-esteem, personality, and reputation are involved. These factors depend in part on traders' cultural background. This paper proposes an agent model of deceit and trust and describes a multi-agent simulation where trading agents are differentiated according to Hofstede's dimensions of national culture. Simulations of USA and Dutch trading situations are compared.
Modeling Criterion Shifts and Target Checking in Prospective Memory Monitoring
ERIC Educational Resources Information Center
Horn, Sebastian S.; Bayen, Ute J.
2015-01-01
Event-based prospective memory (PM) involves remembering to perform intended actions after a delay. An important theoretical issue is whether and how people monitor the environment to execute an intended action when a target event occurs. Performing a PM task often increases the latencies in ongoing tasks. However, little is known about the…
ERIC Educational Resources Information Center
Frawley, Timothy J.
2008-01-01
Children's perceptions of gender are greatly influenced by the illustrations/text they encounter in picture books. While transacting with authentic literature, children build gender schema that guide processing of subsequent information. This knowledge can bias memory to a point where children misremember or distort information to make it fit…
An Interdisciplinary Evaluation of Transactive Memory in Distributed Cyber Teams
ERIC Educational Resources Information Center
Mancuso, Vincent Francis
2012-01-01
In the modern workplace, collaboration is no longer only a face-to-face process. When working together, it is common for teams to rely on technology and operate across geographic, temporal and cultural boundaries. Most research, when looking at distributed teams, takes a uni-disciplinary perspective and fails to address the entire problem space.…
Strategic and Tactical Decision-Making Under Uncertainty
2006-01-03
message passing algorithms. In recent work we applied this method to the problem of joint decoding of a low-density parity-check ( LDPC ) code and a partial...Joint Decoding of LDPC Codes and Partial-Response Channels." IEEE Transactions on Communications. Vol. 54, No. 7, 1149-1153, 2006. P. Pakzad and V...Michael I. Jordan PAGES U U U SAPR 20 19b. TELEPHONE NUMBER (Include area code ) 510/642-3806 Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39.18
1987-08-25
Department Of Computer Science University Of Utah Salt Lake City, UT 84112 August 25, 1987 C IO ,c Acessin Tor i Ifl G I . DTIC ?T3 0 ummouned 0C0 Juxtil t...generated for each instance of an alternative operation. One procedure merits special attention. CheckAndCommit(AltListr, g ): INTEGER is called by process P...in figure 2. CheckAndCommit uses a procedure CheckGuard(AltListr, g ): INTEGER that scans th, remote alternative list AltList7 looking for a matching
The memory remains: Understanding collective memory in the digital age
García-Gavilanes, Ruth; Mollgaard, Anders; Tsvetkova, Milena; Yasseri, Taha
2017-01-01
Recently developed information communication technologies, particularly the Internet, have affected how we, both as individuals and as a society, create, store, and recall information. The Internet also provides us with a great opportunity to study memory using transactional large-scale data in a quantitative framework similar to the practice in natural sciences. We make use of online data by analyzing viewership statistics of Wikipedia articles on aircraft crashes. We study the relation between recent events and past events and particularly focus on understanding memory-triggering patterns. We devise a quantitative model that explains the flow of viewership from a current event to past events based on similarity in time, geography, topic, and the hyperlink structure of Wikipedia articles. We show that, on average, the secondary flow of attention to past events generated by these remembering processes is larger than the primary attention flow to the current event. We report these previously unknown cascading effects. PMID:28435881
The memory remains: Understanding collective memory in the digital age.
García-Gavilanes, Ruth; Mollgaard, Anders; Tsvetkova, Milena; Yasseri, Taha
2017-04-01
Recently developed information communication technologies, particularly the Internet, have affected how we, both as individuals and as a society, create, store, and recall information. The Internet also provides us with a great opportunity to study memory using transactional large-scale data in a quantitative framework similar to the practice in natural sciences. We make use of online data by analyzing viewership statistics of Wikipedia articles on aircraft crashes. We study the relation between recent events and past events and particularly focus on understanding memory-triggering patterns. We devise a quantitative model that explains the flow of viewership from a current event to past events based on similarity in time, geography, topic, and the hyperlink structure of Wikipedia articles. We show that, on average, the secondary flow of attention to past events generated by these remembering processes is larger than the primary attention flow to the current event. We report these previously unknown cascading effects.
Resource Management Scheme Based on Ubiquitous Data Analysis
Lee, Heung Ki; Jung, Jaehee
2014-01-01
Resource management of the main memory and process handler is critical to enhancing the system performance of a web server. Owing to the transaction delay time that affects incoming requests from web clients, web server systems utilize several web processes to anticipate future requests. This procedure is able to decrease the web generation time because there are enough processes to handle the incoming requests from web browsers. However, inefficient process management results in low service quality for the web server system. Proper pregenerated process mechanisms are required for dealing with the clients' requests. Unfortunately, it is difficult to predict how many requests a web server system is going to receive. If a web server system builds too many web processes, it wastes a considerable amount of memory space, and thus performance is reduced. We propose an adaptive web process manager scheme based on the analysis of web log mining. In the proposed scheme, the number of web processes is controlled through prediction of incoming requests, and accordingly, the web process management scheme consumes the least possible web transaction resources. In experiments, real web trace data were used to prove the improved performance of the proposed scheme. PMID:25197692
Jang, Joon Hwan; Kim, Hee Sun; Ha, Tae Hyon; Shin, Na Young; Kang, Do-Hyung; Choi, Jung-Seok; Ha, Kyooseob; Kwon, Jun Soo
2010-12-30
Recent acceptance that obsessive-compulsive disorder (OCD) represents a heterogeneous phenomenon has underscored the need for dimensional approaches to this disorder. However little is known about the relation between neuropsychological functions and symptom dimensions. The purpose of this study was to identify the cognitive deficits correlated with specific symptom dimensions. Thirteen categories in the Yale-Brown Obsessive Compulsive Scale symptom checklist from 144 patients with OCD were analyzed by principal component analysis. Correlations between identified symptom dimensions and neuropsychological functioning, measured by the Boston Qualitative Scoring System, were analyzed. Five factors or dimensions were identified: contamination/cleaning, hoarding, symmetry/ordering, obsessions/checking, and repeating/counting. Dysfunctions in nonverbal memory and organizational strategies were related to the symmetry/ordering dimension and the obsessions/checking dimension, respectively. The results of the present study support a transculturally stable symptom structure for OCD. They also suggest the possibility that nonverbal memory dysfunction and organizational impairment are mediated by distinct obsessive-compulsive dimensions. Copyright © 2010 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wojahn, Christopher K.
2015-10-20
This HDL code (hereafter referred to as "software") implements circuitry in Xilinx Virtex-5QV Field Programmable Gate Array (FPGA) hardware. This software allows the device to self-check the consistency of its own configuration memory for radiation-induced errors. The software then provides the capability to correct any single-bit errors detected in the memory using the device's inherent circuitry, or reload corrupted memory frames when larger errors occur that cannot be corrected with the device's built-in error correction and detection scheme.
Wavelet-based associative memory
NASA Astrophysics Data System (ADS)
Jones, Katharine J.
2004-04-01
Faces provide important characteristics of a person"s identification. In security checks, face recognition still remains the method in continuous use despite other approaches (i.e. fingerprints, voice recognition, pupil contraction, DNA scanners). With an associative memory, the output data is recalled directly using the input data. This can be achieved with a Nonlinear Holographic Associative Memory (NHAM). This approach can also distinguish between strongly correlated images and images that are partially or totally enclosed by others. Adaptive wavelet lifting has been used for Content-Based Image Retrieval. In this paper, adaptive wavelet lifting will be applied to face recognition to achieve an associative memory.
An Incremental High-Utility Mining Algorithm with Transaction Insertion
Gan, Wensheng; Zhang, Binbin
2015-01-01
Association-rule mining is commonly used to discover useful and meaningful patterns from a very large database. It only considers the occurrence frequencies of items to reveal the relationships among itemsets. Traditional association-rule mining is, however, not suitable in real-world applications since the purchased items from a customer may have various factors, such as profit or quantity. High-utility mining was designed to solve the limitations of association-rule mining by considering both the quantity and profit measures. Most algorithms of high-utility mining are designed to handle the static database. Fewer researches handle the dynamic high-utility mining with transaction insertion, thus requiring the computations of database rescan and combination explosion of pattern-growth mechanism. In this paper, an efficient incremental algorithm with transaction insertion is designed to reduce computations without candidate generation based on the utility-list structures. The enumeration tree and the relationships between 2-itemsets are also adopted in the proposed algorithm to speed up the computations. Several experiments are conducted to show the performance of the proposed algorithm in terms of runtime, memory consumption, and number of generated patterns. PMID:25811038
Internet cigarette vendor compliance with credit card payment and shipping bans.
Williams, Rebecca S; Ribisl, Kurt M
2014-02-01
Most Internet cigarette sales have violated taxation and youth access laws, leading to landmark 2005 agreements with credit card companies, PayPal, and private shippers (United Parcel Service, Federal Express, DHL) to cease participation in these transactions. Despite their promise at the time, loopholes allowed for check payment and U.S. Postal Service (USPS) shipping. This study assessed actual vendor compliance with the payment and shipping bans using a purchase survey. In late 2007 and early 2008, an adult buyer attempted to order cigarettes from the 97 most popular Internet cigarette vendors (ICVs) using banned payment and shipping methods. When banned payment or shipping methods were unavailable, purchases were attempted with alternate methods (e.g., checks, e-checks, USPS). Twenty-seven of 100 orders were placed with (banned) credit cards; 23 were successfully received. Seventy-one orders were placed with checks (60 successfully received). Four orders were delivered using banned shippers; 79 of 83 successfully received orders were delivered by the USPS. About a quarter of ICVs violated the payment ban, others adapted by accepting checks. Most vendors complied with the shipping ban, perhaps because USPS was an easy substitute shipping option. Better enforcement of the bans is needed; the 2009 Prevent All Cigarette Trafficking Act closed the USPS loophole by making cigarettes nonmailable material; evaluation of enforcement efforts and adaptations by vendors are needed. These sorts of bans are a promising approach to controlling the sale of restricted goods online.
NASA Astrophysics Data System (ADS)
Chen, Jing-Chao; Zhou, Yu; Wang, Xi
2018-02-01
Technical trading rules have been widely used by practitioners in financial markets for a long time. The profitability remains controversial and few consider the stationarity of technical indicators used in trading rules. We convert MA, KDJ and Bollinger bands into stationary processes and investigate the profitability of these trading rules by using 3 high-frequency data(15s,30s and 60s) of CSI300 Stock Index Futures from January 4th 2012 to December 31st 2016. Several performance and risk measures are adopted to assess the practical value of all trading rules directly while ADF-test is used to verify the stationarity and SPA test to check whether trading rules perform well due to intrinsic superiority or pure luck. The results show that there are several significant combinations of parameters for each indicator when transaction costs are not taken into consideration. Once transaction costs are included, trading profits will be eliminated completely. We also propose a method to reduce the risk of technical trading rules.
Spatiotemporal Patterns of Urban Human Mobility
NASA Astrophysics Data System (ADS)
Hasan, Samiul; Schneider, Christian M.; Ukkusuri, Satish V.; González, Marta C.
2013-04-01
The modeling of human mobility is adopting new directions due to the increasing availability of big data sources from human activity. These sources enclose digital information about daily visited locations of a large number of individuals. Examples of these data include: mobile phone calls, credit card transactions, bank notes dispersal, check-ins in internet applications, among several others. In this study, we consider the data obtained from smart subway fare card transactions to characterize and model urban mobility patterns. We present a simple mobility model for predicting peoples' visited locations using the popularity of places in the city as an interaction parameter between different individuals. This ingredient is sufficient to reproduce several characteristics of the observed travel behavior such as: the number of trips between different locations in the city, the exploration of new places and the frequency of individual visits of a particular location. Moreover, we indicate the limitations of the proposed model and discuss open questions in the current state of the art statistical models of human mobility.
Experimental realization of quantum cheque using a five-qubit quantum computer
NASA Astrophysics Data System (ADS)
Behera, Bikash K.; Banerjee, Anindita; Panigrahi, Prasanta K.
2017-12-01
Quantum cheques could be a forgery-free way to make transaction in a quantum networked banking system with perfect security against any no-signalling adversary. Here, we demonstrate the implementation of quantum cheque, proposed by Moulick and Panigrahi (Quantum Inf Process 15:2475-2486, 2016), using the five-qubit IBM quantum computer. Appropriate single qubit, CNOT and Fredkin gates are used in an optimized configuration. The accuracy of implementation is checked and verified through quantum state tomography by comparing results from the theoretical and experimental density matrices.
Adaptive Backoff Synchronization Techniques
1989-07-01
The Simple Code. Technical Report, Lawrence Livermore Laboratory, February 1978. [6] F. Darems-Rogers, D. A. George, V. A. Norton, and G . F. Pfister...Heights, November 1986. 20 [7] Daniel Gajski , David Kuck, Duncan Lawrie, and Ahmed Saleh. Cedar - A Large Scale Multiprocessor. In International...17] Janak H. Patel. Analysis of Multiprocessors with Private Cache Memories. IEEE Transactions on Com- puters, C-31(4):296-304, April 1982. [18] G
Making the most of a translator.
Dannenfeldt, D
1994-01-01
Anaheim Memorial Hospital in California is a trailblazer. It's one of the first hospitals in the nation to use translation software for both supply procurement and claims-related transactions. Initially, it acquired the software to streamline the ordering of supplies by shifting to standard electronic formats. Today, the hospital is using the software to receive electronic remittance advice, and it has plans for other labor-saving applications.
Conditional load and store in a shared memory
Blumrich, Matthias A; Ohmacht, Martin
2015-02-03
A method, system and computer program product for implementing load-reserve and store-conditional instructions in a multi-processor computing system. The computing system includes a multitude of processor units and a shared memory cache, and each of the processor units has access to the memory cache. In one embodiment, the method comprises providing the memory cache with a series of reservation registers, and storing in these registers addresses reserved in the memory cache for the processor units as a result of issuing load-reserve requests. In this embodiment, when one of the processor units makes a request to store data in the memory cache using a store-conditional request, the reservation registers are checked to determine if an address in the memory cache is reserved for that processor unit. If an address in the memory cache is reserved for that processor, the data are stored at this address.
Modeling of a bubble-memory organization with self-checking translators to achieve high reliability.
NASA Technical Reports Server (NTRS)
Bouricius, W. G.; Carter, W. C.; Hsieh, E. P.; Wadia, A. B.; Jessep, D. C., Jr.
1973-01-01
Study of the design and modeling of a highly reliable bubble-memory system that has the capabilities of: (1) correcting a single 16-adjacent bit-group error resulting from failures in a single basic storage module (BSM), and (2) detecting with a probability greater than 0.99 any double errors resulting from failures in BSM's. The results of the study justify the design philosophy adopted of employing memory data encoding and a translator to correct single group errors and detect double group errors to enhance the overall system reliability.
NASA Astrophysics Data System (ADS)
Sakaki, Yukiya; Yamada, Tomoaki; Matsui, Chihiro; Yamaga, Yusuke; Takeuchi, Ken
2018-04-01
In order to improve performance of solid-state drives (SSDs), hybrid SSDs have been proposed. Hybrid SSDs consist of more than two types of NAND flash memories or NAND flash memories and storage-class memories (SCMs). However, the cost of hybrid SSDs adopting SCMs is more expensive than that of NAND flash only SSDs because of the high bit cost of SCMs. This paper proposes unique hybrid SSDs with two-dimensional (2D) horizontal multi-level cell (MLC)/three-dimensional (3D) vertical triple-level cell (TLC) NAND flash memories to achieve higher cost-performance. The 2D-MLC/3D-TLC hybrid SSD achieves up to 31% higher performance than the conventional 2D-MLC/2D-TLC hybrid SSD. The factors of different performance between the proposed hybrid SSD and the conventional hybrid SSD are analyzed by changing its block size, read/write/erase latencies, and write unit of 3D-TLC NAND flash memory, by means of a transaction-level modeling simulator.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartlett, Roscoe Ainsworth
2010-05-01
The ubiquitous use of raw pointers in higher-level code is the primary cause of all memory usage problems and memory leaks in C++ programs. This paper describes what might be considered a radical approach to the problem which is to encapsulate the use of all raw pointers and all raw calls to new and delete in higher-level C++ code. Instead, a set of cooperating template classes developed in the Trilinos package Teuchos are used to encapsulate every use of raw C++ pointers in every use case where it appears in high-level code. Included in the set of memory management classesmore » is the typical reference-counted smart pointer class similar to boost::shared ptr (and therefore C++0x std::shared ptr). However, what is missing in boost and the new standard library are non-reference counted classes for remaining use cases where raw C++ pointers would need to be used. These classes have a debug build mode where nearly all programmer errors are caught and gracefully reported at runtime. The default optimized build mode strips all runtime checks and allows the code to perform as efficiently as raw C++ pointers with reasonable usage. Also included is a novel approach for dealing with the circular references problem that imparts little extra overhead and is almost completely invisible to most of the code (unlike the boost and therefore C++0x approach). Rather than being a radical approach, encapsulating all raw C++ pointers is simply the logical progression of a trend in the C++ development and standards community that started with std::auto ptr and is continued (but not finished) with std::shared ptr in C++0x. Using the Teuchos reference-counted memory management classes allows one to remove unnecessary constraints in the use of objects by removing arbitrary lifetime ordering constraints which are a type of unnecessary coupling [23]. The code one writes with these classes will be more likely to be correct on first writing, will be less likely to contain silent (but deadly) memory usage errors, and will be much more robust to later refactoring and maintenance. The level of debug-mode runtime checking provided by the Teuchos memory management classes is stronger in many respects than what is provided by memory checking tools like Valgrind and Purify while being much less expensive. However, tools like Valgrind and Purify perform a number of types of checks (like usage of uninitialized memory) that makes these tools very valuable and therefore complement the Teuchos memory management debug-mode runtime checking. The Teuchos memory management classes and idioms largely address the technical issues in resolving the fragile built-in C++ memory management model (with the exception of circular references which has no easy solution but can be managed as discussed). All that remains is to teach these classes and idioms and expand their usage in C++ codes. The long-term viability of C++ as a usable and productive language depends on it. Otherwise, if C++ is no safer than C, then is the greater complexity of C++ worth what one gets as extra features? Given that C is smaller and easier to learn than C++ and since most programmers don't know object-orientation (or templates or X, Y, and Z features of C++) all that well anyway, then what really are most programmers getting extra out of C++ that would outweigh the extra complexity of C++ over C? C++ zealots will argue this point but the reality is that C++ popularity has peaked and is becoming less popular while the popularity of C has remained fairly stable over the last decade22. Idioms like are advocated in this paper can help to avert this trend but it will require wide community buy-in and a change in the way C++ is taught in order to have the greatest impact. To make these programs more secure, compiler vendors or static analysis tools (e.g. klocwork23) could implement a preprocessor-like language similar to OpenMP24 that would allow the programmer to declare (in comments) that certain blocks of code should be ''pointer-free'' or allow smaller blocks to be 'pointers allowed'. This would significantly improve the robustness of code that uses the memory management classes described here.« less
Multi-petascale highly efficient parallel supercomputer
DOE Office of Scientific and Technical Information (OSTI.GOV)
Asaad, Sameh; Bellofatto, Ralph E.; Blocksome, Michael A.
A Multi-Petascale Highly Efficient Parallel Supercomputer of 100 petaflop-scale includes node architectures based upon System-On-a-Chip technology, where each processing node comprises a single Application Specific Integrated Circuit (ASIC). The ASIC nodes are interconnected by a five dimensional torus network that optimally maximize the throughput of packet communications between nodes and minimize latency. The network implements collective network and a global asynchronous network that provides global barrier and notification functions. Integrated in the node design include a list-based prefetcher. The memory system implements transaction memory, thread level speculation, and multiversioning cache that improves soft error rate at the same time andmore » supports DMA functionality allowing for parallel processing message-passing.« less
Adaptive Backoff Synchronization Techniques
1989-06-01
The Simple Code. Technical Report, Lawrence Livermore Laboratory, February 1978. [6J F. Darems-Rogers, D. A. George, V. A. Norton, and G . F. Pfister...Heights, November 1986. 20 [7] Daniel Gajski , David Kuck, Duncan Lawrie, and Ahmed Saleh. Cedar - A Large Scale Multiprocessor. In International Conference...17] Janak H. Patel. Analysis of Multiprocessors with Private Cache Memories. IEEE Transactions on Com- puters, C-31(4):296-304, April 1982. [18] G
A cache-aided multiprocessor rollback recovery scheme
NASA Technical Reports Server (NTRS)
Wu, Kun-Lung; Fuchs, W. Kent
1989-01-01
This paper demonstrates how previous uniprocessor cache-aided recovery schemes can be applied to multiprocessor architectures, for recovering from transient processor failures, utilizing private caches and a global shared memory. As with cache-aided uniprocessor recovery, the multiprocessor cache-aided recovery scheme of this paper can be easily integrated into standard bus-based snoopy cache coherence protocols. A consistent shared memory state is maintained without the necessity of global check-pointing.
Sleep Deprivation and Time-Based Prospective Memory.
Esposito, Maria José; Occhionero, Miranda; Cicogna, PierCarla
2015-11-01
To evaluate the effect of sleep deprivation on time-based prospective memory performance, that is, realizing delayed intentions at an appropriate time in the future (e.g., to take a medicine in 30 minutes). Between-subjects experimental design. The experimental group underwent 24 h of total sleep deprivation, and the control group had a regular sleep-wake cycle. Participants were tested at 08:00. Laboratory. Fifty healthy young adults (mean age 22 ± 2.1, 31 female). 24 h of total sleep deprivation. Participants were monitored by wrist actigraphy for 3 days before the experimental session. The following cognitive tasks were administered: one time-based prospective memory task and 3 reasoning tasks as ongoing activity. Objective and subjective vigilance was assessed by the psychomotor vigilance task and a visual analog scale, respectively. To measure the time-based prospective memory task we assessed compliance and clock checking behavior (time monitoring). Sleep deprivation negatively affected time-based prospective memory compliance (P < 0.001), objective vigilance (mean RT: P < 0.001; slowest 10% RT: P < 0.001; lapses: P < 0.005), and subjective vigilance (P < 0.0001). Performance on reasoning tasks and time monitoring behavior did not differ between groups. The results highlight the potential dangerous effects of total sleep deprivation on human behavior, particularly the ability to perform an intended action after a few minutes. Sleep deprivation strongly compromises time-based prospective memory compliance but does not affect time check frequency. Sleep deprivation may impair the mechanism that allows the integration of information related to time monitoring with the prospective intention. © 2015 Associated Professional Sleep Societies, LLC.
Programmable stream prefetch with resource optimization
Boyle, Peter; Christ, Norman; Gara, Alan; Mawhinney, Robert; Ohmacht, Martin; Sugavanam, Krishnan
2013-01-08
A stream prefetch engine performs data retrieval in a parallel computing system. The engine receives a load request from at least one processor. The engine evaluates whether a first memory address requested in the load request is present and valid in a table. The engine checks whether there exists valid data corresponding to the first memory address in an array if the first memory address is present and valid in the table. The engine increments a prefetching depth of a first stream that the first memory address belongs to and fetching a cache line associated with the first memory address from the at least one cache memory device if there is not yet valid data corresponding to the first memory address in the array. The engine determines whether prefetching of additional data is needed for the first stream within its prefetching depth. The engine prefetches the additional data if the prefetching is needed.
Realization of Quantum Digital Signatures without the Requirement of Quantum Memory
NASA Astrophysics Data System (ADS)
Collins, Robert J.; Donaldson, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.
2014-07-01
Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, security against forging relies on the impossibility of perfectly distinguishing between nonorthogonal quantum states. A serious drawback of previous quantum digital signature schemes is that they require long-term quantum memory, making them impractical at present. We present the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors. In our realization, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination. This significantly advances quantum digital signatures as a quantum technology with potential for real applications.
Realization of quantum digital signatures without the requirement of quantum memory.
Collins, Robert J; Donaldson, Ross J; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J; Andersson, Erika; Jeffers, John; Buller, Gerald S
2014-07-25
Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, security against forging relies on the impossibility of perfectly distinguishing between nonorthogonal quantum states. A serious drawback of previous quantum digital signature schemes is that they require long-term quantum memory, making them impractical at present. We present the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors. In our realization, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination. This significantly advances quantum digital signatures as a quantum technology with potential for real applications.
When to use the emergency room - adult
... what you should do. Your provider or health insurance company may also offer a nurse telephone advice hotline. ... choices are. Check the website of your health insurance company. Put these telephone numbers in the memory of ...
ACS Science Data Buffer Check/Self-Tests for CS Buffer RAM and MIE RAM
NASA Astrophysics Data System (ADS)
Balzano, V.
2001-07-01
The ACS Science Buffer RAM is checked for bit flips during SAA passages. This is followed by a Control Section {CS} self-test consisting of writing/reading a specified bit pattern from each memory location in Buffer RAM and a similar test for MIE RAM. The MIE must be placed in BOOT mode for its self-test. The CS Buffer RAM self-test as well as the bit flip tests are all done with the CS in Operate.
COS Side 2 Science Data Buffer Check/Self-Tests for CS Buffer RAM and DIB RAM
NASA Astrophysics Data System (ADS)
Bacinski, John
2013-10-01
The COS Science Buffer RAM is checked for bit flips during SAA passages. This is followed by a Control Section {CS} self-test consisting of writing/reading a specified bit pattern from each memory location in Buffer RAM and a similar test for DIB RAM. The DIB must be placed in BOOT mode for its self-test. The CS Buffer RAM self-test as well as the bit flip tests are all done with the CS in Operate.
ACS Science Data Buffer Check/Self-Tests for CS Buffer RAM and MIE RAM
NASA Astrophysics Data System (ADS)
Welty, Alan
2005-07-01
The ACS Science Buffer RAM is checked for bit flips during SAA passages. Thisis followed by a Control Section {CS} self-test consisting of writing/reading a specified bit pattern from each memory location in Buffer RAM and a similar test for MIE RAM. The MIE must be placed in BOOT mode for its self-test. The CS Buffer RAM self-test as well as the bit flip tests are all done with the CS in Operate.
Monitoring Blood Sugar: The Importance of Checking Blood Sugar Levels
... more portable sizes. Other features may include memory storage and the ability to record other information like ... for ketones , chemicals that show up in the urine (pee) and blood after the body breaks down ...
A fractal comparison of real and Austrian business cycle models
NASA Astrophysics Data System (ADS)
Mulligan, Robert F.
2010-06-01
Rescaled range and power spectral density analysis are applied to examine a diverse set of macromonetary data for fractal character and stochastic dependence. Fractal statistics are used to evaluate two competing models of the business cycle, Austrian business cycle theory and real business cycle theory. Strong evidence is found for antipersistent stochastic dependence in transactions money (M1) and components of the monetary aggregates most directly concerned with transactions, which suggests an activist monetary policy. Savings assets exhibit persistent long memory, as do those monetary aggregates which include savings assets, such as savings money (M2), M2 minus small time deposits, and money of zero maturity (MZM). Virtually all measures of economic activity display antipersistence, and this finding is invariant to whether the measures are adjusted for inflation, including real gross domestic product, real consumption expenditures, real fixed private investment, and labor productivity. This strongly disconfirms real business cycle theory.
The criminal purchase of firearm ammunition.
Tita, G E; Braga, A A; Ridgeway, G; Pierce, G L
2006-10-01
Laws that prohibit certain individuals from owning firearms also pertain to ammunition. Whereas retail sales of firearms to criminals are regularly disrupted by instant background checks, sales of ammunition are essentially unchecked and the rate at which criminals acquire ammunition is unknown. This research describes the ammunition market and estimates the rate at which criminals are acquiring ammunition. Criminal background checks conducted on individuals purchasing ammunition in the City of Los Angeles in April and May 2004. Los Angeles, CA, USA. Ammunition purchasers. Criminal activity that prohibits one from owning, purchasing, or possessing ammunition. 2.6% (95% CI 1.9% to 3.2%) of ammunition purchasers had a prior felony conviction or another condition that prohibited them from possessing ammunition. During the study period prohibited possessors purchased 10,050 rounds of ammunition in Los Angeles. These estimates suggest that monitoring ammunition transactions may help reduce the supply of ammunition to criminals and the frequency of injuries from felonious gun assaults. Such a record can also provide information for generating leads on illegal firearm possession.
Formal Specification and Analysis of Cloud Computing Management
2012-01-24
te r Cloud Computing in a Nutshell We begin this introduction to Cloud Computing with a famous quote by Larry Ellison: “The interesting thing about...the wording of some of our ads.” — Larry Ellison, Oracle CEO [106] In view of this statement, we summarize the essential aspects of Cloud Computing...1] M. Abadi, M. Burrows , M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. ACM Transactions on Internet Technology, 5(2):299–327
Virtual Machine-level Software Transactional Memory: Principles, Techniques, and Implementation
2015-08-13
against non-VM STMs, with the same algorithm inside the VM versus “outside”it. Our competitor non-VM STMs include Deuce, ObjectFabric, Multiverse , and...TL2 ByteSTM/NOrec Non-VM/NOrec Deuce/TL2 Object Fabric Multiverse JVSTM (a) 20% writes. (b) 80% writes. Fig. 1 Throughput for Linked-List. Higher is...When Scalability Meets Consistency: Genuine Multiversion Update-Serializable Partial Data Replication. In ICDCS, pages 455–465, 2012. [34] D
Cache Coherence Protocols for Large-Scale Multiprocessors
1990-09-01
and is compared with the other protocols for large-scale machines. In later analysis, this coherence method is designated by the acronym OCPD , which...private read misses 2 6 6 ( OCPD ) private write misses 2 6 6 Table 4.2: Transaction Types and Costs. the performance of the memory system. These...methodologies. Figure 4-2 shows the processor utiliza- tions of the Weather program, with special code in the dyn-nic post-mortem sched- 94 OCPD DlrINB
Naval Postgraduate School Research. Volume 9, Number 3, October 1999
1999-10-01
this effort so far. It is an exciting field. “ Quantum computers are the atomic bomb of the information age ,” according to Professor Baer, “ but it...Transactions on Image Processing, Octo- ber 1999 R. Hippenstiel and U. Aktas, “Difference of Arrival Estimation Using Wavelet Transforms,” 42nd Midwest...Electronic Warfare Conference Naval Air Warfare Center (SECRET) 23-24 Jun 00 Thirty-Fifth Annual Colonel Allyn D. Burke Memorial U.S. Army Dental Symposium
Measuring cognition in teams: a cross-domain review.
Wildman, Jessica L; Salas, Eduardo; Scott, Charles P R
2014-08-01
The purpose of this article is twofold: to provide a critical cross-domain evaluation of team cognition measurement options and to provide novice researchers with practical guidance when selecting a measurement method. A vast selection of measurement approaches exist for measuring team cognition constructs including team mental models, transactive memory systems, team situation awareness, strategic consensus, and cognitive processes. Empirical studies and theoretical articles were reviewed to identify all of the existing approaches for measuring team cognition. These approaches were evaluated based on theoretical perspective assumed, constructs studied, resources required, level of obtrusiveness, internal consistency reliability, and predictive validity. The evaluations suggest that all existing methods are viable options from the point of view of reliability and validity, and that there are potential opportunities for cross-domain use. For example, methods traditionally used only to measure mental models may be useful for examining transactive memory and situation awareness. The selection of team cognition measures requires researchers to answer several key questions regarding the theoretical nature of team cognition and the practical feasibility of each method. We provide novice researchers with guidance regarding how to begin the search for a team cognition measure and suggest several new ideas regarding future measurement research. We provide (1) a broad overview and evaluation of existing team cognition measurement methods, (2) suggestions for new uses of those methods across research domains, and (3) critical guidance for novice researchers looking to measure team cognition.
[Advanced information technologies for financial services industry]. Final report
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
The project scope is to develop an advanced user interface utilizing speech and/or handwriting recognition technology that will improve the accuracy and speed of recording transactions in the dynamic environment of a foreign exchange (FX) trading floor. The project`s desired result is to improve the base technology for trader`s workstations on FX trading floors. Improved workstation effectiveness will allow vast amounts of complex information and events to be presented and analyzed, thus increasing the volume of money and other assets to be exchanged at an accelerated rate. The project scope is to develop and demonstrate technologies that advance interbank checkmore » imaging and paper check truncation. The following describes the tasks to be completed: (1) Identify the economics value case, the legal and regulatory issues, the business practices that are affected, and the effects upon settlement. (2) Familiarization with existing imaging technology. Develop requirements for image quality, security, and interoperability. Adapt existing technologies to meet requirements. (3) Define requirements for the imaging laboratory and design its architecture. Integrate and test technology from task 2 with equipment in the laboratory. (4) Develop and/or integrate and test remaining components; includes security, storage, and communications. (5) Build a prototype system and test in a laboratory. Install and run in two or more banks. Develop documentation. Conduct training. The project`s desired result is to enable a proof-of-concept trial in which multiple banks will exchange check images, exhibiting operating conditions which a check experiences as it travels through the payments/clearing system. The trial should demonstrate the adequacy of digital check images instead of paper checks.« less
Crosstalk eliminating and low-density parity-check codes for photochromic dual-wavelength storage
NASA Astrophysics Data System (ADS)
Wang, Meicong; Xiong, Jianping; Jian, Jiqi; Jia, Huibo
2005-01-01
Multi-wavelength storage is an approach to increase the memory density with the problem of crosstalk to be deal with. We apply Low Density Parity Check (LDPC) codes as error-correcting codes in photochromic dual-wavelength optical storage based on the investigation of LDPC codes in optical data storage. A proper method is applied to reduce the crosstalk and simulation results show that this operation is useful to improve Bit Error Rate (BER) performance. At the same time we can conclude that LDPC codes outperform RS codes in crosstalk channel.
COS Science Data Buffer Check/Self-Tests for CS Buffer RAM and DIB RAM
NASA Astrophysics Data System (ADS)
Welty, Alan
2009-07-01
The COS Science Buffer RAM is checked for bit flips during SAA passages. This is followed by a Control Section {CS} self-test consisting of writing/reading a specified bit pattern from each memory location in Buffer RAM and a similar test for DIB RAM. The DIB must be placed in BOOT mode for its self-test. The CS Buffer RAM self-test as well as the bit flip tests are all done with the CS in Operate.Supports Activity COS-03
1987-06-01
shared variables. This will be discussed later. One procedure merits special attention. CheckAndCommit(m, g ,): INTEGER is called by process P, (I...denotes the local process) to check that "valid" communications can take place between P, using guard g , and Pm (m denotes the remote process). If so, P...local guard gi. By matching we mean gj contains an 1/O operation with P. By compatible we mean g , and gj do not both contain input (output) commands
State recovery and lockstep execution restart in a system with multiprocessor pairing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gara, Alan; Gschwind, Michael K; Salapura, Valentina
System, method and computer program product for a multiprocessing system to offer selective pairing of processor cores for increased processing reliability. A selective pairing facility is provided that selectively connects, i.e., pairs, multiple microprocessor or processor cores to provide one highly reliable thread (or thread group). Each paired microprocessor or processor cores that provide one highly reliable thread for high-reliability connect with a system components such as a memory "nest" (or memory hierarchy), an optional system controller, and optional interrupt controller, optional I/O or peripheral devices, etc. The memory nest is attached to a selective pairing facility via a switchmore » or a bus. Each selectively paired processor core is includes a transactional execution facility, whereing the system is configured to enable processor rollback to a previous state and reinitialize lockstep execution in order to recover from an incorrect execution when an incorrect execution has been detected by the selective pairing facility.« less
Stateless and stateful implementations of faithful execution
Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L
2014-12-16
A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.
Google effects on memory: cognitive consequences of having information at our fingertips.
Sparrow, Betsy; Liu, Jenny; Wegner, Daniel M
2011-08-05
The advent of the Internet, with sophisticated algorithmic search engines, has made accessing information as easy as lifting a finger. No longer do we have to make costly efforts to find the things we want. We can "Google" the old classmate, find articles online, or look up the actor who was on the tip of our tongue. The results of four studies suggest that when faced with difficult questions, people are primed to think about computers and that when people expect to have future access to information, they have lower rates of recall of the information itself and enhanced recall instead for where to access it. The Internet has become a primary form of external or transactive memory, where information is stored collectively outside ourselves.
Fabricio, Aline Teixeira; Yassuda, Mônica Sanches
2011-01-01
Memory plays a fundamental role in the identity of people and in human life, as it enables us to interpret our surroundings and make decisions. It is known that the aging process can be accompanied by cognitive decline in some memory sub systems. However, the use of memory strategies can help encoding and retrieval of new information. The aim of this study was to identify and compare, using objective and subjective measures, which recall strategies are used spontaneously by young and older adults. Twenty-six first-year college students, and thirty-three seniors enrolled at the Third Age University of the same campus, completed a visual memory test including 18 black and white pictures, memorized a short story, and completed an open question about memory strategies, a memory check list to indicate strategies used, and a memory self-efficacy scale. The Bousfield categorization measure was also calculated from the recall protocol. Young adults demonstrated better performance than the older adults on the memory tasks, and were also more confident. Both groups reported using similar strategies. Young and older adults seem to tackle memory tasks in similar ways but young adults outperform seniors.
A wavelet-based evaluation of time-varying long memory of equity markets: A paradigm in crisis
NASA Astrophysics Data System (ADS)
Tan, Pei P.; Chin, Cheong W.; Galagedera, Don U. A.
2014-09-01
This study, using wavelet-based method investigates the dynamics of long memory in the returns and volatility of equity markets. In the sample of five developed and five emerging markets we find that the daily return series from January 1988 to June 2013 may be considered as a mix of weak long memory and mean-reverting processes. In the case of volatility in the returns, there is evidence of long memory, which is stronger in emerging markets than in developed markets. We find that although the long memory parameter may vary during crisis periods (1997 Asian financial crisis, 2001 US recession and 2008 subprime crisis) the direction of change may not be consistent across all equity markets. The degree of return predictability is likely to diminish during crisis periods. Robustness of the results is checked with de-trended fluctuation analysis approach.
Blood Fluke Exploitation of Innate-Adaptive Immune Interactions to Facilitate Parasite Development
2007-01-01
epidemiology 25:1292-1300. 7. Alonso , D., J. Munoz, J. Gascon, M. E. Valls, and M. Corachan. 2006. Failure of standard treatment with praziquantel in two...of naive and memory CD8 T cells in vivo. Nature immunology 1:426-432. 105. Pearce, E. J., A. Cheever, S. Leonard, M. Covalesky, R. Fernandez - Botran...Transactions of the Royal Society of Tropical Medicine and Hygiene 48:3–4. 149 148. Garcia , S., J. DiSanto, and B. Stockinger. 1999. Following the
Slicing AADL Specifications for Model Checking
NASA Technical Reports Server (NTRS)
Odenbrett, Maximilian; Nguyen, Viet Yen; Noll, Thomas
2010-01-01
To combat the state-space explosion problem in model checking larger systems, abstraction techniques can be employed. Here, methods that operate on the system specification before constructing its state space are preferable to those that try to minimize the resulting transition system as they generally reduce peak memory requirements. We sketch a slicing algorithm for system specifications written in (a variant of) the Architecture Analysis and Design Language (AADL). Given a specification and a property to be verified, it automatically removes those parts of the specification that are irrelevant for model checking the property, thus reducing the size of the corresponding transition system. The applicability and effectiveness of our approach is demonstrated by analyzing the state-space reduction for an example, employing a translator from AADL to Promela, the input language of the SPIN model checker.
Eye movements provide insights into the conscious use of context in prospective memory.
Bowden, Vanessa K; Smith, Rebekah E; Loft, Shayne
2017-07-01
Prior research examining the impact of context on prospective memory (PM) has produced mixed results. Our study aimed to determine whether providing progressive context information could increase PM accuracy and reduce costs to ongoing tasks. Seventy-two participants made ongoing true/false judgements for simple sentences while maintaining a PM intention to respond differently to four memorised words. The context condition were informed of the trial numbers where PM targets could appear, and eye-tracking recorded trial number fixation frequency. The context condition showed reduced costs during irrelevant contexts, increased costs during relevant contexts, and had better PM accuracy compared to a standard condition that was not provided with context. The context condition also made an increasing number of trial number fixations leading up to relevant contexts, indicating the conscious use of context. Furthermore, this trial number checking was beneficial to PM, with participants who checked more frequently having better PM accuracy. Copyright © 2017 Elsevier Inc. All rights reserved.
Stability analysis for stochastic BAM nonlinear neural network with delays
NASA Astrophysics Data System (ADS)
Lv, Z. W.; Shu, H. S.; Wei, G. L.
2008-02-01
In this paper, stochastic bidirectional associative memory neural networks with constant or time-varying delays is considered. Based on a Lyapunov-Krasovskii functional and the stochastic stability analysis theory, we derive several sufficient conditions in order to guarantee the global asymptotically stable in the mean square. Our investigation shows that the stochastic bidirectional associative memory neural networks are globally asymptotically stable in the mean square if there are solutions to some linear matrix inequalities(LMIs). Hence, the global asymptotic stability of the stochastic bidirectional associative memory neural networks can be easily checked by the Matlab LMI toolbox. A numerical example is given to demonstrate the usefulness of the proposed global asymptotic stability criteria.
Characterizing Effects of Nitric Oxide Sterilization on tert-Butyl Acrylate Shape Memory Polymers
NASA Astrophysics Data System (ADS)
Phillippi, Ben
As research into the potential uses of shape memory polymers (SMPs) as implantable medical devices continues to grow and expand, so does the need for an accurate and reliable sterilization mechanism. The ability of an SMP to precisely undergo a programmed shape change will define its ability to accomplish a therapeutic task. To ensure proper execution of the in vivo shape change, the sterilization process must not negatively affect the shape memory behavior of the material. To address this need, this thesis investigates the effectiveness of a benchtop nitric oxide (NOx) sterilization process and the extent to which the process affects the shape memory behavior of a well-studied tert-Butyl Acrylate (tBA) SMP. Quantifying the effects on shape memory behavior was performed using a two-tiered analysis. A two-tiered study design was used to determine if the sterilization process induced any premature shape recovery and to identify any effects that NOx has on the overall shape memory behavior of the foams. Determining the effectiveness of the NOx system--specially, whether the treated samples are more sterile/less contaminated than untreated--was also performed with a two-tiered analysis. In this case, the two-tiered analysis was employed to have a secondary check for contamination. To elaborate, all of the samples that were deemed not contaminated from the initial test were put through a second sterility test to check for contamination a second time. The results of these tests indicated the NOx system is an effective sterilization mechanism and the current protocol does not negatively impact the shape memory behavior of the tBA SMP. The samples held their compressed shape throughout the entirety of the sterilization process. Additionally, there were no observable impacts on the shape memory behavior induced by NOx. Lastly, the treated samples demonstrated lower contamination than the untreated. This thesis demonstrates the effectiveness of NOx as a laboratory scale sterilization mechanism for heat triggered shape memory polymers. The shape memory analysis indicated that the magnitude of the length changes induced by NOx is small enough that it does not make a statistically significant impact on the shape memory behavior of the foams. Additionally, there were no observable effects on the shape memory behavior induced by NOx. The results further indicated the NOx system is effective at sterilizing porous scaffolds, as none of the sterilized samples showed contamination. Testing methods proved to be effective because the initial sterility test was able to identify all of the contaminated samples and preliminary results indicated that NOx sterilization improves the sterility of the foams.
Single-trial evaluative conditioning can be moderated by instructed forgetting.
Gast, Anne; Kattner, Florian
2016-09-01
Evaluative conditioning (EC) is a change in the valence of a conditioned stimulus (CS) due to previous pairing with an affective unconditioned stimulus (US). Several previous studies indicate that EC is related to memory of the CS-US pairs. Previous studies, however, typically cannot distinguish between the influence of CS-US knowledge during measurement and during encoding. In addition, by measuring rather than manipulating memory, they do not test the causal effect of memory on EC. The present study employed a "directed forgetting" procedure to the EC paradigm instructing participants to either forget or remember certain CS-US pairs. We found that EC effects after single learning trials were stronger for to-be-remembered than for to-be-forgotten pairs. Manipulation checks showed that the forgetting manipulation also successfully modulated memory for the target pairs and reduced both retroactive and proactive interference on memory for other pairs. Item-based analyses further demonstrated that the size of EC depended on CS-US memory. The results suggest that EC relies on available memory during measurement of the EC effect.
Protocol for buffer space negotiation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nessett, D.
There are at least two ways to manage the buffer memory of a communications node. On etechnique veiws the buffer as a single resource that is to be reserved and released as a unit for a particular communication transaction. A more common approach treats the node's buffer space as a collection of resources (e.g., bytes, words, packet slots) capable of being allocated among multiple concurrent conversations. To achieve buffer space multiplexing, some sort of negotiation for buffer space must take place between source and sink nodes before a transaction can commence. Results are presented which indicate that, for an applicationmore » involving a CSMA broadcast network, buffer space multiplexing offers better performance than buffer reservation. To achieve this improvement, a simple protocol is presented that features flow-control information traveling both from source to sink as well as from sink to source. It is argued that this bidirectionality allows the sink to allocate buffer space among its active communication paths more effectively. 13 figures.« less
Kiesel, Andrea; Kunde, Wilfried; Pohl, Carsten; Berner, Michael P; Hoffmann, Joachim
2009-01-01
Expertise in a certain stimulus domain enhances perceptual capabilities. In the present article, the authors investigate whether expertise improves perceptual processing to an extent that allows complex visual stimuli to bias behavior unconsciously. Expert chess players judged whether a target chess configuration entailed a checking configuration. These displays were preceded by masked prime configurations that either represented a checking or a nonchecking configuration. Chess experts, but not novice chess players, revealed a subliminal response priming effect, that is, faster responding when prime and target displays were congruent (both checking or both nonchecking) rather than incongruent. Priming generalized to displays that were not used as targets, ruling out simple repetition priming effects. Thus, chess experts were able to judge unconsciously presented chess configurations as checking or nonchecking. A 2nd experiment demonstrated that experts' priming does not occur for simpler but uncommon chess configurations. The authors conclude that long-term practice prompts the acquisition of visual memories of chess configurations with integrated form-location conjunctions. These perceptual chunks enable complex visual processing outside of conscious awareness.
Scopolamine impairs memory recall in Octopus vulgaris.
Fiorito, G; Agnisola, C; d'Addio, M; Valanzano, A; Calamandrei, G
1998-09-04
The involvement of the central cholinergic system in predatory performance, and on the recall of individual and observational memory in Octopus vulgaris was studied by treating the animals with the muscarinic antagonist scopolamine (2 mg/kg). The absence of the effects of the injection of scopolamine on blood circulation was also checked. Scopolamine did not affect the ability of octopuses to prey on live crabs. However, it interfered significantly with memory recall. In fact, the ability to solve the jar problem was impaired within the first hour after injection (short-term effects) and was only partially recovered after 24 h (long-term). Moreover, both individual and observational learning of a visual discrimination were significantly reduced at the short- and long-term testing. These results support a role of the cholinergic system in the processes of memory recall of O. vulgaris.
A MATLAB/Simulink based GUI for the CERES Simulator
NASA Technical Reports Server (NTRS)
Valencia, Luis H.
1995-01-01
The Clouds and The Earth's Radiant Energy System (CERES) simulator will allow flight operational familiarity with the CERES instrument prior to launch. It will provide a CERES instrument simulation facility for NASA Langley Research Center. NASA Goddard Space Flight Center and TRW. One of the objectives of building this simulator would be for use as a testbed for functionality checking of atypical memory uploads and for anomaly investigation. For instance, instrument malfunction due to memory damage requires troubleshooting on a simulator to determine the nature of the problem and to find a solution.
Burgos, Pablo; Kilborn, Kerry; Evans, Jonathan J.
2017-01-01
Objective Time-based prospective memory (PM), remembering to do something at a particular moment in the future, is considered to depend upon self-initiated strategic monitoring, involving a retrieval mode (sustained maintenance of the intention) plus target checking (intermittent time checks). The present experiment was designed to explore what brain regions and brain activity are associated with these components of strategic monitoring in time-based PM tasks. Method 24 participants were asked to reset a clock every four minutes, while performing a foreground ongoing word categorisation task. EEG activity was recorded and data were decomposed into source-resolved activity using Independent Component Analysis. Common brain regions across participants, associated with retrieval mode and target checking, were found using Measure Projection Analysis. Results Participants decreased their performance on the ongoing task when concurrently performed with the time-based PM task, reflecting an active retrieval mode that relied on withdrawal of limited resources from the ongoing task. Brain activity, with its source in or near the anterior cingulate cortex (ACC), showed changes associated with an active retrieval mode including greater negative ERP deflections, decreased theta synchronization, and increased alpha suppression for events locked to the ongoing task while maintaining a time-based intention. Activity in the ACC was also associated with time-checks and found consistently across participants; however, we did not find an association with time perception processing per se. Conclusion The involvement of the ACC in both aspects of time-based PM monitoring may be related to different functions that have been attributed to it: strategic control of attention during the retrieval mode (distributing attentional resources between the ongoing task and the time-based task) and anticipatory/decision making processing associated with clock-checks. PMID:28863146
The Fleet Application for Scheduling and Tracking (FAST) Management Website
NASA Technical Reports Server (NTRS)
Marrero-Perez, Radames J.
2014-01-01
The FAST application was designed to replace the paper and pen method of checking out and checking in GSA Vehicles at KSC. By innovating from a paper and pen based checkout system to a fully digital one, not only the resources wasted by printing the checkout forms have been reduced, but it also reduces significantly the time that users and fleet managers need to interact with the system as well as improving the record accuracy for each vehicle. The vehicle information is pulled from a centralized database server in the SPSDL. In an attempt to add a new feature to the FAST application, the author of this report (alongside the FAST developers) has been designing and developing the FAST Management Website. The GSA fleet managers had to rely on the FAST developers in order to add new vehicles, edit vehicles and previous transactions, or for generating vehicles reports. By providing an easy-to-use FAST Management Website portal, the GSA fleet managers are now able to easily move vehicles, edit records, and print reports.
The criminal purchase of firearm ammunition
Tita, G E; Braga, A A; Ridgeway, G; Pierce, G L
2006-01-01
Objective Laws that prohibit certain individuals from owning firearms also pertain to ammunition. Whereas retail sales of firearms to criminals are regularly disrupted by instant background checks, sales of ammunition are essentially unchecked and the rate at which criminals acquire ammunition is unknown. This research describes the ammunition market and estimates the rate at which criminals are acquiring ammunition. Design Criminal background checks conducted on individuals purchasing ammunition in the City of Los Angeles in April and May 2004. Setting Los Angeles, CA, USA. Subjects Ammunition purchasers. Main outcome measures Criminal activity that prohibits one from owning, purchasing, or possessing ammunition. Results 2.6% (95% CI 1.9% to 3.2%) of ammunition purchasers had a prior felony conviction or another condition that prohibited them from possessing ammunition. During the study period prohibited possessors purchased 10 050 rounds of ammunition in Los Angeles. Conclusions These estimates suggest that monitoring ammunition transactions may help reduce the supply of ammunition to criminals and the frequency of injuries from felonious gun assaults. Such a record can also provide information for generating leads on illegal firearm possession. PMID:17018671
An efficient spectral crystal plasticity solver for GPU architectures
NASA Astrophysics Data System (ADS)
Malahe, Michael
2018-03-01
We present a spectral crystal plasticity (CP) solver for graphics processing unit (GPU) architectures that achieves a tenfold increase in efficiency over prior GPU solvers. The approach makes use of a database containing a spectral decomposition of CP simulations performed using a conventional iterative solver over a parameter space of crystal orientations and applied velocity gradients. The key improvements in efficiency come from reducing global memory transactions, exposing more instruction-level parallelism, reducing integer instructions and performing fast range reductions on trigonometric arguments. The scheme also makes more efficient use of memory than prior work, allowing for larger problems to be solved on a single GPU. We illustrate these improvements with a simulation of 390 million crystal grains on a consumer-grade GPU, which executes at a rate of 2.72 s per strain step.
Modeling criterion shifts and target checking in prospective memory monitoring.
Horn, Sebastian S; Bayen, Ute J
2015-01-01
Event-based prospective memory (PM) involves remembering to perform intended actions after a delay. An important theoretical issue is whether and how people monitor the environment to execute an intended action when a target event occurs. Performing a PM task often increases the latencies in ongoing tasks. However, little is known about the reasons for this cost effect. This study uses diffusion model analysis to decompose monitoring processes in the PM paradigm. Across 4 experiments, performing a PM task increased latencies in an ongoing lexical decision task. A large portion of this effect was explained by consistent increases in boundary separation; additional increases in nondecision time emerged in a nonfocal PM task and explained variance in PM performance (Experiment 1), likely reflecting a target-checking strategy before and after the ongoing decision (Experiment 2). However, we found that possible target-checking strategies may depend on task characteristics. That is, instructional emphasis on the importance of ongoing decisions (Experiment 3) or the use of focal targets (Experiment 4) eliminated the contribution of nondecision time to the cost of PM, but left participants in a mode of increased cautiousness. The modeling thus sheds new light on the cost effect seen in many PM studies and suggests that people approach ongoing activities more cautiously when they need to remember an intended action. PsycINFO Database Record (c) 2015 APA, all rights reserved.
Factors that influence the generation of autobiographical memory conjunction errors
Devitt, Aleea L.; Monk-Fromont, Edwin; Schacter, Daniel L.; Addis, Donna Rose
2015-01-01
The constructive nature of memory is generally adaptive, allowing us to efficiently store, process and learn from life events, and simulate future scenarios to prepare ourselves for what may come. However, the cost of a flexibly constructive memory system is the occasional conjunction error, whereby the components of an event are authentic, but the combination of those components is false. Using a novel recombination paradigm, it was demonstrated that details from one autobiographical memory may be incorrectly incorporated into another, forming autobiographical memory conjunction errors that elude typical reality monitoring checks. The factors that contribute to the creation of these conjunction errors were examined across two experiments. Conjunction errors were more likely to occur when the corresponding details were partially rather than fully recombined, likely due to increased plausibility and ease of simulation of partially recombined scenarios. Brief periods of imagination increased conjunction error rates, in line with the imagination inflation effect. Subjective ratings suggest that this inflation is due to similarity of phenomenological experience between conjunction and authentic memories, consistent with a source monitoring perspective. Moreover, objective scoring of memory content indicates that increased perceptual detail may be particularly important for the formation of autobiographical memory conjunction errors. PMID:25611492
Statistical Anomalies of Bitflips in SRAMs to Discriminate SBUs From MCUs
NASA Astrophysics Data System (ADS)
Clemente, Juan Antonio; Franco, Francisco J.; Villa, Francesca; Baylac, Maud; Rey, Solenne; Mecha, Hortensia; Agapito, Juan A.; Puchner, Helmut; Hubert, Guillaume; Velazco, Raoul
2016-08-01
Recently, the occurrence of multiple events in static tests has been investigated by checking the statistical distribution of the difference between the addresses of the words containing bitflips. That method has been successfully applied to Field Programmable Gate Arrays (FPGAs) and the original authors indicate that it is also valid for SRAMs. This paper presents a modified methodology that is based on checking the XORed addresses with bitflips, rather than on the difference. Irradiation tests on CMOS 130 & 90 nm SRAMs with 14-MeV neutrons have been performed to validate this methodology. Results in high-altitude environments are also presented and cross-checked with theoretical predictions. In addition, this methodology has also been used to detect modifications in the organization of said memories. Theoretical predictions have been validated with actual data provided by the manufacturer.
NASA Technical Reports Server (NTRS)
Keeler, James D.
1988-01-01
The information capacity of Kanerva's Sparse Distributed Memory (SDM) and Hopfield-type neural networks is investigated. Under the approximations used here, it is shown that the total information stored in these systems is proportional to the number connections in the network. The proportionality constant is the same for the SDM and Hopfield-type models independent of the particular model, or the order of the model. The approximations are checked numerically. This same analysis can be used to show that the SDM can store sequences of spatiotemporal patterns, and the addition of time-delayed connections allows the retrieval of context dependent temporal patterns. A minor modification of the SDM can be used to store correlated patterns.
Cricket: A Mapped, Persistent Object Store
NASA Technical Reports Server (NTRS)
Shekita, Eugene; Zwilling, Michael
1996-01-01
This paper describes Cricket, a new database storage system that is intended to be used as a platform for design environments and persistent programming languages. Cricket uses the memory management primitives of the Mach operating system to provide the abstraction of a shared, transactional single-level store that can be directly accessed by user applications. In this paper, we present the design and motivation for Cricket. We also present some initial performance results which show that, for its intended applications, Cricket can provide better performance than a general-purpose database storage system.
Selectively Distracted: Divided Attention and Memory for Important Information.
Middlebrooks, Catherine D; Kerr, Tyson; Castel, Alan D
2017-08-01
Distractions and multitasking are generally detrimental to learning and memory. Nevertheless, people often study while listening to music, sitting in noisy coffee shops, or intermittently checking their e-mail. The current experiments examined how distractions and divided attention influence one's ability to selectively remember valuable information. Participants studied lists of words that ranged in value from 1 to 10 points while completing a digit-detection task, while listening to music, or without distractions. Though participants recalled fewer words following digit detection than in the other conditions, there were no significant differences between conditions in terms of selectively remembering the most valuable words. Similar results were obtained across a variety of divided-attention tasks that stressed attention and working memory to different degrees, which suggests that people may compensate for divided-attention costs by selectively attending to the most valuable items and that factors that worsen memory do not necessarily impair the ability to selectively remember important information.
Effects of 45-day -6° head-down bed rest on the time-based prospective memory
NASA Astrophysics Data System (ADS)
Chen, SiYi; Zhou, RenLai; Xiu, LiChao; Chen, ShanGuang; Chen, XiaoPing; Tan, Cheng
2013-03-01
The research explored the effects of 45-day -6° head-down bed rest (HDBR) simulation of microgravity on the time-based prospective memory (PM) with 16 males. The time-based prospective memory task was performed on the 2nd day before HDBR, on the 11th, 20th, 32nd, and 40th days during HDBR, and on the 8th day after HDBR, and subjects' anxiety and depression feelings were recorded simultaneously using Beck Anxiety Inventory (BAI) and Beck Depression Inventory (BDI). The results demonstrated that it showed decreased accuracy of PM responses and frequency of clock checks during and after bed rest; long term bed rest did not induce significant emotional changes. The deficit of prospective memory performance induced by long term HDBR may result from a lack of aerobic physical activity or changes in the prefrontal cortex, but it remains to be determined.
Ward, Jamie; Hovard, Peter; Jones, Alicia; Rothen, Nicolas
2013-01-01
Memory has been shown to be enhanced in grapheme-color synaesthesia, and this enhancement extends to certain visual stimuli (that don't induce synaesthesia) as well as stimuli comprised of graphemes (which do). Previous studies have used a variety of testing procedures to assess memory in synaesthesia (e.g., free recall, recognition, associative learning) making it hard to know the extent to which memory benefits are attributable to the stimulus properties themselves, the testing method, participant strategies, or some combination of these factors. In the first experiment, we use the same testing procedure (recognition memory) for a variety of stimuli (written words, non-words, scenes, and fractals) and also check which memorization strategies were used. We demonstrate that grapheme-color synaesthetes show enhanced memory across all these stimuli, but this is not found for a non-visual type of synaesthesia (lexical-gustatory). In the second experiment, the memory advantage for scenes is explored further by manipulating the properties of the old and new images (changing color, orientation, or object presence). Again, grapheme-color synaesthetes show a memory advantage for scenes across all manipulations. Although recognition memory is generally enhanced in this study, the largest effects were found for abstract visual images (fractals) and scenes for which color can be used to discriminate old/new status. PMID:24187542
Ward, Jamie; Hovard, Peter; Jones, Alicia; Rothen, Nicolas
2013-01-01
Memory has been shown to be enhanced in grapheme-color synaesthesia, and this enhancement extends to certain visual stimuli (that don't induce synaesthesia) as well as stimuli comprised of graphemes (which do). Previous studies have used a variety of testing procedures to assess memory in synaesthesia (e.g., free recall, recognition, associative learning) making it hard to know the extent to which memory benefits are attributable to the stimulus properties themselves, the testing method, participant strategies, or some combination of these factors. In the first experiment, we use the same testing procedure (recognition memory) for a variety of stimuli (written words, non-words, scenes, and fractals) and also check which memorization strategies were used. We demonstrate that grapheme-color synaesthetes show enhanced memory across all these stimuli, but this is not found for a non-visual type of synaesthesia (lexical-gustatory). In the second experiment, the memory advantage for scenes is explored further by manipulating the properties of the old and new images (changing color, orientation, or object presence). Again, grapheme-color synaesthetes show a memory advantage for scenes across all manipulations. Although recognition memory is generally enhanced in this study, the largest effects were found for abstract visual images (fractals) and scenes for which color can be used to discriminate old/new status.
Prospective memory impairment in "ecstasy" (MDMA) users.
Rendell, Peter G; Gray, Timothy J; Henry, Julie D; Tolan, Anne
2007-11-01
Considerable research indicates that "ecstasy" users perceive their memory for future intentions (prospective memory) to be impaired. However, only one empirical study to date has directly tested how this capacity is affected by ecstasy use, and this study provided relatively limited information regarding the extent, scope, or implications of problems experienced. The present study assessed prospective performance on a laboratory measure of prospective memory that closely represents the types of prospective memory tasks that actually occur in everyday life and provides an opportunity to investigate the different sorts of prospective memory failures that occur ("Virtual Week"). Ecstasy user group (27 current users and 34 nonusers) was between participants, and prospective memory task (regular, irregular, time-check) was within participants. A measure sensitive to specific aspects of psychopathology was also administered. Ecstasy users were significantly impaired on Virtual Week, and these deficits were of a comparable magnitude irrespective of the specific prospective memory task demands. The pattern of results was unchanged after controlling for marijuana use, level of psychopathology, and sleep quality. Further, prospective memory was shown to be significantly impaired for both relatively infrequent and relatively frequent ecstasy users, although for the latter group the magnitude of this deficit was greater. Prospective memory performance is sensitive to regular and even moderate ecstasy use. Importantly, ecstasy users experience generalized difficulties with prospective memory, suggesting that these deficits are likely to have important implications for day-to-day functioning.
False memories and confabulation.
Johnson, M K; Raye, C L
1998-04-01
Memory distortions range from the benign (thinking you mailed a check that you only thought about mailing), to the serious (confusing what you heard after a crime with what you actually saw), to the fantastic (claiming you piloted a spaceship). We review theoretical ideas and empirical evidence about the source monitoring processes underlying both true and false memories. Neuropsychological studies show that certain forms of brain damage (such as combined frontal and medial-temporal lesions) might result in profound source confusions, called confabulations. Neuroimaging techniques provide new evidence regarding more specific links between underlying brain mechanisms and the normal cognitive processes involved in evaluating memories. One hypothesis is that the right prefrontal cortex (PFC) subserves heuristic judgments based on easily assessed qualities (such as familiarity or perceptual detail) and the left PFC (or the right and left PFC together) subserves more systematic judgments requiring more careful analysis of memorial qualities or retrieval and evaluation of additional supporting or disconfirming information. Such heuristic and systematic processes can be disrupted not only by brain damage but also, for example, by hypnosis, social demands and motivational factors, suggesting caution in the methods used by `memory exploring' professions (therapists, police officers, lawyers, etc.) in order to avoid inducing false memories.
The mass storage testing laboratory at GSFC
NASA Technical Reports Server (NTRS)
Venkataraman, Ravi; Williams, Joel; Michaud, David; Gu, Heng; Kalluri, Atri; Hariharan, P. C.; Kobler, Ben; Behnke, Jeanne; Peavey, Bernard
1998-01-01
Industry-wide benchmarks exist for measuring the performance of processors (SPECmarks), and of database systems (Transaction Processing Council). Despite storage having become the dominant item in computing and IT (Information Technology) budgets, no such common benchmark is available in the mass storage field. Vendors and consultants provide services and tools for capacity planning and sizing, but these do not account for the complete set of metrics needed in today's archives. The availability of automated tape libraries, high-capacity RAID systems, and high- bandwidth interconnectivity between processor and peripherals has led to demands for services which traditional file systems cannot provide. File Storage and Management Systems (FSMS), which began to be marketed in the late 80's, have helped to some extent with large tape libraries, but their use has introduced additional parameters affecting performance. The aim of the Mass Storage Test Laboratory (MSTL) at Goddard Space Flight Center is to develop a test suite that includes not only a comprehensive check list to document a mass storage environment but also benchmark code. Benchmark code is being tested which will provide measurements for both baseline systems, i.e. applications interacting with peripherals through the operating system services, and for combinations involving an FSMS. The benchmarks are written in C, and are easily portable. They are initially being aimed at the UNIX Open Systems world. Measurements are being made using a Sun Ultra 170 Sparc with 256MB memory running Solaris 2.5.1 with the following configuration: 4mm tape stacker on SCSI 2 Fast/Wide; 4GB disk device on SCSI 2 Fast/Wide; and Sony Petaserve on Fast/Wide differential SCSI 2.
Consistency Checking in Hypothesis Generation,
1979-07-01
In a semantic network model of memory (Col l ins and Loftu s , 1975) , concepts are repr~~ented as nodes inter connected by re lational pathw ays...fornia 90007 Defense Dooinentation Center: C~ neron Stat ion , Bldg . 5 Dr. Kenneth I lain~ondAlexandria , Vi rg ir& a 22314 (i~ c>r ;) Institt~to of
Arik, Sabri
2005-05-01
This paper presents a sufficient condition for the existence, uniqueness and global asymptotic stability of the equilibrium point for bidirectional associative memory (BAM) neural networks with distributed time delays. The results impose constraint conditions on the network parameters of neural system independently of the delay parameter, and they are applicable to all continuous nonmonotonic neuron activation functions. It is shown that in some special cases of the results, the stability criteria can be easily checked. Some examples are also given to compare the results with the previous results derived in the literature.
Thin Rechargeable Batteries for CMOS SRAM Memory Protection
NASA Technical Reports Server (NTRS)
Crouse, Dennis N.
1993-01-01
New rechargeable battery technology is described and compared with classical primary battery back-up of SRAM PC cards. Thin solid polymer electrolyte cells with the thickness of TSOP memory components (1 mm nominal, 1.1 mm max) and capacities of 14 mAh/sq cm can replace coin cells. The SRAM PC cards with permanently installed rechargeable cells and optional electrochromic low battery voltage indicators will free the periodic PC card user from having to 'feed' their PC cards with coin cells and will allow a quick visual check of stored cards for their battery voltage status.
Experimental investigation of practical unforgeable quantum money
NASA Astrophysics Data System (ADS)
Bozzio, Mathieu; Orieux, Adeline; Trigo Vidarte, Luis; Zaquine, Isabelle; Kerenidis, Iordanis; Diamanti, Eleni
2018-01-01
Wiesner's unforgeable quantum money scheme is widely celebrated as the first quantum information application. Based on the no-cloning property of quantum mechanics, this scheme allows for the creation of credit cards used in authenticated transactions offering security guarantees impossible to achieve by classical means. However, despite its central role in quantum cryptography, its experimental implementation has remained elusive because of the lack of quantum memories and of practical verification techniques. Here, we experimentally implement a quantum money protocol relying on classical verification that rigorously satisfies the security condition for unforgeability. Our system exploits polarization encoding of weak coherent states of light and operates under conditions that ensure compatibility with state-of-the-art quantum memories. We derive working regimes for our system using a security analysis taking into account all practical imperfections. Our results constitute a major step towards a real-world realization of this milestone protocol.
Exploring Manycore Multinode Systems for Irregular Applications with FPGA Prototyping
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ceriani, Marco; Palermo, Gianluca; Secchi, Simone
We present a prototype of a multi-core architecture implemented on FPGA, designed to enable efficient execution of irregular applications on distributed shared memory machines, while maintaining high performance on regular workloads. The architecture is composed of off-the-shelf soft-core cores, local interconnection and memory interface, integrated with custom components that optimize it for irregular applications. It relies on three key elements: a global address space, multithreading, and fine-grained synchronization. Global addresses are scrambled to reduce the formation of network hot-spots, while the latency of the transactions is covered by integrating an hardware scheduler within the custom load/store buffers to take advantagemore » from the availability of multiple executions threads, increasing the efficiency in a transparent way to the application. We evaluated a dual node system irregular kernels showing scalability in the number of cores and threads.« less
The Birth Memories and Recall Questionnaire (BirthMARQ): development and evaluation
2014-01-01
Background Childbirth is a challenging and emotive experience that is accompanied by strong positive and/or negative emotions. Memories of birth may be associated with how women cognitively process birth events postpartum and potentially their adaptation to parenthood. Characteristics of memories for birth may also be associated with postnatal psychological wellbeing. This paper reports the development and evaluation of a questionnaire to measure characteristics of memories of childbirth and to examine the relationship between memories for birth and mental health. Methods The Birth Memories and Recall Questionnaire (BirthMARQ) was developed by generating items from literature reviews and general measures of memory characteristics to cover dimensions relevant to childbirth. Fifty nine items were administered to 523 women in the first year after childbirth (M = 23.7 weeks) as part of an online study of childbirth. Validity of the final scale was checked by examining differences between women with and without probable depression and PTSD. Results Principal components analysis identified 23 items representing six aspects of memory accounting for 64% of the variance. These were: Emotional memory, Centrality of memory to identity, Coherence, Reliving, Involuntary recall, and Sensory memory. Reliability was good (M alpha = .80). Women with probable depression or PTSD reported more emotional memory, centrality of memories and involuntary recall. Women with probable depression also reported more reliving, and those with probable PTSD reported less coherence and sensory memory. Conclusion The results suggest the BirthMARQ is a coherent and valid measure of the characteristics of memory for childbirth which may be important in postnatal mood and psychopathology. While further testing of its reliability and validity is needed, it is a measure capable of becoming a valuable tool for examining memory characteristics in the important context of childbirth. PMID:24950589
The Birth Memories and Recall Questionnaire (BirthMARQ): development and evaluation.
Foley, Suzanne; Crawley, Rosalind; Wilkie, Stephanie; Ayers, Susan
2014-06-20
Childbirth is a challenging and emotive experience that is accompanied by strong positive and/or negative emotions. Memories of birth may be associated with how women cognitively process birth events postpartum and potentially their adaptation to parenthood. Characteristics of memories for birth may also be associated with postnatal psychological wellbeing. This paper reports the development and evaluation of a questionnaire to measure characteristics of memories of childbirth and to examine the relationship between memories for birth and mental health. The Birth Memories and Recall Questionnaire (BirthMARQ) was developed by generating items from literature reviews and general measures of memory characteristics to cover dimensions relevant to childbirth. Fifty nine items were administered to 523 women in the first year after childbirth (M = 23.7 weeks) as part of an online study of childbirth. Validity of the final scale was checked by examining differences between women with and without probable depression and PTSD. Principal components analysis identified 23 items representing six aspects of memory accounting for 64% of the variance. These were: Emotional memory, Centrality of memory to identity, Coherence, Reliving, Involuntary recall, and Sensory memory. Reliability was good (M alpha = .80). Women with probable depression or PTSD reported more emotional memory, centrality of memories and involuntary recall. Women with probable depression also reported more reliving, and those with probable PTSD reported less coherence and sensory memory. The results suggest the BirthMARQ is a coherent and valid measure of the characteristics of memory for childbirth which may be important in postnatal mood and psychopathology. While further testing of its reliability and validity is needed, it is a measure capable of becoming a valuable tool for examining memory characteristics in the important context of childbirth.
Neuroanatomical correlates of encoding in episodic memory: levels of processing effect.
Kapur, S; Craik, F I; Tulving, E; Wilson, A A; Houle, S; Brown, G M
1994-01-01
Cognitive studies of memory processes demonstrate that memory for stimuli is a function of how they are encoded; stimuli processed semantically are better remembered than those processed in a perceptual or shallow fashion. This study investigates the neural correlates of this cognitive phenomenon. Twelve subjects performed two different cognitive tasks on a series of visually presented nouns. In one task, subjects detected the presence or absence of the letter a; in the other, subjects categorized each noun as living or nonliving. Positron emission tomography (PET) scans using 15O-labeled water were obtained during both tasks. Subjects showed substantially better recognition memory for nouns seen in the living/nonliving task, compared to nouns seen in the a-checking task. Comparison of the PET images between the two cognitive tasks revealed a significant activation in the left inferior prefrontal cortex (Brodmann's areas 45, 46, 47, and 10) in the semantic task as compared to the perceptual task. We propose that memory processes are subserved by a wide neurocognitive network and that encoding processes involve preferential activation of the structures in the left inferior prefrontal cortex. PMID:8134340
Neuroanatomical correlates of encoding in episodic memory: levels of processing effect.
Kapur, S; Craik, F I; Tulving, E; Wilson, A A; Houle, S; Brown, G M
1994-03-15
Cognitive studies of memory processes demonstrate that memory for stimuli is a function of how they are encoded; stimuli processed semantically are better remembered than those processed in a perceptual or shallow fashion. This study investigates the neural correlates of this cognitive phenomenon. Twelve subjects performed two different cognitive tasks on a series of visually presented nouns. In one task, subjects detected the presence or absence of the letter a; in the other, subjects categorized each noun as living or nonliving. Positron emission tomography (PET) scans using 15O-labeled water were obtained during both tasks. Subjects showed substantially better recognition memory for nouns seen in the living/nonliving task, compared to nouns seen in the a-checking task. Comparison of the PET images between the two cognitive tasks revealed a significant activation in the left inferior prefrontal cortex (Brodmann's areas 45, 46, 47, and 10) in the semantic task as compared to the perceptual task. We propose that memory processes are subserved by a wide neurocognitive network and that encoding processes involve preferential activation of the structures in the left inferior prefrontal cortex.
Factors that influence the generation of autobiographical memory conjunction errors.
Devitt, Aleea L; Monk-Fromont, Edwin; Schacter, Daniel L; Addis, Donna Rose
2016-01-01
The constructive nature of memory is generally adaptive, allowing us to efficiently store, process and learn from life events, and simulate future scenarios to prepare ourselves for what may come. However, the cost of a flexibly constructive memory system is the occasional conjunction error, whereby the components of an event are authentic, but the combination of those components is false. Using a novel recombination paradigm, it was demonstrated that details from one autobiographical memory (AM) may be incorrectly incorporated into another, forming AM conjunction errors that elude typical reality monitoring checks. The factors that contribute to the creation of these conjunction errors were examined across two experiments. Conjunction errors were more likely to occur when the corresponding details were partially rather than fully recombined, likely due to increased plausibility and ease of simulation of partially recombined scenarios. Brief periods of imagination increased conjunction error rates, in line with the imagination inflation effect. Subjective ratings suggest that this inflation is due to similarity of phenomenological experience between conjunction and authentic memories, consistent with a source monitoring perspective. Moreover, objective scoring of memory content indicates that increased perceptual detail may be particularly important for the formation of AM conjunction errors.
Pintus, Roberta; Riggi, Margherita; Cannarozzo, Cecilia; Valeri, Andrea; de Leo, Gioacchino; Romano, Maurizio; Gulino, Rosario; Leanza, Giampiero
2018-05-01
Extensive loss of noradrenaline-containing neurons and fibers is a nearly invariant feature of Alzheimer's Disease (AD). However, the exact noradrenergic contribution to cognitive and histopathological changes in AD is still unclear. Here, this issue was addressed following selective lesioning and intrahippocampal implantation of embryonic noradrenergic progenitors in developing rats. Starting from about 3 months and up to 12 months post-surgery, animals underwent behavioral tests to evaluate sensory-motor, as well as spatial learning and memory, followed by post-mortem morphometric analyses. At 9 months, Control, Lesioned and Lesion + Transplant animals exhibited equally efficient sensory-motor and reference memory performance. Interestingly, working memory abilities were seen severely impaired in Lesion-only rats and fully recovered in Transplanted rats, and appeared partly lost again 2 months after ablation of the implanted neuroblasts. Morphological analyses confirmed the almost total lesion-induced noradrenergic neuronal and terminal fiber loss, the near-normal reinnervation of the hippocampus promoted by the transplants, and its complete removal by the second lesion. Notably, the noradrenergic-rich transplants normalized also the nuclear expression of the transactive response DNA-binding protein 43 (TDP-43) in various hippocampal subregions, whose cytoplasmic (i.e., pathological) occurrence appeared dramatically increased as a result of the lesions. Thus, integrity of ascending noradrenergic inputs to the hippocampus may be required for the regulation of specific aspects of learning and memory and to prevent TDP-43 tissue pathology. © 2018 Wiley Periodicals, Inc.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Murphy, Richard C.
2009-09-01
This report details the accomplishments of the 'Building More Powerful Less Expensive Supercomputers Using Processing-In-Memory (PIM)' LDRD ('PIM LDRD', number 105809) for FY07-FY09. Latency dominates all levels of supercomputer design. Within a node, increasing memory latency, relative to processor cycle time, limits CPU performance. Between nodes, the same increase in relative latency impacts scalability. Processing-In-Memory (PIM) is an architecture that directly addresses this problem using enhanced chip fabrication technology and machine organization. PIMs combine high-speed logic and dense, low-latency, high-bandwidth DRAM, and lightweight threads that tolerate latency by performing useful work during memory transactions. This work examines the potential ofmore » PIM-based architectures to support mission critical Sandia applications and an emerging class of more data intensive informatics applications. This work has resulted in a stronger architecture/implementation collaboration between 1400 and 1700. Additionally, key technology components have impacted vendor roadmaps, and we are in the process of pursuing these new collaborations. This work has the potential to impact future supercomputer design and construction, reducing power and increasing performance. This final report is organized as follow: this summary chapter discusses the impact of the project (Section 1), provides an enumeration of publications and other public discussion of the work (Section 1), and concludes with a discussion of future work and impact from the project (Section 1). The appendix contains reprints of the refereed publications resulting from this work.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Behrens, V.; Burroughs, G.E.; Crandall, M.
1985-07-01
Environmental and breathing-zone samples were analyzed for nitrous oxide, halogenated anesthetic gases, and ethylene-oxide at Porter Memorial Hospital, Valparaiso, Indiana in April, 1984. The evaluation was requested by the Indiana Occupational Safety and Health Administration to investigate the exposure of operating room personnel to anesthetic gases and central supply employees to ethylene-oxide. The authors conclude that some of the operating room personnel are overexposed to halogenated anesthetic gases and nitrous-oxide. Recommendations include performing better maintenance of the anesthesia equipment, improving the work practices of the anesthesiologists, and periodically checking the ethylene-oxide sterilizer system for leaks.
Cache directory lookup reader set encoding for partial cache line speculation support
Gara, Alan; Ohmacht, Martin
2014-10-21
In a multiprocessor system, with conflict checking implemented in a directory lookup of a shared cache memory, a reader set encoding permits dynamic recordation of read accesses. The reader set encoding includes an indication of a portion of a line read, for instance by indicating boundaries of read accesses. Different encodings may apply to different types of speculative execution.
ERIC Educational Resources Information Center
Buschmann, Anke; Multhauf, Bettina; Hasselhorn, Marcus; Pietz, Joachim
2015-01-01
A randomized control intervention study was conducted to evaluate the effects of the highly structured Heidelberg Parent-Based Language Intervention (HPLI). The outcomes of 43 children (n = 23 intervention, n = 20 control) who had been identified as late talkers during routine developmental check-ups carried out in pediatric practices at the age…
A State of the Art Survey of Fraud Detection Technology
NASA Astrophysics Data System (ADS)
Flegel, Ulrich; Vayssière, Julien; Bitz, Gunter
With the introduction of IT to conductbusiness we accepted the loss of a human control step.For this reason, the introductionof newIT systemswas accompanied by the development of the authorization concept. But since, in reality, there is no such thing as 100 per cent security; auditors are commissioned to examine all transactions for misconduct. Since the data exists in digital form already, it makes sense to use computer-based processes to analyse it. Such processes allow the auditor to carry out extensive checks within an acceptable timeframe and with reasonable effort. Once the algorithm has been defined, it only takes sufficient computing power to evaluate larger quantities of data. This contribution presents the state of the art for IT-based data analysis processes that can be used to identify fraudulent activities.
Evaluating the accuracy of technicians and pharmacists in checking unit dose medication cassettes.
Ambrose, Peter J; Saya, Frank G; Lovett, Larry T; Tan, Sandy; Adams, Dale W; Shane, Rita
2002-06-15
The accuracy rates of board-registered pharmacy technicians and pharmacists in checking unit dose medication cassettes in the inpatient setting at two separate institutions were examined. Cedars-Sinai Medical Center and Long Beach Memorial Medical Center, both in Los Angeles county, petitioned the California State Board of Pharmacy to approve a waiver of the California Code of Regulations to conduct an experimental program to compare the accuracy of unit dose medication cassettes checked by pharmacists with that of cassettes checked by trained, certified pharmacy technicians. The study consisted of three parts: assessing pharmacist baseline checking accuracy (Phase I), developing a technician-training program and certifying technicians who completed the didactic and practical training (Phase II), and evaluating the accuracy of certified technicians checking unit dose medication cassettes as a daily function (Phase III). Twenty-nine pharmacists and 41 technicians (3 of whom were pharmacy interns) participated in the study. Of the technicians, all 41 successfully completed the didactic and practical training, 39 successfully completed the audits and became certified checkers, and 2 (including 1 of the interns) did not complete the certification audits because they were reassigned to another work area or had resigned. In Phase II, the observed accuracy rate and its lower confidence limit exceeded the predetermined minimum requirement of 99.8% for a certified checker. The mean accuracy rates for technicians were identical at the two institutions (p = 1.0). The difference in mean accuracy rates between pharmacists (99.52%; 95% confidence interval [CI] 99.44-99.58%) and technicians, (99.89%; 95% CI 99.87-99.90%) was significant (p < 0.0001). Inpatient technicians who had been trained and certified in a closely supervised program that incorporated quality assurance mechanisms could safely and accurately check unit dose medication cassettes filled by other technicians.
Certifying Domain-Specific Policies
NASA Technical Reports Server (NTRS)
Lowry, Michael; Pressburger, Thomas; Rosu, Grigore; Koga, Dennis (Technical Monitor)
2001-01-01
Proof-checking code for compliance to safety policies potentially enables a product-oriented approach to certain aspects of software certification. To date, previous research has focused on generic, low-level programming-language properties such as memory type safety. In this paper we consider proof-checking higher-level domain -specific properties for compliance to safety policies. The paper first describes a framework related to abstract interpretation in which compliance to a class of certification policies can be efficiently calculated Membership equational logic is shown to provide a rich logic for carrying out such calculations, including partiality, for certification. The architecture for a domain-specific certifier is described, followed by an implemented case study. The case study considers consistency of abstract variable attributes in code that performs geometric calculations in Aerospace systems.
Dishion, Thomas J; Mun, Chung Jung; Drake, Emily C; Tein, Jenn-Yun; Shaw, Daniel S; Wilson, Melvin
2015-11-01
This study examined the hypothesis that a brief, strengths-based home visiting strategy can promote positive engagement between caregiver and child and thereby reduce various forms of early childhood neglect. A total of 731 low-income families receiving services through the Women, Infants, and Children nutritional supplement program were randomized to the Women, Infants, and Children as usual or the Family Check-Up intervention. Assessments and intervention services were delivered in the home environment at ages 2, 3, 4, and 5. During the assessments, staff videotaped caregiver-child interactions and rated various features of the home environment, including the physical appropriateness of the home setting for children. Trained observers later coded the videotapes, unaware of the family's intervention condition. Specific caregiver-child interaction patterns were coded and macroratings were made of the caregiver's affection, monitoring, and involvement with the child. An intention to treat design revealed that randomization to the Family Check-Up increased duration of positive engagement between caregivers and children by age 3, which in turn was prognostic of less neglect of the child at age 4, controlling for family adversity. It was also found that family adversity moderated the impact of the intervention, such that the families with the most adverse circumstances were highly responsive to the intervention. Families with the highest levels of adversity exhibited the strongest mediation between positive engagement and reduction of neglect. Findings are discussed with respect to developmental theory and their potential implications for a public health approach to the prevention of early childhood maltreatment.
Heap/stack guard pages using a wakeup unit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gooding, Thomas M; Satterfield, David L; Steinmacher-Burow, Burkhard
A method and system for providing a memory access check on a processor including the steps of detecting accesses to a memory device including level-1 cache using a wakeup unit. The method includes invalidating level-1 cache ranges corresponding to a guard page, and configuring a plurality of wakeup address compare (WAC) registers to allow access to selected WAC registers. The method selects one of the plurality of WAC registers, and sets up a WAC register related to the guard page. The method configures the wakeup unit to interrupt on access of the selected WAC register. The method detects access ofmore » the memory device using the wakeup unit when a guard page is violated. The method generates an interrupt to the core using the wakeup unit, and determines the source of the interrupt. The method detects the activated WAC registers assigned to the violated guard page, and initiates a response.« less
Entanglement distillation for quantum communication network with atomic-ensemble memories.
Li, Tao; Yang, Guo-Jian; Deng, Fu-Guo
2014-10-06
Atomic ensembles are effective memory nodes for quantum communication network due to the long coherence time and the collective enhancement effect for the nonlinear interaction between an ensemble and a photon. Here we investigate the possibility of achieving the entanglement distillation for nonlocal atomic ensembles by the input-output process of a single photon as a result of cavity quantum electrodynamics. We give an optimal entanglement concentration protocol (ECP) for two-atomic-ensemble systems in a partially entangled pure state with known parameters and an efficient ECP for the systems in an unknown partially entangled pure state with a nondestructive parity-check detector (PCD). For the systems in a mixed entangled state, we introduce an entanglement purification protocol with PCDs. These entanglement distillation protocols have high fidelity and efficiency with current experimental techniques, and they are useful for quantum communication network with atomic-ensemble memories.
Memory, modelling and Marr: a commentary on Marr (1971) ‘Simple memory: a theory of archicortex’
Willshaw, D. J.; Dayan, P.; Morris, R. G. M.
2015-01-01
David Marr's theory of the archicortex, a brain structure now more commonly known as the hippocampus and hippocampal formation, is an epochal contribution to theoretical neuroscience. Addressing the problem of how information about 10 000 events could be stored in the archicortex during the day so that they can be retrieved using partial information and then transferred to the neocortex overnight, the paper presages a whole wealth of later empirical and theoretical work, proving impressively prescient. Despite this impending success, Marr later apparently grew dissatisfied with this style of modelling, but he went on to make seminal suggestions that continue to resonate loudly throughout the field of theoretical neuroscience. We describe Marr's theory of the archicortex and his theory of theories, setting them into their original and a contemporary context, and assessing their impact. This commentary was written to celebrate the 350th anniversary of the journal Philosophical Transactions of the Royal Society. PMID:25750246
NASA Astrophysics Data System (ADS)
Liu, Tianyu; Du, Xining; Ji, Wei; Xu, X. George; Brown, Forrest B.
2014-06-01
For nuclear reactor analysis such as the neutron eigenvalue calculations, the time consuming Monte Carlo (MC) simulations can be accelerated by using graphics processing units (GPUs). However, traditional MC methods are often history-based, and their performance on GPUs is affected significantly by the thread divergence problem. In this paper we describe the development of a newly designed event-based vectorized MC algorithm for solving the neutron eigenvalue problem. The code was implemented using NVIDIA's Compute Unified Device Architecture (CUDA), and tested on a NVIDIA Tesla M2090 GPU card. We found that although the vectorized MC algorithm greatly reduces the occurrence of thread divergence thus enhancing the warp execution efficiency, the overall simulation speed is roughly ten times slower than the history-based MC code on GPUs. Profiling results suggest that the slow speed is probably due to the memory access latency caused by the large amount of global memory transactions. Possible solutions to improve the code efficiency are discussed.
Study of memory effects in international market indices
NASA Astrophysics Data System (ADS)
Mariani, M. C.; Florescu, I.; Beccar Varela, M. P.; Ncheuguim, E.
2010-04-01
Long term memory effects in stock market indices that represent internationally diversified stocks are analyzed in this paper and the results are compared with the S&P 500 index. The Hurst exponent and the Detrended fluctuation analysis (DFA) technique are the tools used for this analysis. The financial time-series data of these indices are tested with the Normalized Truncated Levy Flight to check whether the evolution of these indices is explained by the TLF. Some features that seem to be specific for international indices are discovered and briefly discussed. In particular, a potential investor seems to be faced with new investment opportunities in emerging markets during and especially after a crisis.
NASA Technical Reports Server (NTRS)
2005-01-01
KENNEDY SPACE CENTER, FLA. In the Vehicle Assembly Building at NASAs Kennedy Space Center, workers check the digital still camera they will mount in the External Tank (ET) umbilical well on the aft end of Space Shuttle Discovery. The camera is being used to obtain and downlink high-resolution images of the disconnect point on the ET following the tank's separation from the orbiter after launch. The Kodak camera will record 24 images, at one frame per 1.5 seconds, on a flash memory card. After orbital insertion, the crew will transfer the images from the memory card to a laptop computer. The files will then be downloaded through the Ku-band system to the Mission Control Center in Houston for analysis.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Tyler Barratt; Urrea, Jorge Mario
2012-06-01
The aim of the Authenticating Cache architecture is to ensure that machine instructions in a Read Only Memory (ROM) are legitimate from the time the ROM image is signed (immediately after compilation) to the time they are placed in the cache for the processor to consume. The proposed architecture allows the detection of ROM image modifications during distribution or when it is loaded into memory. It also ensures that modified instructions will not execute in the processor-as the cache will not be loaded with a page that fails an integrity check. The authenticity of the instruction stream can also bemore » verified in this architecture. The combination of integrity and authenticity assurance greatly improves the security profile of a system.« less
Bragdon, Laura B; Gibb, Brandon E; Coles, Meredith E
2018-06-19
Investigations of neuropsychological functioning in obsessive-compulsive disorder (OCD) have produced mixed results for deficits in executive functioning (EF), attention, and memory. One potential explanation for varied findings may relate to the heterogeneity of symptom presentations, and different clinical or neurobiological characteristics may underlie these different symptoms. We investigated differences in neuropsychological functioning between two symptoms groups, obsessing/checking (O/C) and symmetry/ordering (S/O), based on data suggesting an association with different motivations: harm avoidance and incompleteness, respectively. Ten studies (with 628 patients) were included and each investigation assessed at least one of 14 neuropsychological domains. The S/O domain demonstrated small, negative correlations with overall neuropsychological functioning, performance in EF, memory, visuospatial ability, cognitive flexibility, and verbal working memory. O/C symptoms demonstrated small, negative correlations with memory and verbal memory performance. A comparison of functioning between symptom groups identified large effect sizes showing that the S/O dimension was more strongly related to poorer neuropsychological performance overall, and in the domains of attention, visuospatial ability, and the subdomain of verbal working memory. Findings support existing evidence suggesting that different OCD symptoms, and their associated core motivations, relate to unique patterns of neuropsychological functioning, and, potentially dysfunction in different neural circuits. © 2018 Wiley Periodicals, Inc.
Self-Referential Tags in the Discourse of People with Alzheimer's Disease
ERIC Educational Resources Information Center
Asp, Elissa; Song, Xiaowei; Rockwood, Kenneth
2006-01-01
In a study of the discourse of 100 people with Alzheimer's disease treated for 12 months with donepezil, we observed that, as a group, they used a form of tag, described here as a self-referential tag (SRT), 14 times more frequently than did caregivers. Patients use SRTs to check propositions dependent on episodic memory as in I haven't seen the…
An Assessment of Modafinil for Vestibular and Aviation-Related Effects
2005-10-01
Charlton and Cory Welch for editing and checking references; Ms. Anne Marie Michel for sheparding the urine through the analysis process . Lastly we wish to...superior performance during the sleep deprivation on the following tasks: reaction time task, mathematical processing , memory search, spatial... processing , unstable tracking, and grammatical reasoning. Baranski, Cian, Esquivie, Pigeau, and Raphel (1998) administered a cognitive test battery during a
A Weakest Precondition Approach to Robustness
NASA Astrophysics Data System (ADS)
Balliu, Musard; Mastroeni, Isabella
With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.
17 CFR 37.8 - Information relating to transactions on derivatives transaction execution facilities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... transactions on derivatives transaction execution facilities. 37.8 Section 37.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES TRANSACTION EXECUTION FACILITIES § 37.8 Information relating to transactions on derivatives transaction execution facilities. (a) Special calls for...
How "implicit" are implicit color effects in memory?
Zimmer, Hubert D; Steiner, Astrid; Ecker, Ullrich K H
2002-01-01
Processing colored pictures of objects results in a preference to choose the former color for a specific object in a subsequent color choice test (Wippich & Mecklenbräuker, 1998). We tested whether this implicit memory effect is independent of performances in episodic color recollection (recognition). In the study phase of Experiment 1, the color of line drawings was either named or its appropriateness was judged. We found only weak implicit memory effects for categorical color information. In Experiment 2, silhouettes were colored by subjects during the study phase. Performances in both the implicit and the explicit test were good. Selections of "old" colors in the implicit test, though, were almost completely confined to items for which the color was also remembered explicitly. In Experiment 3, we applied the opposition technique in order to check whether we could find any implicit effects regarding items for which no explicit color recollection was possible. This was not the case. We therefore draw the conclusion that implicit color preference effects are not independent of explicit recollection, and that they are probably based on the same episodic memory traces that are used in explicit tests.
31 CFR 598.405 - Transactions incidental to a licensed transaction.
Code of Federal Regulations, 2013 CFR
2013-07-01
... transaction. 598.405 Section 598.405 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS Interpretations § 598.405 Transactions incidental to a licensed transaction. Any transaction... transactions by specially designated narcotics traffickers and debits to accounts blocked pursuant to § 598.202...
31 CFR 598.405 - Transactions incidental to a licensed transaction.
Code of Federal Regulations, 2014 CFR
2014-07-01
... transaction. 598.405 Section 598.405 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS Interpretations § 598.405 Transactions incidental to a licensed transaction. Any transaction... transactions by specially designated narcotics traffickers and debits to accounts blocked pursuant to § 598.202...
31 CFR 598.405 - Transactions incidental to a licensed transaction.
Code of Federal Regulations, 2012 CFR
2012-07-01
... transaction. 598.405 Section 598.405 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS Interpretations § 598.405 Transactions incidental to a licensed transaction. Any transaction... transactions by specially designated narcotics traffickers and debits to accounts blocked pursuant to § 598.202...
31 CFR 598.405 - Transactions incidental to a licensed transaction.
Code of Federal Regulations, 2010 CFR
2010-07-01
... transaction. 598.405 Section 598.405 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS Interpretations § 598.405 Transactions incidental to a licensed transaction. Any transaction... transactions by specially designated narcotics traffickers and debits to accounts blocked pursuant to § 598.202...
31 CFR 598.405 - Transactions incidental to a licensed transaction.
Code of Federal Regulations, 2011 CFR
2011-07-01
... transaction. 598.405 Section 598.405 Money and Finance: Treasury Regulations Relating to Money and Finance... REGULATIONS Interpretations § 598.405 Transactions incidental to a licensed transaction. Any transaction... transactions by specially designated narcotics traffickers and debits to accounts blocked pursuant to § 598.202...
Analysis of DIRAC's behavior using model checking with process algebra
NASA Astrophysics Data System (ADS)
Remenska, Daniela; Templon, Jeff; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Graciani Diaz, Ricardo; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof
2012-12-01
DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple; the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike conventional testing, it allows full control over the parallel processes execution, and supports exhaustive state-space exploration. We used the mCRL2 language and toolset to model the behavior of two related DIRAC subsystems: the workload and storage management system. Based on process algebra, mCRL2 allows defining custom data types as well as functions over these. This makes it suitable for modeling the data manipulations made by DIRAC's agents. By visualizing the state space and replaying scenarios with the toolkit's simulator, we have detected race-conditions and deadlocks in these systems, which, in several cases, were confirmed to occur in the reality. Several properties of interest were formulated and verified with the tool. Our future direction is automating the translation from DIRAC to a formal model.
Scalability Analysis of Gleipnir: A Memory Tracing and Profiling Tool, on Titan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Janjusic, Tommy; Kartsaklis, Christos; Wang, Dali
2013-01-01
Application performance is hindered by a variety of factors but most notably driven by the well know CPU-memory speed gap (also known as the memory wall). Understanding application s memory behavior is key if we are trying to optimize performance. Understanding application performance properties is facilitated with various performance profiling tools. The scope of profiling tools varies in complexity, ease of deployment, profiling performance, and the detail of profiled information. Specifically, using profiling tools for performance analysis is a common task when optimizing and understanding scientific applications on complex and large scale systems such as Cray s XK7. This papermore » describes the performance characteristics of using Gleipnir, a memory tracing tool, on the Titan Cray XK7 system when instrumenting large applications such as the Community Earth System Model. Gleipnir is a memory tracing tool built as a plug-in tool for the Valgrind instrumentation framework. The goal of Gleipnir is to provide fine-grained trace information. The generated traces are a stream of executed memory transactions mapped to internal structures per process, thread, function, and finally the data structure or variable. Our focus was to expose tool performance characteristics when using Gleipnir with a combination of an external tools such as a cache simulator, Gl CSim, to characterize the tool s overall performance. In this paper we describe our experience with deploying Gleipnir on the Titan Cray XK7 system, report on the tool s ease-of-use, and analyze run-time performance characteristics under various workloads. While all performance aspects are important we mainly focus on I/O characteristics analysis due to the emphasis on the tools output which are trace-files. Moreover, the tool is dependent on the run-time system to provide the necessary infrastructure to expose low level system detail; therefore, we also discuss any theoretical benefits that can be achieved if such modules were present.« less
NASA Astrophysics Data System (ADS)
Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.
2014-10-01
Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.
Capacity for patterns and sequences in Kanerva's SDM as compared to other associative memory models
NASA Technical Reports Server (NTRS)
Keeler, James D.
1987-01-01
The information capacity of Kanerva's Sparse Distributed Memory (SDM) and Hopfield-type neural networks is investigated. Under the approximations used, it is shown that the total information stored in these systems is proportional to the number connections in the network. The proportionality constant is the same for the SDM and Hopfield-type models independent of the particular model, or the order of the model. The approximations are checked numerically. This same analysis can be used to show that the SDM can store sequences of spatiotemporal patterns, and the addition of time-delayed connections allows the retrieval of context dependent temporal patterns. A minor modification of the SDM can be used to store correlated patterns.
Robust stability for stochastic bidirectional associative memory neural networks with time delays
NASA Astrophysics Data System (ADS)
Shu, H. S.; Lv, Z. W.; Wei, G. L.
2008-02-01
In this paper, the asymptotic stability is considered for a class of uncertain stochastic bidirectional associative memory neural networks with time delays and parameter uncertainties. The delays are time-invariant and the uncertainties are norm-bounded that enter into all network parameters. The aim of this paper is to establish easily verifiable conditions under which the delayed neural network is robustly asymptotically stable in the mean square for all admissible parameter uncertainties. By employing a Lyapunov-Krasovskii functional and conducting the stochastic analysis, a linear matrix inequality matrix inequality (LMI) approach is developed to derive the stability criteria. The proposed criteria can be easily checked by the Matlab LMI toolbox. A numerical example is given to demonstrate the usefulness of the proposed criteria.
Interactive communication channel
NASA Astrophysics Data System (ADS)
Chan, R. H.; Mann, M. R.; Ciarrocchi, J. A.
1985-10-01
Discussed is an interactive communications channel (ICC) for providing a digital computer with high-performance multi-channel interfaces. Sixteen full duplex channels can be serviced in the ICC with the sequence or scan pattern being programmable and dependent upon the number or channels and their speed. A channel buffer system is used for line interface, and character exchange. The channel buffer system is on a byte basis. The ICC performs frame start and frame end functions, bit stripping and bit stuffing. Data is stored in a memory in block format (256 bytes maximum) by a program control and the ICC maintains byte address information and a block byte count. Data exchange with a memory is made by cycle steals. Error detection is also provided for using a cyclic redundancy check technique.
Parallel State Space Construction for a Model Checking Based on Maximality Semantics
NASA Astrophysics Data System (ADS)
El Abidine Bouneb, Zine; Saīdouni, Djamel Eddine
2009-03-01
The main limiting factor of the model checker integrated in the concurrency verification environment FOCOVE [1, 2], which use the maximality based labeled transition system (noted MLTS) as a true concurrency model[3, 4], is currently the amount of available physical memory. Many techniques have been developed to reduce the size of a state space. An interesting technique among them is the alpha equivalence reduction. Distributed memory execution environment offers yet another choice. The main contribution of the paper is to show that the parallel state space construction algorithm proposed in [5], which is based on interleaving semantics using LTS as semantic model, may be adapted easily to the distributed implementation of the alpha equivalence reduction for the maximality based labeled transition systems.
A self-consistency check for unitary propagation of Hawking quanta
NASA Astrophysics Data System (ADS)
Baker, Daniel; Kodwani, Darsh; Pen, Ue-Li; Yang, I.-Sheng
2017-11-01
The black hole information paradox presumes that quantum field theory in curved space-time can provide unitary propagation from a near-horizon mode to an asymptotic Hawking quantum. Instead of invoking conjectural quantum-gravity effects to modify such an assumption, we propose a self-consistency check. We establish an analogy to Feynman’s analysis of a double-slit experiment. Feynman showed that unitary propagation of the interfering particles, namely ignoring the entanglement with the double-slit, becomes an arbitrarily reliable assumption when the screen upon which the interference pattern is projected is infinitely far away. We argue for an analogous self-consistency check for quantum field theory in curved space-time. We apply it to the propagation of Hawking quanta and test whether ignoring the entanglement with the geometry also becomes arbitrarily reliable in the limit of a large black hole. We present curious results to suggest a negative answer, and we discuss how this loss of naive unitarity in QFT might be related to a solution of the paradox based on the soft-hair-memory effect.
McNaughton, Neil; Wickens, Jeff
2003-01-01
The hippocampus has been proposed as a key component of a "behavioural inhibition system". We explore the implications of this idea for the nature of associative memory--i.e. learning that is distinct from the moulding of response sequences by error correction and reinforcement. It leads to the view that all associative memory depends on purely Hebbian mechanisms. Memories involve acquisition of new goals not the strengthening of new stimulus-response links. Critically, memories will consist of affectively positive and affectively negative associations as well "purely cognitive" information. The hippocampus is seen as a supervisor that is normally "just checking" information about current available goals. When one available goal is pre-eminent there is no hippocampal output and the goal controls the response system. When two or more goals are similarly and highly primed there is conflict. This is detected by the hippocampus which sends output that increases the valence of affectively negative perceptions and so resolves the conflict by suppressing more aversive goals. Such conflict resolution occurs with innate as well as acquired goals and is fundamentally non-memorial. But, in memory paradigms, it can often act to suppress interference on the current trial and, through Hebbian association of the increase in negative affect, decrease the probability of interference on later trials and during consolidation. Both memory-driven and innate behaviour is made hippocampal-dependent by innate and acquired conflicting tendencies and not the class of stimulus presented.
A Role for Memory in Prospective Timing informs Timing in Prospective Memory
Waldum, Emily R; Sahakyan, Lili
2014-01-01
Time-based prospective memory (TBPM) tasks require the estimation of time in passing – known as prospective timing. Prospective timing is said to depend on an attentionally-driven internal clock mechanism, and is thought to be unaffected by memory for interval information (for reviews see, Block, Hancock, & Zakay, 2010; Block & Zakay, 1997). A prospective timing task that required a verbal estimate following the entire interval (Experiment 1) and a TBPM task that required production of a target response during the interval (Experiment 2) were used to test an alternative view that episodic memory does influence prospective timing. In both experiments, participants performed an ongoing lexical decision task of fixed duration while a varying number of songs were played in the background. Experiment 1 results revealed that verbal time estimates became longer the more songs participants remembered from the interval, suggesting that memory for interval information influences prospective time estimates. In Experiment 2, participants who were asked to perform the TBPM task without the aid of an external clock made their target responses earlier as the number of songs increased, indicating that prospective estimates of elapsed time increased as more songs were experienced. For participants who had access to a clock, changes in clock-checking coincided with the occurrence of song boundaries, indicating that participants used both song information and clock information to estimate time. Finally, ongoing task performance and verbal reports in both experiments further substantiate a role for episodic memory in prospective timing. PMID:22984950
12 CFR 303.62 - Transactions requiring prior approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... merger transaction that consists of the acquisition by an out of state bank of a branch without... FILING PROCEDURES Merger Transactions § 303.62 Transactions requiring prior approval. (a) Merger transactions. The following merger transactions require the prior written approval of the FDIC under this...
Best bang for your buck: GPU nodes for GROMACS biomolecular simulations
Páll, Szilárd; Fechner, Martin; Esztermann, Ansgar; de Groot, Bert L.; Grubmüller, Helmut
2015-01-01
The molecular dynamics simulation package GROMACS runs efficiently on a wide variety of hardware from commodity workstations to high performance computing clusters. Hardware features are well‐exploited with a combination of single instruction multiple data, multithreading, and message passing interface (MPI)‐based single program multiple data/multiple program multiple data parallelism while graphics processing units (GPUs) can be used as accelerators to compute interactions off‐loaded from the CPU. Here, we evaluate which hardware produces trajectories with GROMACS 4.6 or 5.0 in the most economical way. We have assembled and benchmarked compute nodes with various CPU/GPU combinations to identify optimal compositions in terms of raw trajectory production rate, performance‐to‐price ratio, energy efficiency, and several other criteria. Although hardware prices are naturally subject to trends and fluctuations, general tendencies are clearly visible. Adding any type of GPU significantly boosts a node's simulation performance. For inexpensive consumer‐class GPUs this improvement equally reflects in the performance‐to‐price ratio. Although memory issues in consumer‐class GPUs could pass unnoticed as these cards do not support error checking and correction memory, unreliable GPUs can be sorted out with memory checking tools. Apart from the obvious determinants for cost‐efficiency like hardware expenses and raw performance, the energy consumption of a node is a major cost factor. Over the typical hardware lifetime until replacement of a few years, the costs for electrical power and cooling can become larger than the costs of the hardware itself. Taking that into account, nodes with a well‐balanced ratio of CPU and consumer‐class GPU resources produce the maximum amount of GROMACS trajectory over their lifetime. © 2015 The Authors. Journal of Computational Chemistry Published by Wiley Periodicals, Inc. PMID:26238484
Best bang for your buck: GPU nodes for GROMACS biomolecular simulations.
Kutzner, Carsten; Páll, Szilárd; Fechner, Martin; Esztermann, Ansgar; de Groot, Bert L; Grubmüller, Helmut
2015-10-05
The molecular dynamics simulation package GROMACS runs efficiently on a wide variety of hardware from commodity workstations to high performance computing clusters. Hardware features are well-exploited with a combination of single instruction multiple data, multithreading, and message passing interface (MPI)-based single program multiple data/multiple program multiple data parallelism while graphics processing units (GPUs) can be used as accelerators to compute interactions off-loaded from the CPU. Here, we evaluate which hardware produces trajectories with GROMACS 4.6 or 5.0 in the most economical way. We have assembled and benchmarked compute nodes with various CPU/GPU combinations to identify optimal compositions in terms of raw trajectory production rate, performance-to-price ratio, energy efficiency, and several other criteria. Although hardware prices are naturally subject to trends and fluctuations, general tendencies are clearly visible. Adding any type of GPU significantly boosts a node's simulation performance. For inexpensive consumer-class GPUs this improvement equally reflects in the performance-to-price ratio. Although memory issues in consumer-class GPUs could pass unnoticed as these cards do not support error checking and correction memory, unreliable GPUs can be sorted out with memory checking tools. Apart from the obvious determinants for cost-efficiency like hardware expenses and raw performance, the energy consumption of a node is a major cost factor. Over the typical hardware lifetime until replacement of a few years, the costs for electrical power and cooling can become larger than the costs of the hardware itself. Taking that into account, nodes with a well-balanced ratio of CPU and consumer-class GPU resources produce the maximum amount of GROMACS trajectory over their lifetime. © 2015 The Authors. Journal of Computational Chemistry Published by Wiley Periodicals, Inc.
Fault-Tolerant VLSI Design Assessments for Advanced Avionics Department. Literature Review. Phase 1
1982-02-05
negative sense. Another facet of the literature review is to acquaint the researchers with the immense literature base for electronic technology applicable ...Riley, "Special Report: Semiconductor Memories are Tested Over Data-Storage Application ", Electronics, vol. 46, August 19. G. Luecke, J. P. Mize and W...Design and Evaluation of Self-Checking Systems", Report Submitted to the Mathematical and Information Science Division of the Office of Naval
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-13
... transaction fee for XSP index options. Currently, the Exchange has a $0.18 customer transaction fee per... customer transaction fees for transactions in XSP index options. Eliminating the customer transaction fee... opportunity to pay lower fees for such transactions and provide greater incentives for customers to trade XSP...
Algebraic model checking for Boolean gene regulatory networks.
Tran, Quoc-Nam
2011-01-01
We present a computational method in which modular and Groebner bases (GB) computation in Boolean rings are used for solving problems in Boolean gene regulatory networks (BN). In contrast to other known algebraic approaches, the degree of intermediate polynomials during the calculation of Groebner bases using our method will never grow resulting in a significant improvement in running time and memory space consumption. We also show how calculation in temporal logic for model checking can be done by means of our direct and efficient Groebner basis computation in Boolean rings. We present our experimental results in finding attractors and control strategies of Boolean networks to illustrate our theoretical arguments. The results are promising. Our algebraic approach is more efficient than the state-of-the-art model checker NuSMV on BNs. More importantly, our approach finds all solutions for the BN problems.
Principles of continuous quality improvement applied to intravenous therapy.
Dunavin, M K; Lane, C; Parker, P E
1994-01-01
Documentation of the application of the principles of continuous quality improvement (CQI) to the health care setting is crucial for understanding the transition from traditional management models to CQI models. A CQI project was designed and implemented by the IV Therapy Department at Lawrence Memorial Hospital to test the application of these principles to intravenous therapy and as a learning tool for the entire organization. Through a prototype inventory project, significant savings in cost and time were demonstrated using check sheets, flow diagrams, control charts, and other statistical tools, as well as using the Plan-Do-Check-Act cycle. As a result, a primary goal, increased time for direct patient care, was achieved. Eight hours per week in nursing time was saved, relationships between two work areas were improved, and $6,000 in personnel costs, storage space, and inventory were saved.
Implementation and Analysis of the use of the Blockchain Transactions on the Workings of the Bitcoin
NASA Astrophysics Data System (ADS)
Rizky Fauzi, Muhammad Reza; Michrandi Nasution, Surya; Paryasto, Marisa W.
2017-11-01
The present study discusses the workings of blockchain bitcoin in the transactions sector, on the development of today’s emerging computers in the financial sector of blockchain bitcoin traction. In this case the author analyzes how the transaction is running, as well as how blockchain bitcoin is doing work in transactions on the system to make transactions. Transaction is a data structure that encodes the transfer of values between users with in a bitcoin system. Every transaction is a public entry in this bitcoin blockchain. And become a large transaction bookkeeping global.
5 CFR 919.205 - Why is it important if a particular transaction is a covered transaction?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Why is it important if a particular transaction is a covered transaction? 919.205 Section 919.205 Administrative Personnel OFFICE OF PERSONNEL... (NONPROCUREMENT) Covered Transactions § 919.205 Why is it important if a particular transaction is a covered...
Programming Models for Concurrency and Real-Time
NASA Astrophysics Data System (ADS)
Vitek, Jan
Modern real-time applications are increasingly large, complex and concurrent systems which must meet stringent performance and predictability requirements. Programming those systems require fundamental advances in programming languages and runtime systems. This talk presents our work on Flexotasks, a programming model for concurrent, real-time systems inspired by stream-processing and concurrent active objects. Some of the key innovations in Flexotasks are that it support both real-time garbage collection and region-based memory with an ownership type system for static safety. Communication between tasks is performed by channels with a linear type discipline to avoid copying messages, and by a non-blocking transactional memory facility. We have evaluated our model empirically within two distinct implementations, one based on Purdue’s Ovm research virtual machine framework and the other on Websphere, IBM’s production real-time virtual machine. We have written a number of small programs, as well as a 30 KLOC avionics collision detector application. We show that Flexotasks are capable of executing periodic threads at 10 KHz with a standard deviation of 1.2us and have performance competitive with hand coded C programs.
NASA Astrophysics Data System (ADS)
Burlacu, L.; Cimpoeşu, N.; Bujoreanu, L. G.; Lohan, N. M.
2017-08-01
Ni-Ti shape memory alloys (SMAs) are intelligent alloys which demonstrate unique properties, such as shape memory effect, two-way shape memory effect, super-elasticity and vibration damping which, accompanied by good processability, excellent corrosion resistance and biocompatibility as well as fair wear resistance and cyclic stability, enabled the development of important industrial applications (such as sensors, actuators, fasteners, couplings and valves), medical applications (such as stents, bone implants, orthodontic archwires, minimal invasive surgical equipment) as well as environmental health and safety devices (anti-seismic dampers, fire safety devices). The phase transitions in Ni-Ti SMAs are strongly influenced by processing methods, chemical compositions and thermomechanical history. This paper presents a study of the effects of heat treatment on the mechanical and thermal properties of commercial Ni-Ti shape memory alloy (SMA). The experimental work involved subjecting a SMA rod to heat-treatment consisting in heating up to 500°C, 10 minutes-maintaining and water quenching. Mechanical properties were highlighted by microhardness tests while thermal characteristics were emphasized by differential scanning calorimetry (DSC). The presence of chemical composition fluctuations was checked by X-ray energy dispersive spectroscopy performed with an EDAX Bruker analyzer.
Reduced memory specificity predicts the acquisition of problem solving skills in psychoeducation.
Van Daele, Tom; Van den Bergh, Omer; Van Audenhove, Chantal; Raes, Filip; Hermans, Dirk
2013-03-01
Research has shown that overgeneral autobiographical memory (OGM) is a valid predictor for the course of depression. It is not known, however, whether OGM also moderates information uptake and consolidation in a psychoeducation program to prevent stress, anxiety and depression. The present study was designed to investigate whether the Autobiographical Memory Test (AMT; Williams, & Broadbent, 1986) is a valid predictor for the actual unfolding of skills learned through psychoeducation. The questionnaire included primarily the AMT and the Stress Anxiety Depression Means-Ends Problem Solving Questionnaire (SAD-MEPS). It was filled in prior to and after the psychoeducational course by 23 participants. Correlations were calculated for the AMT at baseline and the differences between the pre and post measurements on the SAD-MEPS. Significant correlations were observed between the number of specific responses and the changes in the number of relevant means (r = .49, p < .01). The sample size was rather small, but several checks were able to reduce the chance of spurious findings. These findings may have important implications for the guidance to and the setup of psychoeducational interventions. Suggestions include screening and memory specificity training prior to course commencement. Copyright © 2011 Elsevier Ltd. All rights reserved.
Remote Memory Access Protocol Target Node Intellectual Property
NASA Technical Reports Server (NTRS)
Haddad, Omar
2013-01-01
The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gylenhaal, J.; Bronevetsky, G.
2007-05-25
CLOMP is the C version of the Livermore OpenMP benchmark deeloped to measure OpenMP overheads and other performance impacts due to threading (like NUMA memory layouts, memory contention, cache effects, etc.) in order to influence future system design. Current best-in-class implementations of OpenMP have overheads at least ten times larger than is required by many of our applications for effective use of OpenMP. This benchmark shows the significant negative performance impact of these relatively large overheads and of other thread effects. The CLOMP benchmark highly configurable to allow a variety of problem sizes and threading effects to be studied andmore » it carefully checks its results to catch many common threading errors. This benchmark is expected to be included as part of the Sequoia Benchmark suite for the Sequoia procurement.« less
Non-binary LDPC-coded modulation for high-speed optical metro networks with backpropagation
NASA Astrophysics Data System (ADS)
Arabaci, Murat; Djordjevic, Ivan B.; Saunders, Ross; Marcoccia, Roberto M.
2010-01-01
To simultaneously mitigate the linear and nonlinear channel impairments in high-speed optical communications, we propose the use of non-binary low-density-parity-check-coded modulation in combination with a coarse backpropagation method. By employing backpropagation, we reduce the memory in the channel and in return obtain significant reductions in the complexity of the channel equalizer which is exponentially proportional to the channel memory. We then compensate for the remaining channel distortions using forward error correction based on non-binary LDPC codes. We propose non-binary-LDPC-coded modulation scheme because, compared to bit-interleaved binary-LDPC-coded modulation scheme employing turbo equalization, the proposed scheme lowers the computational complexity and latency of the overall system while providing impressively larger coding gains.
NASA Technical Reports Server (NTRS)
2004-01-01
KENNEDY SPACE CENTER, FLA. In the Orbiter Processing Facility, from left, United Space Alliance workers Loyd Turner, Craig Meyer and Erik Visser prepare to conduct a fit check of an External Tank (ET) digital still camera in the right-hand liquid oxygen umbilical well on Space Shuttle Atlantis. NASA is pursuing use of the camera, beginning with the Shuttles Return To Flight, to obtain and downlink high-resolution images of the ET following separation of the ET from the orbiter after launch. The Kodak camera will record 24 images, at one frame per 1.5 seconds, on a flash memory card. After orbital insertion, the crew will transfer the images from the memory card to a laptop computer. The files will then be downloaded through the Ku-band system to the Mission Control Center in Houston for analysis.
NASA Technical Reports Server (NTRS)
2004-01-01
KENNEDY SPACE CENTER, FLA. In the Orbiter Processing Facility, from left, United Space Alliance workers Loyd Turner, Craig Meyer and Erik Visser conduct a fit check of an External Tank (ET) digital still camera in the right-hand liquid oxygen umbilical well on Space Shuttle Atlantis. NASA is pursuing use of the camera, beginning with the Shuttles Return To Flight, to obtain and downlink high-resolution images of the ET following separation of the ET from the orbiter after launch. The Kodak camera will record 24 images, at one frame per 1.5 seconds, on a flash memory card. After orbital insertion, the crew will transfer the images from the memory card to a laptop computer. The files will then be downloaded through the Ku-band system to the Mission Control Center in Houston for analysis.
2004-09-17
KENNEDY SPACE CENTER, FLA. - In the Orbiter Processing Facility, from left, United Space Alliance workers Loyd Turner, Craig Meyer and Erik Visser conduct a fit check of an External Tank (ET) digital still camera in the right-hand liquid oxygen umbilical well on Space Shuttle Atlantis. NASA is pursuing use of the camera, beginning with the Shuttle’s Return To Flight, to obtain and downlink high-resolution images of the ET following separation of the ET from the orbiter after launch. The Kodak camera will record 24 images, at one frame per 1.5 seconds, on a flash memory card. After orbital insertion, the crew will transfer the images from the memory card to a laptop computer. The files will then be downloaded through the Ku-band system to the Mission Control Center in Houston for analysis.
2004-09-17
KENNEDY SPACE CENTER, FLA. - In the Orbiter Processing Facility, from left, United Space Alliance workers Loyd Turner, Craig Meyer and Erik Visser prepare to conduct a fit check of an External Tank (ET) digital still camera in the right-hand liquid oxygen umbilical well on Space Shuttle Atlantis. NASA is pursuing use of the camera, beginning with the Shuttle’s Return To Flight, to obtain and downlink high-resolution images of the ET following separation of the ET from the orbiter after launch. The Kodak camera will record 24 images, at one frame per 1.5 seconds, on a flash memory card. After orbital insertion, the crew will transfer the images from the memory card to a laptop computer. The files will then be downloaded through the Ku-band system to the Mission Control Center in Houston for analysis.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-07
... for OMB Review; Comment Request; Foreign Currency Transactions Prohibited Transaction Class Exemption... Administration (EBSA) sponsored information collection request (ICR) titled, ``Foreign Currency Transactions...). SUPPLEMENTARY INFORMATION: The Foreign Currency Transactions Prohibited Transaction Class Exemption permits...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-07
... for OMB Review; Comment Request; Collective Investment Funds Conversion Transactions Prohibited... Investment Funds Conversion Transactions Prohibited Transaction Class Exemption,'' to the Office of... Conversion Transactions Prohibited Transaction Class Exemption permits an employee benefit plan to purchase...
Verification using Satisfiability Checking, Predicate Abstraction, and Craig Interpolation
2008-09-01
297, 2007. 4.10.1 196 [48] Roberto Bruttomesso, Alessandro Cimatti, Anders Franzen, Alberto Grig- gio, Ziyad Hanna, Alexander Nadel, Amit Palti, and...using SAT based conflict analysis. In Formal Methods in Computer Aided Design, pages 33–51, 2002. 1.1, 7 [54] Alessandro Cimatti, Alberto Griggio, and...and D. Vroon. Automatic memory reductions for RTL-level verification. In ICCAD, 2006. 1.2.4, 6.2, 7 [108] Joao P. Marques-Silva and Karem A. Sakallah
1985-04-01
and equipment whose operation can be verified with a visual or aural check. The sequence of outputs shall be cyclic, with provisions to stop the...private memory. The decision to provide spare, expansion capability, or a combination of both shall be based on life cycle cost (to the best extent...Computational System should be determined in conjunction with a computer expert (if possible). In any event, it is best to postpone completing - this
ERIC Educational Resources Information Center
Dymock, Susan; Nicholson, Tom
2017-01-01
The ubiquitous weekly spelling test assumes that words are best learned by memorisation and testing but is this the best way? This study compared two well-known approaches to spelling instruction, the rule based and visual memory approaches. A group of 55 seven-year-olds in two Year 3 classrooms was taught spelling in small groups for three…
17 CFR 5.9 - Security deposits for retail forex transactions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... forex transactions. 5.9 Section 5.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.9 Security deposits for retail forex transactions. (a) Each futures commission merchant engaging, or offering to engage, in retail forex transactions...
17 CFR 5.9 - Security deposits for retail forex transactions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... forex transactions. 5.9 Section 5.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.9 Security deposits for retail forex transactions. (a) Each futures commission merchant engaging, or offering to engage, in retail forex transactions...
17 CFR 5.9 - Security deposits for retail forex transactions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... forex transactions. 5.9 Section 5.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.9 Security deposits for retail forex transactions. (a) Each futures commission merchant engaging, or offering to engage, in retail forex transactions...
26 CFR 1.1221-2 - Hedging transactions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... another position such as a purchased option, then it may be a hedging transaction. (4) Recycling. A... liability as a hedge of another asset or liability (recycling). (5) Transactions not entered into primarily... enters into a hedging transaction (including recycling an existing hedging transaction) must clearly...
26 CFR 1.1221-2 - Hedging transactions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... another position such as a purchased option, then it may be a hedging transaction. (4) Recycling. A... liability as a hedge of another asset or liability (recycling). (5) Transactions not entered into primarily... enters into a hedging transaction (including recycling an existing hedging transaction) must clearly...
26 CFR 1.1221-2 - Hedging transactions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... another position such as a purchased option, then it may be a hedging transaction. (4) Recycling. A... liability as a hedge of another asset or liability (recycling). (5) Transactions not entered into primarily... enters into a hedging transaction (including recycling an existing hedging transaction) must clearly...
26 CFR 1.1221-2 - Hedging transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... another position such as a purchased option, then it may be a hedging transaction. (4) Recycling. A... liability as a hedge of another asset or liability (recycling). (5) Transactions not entered into primarily... enters into a hedging transaction (including recycling an existing hedging transaction) must clearly...
26 CFR 1.1221-2 - Hedging transactions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... another position such as a purchased option, then it may be a hedging transaction. (4) Recycling. A... liability as a hedge of another asset or liability (recycling). (5) Transactions not entered into primarily... enters into a hedging transaction (including recycling an existing hedging transaction) must clearly...
31 CFR 510.404 - Transactions ordinarily incident to a licensed transaction authorized.
Code of Federal Regulations, 2013 CFR
2013-07-01
... licensed transaction authorized. 510.404 Section 510.404 Money and Finance: Treasury Regulations Relating... KOREA SANCTIONS REGULATIONS Interpretations § 510.404 Transactions ordinarily incident to a licensed... blocked pursuant to § 510.201(b); or (b) An ordinarily incident transaction, not explicitly authorized...
31 CFR 510.404 - Transactions ordinarily incident to a licensed transaction authorized.
Code of Federal Regulations, 2011 CFR
2011-07-01
... licensed transaction authorized. 510.404 Section 510.404 Money and Finance: Treasury Regulations Relating... KOREA SANCTIONS REGULATIONS Interpretations § 510.404 Transactions ordinarily incident to a licensed... blocked pursuant to § 510.201(b); or (b) An ordinarily incident transaction, not explicitly authorized...
31 CFR 510.404 - Transactions ordinarily incident to a licensed transaction authorized.
Code of Federal Regulations, 2014 CFR
2014-07-01
... licensed transaction authorized. 510.404 Section 510.404 Money and Finance: Treasury Regulations Relating... KOREA SANCTIONS REGULATIONS Interpretations § 510.404 Transactions ordinarily incident to a licensed... blocked pursuant to § 510.201(b); or (b) An ordinarily incident transaction, not explicitly authorized...
17 CFR 37.8 - Information relating to transactions on derivatives transaction execution facilities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Information relating to transactions on derivatives transaction execution facilities. 37.8 Section 37.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES TRANSACTION EXECUTION FACILITIES § 37.8...
75 FR 76139 - Real-Time Public Reporting of Swap Transaction Data
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-07
... Transaction Data; Proposed Rule #0;#0;Federal Register / Vol. 75 , No. 234 / Tuesday, December 7, 2010...-Time Public Reporting of Swap Transaction Data AGENCY: Commodity Futures Trading Commission. ACTION...-time public reporting of swap transaction and pricing data for all swap transactions. Additionally, the...
17 CFR 5.20 - Special calls for account and transaction information.
Code of Federal Regulations, 2013 CFR
2013-04-01
...'s account in retail forex transactions. (c) Special calls for information on open transactions in... introducing brokers. Upon special call by the Commission for information relating to retail forex transactions... concerning accounts of traders owning or controlling such retail forex transaction positions, as may be...
17 CFR 5.20 - Special calls for account and transaction information.
Code of Federal Regulations, 2012 CFR
2012-04-01
...'s account in retail forex transactions. (c) Special calls for information on open transactions in... introducing brokers. Upon special call by the Commission for information relating to retail forex transactions... concerning accounts of traders owning or controlling such retail forex transaction positions, as may be...
17 CFR 5.20 - Special calls for account and transaction information.
Code of Federal Regulations, 2014 CFR
2014-04-01
...'s account in retail forex transactions. (c) Special calls for information on open transactions in... introducing brokers. Upon special call by the Commission for information relating to retail forex transactions... concerning accounts of traders owning or controlling such retail forex transaction positions, as may be...
12 CFR 226.8 - Identification of transactions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... either the date of the transaction or the date of debiting the transaction to the consumer's account are... consumer, if the number or symbol reasonably identifies that transaction with that creditor, and if the... the consumer with point-of-sale documentation for that transaction; and (4) the creditor treats an...
26 CFR 157.5891-1 - Imposition of excise tax on structured settlement factoring transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... settlement factoring transactions. 157.5891-1 Section 157.5891-1 Internal Revenue INTERNAL REVENUE SERVICE... SETTLEMENT FACTORING TRANSACTIONS Tax on Structured Settlement Factoring Transactions § 157.5891-1 Imposition of excise tax on structured settlement factoring transactions. (a) In general. Section 5891 imposes...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... for OMB Review; Comment Request; Prohibited Transaction Class Exemption 75-1, Security Transactions... request (ICR) titled, ``Prohibited Transaction Class Exemption 75-1, Security Transactions with Broker....gov . Authority: 44 U.S.C. 3507(a)(1)(D). SUPPLEMENTARY INFORMATION: The Prohibited Transaction Class...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
... for OMB Review; Comment Request; Plan Asset Transactions Determined by In-House Asset Managers Under...) titled, ``Plan Asset Transactions Determined by In-House Asset Managers under Prohibited Transaction... Transaction Class Exemption for Plan Asset Transactions Determined by In-House Asset Managers (PTE 96-23...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... the MSRB's Real-time Transaction Reporting System (``RTRS''). The proposed rule change consists of fee changes to the MSRB's Real-Time Transaction Price Service and Comprehensive Transaction Price Service of... Consisting of Fee Changes to Its Real-Time Transaction Price Service and Comprehensive Transaction Price...
Transactions in domain-specific information systems
NASA Astrophysics Data System (ADS)
Zacek, Jaroslav
2017-07-01
Substantial number of the current information system (IS) implementations is based on transaction approach. In addition, most of the implementations are domain-specific (e.g. accounting IS, resource planning IS). Therefore, we have to have a generic transaction model to build and verify domain-specific IS. The paper proposes a new transaction model for domain-specific ontologies. This model is based on value oriented business process modelling technique. The transaction model is formalized by the Petri Net theory. First part of the paper presents common business processes and analyses related to business process modeling. Second part defines the transactional model delimited by REA enterprise ontology paradigm and introduces states of the generic transaction model. The generic model proposal is defined and visualized by the Petri Net modelling tool. Third part shows application of the generic transaction model. Last part of the paper concludes results and discusses a practical usability of the generic transaction model.
Picard, Laurence; Mayor-Dubois, Claire; Maeder, Philippe; Kalenzaga, Sandrine; Abram, Maria; Duval, Céline; Eustache, Francis; Roulet-Perez, Eliane; Piolino, Pascale
2013-06-01
Neuropsychological and neuroimaging data suggest that the self-memory system can be fractionated into three functionally independent systems processing personal information at several levels of abstraction, including episodic memories of one's life (episodic autobiographical memory, EAM), semantic knowledge of facts about one's life (semantic autobiographical memory, SAM), and semantic knowledge of one's personality [conceptual self, (CS)]. Through the study of two developmental amnesic patients suffering of neonatal brain injuries, we explored how the different facets of the self-memory system develop when growing up with bilateral hippocampal atrophy. Neuropsychological evaluations showed that both of them suffered from dramatic episodic learning disability with no sense of recollection (Remember/Know procedure), whereas their semantic abilities differed, being completely preserved (Valentine) or not (Jocelyn). Magnetic resonance imaging, including quantitative volumetric measurements of the hippocampus and adjacent (entorhinal, perirhinal, and temporopolar) cortex, showed severe bilateral atrophy of the hippocampus in both patients, with additional atrophy of adjacent cortex in Jocelyn. Exploration of EAM and SAM according to lifetime periods covering the entire lifespan (TEMPAu task, Piolino et al., 2009) showed that both patients had marked impairments in EAM, as they lacked specificity, details and sense of recollection, whereas SAM was completely normal in Valentine, but impaired in Jocelyn. Finally, measures of patients' CS (Tennessee Self-Concept Scale, Fitts and Warren, 1996), checked by their mothers, were generally within normal range, but both patients showed a more positive self-concept than healthy controls. These two new cases support a modular account of the medial-temporal lobe with episodic memory and recollection depending on the hippocampus, and semantic memory and familiarity on adjacent cortices. Furthermore, they highlight developmental episodic and semantic functional independence within the self-memory system suggesting that SAM and CS may be acquired without episodic memories. Copyright © 2012 Elsevier Ltd. All rights reserved.
A Tutorial on Parallel and Concurrent Programming in Haskell
NASA Astrophysics Data System (ADS)
Peyton Jones, Simon; Singh, Satnam
This practical tutorial introduces the features available in Haskell for writing parallel and concurrent programs. We first describe how to write semi-explicit parallel programs by using annotations to express opportunities for parallelism and to help control the granularity of parallelism for effective execution on modern operating systems and processors. We then describe the mechanisms provided by Haskell for writing explicitly parallel programs with a focus on the use of software transactional memory to help share information between threads. Finally, we show how nested data parallelism can be used to write deterministically parallel programs which allows programmers to use rich data types in data parallel programs which are automatically transformed into flat data parallel versions for efficient execution on multi-core processors.
Brain Energetics During the Sleep-Wake Cycle
DiNuzzo, Mauro; Nedergaard, Maiken
2017-01-01
Brain activity during wakefulness is associated with high metabolic rates that are believed to support information processing and memory encoding. In spite of loss of consciousness, sleep still carries a substantial energy cost. Experimental evidence supports a cerebral metabolic shift taking place during sleep that suppresses aerobic glycolysis, a hallmark of environment-oriented waking behavior and synaptic plasticity. Recent studies reveal that glial astrocytes respond to the reduction of wake-promoting neuromodulators by regulating volume, composition and glymphatic drainage of interstitial fluid. These events are accompanied by changes in neuronal discharge patterns, astrocyte-neuron interactions, synaptic transactions and underlying metabolic features. Internally-generated neuronal activity and network homeostasis are proposed to account for the high sleep-related energy demand. PMID:29024871
SU-E-J-60: Efficient Monte Carlo Dose Calculation On CPU-GPU Heterogeneous Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xiao, K; Chen, D. Z; Hu, X. S
Purpose: It is well-known that the performance of GPU-based Monte Carlo dose calculation implementations is bounded by memory bandwidth. One major cause of this bottleneck is the random memory writing patterns in dose deposition, which leads to several memory efficiency issues on GPU such as un-coalesced writing and atomic operations. We propose a new method to alleviate such issues on CPU-GPU heterogeneous systems, which achieves overall performance improvement for Monte Carlo dose calculation. Methods: Dose deposition is to accumulate dose into the voxels of a dose volume along the trajectories of radiation rays. Our idea is to partition this proceduremore » into the following three steps, which are fine-tuned for CPU or GPU: (1) each GPU thread writes dose results with location information to a buffer on GPU memory, which achieves fully-coalesced and atomic-free memory transactions; (2) the dose results in the buffer are transferred to CPU memory; (3) the dose volume is constructed from the dose buffer on CPU. We organize the processing of all radiation rays into streams. Since the steps within a stream use different hardware resources (i.e., GPU, DMA, CPU), we can overlap the execution of these steps for different streams by pipelining. Results: We evaluated our method using a Monte Carlo Convolution Superposition (MCCS) program and tested our implementation for various clinical cases on a heterogeneous system containing an Intel i7 quad-core CPU and an NVIDIA TITAN GPU. Comparing with a straightforward MCCS implementation on the same system (using both CPU and GPU for radiation ray tracing), our method gained 2-5X speedup without losing dose calculation accuracy. Conclusion: The results show that our new method improves the effective memory bandwidth and overall performance for MCCS on the CPU-GPU systems. Our proposed method can also be applied to accelerate other Monte Carlo dose calculation approaches. This research was supported in part by NSF under Grants CCF-1217906, and also in part by a research contract from the Sandia National Laboratories.« less
12 CFR 551.130 - When must I settle a securities transaction?
Code of Federal Regulations, 2010 CFR
2010-01-01
... RECORDKEEPING AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS Settlement of Securities Transactions § 551.130 When must I settle a securities transaction? (a) You may not effect or enter into a contract... 12 Banks and Banking 5 2010-01-01 2010-01-01 false When must I settle a securities transaction...
How to Use EMTS to Report Transactions for Fuel Programs
Reporting instructions for parties who transact Renewable Identification Numbers (RINs) and must enter transaction information in the EPA Moderated Transaction System (EMTS) within five (5) business days.
Global exponential stability of BAM neural networks with time-varying delays: The discrete-time case
NASA Astrophysics Data System (ADS)
Raja, R.; Marshal Anthoni, S.
2011-02-01
This paper deals with the problem of stability analysis for a class of discrete-time bidirectional associative memory (BAM) neural networks with time-varying delays. By employing the Lyapunov functional and linear matrix inequality (LMI) approach, a new sufficient conditions is proposed for the global exponential stability of discrete-time BAM neural networks. The proposed LMI based results can be easily checked by LMI control toolbox. Moreover, an example is also provided to demonstrate the effectiveness of the proposed method.
Passivity analysis for uncertain BAM neural networks with time delays and reaction-diffusions
NASA Astrophysics Data System (ADS)
Zhou, Jianping; Xu, Shengyuan; Shen, Hao; Zhang, Baoyong
2013-08-01
This article deals with the problem of passivity analysis for delayed reaction-diffusion bidirectional associative memory (BAM) neural networks with weight uncertainties. By using a new integral inequality, we first present a passivity condition for the nominal networks, and then extend the result to the case with linear fractional weight uncertainties. The proposed conditions are expressed in terms of linear matrix inequalities, and thus can be checked easily. Examples are provided to demonstrate the effectiveness of the proposed results.
Authenticating Secure Tokens Using Slow Memory Access
1999-01-01
Cryptology— CRYPTO ’97 Proceedings, Springer- Verlag, 1997, pp. 513–525. [CP93] D . Chaum and T. Pederson, “Wallet Databases with Observers,” Advances in...96 Proceedings, Springer-Verlag, 1996, pp. 1–15. [BDL97] D . Boneh, R.A. Demillo, R.J. Lip- ton, “On the Importance of Check- ing Cryptographic...Protocols for Faults,” Advances in Cryptology—EUROCRYPT ’97 Proceedings, Springer-Verlag, 1997, pp. 37–51. [BGW98] M. Briceno, I. Goldberg, D . Wagner
31 CFR 560.555 - Winding-down of transactions prohibited by § 560.215.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Winding-down of transactions... Winding-down of transactions prohibited by § 560.215. (a) Except as set forth in paragraphs (b) and (c) of this section, all transactions ordinarily incident and necessary to the winding-down of transactions...
31 CFR 560.555 - Winding-down of transactions prohibited by § 560.215.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Winding-down of transactions... Winding-down of transactions prohibited by § 560.215. (a) Except as set forth in paragraphs (b) and (c) of this section, all transactions ordinarily incident and necessary to the winding-down of transactions...
22 CFR 208.205 - Why is it important to know if a particular transaction is a covered transaction?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Why is it important to know if a particular transaction is a covered transaction? 208.205 Section 208.205 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Covered Transactions § 208.205 Why is it...
34 CFR 85.205 - Why is it important if a particular transaction is a covered transaction?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 34 Education 1 2010-07-01 2010-07-01 false Why is it important if a particular transaction is a covered transaction? 85.205 Section 85.205 Education Office of the Secretary, Department of Education GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Covered Transactions § 85.205 Why is it important if a...
21 CFR 1404.205 - Why is it important if a particular transaction is a covered transaction?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Why is it important if a particular transaction is a covered transaction? 1404.205 Section 1404.205 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Covered Transactions § 1404.205 Why is it...
26 CFR 31.3406(b)(3)-5 - Reportable payments of payment card and third party network transactions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... party network transactions. 31.3406(b)(3)-5 Section 31.3406(b)(3)-5 Internal Revenue INTERNAL REVENUE... Reportable payments of payment card and third party network transactions. (a) Payment card and third party network transactions subject to backup withholding. The gross amount of a reportable transaction that is...
12 CFR 12.7 - Securities trading policies and procedures.
Code of Federal Regulations, 2011 CFR
2011-01-01
... has no direct or indirect influence or control over the transaction; (2) The transaction is in mutual fund shares; (3) The transaction is in government securities; or (4) The transactions involve an...
Code of Federal Regulations, 2011 CFR
2011-04-01
... Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES TRANSACTION EXECUTION FACILITIES § 37.2 Exemption. Contracts, agreements or transactions traded on a derivatives transaction... derivatives transaction execution facilities. [71 FR 37822, July 3, 2006] ...
Ehrensperger, Michael M; Taylor, Kirsten I; Berres, Manfred; Foldi, Nancy S; Dellenbach, Myriam; Bopp, Irene; Gold, Gabriel; von Gunten, Armin; Inglin, Daniel; Müri, René; Rüegger, Brigitte; Kressig, Reto W; Monsch, Andreas U
2014-01-01
Optimal identification of subtle cognitive impairment in the primary care setting requires a very brief tool combining (a) patients' subjective impairments, (b) cognitive testing, and (c) information from informants. The present study developed a new, very quick and easily administered case-finding tool combining these assessments ('BrainCheck') and tested the feasibility and validity of this instrument in two independent studies. We developed a case-finding tool comprised of patient-directed (a) questions about memory and depression and (b) clock drawing, and (c) the informant-directed 7-item version of the Informant Questionnaire on Cognitive Decline in the Elderly (IQCODE). Feasibility study: 52 general practitioners rated the feasibility and acceptance of the patient-directed tool. Validation study: An independent group of 288 Memory Clinic patients (mean ± SD age = 76.6 ± 7.9, education = 12.0 ± 2.6; 53.8% female) with diagnoses of mild cognitive impairment (n = 80), probable Alzheimer's disease (n = 185), or major depression (n = 23) and 126 demographically matched, cognitively healthy volunteer participants (age = 75.2 ± 8.8, education = 12.5 ± 2.7; 40% female) partook. All patient and healthy control participants were administered the patient-directed tool, and informants of 113 patient and 70 healthy control participants completed the very short IQCODE. Feasibility study: General practitioners rated the patient-directed tool as highly feasible and acceptable. Validation study: A Classification and Regression Tree analysis generated an algorithm to categorize patient-directed data which resulted in a correct classification rate (CCR) of 81.2% (sensitivity = 83.0%, specificity = 79.4%). Critically, the CCR of the combined patient- and informant-directed instruments (BrainCheck) reached nearly 90% (that is 89.4%; sensitivity = 97.4%, specificity = 81.6%). A new and very brief instrument for general practitioners, 'BrainCheck', combined three sources of information deemed critical for effective case-finding (that is, patients' subject impairments, cognitive testing, informant information) and resulted in a nearly 90% CCR. Thus, it provides a very efficient and valid tool to aid general practitioners in deciding whether patients with suspected cognitive impairments should be further evaluated or not ('watchful waiting').
ERIC Educational Resources Information Center
Casey, Carl
1992-01-01
Discussion of transactions in computer-based instruction for ill-structured and visual domains focuses on two transactions developed for meteorology training that provide the capability to interact with video and graphic images at a very detailed level. Potential applications for the transactions are suggested, and early evaluation reports are…
Code of Federal Regulations, 2010 CFR
2010-01-01
... with a participant if a principal of the transaction is excluded? 919.405 Section 919.405 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED... § 919.405 May I enter into a covered transaction with a participant if a principal of the transaction is...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-09
... transactions with foreign persons. In nonbenchmark years, the universe estimates covering these transactions... nonbenchmark years, the universe estimates covering these transactions would be derived from the sample data...
Molecular dynamics of conformational substates for a simplified protein model
NASA Astrophysics Data System (ADS)
Grubmüller, Helmut; Tavan, Paul
1994-09-01
Extended molecular dynamics simulations covering a total of 0.232 μs have been carried out on a simplified protein model. Despite its simplified structure, that model exhibits properties similar to those of more realistic protein models. In particular, the model was found to undergo transitions between conformational substates at a time scale of several hundred picoseconds. The computed trajectories turned out to be sufficiently long as to permit a statistical analysis of that conformational dynamics. To check whether effective descriptions neglecting memory effects can reproduce the observed conformational dynamics, two stochastic models were studied. A one-dimensional Langevin effective potential model derived by elimination of subpicosecond dynamical processes could not describe the observed conformational transition rates. In contrast, a simple Markov model describing the transitions between but neglecting dynamical processes within conformational substates reproduced the observed distribution of first passage times. These findings suggest, that protein dynamics generally does not exhibit memory effects at time scales above a few hundred picoseconds, but confirms the existence of memory effects at a picosecond time scale.
Shape memory polymeric composites sensing by optic fibre Bragg gratings: A very first approach
NASA Astrophysics Data System (ADS)
Quadrini, Fabrizio; Santo, Loredana; Ciminello, Monica; Concilio, Antonio; Volponi, Ruggero; Spena, Paola
2016-05-01
Shape memory polymer composites (SMPCs) have the potential for many applications in aerospace, spanning from self-repairing of structures to self-deploying of antennas, solar sails, or functional devices (e.g. for grabbing small space debris). In all these cases, it may be essential to have information about their configuration at different stages of shape recovery. In this study, the strain history of a prepreg carbon fibre system, cured with a shape memory polymer (SMP) interlayer, is monitored through a Fibre Bragg Grating (FBG), a fibre optic sensor device. SMPC has been manufactured by using traditional technologies for aerospace. After manufacturing cylindrical shape samples, an external fibre optic system is added to the composite structure; this system is especially suited for high temperatures which are necessary for SMP recovery and composite softening. Sensor functionality is checked before and after each strain history path. Optic fibre arrangement is optimized to avoid unwanted breakings whereas strains are limited by fibre collapsing, i.e. within nominal 2% of deformation. Dynamic information about shape recovery gives fundamental insights about strain evolution during time as well as its spatial distribution.
Viard, Armelle; Lebreton, Karine; Chételat, Gaël; Desgranges, Béatrice; Landeau, Brigitte; Young, Alan; De La Sayette, Vincent; Eustache, Francis; Piolino, Pascale
2010-01-01
We previously demonstrated that Episodic Autobiographical Memories (EAMs) rely on a network of brain regions comprising the medial temporal lobe (MTL) and distributed neocortical regions regardless of their remoteness. The findings supported the model of memory consolidation which proposes a permanent role of MTL during EAM retrieval (Multiple-Trace Theory or MTT) rather than a temporary role (standard model). Our present aim was to expand the results by examining the interactions between the MTL and neocortical regions (or MTL-neocortical links) during EAM retrieval with varying retention intervals. We used an experimental paradigm specially designed to engage aged participants in the recollection of EAMs, extracted from five different time-periods, covering their whole life-span, in order to examine correlations between activation in the MTL and neocortical regions. The nature of the memories was checked at debriefing by means of behavioral measures to control the degree of episodicity and properties of memories. Targeted correlational analyses carried out on the MTL, frontal, lateral temporal and posterior regions revealed strong links between the MTL and neocortex during the retrieval of both recent and remote EAMs, challenging the standard model of memory consolidation and supporting MTT instead. Further confirmation was given by results showing that activation in the left and right hippocampi significantly correlated during the retrieval of both recent and remote memories. Correlations among extra-MTL neocortical regions also emerged for all time-periods, confirming the critical role of the prefrontal, temporal (lateral temporal cortex and temporal pole), precuneus and posterior cingulate regions in EAM retrieval. Overall, this paper emphasizes the role of a bilateral network of MTL and neocortical areas whose activation correlate during the recollection of rich phenomenological recent and remote EAMs. PMID:19338022
21 CFR 1310.08 - Excluded transactions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... including anhydrous hydrogen chloride. (b) Exports, transshipments, and international transactions of hydrochloric (including anhydrous hydrogen chloride) and sulfuric acids, except for exports, transshipments and... less, and no greater than one package per transaction. (g) Import transactions of anhydrous hydrogen...
21 CFR 1310.08 - Excluded transactions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... including anhydrous hydrogen chloride. (b) Exports, transshipments, and international transactions of hydrochloric (including anhydrous hydrogen chloride) and sulfuric acids, except for exports, transshipments and... less, and no greater than one package per transaction. (g) Import transactions of anhydrous hydrogen...
21 CFR 1310.08 - Excluded transactions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... including anhydrous hydrogen chloride. (b) Exports, transshipments, and international transactions of hydrochloric (including anhydrous hydrogen chloride) and sulfuric acids, except for exports, transshipments and... less, and no greater than one package per transaction. (g) Import transactions of anhydrous hydrogen...
21 CFR 1310.08 - Excluded transactions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... including anhydrous hydrogen chloride. (b) Exports, transshipments, and international transactions of hydrochloric (including anhydrous hydrogen chloride) and sulfuric acids, except for exports, transshipments and... less, and no greater than one package per transaction. (g) Import transactions of anhydrous hydrogen...
Perceptual impairment in face identification with poor sleep
Beattie, Louise; Walsh, Darragh; McLaren, Jessica; Biello, Stephany M.
2016-01-01
Previous studies have shown impaired memory for faces following restricted sleep. However, it is not known whether lack of sleep impairs performance on face identification tasks that do not rely on recognition memory, despite these tasks being more prevalent in security and forensic professions—for example, in photo-ID checks at national borders. Here we tested whether poor sleep affects accuracy on a standard test of face-matching ability that does not place demands on memory: the Glasgow Face-Matching Task (GFMT). In Experiment 1, participants who reported sleep disturbance consistent with insomnia disorder show impaired accuracy on the GFMT when compared with participants reporting normal sleep behaviour. In Experiment 2, we then used a sleep diary method to compare GFMT accuracy in a control group to participants reporting poor sleep on three consecutive nights—and again found lower accuracy scores in the short sleep group. In both experiments, reduced face-matching accuracy in those with poorer sleep was not associated with lower confidence in their decisions, carrying implications for occupational settings where identification errors made with high confidence can have serious outcomes. These results suggest that sleep-related impairments in face memory reflect difficulties in perceptual encoding of identity, and point towards metacognitive impairment in face matching following poor sleep. PMID:27853547
Memory reconsolidation may be disrupted by a distractor stimulus presented during reactivation
Crestani, Ana Paula; Zacouteguy Boos, Flávia; Haubrich, Josué; Ordoñez Sierra, Rodrigo; Santana, Fabiana; Molina, Johanna Marcela Duran; Cassini, Lindsey de Freitas; Alvares, Lucas de Oliveira; Quillfeldt, Jorge Alberto
2015-01-01
Memories can be destabilized by the reexposure to the training context, and may reconsolidate into a modified engram. Reconsolidation relies on some particular molecular mechanisms involving LVGCCs and GluN2B-containing NMDARs. In this study we investigate the interference caused by the presence of a distractor - a brief, unanticipated stimulus that impair a fear memory expression - during the reactivation session, and tested the hypothesis that this disruptive effect relies on a reconsolidation process. Rats previously trained in the contextual fear conditioning (CFC) were reactivated in the presence or absence of a distractor stimulus. In the test, groups reactivated in the original context with distractor displayed a reduction of the freezing response lasting up to 20 days. To check for the involvement of destabilization / reconsolidation mechanisms, we studied the effect of systemic nimodipine (a L-VGCC blocker) or intra-CA1 ifenprodil (a selective GluN2B/NMDAR antagonist) infused right before the reactivation session. Both treatments were able to prevent the disruptive effect of distraction. Ifenprodil results also bolstered the case for hippocampus as the putative brain structure hosting this phenomenon. Our results provide some evidence in support of a behavioral, non-invasive procedure that was able to disrupt an aversive memory in a long-lasting way. PMID:26328547
Vanneste, Sandrine; Baudouin, Alexia; Bouazzaoui, Badiâa; Taconnat, Laurence
2016-07-01
Time-based prospective memory (TBPM) is required when it is necessary to remember to perform an action at a specific future point in time. This type of memory has been found to be particularly sensitive to ageing, probably because it requires a self-initiated response at a specific time. In this study, we sought to examine the involvement of temporal processes in the time monitoring strategy, which has been demonstrated to be a decisive factor in TBPM efficiency. We compared the performance of young and older adults in a TBPM task in which they had to press a response button every minute while categorising words. The design allowed participants to monitor time by checking a clock whenever they decided. Participants also completed a classic time-production task and several executive tasks assessing inhibition, updating and shifting processes. Our results confirm an age-related lack of accuracy in prospective memory performance, which seems to be related to a deficient strategic use of time monitoring. This could in turn be partially explained by age-related temporal deficits, as evidenced in the duration production task. These findings suggest that studies designed to investigate the age effect in TBPM tasks should consider the contribution of temporal mechanisms.
Distributed shared memory for roaming large volumes.
Castanié, Laurent; Mion, Christophe; Cavin, Xavier; Lévy, Bruno
2006-01-01
We present a cluster-based volume rendering system for roaming very large volumes. This system allows to move a gigabyte-sized probe inside a total volume of several tens or hundreds of gigabytes in real-time. While the size of the probe is limited by the total amount of texture memory on the cluster, the size of the total data set has no theoretical limit. The cluster is used as a distributed graphics processing unit that both aggregates graphics power and graphics memory. A hardware-accelerated volume renderer runs in parallel on the cluster nodes and the final image compositing is implemented using a pipelined sort-last rendering algorithm. Meanwhile, volume bricking and volume paging allow efficient data caching. On each rendering node, a distributed hierarchical cache system implements a global software-based distributed shared memory on the cluster. In case of a cache miss, this system first checks page residency on the other cluster nodes instead of directly accessing local disks. Using two Gigabit Ethernet network interfaces per node, we accelerate data fetching by a factor of 4 compared to directly accessing local disks. The system also implements asynchronous disk access and texture loading, which makes it possible to overlap data loading, volume slicing and rendering for optimal volume roaming.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Forfia, David; Knight, Mark; Melton, Ron
The topic of “transactive energy” has received growing attention over the past eighteen months. It has been a part, for example, of the NY Reforming the Energy Vision discussions and the topic of activities such as the National Institute of Standards Transactive Energy Challenge. The growing discussion stems from the realization that new approaches are needed to efficiently and reliably integrate growing numbers of distributed energy resources. In anticipation of the applicability of transactive energy systems to emerging challenges in Grid integration, the GridWise® Architecture Council (GWAC) began to build a community of practice in the area of transactive energymore » systems. Starting with a workshop on the topic of “transactive energy” in May 2011, the Council brought together about a dozen interested researchers and practitioners from utilities, vendors, labs and academia to compare their approaches and experience in order to create common definitions and understanding within this topical area. This was followed in March 2012 with a second workshop during which about twice as many attendees continued the discussion. At this workshop the need for both a roadmap and a document documenting the foundations of transactive energy, common vocabulary and other definitional aspects was recognized. These two workshops led to the Council organizing the First International Conference and Workshop on Transactive Energy which took place May 23 – 24, 2013 in Portland, Oregon. The Council has continued this work with additional topical workshops, the Second International Conference and Workshop on Transactive Energy held in December 2014, and is currently organizing the Third International Conference and Workshop on Transactive Energy Systems to be held in May 2016. This article provides a summary of the Council’s work to build the community of practice through creation of a Transactive Energy Framework document and related activities. In addition to seeing transactive energy discussions on the agenda for many conferences there are also group activities relating to transactive energy being coordinated by both NIST and SGIP with which GWAC is also involved. The NIST work aims to develop and enhance modeling and simulation tools and integration into modeling and simulation platforms for Transactive Energy evaluation, as well as demonstrate how different transactive approaches may be used to improve reliability and efficiency of the electric grid. This will be accomplished through development of a set of scenarios that can serve as ongoing reference points for modeling and simulation. It is also an example of helping to develop a Transactive Energy community. The ongoing Transactive Energy Coordination Group formed by SGIP reviews the progress and directions of transactive energy activities in related parts of the SGIP and collaborating organizations such as GWAC. One of its activities is assembling a core set of transactive energy use cases as representative of the transactive energy interface requirements. This will enable assessment of interoperability requirements for transactive energy applications and an analysis of standards coverage, gaps, and future needs.« less
Code of Federal Regulations, 2011 CFR
2011-01-01
... 2 Grants and Agreements 1 2011-01-01 2011-01-01 false Which nonprocurement transactions, in addition to those listed in 2 CFR 180.215, are not covered transactions? 1400.215 Section 1400.215 Grants... addition to those listed in 2 CFR 180.215, are not covered transactions? (a) Transactions entered into...
Jurkowski, Susanne; Hänze, Martin
2015-09-01
Transactive communication means referring to and building on a learning partner's idea, by, for example, extending the partner's idea or interlinking the partner's idea with an idea of one's own. This transforms the partner's idea into a more elaborate one. Previous research found a positive relationship between students' transactive communication and their learning results when working in small groups. To increase the benefits of cooperation, we developed and tested a module for training students in transactive communication. We assumed that this training would enhance students' transactive communication and also increase their knowledge acquisition during cooperative learning. Further, we distinguished between an actor's transactive communication and a learning partner's transactive communication and expected both to be positively associated with an actor's knowledge acquisition. Participants were 80 university students. In an experiment with pre- and post-test measurements, transactive communication was measured by coding students' communication in a cooperative learning situation before training and in another cooperative learning situation after training. For the post-test cooperative learning situation, knowledge was pre-tested and post-tested. Trained students outperformed controls in transactive communication and in knowledge acquisition. Positive training effects on actors' knowledge acquisition were partially mediated by the improved actors' transactive communication. Moreover, actors' knowledge acquisition was positively influenced by learning partners' transactive communication. Results show a meaningful increase in the benefits of cooperation through the training in transactive communication. Furthermore, findings indicate that students benefit from both elaborating on their partner's ideas and having their own ideas elaborated on. © 2015 The British Psychological Society.
A transaction assessment method for allocation of transmission services
NASA Astrophysics Data System (ADS)
Banunarayanan, Venkatasubramaniam
The purpose of this research is to develop transaction assessment methods for allocating transmission services that are provided by an area/utility to power transactions. Transmission services are the services needed to deliver, or provide the capacity to deliver, real and reactive power from one or more supply points to one or more delivery points. As the number of transactions increase rapidly in the emerging deregulated environment, accurate quantification of the transmission services an area/utility provides to accommodate a transaction is becoming important, because then appropriate pricing schemes can be developed to compensate for the parties that provide these services. The Allocation methods developed are based on the "Fair Resource Allocation Principle" and they determine for each transaction the following: the flowpath of the transaction (both real and reactive power components), generator reactive power support from each area/utility, real power loss support from each area/utility. Further, allocation methods for distributing the cost of relieving congestion on transmission lines caused by transactions are also developed. The main feature of the proposed methods is representation of actual usage of the transmission services by the transactions. The proposed method is tested extensively on a variety of systems. The allocation methods developed in this thesis for allocation of transmission services to transactions is not only useful in studying the impact of transactions on a transmission system in a multi-transaction case, but they are indeed necessary to meet the criteria set forth by FERC with regard to pricing based on actual usage. The "consistency" of the proposed allocation methods has also been investigated and tested.
Bauermeister, José A; Eaton, Lisa; Meanley, Steven; Pingel, Emily S
2017-05-01
Transactional sex refers to the commodification of the body in exchange for shelter, food, and other goods and needs. Transactional sex has been associated with negative health outcomes including HIV infection, psychological distress, and substance use and abuse. Compared with the body of research examining transactional sex among women, less is known about the prevalence and correlates of transactional sex among men. Using data from a cross-sectional survey of young men who have sex with men (ages 18-29) living in the Detroit Metro Area ( N = 357; 9% HIV infected; 49% Black, 26% White, 16% Latino, 9% Other race), multivariate logistic regression analyses examined the association between transactional sex with regular and casual partners and key psychosocial factors (e.g., race/ethnicity, education, poverty, relationship status, HIV status, prior sexually transmitted infections [STIs], mental health, substance use, and residential instability) previously identified in the transactional sex literature. Forty-four percent of the current sample reported engaging in transactional sex. Transactional sex was associated with age, employment status, relationship status, and anxiety symptoms. When stratified, transactional sex with a regular partner was associated with age, educational attainment, employment status, relationship status, anxiety, and alcohol use. Transactional sex with a casual partner was associated with homelessness, race/ethnicity, employment status, and hard drug use. The implications of these findings for HIV/STI prevention are discussed, including the notion that efforts to address HIV/STIs among young men who have sex with men may require interventions to consider experiences of transactional sex and the psychosocial contexts that may increase its likelihood.
Akbarabadi, Ardeshir; Niknamfar, Saba; Vousooghi, Nasim; Sadat-Shirazi, Mitra-Sadat; Toolee, Heidar; Zarrindast, Mohammad-Reza
2018-02-01
Drug addiction is a chronic disorder resulted from complex interaction of genetic, environmental, and developmental factors. Epigenetic mechanisms play an important role in the development and maintenance of addiction and also memory formation in the brain. We have examined passive avoidance memory and morphine conditioned place preference (CPP) in the offspring of male and/or female rats with a history of adulthood morphine consumption. Adult male and female animals received chronic oral morphine for 21days and then were maintained drug free for 10days. After that, they were let to mate with either an abstinent or control rat. Male offspring's memory was evaluated by step through test. Besides, rewarding effects of morphine were checked with CCP paradigm. Offspring of abstinent animals showed significant memory impairment compared to the control group which was more prominent in the offspring of abstinent females. Conditioning results showed that administration of a high dose of morphine (10mg/kg) that could significantly induce CPP in control rats, was not able to induce similar results in the offspring of morphine abstinent parents; and CPP was much more prominent when it was induced in the offspring of morphine exposed females compared to the progeny of morphine exposed males. It is concluded that parental morphine consumption in adulthood even before mating has destructive effects on memory state of the male offspring and also leads to tolerance to the rewarding effects of morphine. These effects are greater when the morphine consumer parent is the female one. Copyright © 2017 Elsevier Inc. All rights reserved.
77 FR 17328 - Commodity Pool Operators and Commodity Trading Advisors: Compliance Obligations
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-26
..., for each such retail forex transaction, by calculating the value in U.S. Dollars for such transaction... forex transaction, by calculating the value in U.S. Dollars of such transaction, at the time the...
45 CFR 162.1901 - Medicaid pharmacy subrogation transaction.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 1 2012-10-01 2012-10-01 false Medicaid pharmacy subrogation transaction. 162... STANDARDS AND RELATED REQUIREMENTS ADMINISTRATIVE REQUIREMENTS Medicaid Pharmacy Subrogation § 162.1901 Medicaid pharmacy subrogation transaction. The Medicaid pharmacy subrogation transaction is the...
45 CFR 162.1901 - Medicaid pharmacy subrogation transaction.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Medicaid pharmacy subrogation transaction. 162... STANDARDS AND RELATED REQUIREMENTS ADMINISTRATIVE REQUIREMENTS Medicaid Pharmacy Subrogation § 162.1901 Medicaid pharmacy subrogation transaction. The Medicaid pharmacy subrogation transaction is the...
45 CFR 162.1901 - Medicaid pharmacy subrogation transaction.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Medicaid pharmacy subrogation transaction. 162... STANDARDS AND RELATED REQUIREMENTS ADMINISTRATIVE REQUIREMENTS Medicaid Pharmacy Subrogation § 162.1901 Medicaid pharmacy subrogation transaction. The Medicaid pharmacy subrogation transaction is the...
45 CFR 162.1901 - Medicaid pharmacy subrogation transaction.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Medicaid pharmacy subrogation transaction. 162... STANDARDS AND RELATED REQUIREMENTS ADMINISTRATIVE REQUIREMENTS Medicaid Pharmacy Subrogation § 162.1901 Medicaid pharmacy subrogation transaction. The Medicaid pharmacy subrogation transaction is the...
45 CFR 162.1901 - Medicaid pharmacy subrogation transaction.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 1 2013-10-01 2013-10-01 false Medicaid pharmacy subrogation transaction. 162... STANDARDS AND RELATED REQUIREMENTS ADMINISTRATIVE REQUIREMENTS Medicaid Pharmacy Subrogation § 162.1901 Medicaid pharmacy subrogation transaction. The Medicaid pharmacy subrogation transaction is the...
NASA Astrophysics Data System (ADS)
Brzuszek, Marcin; Daniluk, Andrzej
2006-11-01
Writing a concurrent program can be more difficult than writing a sequential program. Programmer needs to think about synchronisation, race conditions and shared variables. Transactions help reduce the inconvenience of using threads. A transaction is an abstraction, which allows programmers to group a sequence of actions on the program into a logical, higher-level computation unit. This paper presents multithreaded versions of the GROWTH program, which allow to calculate the layer coverages during the growth of thin epitaxial films and the corresponding RHEED intensities according to the kinematical approximation. The presented programs also contain graphical user interfaces, which enable displaying program data at run-time. New version program summaryTitles of programs:GROWTHGr, GROWTH06 Catalogue identifier:ADVL_v2_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVL_v2_0 Program obtainable from:CPC Program Library, Queen's University of Belfast, N. Ireland Catalogue identifier of previous version:ADVL Does the new version supersede the original program:No Computer for which the new version is designed and others on which it has been tested: Pentium-based PC Operating systems or monitors under which the new version has been tested: Windows 9x, XP, NT Programming language used:Object Pascal Memory required to execute with typical data:More than 1 MB Number of bits in a word:64 bits Number of processors used:1 No. of lines in distributed program, including test data, etc.:20 931 Number of bytes in distributed program, including test data, etc.: 1 311 268 Distribution format:tar.gz Nature of physical problem: The programs compute the RHEED intensities during the growth of thin epitaxial structures prepared using the molecular beam epitaxy (MBE). The computations are based on the use of kinematical diffraction theory [P.I. Cohen, G.S. Petrich, P.R. Pukite, G.J. Whaley, A.S. Arrott, Surf. Sci. 216 (1989) 222. [1
77 FR 54862 - Integrated Hedging Transactions of Qualifying Debt
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-06
... Integrated Hedging Transactions of Qualifying Debt AGENCY: Internal Revenue Service (IRS), Treasury. ACTION... certain integrated transactions that involve a foreign currency denominated debt instrument and multiple... foreign currency denominated debt instrument and multiple associated hedging transactions. The text of...
Transaction-Based Building Controls Framework, Volume 1: Reference Guide
DOE Office of Scientific and Technical Information (OSTI.GOV)
Somasundaram, Sriram; Pratt, Robert G.; Akyol, Bora A.
This document proposes a framework concept to achieve the objectives of raising buildings’ efficiency and energy savings potential benefitting building owners and operators. We call it a transaction-based framework, wherein mutually-beneficial and cost-effective market-based transactions can be enabled between multiple players across different domains. Transaction-based building controls are one part of the transactional energy framework. While these controls realize benefits by enabling automatic, market-based intra-building efficiency optimizations, the transactional energy framework provides similar benefits using the same market -based structure, yet on a larger scale and beyond just buildings, to the society at large.
Identifying Bitcoin users by transaction behavior
NASA Astrophysics Data System (ADS)
Monaco, John V.
2015-05-01
Digital currencies, such as Bitcoin, offer convenience and security to criminals operating in the black marketplace. Some Bitcoin marketplaces, such as Silk Road, even claim anonymity. This claim contradicts the findings in this work, where long term transactional behavior is used to identify and verify account holders. Transaction timestamps and network properties observed over time contribute to this finding. The timestamp of each transaction is the result of many factors: the desire purchase an item, daily schedule and activities, as well as hardware and network latency. Dynamic network properties of the transaction, such as coin flow and the number of edge outputs and inputs, contribute further to reveal account identity. In this paper, we propose a novel methodology for identifying and verifying Bitcoin users based on the observation of Bitcoin transactions over time. The behavior we attempt to quantify roughly occurs in the social band of Newell's time scale. A subset of the Blockchain 230686 is taken, selecting users that initiated between 100 and 1000 unique transactions per month for at least 6 different months. This dataset shows evidence of being nonrandom and nonlinear, thus a dynamical systems approach is taken. Classification and authentication accuracies are obtained under various representations of the monthly Bitcoin samples: outgoing transactions, as well as both outgoing and incoming transactions are considered, along with the timing and dynamic network properties of transaction sequences. The most appropriate representations of monthly Bitcoin samples are proposed. Results show an inherent lack of anonymity by exploiting patterns in long-term transactional behavior.
21 CFR 1404.970 - Nonprocurement transaction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Nonprocurement transaction. 1404.970 Section 1404.970 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 1404.970 Nonprocurement transaction. (a) Nonprocurement transaction means any...
Bauermeister, José A.; Eaton, Lisa; Meanley, Steven; Pingel, Emily S.
2015-01-01
Transactional sex refers to the commodification of the body in exchange for shelter, food, and other goods and needs. Transactional sex has been associated with negative health outcomes including HIV infection, psychological distress, and substance use and abuse. Compared with the body of research examining transactional sex among women, less is known about the prevalence and correlates of transactional sex among men. Using data from a cross-sectional survey of young men who have sex with men (ages 18-29) living in the Detroit Metro Area (N = 357; 9% HIV infected; 49% Black, 26% White, 16% Latino, 9% Other race), multivariate logistic regression analyses examined the association between transactional sex with regular and casual partners and key psychosocial factors (e.g., race/ethnicity, education, poverty, relationship status, HIV status, prior sexually transmitted infections [STIs], mental health, substance use, and residential instability) previously identified in the transactional sex literature. Forty-four percent of the current sample reported engaging in transactional sex. Transactional sex was associated with age, employment status, relationship status, and anxiety symptoms. When stratified, transactional sex with a regular partner was associated with age, educational attainment, employment status, relationship status, anxiety, and alcohol use. Transactional sex with a casual partner was associated with homelessness, race/ethnicity, employment status, and hard drug use. The implications of these findings for HIV/STI prevention are discussed, including the notion that efforts to address HIV/STIs among young men who have sex with men may require interventions to consider experiences of transactional sex and the psychosocial contexts that may increase its likelihood. PMID:26438470
Big Data, Deep Learning and Tianhe-2 at Sun Yat-Sen University, Guangzhou
NASA Astrophysics Data System (ADS)
Yuen, D. A.; Dzwinel, W.; Liu, J.; Zhang, K.
2014-12-01
In this decade the big data revolution has permeated in many fields, ranging from financial transactions, medical surveys and scientific endeavors, because of the big opportunities people see ahead. What to do with all this data remains an intriguing question. This is where computer scientists together with applied mathematicians have made some significant inroads in developing deep learning techniques for unraveling new relationships among the different variables by means of correlation analysis and data-assimilation methods. Deep-learning and big data taken together is a grand challenge task in High-performance computing which demand both ultrafast speed and large memory. The Tianhe-2 recently installed at Sun Yat-Sen University in Guangzhou is well positioned to take up this challenge because it is currently the world's fastest computer at 34 Petaflops. Each compute node of Tianhe-2 has two CPUs of Intel Xeon E5-2600 and three Xeon Phi accelerators. The Tianhe-2 has a very large fast memory RAM of 88 Gigabytes on each node. The system has a total memory of 1,375 Terabytes. All of these technical features will allow very high dimensional (more than 10) problem in deep learning to be explored carefully on the Tianhe-2. Problems in seismology which can be solved include three-dimensional seismic wave simulations of the whole Earth with a few km resolution and the recognition of new phases in seismic wave form from assemblage of large data sets.
45 CFR 162.1801 - Coordination of benefits transaction.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Coordination of benefits transaction. 162.1801... RELATED REQUIREMENTS ADMINISTRATIVE REQUIREMENTS Coordination of Benefits § 162.1801 Coordination of benefits transaction. The coordination of benefits transaction is the transmission from any entity to a...
31 CFR 510.201 - Prohibited transactions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Prohibited transactions. 510.201 Section 510.201 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 510.201 Prohibited transactions. (a) All transactions prohibited pursuant to Executive Order 13466 are...
31 CFR 510.201 - Prohibited transactions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Prohibited transactions. 510.201 Section 510.201 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 510.201 Prohibited transactions. (a) All transactions prohibited pursuant to Executive Order 13466 are...
31 CFR 510.201 - Prohibited transactions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Prohibited transactions. 510.201 Section 510.201 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 510.201 Prohibited transactions. (a) All transactions prohibited pursuant to Executive Order 13466 are...
22 CFR 513.220 - Continuation of covered transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... and participants shall not renew or extend covered transactions (other than no-cost time extensions... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Continuation of covered transactions. 513.220... Continuation of covered transactions. (a) Notwithstanding the debarment, suspension, proposed debarment under...
24 CFR 100.110 - Discriminatory practices in residential real estate-related transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... residential real estate-related transactions. 100.110 Section 100.110 Housing and Urban Development... Discrimination in Residential Real Estate-Related Transactions § 100.110 Discriminatory practices in residential real estate-related transactions. (a) This subpart provides the Department's interpretation of the...
24 CFR 100.110 - Discriminatory practices in residential real estate-related transactions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... residential real estate-related transactions. 100.110 Section 100.110 Housing and Urban Development... Discrimination in Residential Real Estate-Related Transactions § 100.110 Discriminatory practices in residential real estate-related transactions. (a) This subpart provides the Department's interpretation of the...
24 CFR 100.110 - Discriminatory practices in residential real estate-related transactions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... residential real estate-related transactions. 100.110 Section 100.110 Housing and Urban Development... Discrimination in Residential Real Estate-Related Transactions § 100.110 Discriminatory practices in residential real estate-related transactions. (a) This subpart provides the Department's interpretation of the...
24 CFR 100.110 - Discriminatory practices in residential real estate-related transactions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... residential real estate-related transactions. 100.110 Section 100.110 Housing and Urban Development... Discrimination in Residential Real Estate-Related Transactions § 100.110 Discriminatory practices in residential real estate-related transactions. (a) This subpart provides the Department's interpretation of the...
24 CFR 100.110 - Discriminatory practices in residential real estate-related transactions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... residential real estate-related transactions. 100.110 Section 100.110 Housing and Urban Development... Discrimination in Residential Real Estate-Related Transactions § 100.110 Discriminatory practices in residential real estate-related transactions. (a) This subpart provides the Department's interpretation of the...
17 CFR 5.2 - Prohibited transactions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Prohibited transactions. 5.2 Section 5.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.2 Prohibited transactions. (a) Scope. The provisions of this section shall be...
31 CFR 800.214 - Foreign government-controlled transaction.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Foreign government-controlled..., ACQUISITIONS, AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.214 Foreign government-controlled transaction. The term foreign government-controlled transaction means any covered transaction that could result in...
31 CFR 800.214 - Foreign government-controlled transaction.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Foreign government-controlled..., ACQUISITIONS, AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.214 Foreign government-controlled transaction. The term foreign government-controlled transaction means any covered transaction that could result in...
31 CFR 800.214 - Foreign government-controlled transaction.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Foreign government-controlled..., ACQUISITIONS, AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.214 Foreign government-controlled transaction. The term foreign government-controlled transaction means any covered transaction that could result in...
17 CFR 31.17 - Records of leverage transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Records of leverage... LEVERAGE TRANSACTIONS § 31.17 Records of leverage transactions. (a) Each leverage transaction merchant receiving a leverage customer's order shall immediately upon receipt thereof prepare a written record of...
Some stylized facts of the Bitcoin market
NASA Astrophysics Data System (ADS)
Bariviera, Aurelio F.; Basgall, María José; Hasperué, Waldo; Naiouf, Marcelo
2017-10-01
In recent years a new type of tradable assets appeared, generically known as cryptocurrencies. Among them, the most widespread is Bitcoin. Given its novelty, this paper investigates some statistical properties of the Bitcoin market. This study compares Bitcoin and standard currencies dynamics and focuses on the analysis of returns at different time scales. We test the presence of long memory in return time series from 2011 to 2017, using transaction data from one Bitcoin platform. We compute the Hurst exponent by means of the Detrended Fluctuation Analysis method, using a sliding window in order to measure long range dependence. We detect that Hurst exponents changes significantly during the first years of existence of Bitcoin, tending to stabilize in recent times. Additionally, multiscale analysis shows a similar behavior of the Hurst exponent, implying a self-similar process.
The Raid distributed database system
NASA Technical Reports Server (NTRS)
Bhargava, Bharat; Riedl, John
1989-01-01
Raid, a robust and adaptable distributed database system for transaction processing (TP), is described. Raid is a message-passing system, with server processes on each site to manage concurrent processing, consistent replicated copies during site failures, and atomic distributed commitment. A high-level layered communications package provides a clean location-independent interface between servers. The latest design of the package delivers messages via shared memory in a configuration with several servers linked into a single process. Raid provides the infrastructure to investigate various methods for supporting reliable distributed TP. Measurements on TP and server CPU time are presented, along with data from experiments on communications software, consistent replicated copy control during site failures, and concurrent distributed checkpointing. A software tool for evaluating the implementation of TP algorithms in an operating-system kernel is proposed.
NASA Astrophysics Data System (ADS)
Piao, Chunhui; Han, Xufang; Wu, Harris
2010-08-01
We provide a formal definition of an e-commerce transaction network. Agent-based modelling is used to simulate e-commerce transaction networks. For real-world analysis, we studied the open application programming interfaces (APIs) from eBay and Taobao e-commerce websites and captured real transaction data. Pajek is used to visualise the agent relationships in the transaction network. We derived one-mode networks from the transaction network and analysed them using degree and betweenness centrality. Integrating multi-agent modelling, open APIs and social network analysis, we propose a new way to study large-scale e-commerce systems.
NASA Astrophysics Data System (ADS)
Liang, J.; Sédillot, S.; Traverson, B.
1997-09-01
This paper addresses federation of a transactional object standard - Object Management Group (OMG) object transaction service (OTS) - with the X/Open distributed transaction processing (DTP) model and International Organization for Standardization (ISO) open systems interconnection (OSI) transaction processing (TP) communication protocol. The two-phase commit propagation rules within a distributed transaction tree are similar in the X/Open, ISO and OMG models. Building an OTS on an OSI TP protocol machine is possible because the two specifications are somewhat complementary. OTS defines a set of external interfaces without specific internal protocol machine, while OSI TP specifies an internal protocol machine without any application programming interface. Given these observations, and having already implemented an X/Open two-phase commit transaction toolkit based on an OSI TP protocol machine, we analyse the feasibility of using this implementation as a transaction service provider for OMG interfaces. Based on the favourable result of this feasibility study, we are implementing an OTS compliant system, which, by initiating the extensibility and openness strengths of OSI TP, is able to provide interoperability between X/Open DTP and OMG OTS models.
Code of Federal Regulations, 2012 CFR
2012-04-01
... retail forex transaction, by calculating the value in U.S. Dollars for such transaction, at the time the... such retail forex transaction, by calculating the value in U.S. Dollars for such transaction, at the...
31 CFR 598.407 - Offshore transactions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 598.407 Section 598.407 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... Interpretations § 598.407 Offshore transactions. The prohibitions contained in § 598.203 apply to transactions by...
17 CFR 229.1005 - (Item 1005) Past contacts, transactions, negotiations and agreements.
Code of Federal Regulations, 2013 CFR
2013-04-01
..., transactions, negotiations and agreements. 229.1005 Section 229.1005 Commodity and Securities Exchanges... Acquisitions (Regulation M-A) § 229.1005 (Item 1005) Past contacts, transactions, negotiations and agreements... events. Describe any negotiations, transactions or material contacts during the past two years between...
17 CFR 229.1005 - (Item 1005) Past contacts, transactions, negotiations and agreements.
Code of Federal Regulations, 2012 CFR
2012-04-01
..., transactions, negotiations and agreements. 229.1005 Section 229.1005 Commodity and Securities Exchanges... Acquisitions (Regulation M-A) § 229.1005 (Item 1005) Past contacts, transactions, negotiations and agreements... events. Describe any negotiations, transactions or material contacts during the past two years between...
17 CFR 229.1005 - (Item 1005) Past contacts, transactions, negotiations and agreements.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., transactions, negotiations and agreements. 229.1005 Section 229.1005 Commodity and Securities Exchanges... Acquisitions (Regulation M-A) § 229.1005 (Item 1005) Past contacts, transactions, negotiations and agreements... events. Describe any negotiations, transactions or material contacts during the past two years between...
17 CFR 229.1005 - (Item 1005) Past contacts, transactions, negotiations and agreements.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., transactions, negotiations and agreements. 229.1005 Section 229.1005 Commodity and Securities Exchanges... Acquisitions (Regulation M-A) § 229.1005 (Item 1005) Past contacts, transactions, negotiations and agreements... events. Describe any negotiations, transactions or material contacts during the past two years between...
17 CFR 229.1005 - (Item 1005) Past contacts, transactions, negotiations and agreements.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., transactions, negotiations and agreements. 229.1005 Section 229.1005 Commodity and Securities Exchanges... Acquisitions (Regulation M-A) § 229.1005 (Item 1005) Past contacts, transactions, negotiations and agreements... events. Describe any negotiations, transactions or material contacts during the past two years between...
2 CFR 180.210 - Which nonprocurement transactions are covered transactions?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Which nonprocurement transactions are covered transactions? 180.210 Section 180.210 Grants and Agreements OFFICE OF MANAGEMENT AND BUDGET GOVERNMENTWIDE GUIDANCE FOR GRANTS AND AGREEMENTS Reserved OMB GUIDELINES TO AGENCIES ON GOVERNMENTWIDE DEBARMENT...
18 CFR 33.2 - Contents of application-general information requirements.
Code of Federal Regulations, 2012 CFR
2012-04-01
... post-transaction corporate structures (including any pending authorized but not implemented changes... that the proposed transaction does not affect the corporate structure of any party to the transaction... application); (5) The identity of common officers or directors of parties to the proposed transaction (to be...
18 CFR 33.2 - Contents of application-general information requirements.
Code of Federal Regulations, 2013 CFR
2013-04-01
... post-transaction corporate structures (including any pending authorized but not implemented changes... that the proposed transaction does not affect the corporate structure of any party to the transaction... application); (5) The identity of common officers or directors of parties to the proposed transaction (to be...
18 CFR 33.2 - Contents of application-general information requirements.
Code of Federal Regulations, 2011 CFR
2011-04-01
... post-transaction corporate structures (including any pending authorized but not implemented changes... that the proposed transaction does not affect the corporate structure of any party to the transaction... application); (5) The identity of common officers or directors of parties to the proposed transaction (to be...
18 CFR 33.2 - Contents of application-general information requirements.
Code of Federal Regulations, 2014 CFR
2014-04-01
... post-transaction corporate structures (including any pending authorized but not implemented changes... that the proposed transaction does not affect the corporate structure of any party to the transaction... application); (5) The identity of common officers or directors of parties to the proposed transaction (to be...
24 CFR 100.115 - Residential real estate-related transactions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Residential real estate-related... Estate-Related Transactions § 100.115 Residential real estate-related transactions. The term residential real estate-related transactions means: (a) The making or purchasing of loans or providing other...
24 CFR 100.115 - Residential real estate-related transactions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Residential real estate-related... Estate-Related Transactions § 100.115 Residential real estate-related transactions. The term residential real estate-related transactions means: (a) The making or purchasing of loans or providing other...
24 CFR 100.115 - Residential real estate-related transactions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Residential real estate-related... Estate-Related Transactions § 100.115 Residential real estate-related transactions. The term residential real estate-related transactions means: (a) The making or purchasing of loans or providing other...
24 CFR 100.115 - Residential real estate-related transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Residential real estate-related... Estate-Related Transactions § 100.115 Residential real estate-related transactions. The term residential real estate-related transactions means: (a) The making or purchasing of loans or providing other...
24 CFR 100.115 - Residential real estate-related transactions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Residential real estate-related... Estate-Related Transactions § 100.115 Residential real estate-related transactions. The term residential real estate-related transactions means: (a) The making or purchasing of loans or providing other...
Provisions in School Contracts: What to Include, What to Avoid
ERIC Educational Resources Information Center
Horner, Jeffrey J.
2011-01-01
Many factors distinguish public school district transactions from private business transactions. Like any other business transaction, public school contracts should unambiguously describe the transaction and sufficiently outline the obligations of the parties. However, public school districts may be subject to distinctive laws that effectively…
17 CFR 30.9 - Fraudulent transactions prohibited.
Code of Federal Regulations, 2010 CFR
2010-04-01
... prohibited. 30.9 Section 30.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION FOREIGN FUTURES AND FOREIGN OPTIONS TRANSACTIONS § 30.9 Fraudulent transactions prohibited. It shall be unlawful... foreign futures contract or foreign options transaction: (a) To cheat or defraud or attempt to cheat or...
Error correcting code with chip kill capability and power saving enhancement
Gara, Alan G [Mount Kisco, NY; Chen, Dong [Croton On Husdon, NY; Coteus, Paul W [Yorktown Heights, NY; Flynn, William T [Rochester, MN; Marcella, James A [Rochester, MN; Takken, Todd [Brewster, NY; Trager, Barry M [Yorktown Heights, NY; Winograd, Shmuel [Scarsdale, NY
2011-08-30
A method and system are disclosed for detecting memory chip failure in a computer memory system. The method comprises the steps of accessing user data from a set of user data chips, and testing the user data for errors using data from a set of system data chips. This testing is done by generating a sequence of check symbols from the user data, grouping the user data into a sequence of data symbols, and computing a specified sequence of syndromes. If all the syndromes are zero, the user data has no errors. If one of the syndromes is non-zero, then a set of discriminator expressions are computed, and used to determine whether a single or double symbol error has occurred. In the preferred embodiment, less than two full system data chips are used for testing and correcting the user data.
Reformulation of time-convolutionless mode-coupling theory near the glass transition
NASA Astrophysics Data System (ADS)
Tokuyama, Michio
2017-10-01
The time-convolutionless mode-coupling theory (TMCT) recently proposed is reformulated under the condition that one of two approximations, which have been used to formulate the original TMCT in addition to the MCT approximations done on a derivation of nonlinear memory function in terms of the intermediate-scattering function, is not employed because it causes unphysical results for intermediate times. The improved TMCT equation is then derived consistently under another approximation. It is first checked that the ergodic to non-ergodic transition obtained by a new equation is exactly the same as that obtained by an old one because the long-time dynamics of both equations coincides with each other. However, it is emphasized that a difference between them appears in the intermediate-time dynamics of physical quantities. Such a difference is explored numerically in the dynamics of a non-Gaussian parameter by employing the Percus-Yevick static structure factor to calculate the nonlinear memory function.
31 CFR 515.527 - Certain transactions with respect to United States intellectual property.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Certain transactions with respect to United States intellectual property. 515.527 Section 515.527 Money and Finance: Treasury Regulations... Certain transactions with respect to United States intellectual property. (a)(1) Transactions related to...
31 CFR 515.528 - Certain transactions with respect to blocked foreign intellectual property.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Certain transactions with respect to blocked foreign intellectual property. 515.528 Section 515.528 Money and Finance: Treasury Regulations... Certain transactions with respect to blocked foreign intellectual property. (a) The following transactions...
31 CFR 515.528 - Certain transactions with respect to blocked foreign intellectual property.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Certain transactions with respect to blocked foreign intellectual property. 515.528 Section 515.528 Money and Finance: Treasury Regulations... Certain transactions with respect to blocked foreign intellectual property. (a) The following transactions...
17 CFR 5.2 - Prohibited transactions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... applicable to any retail forex transaction. (b) Fraudulent conduct prohibited. It shall be unlawful for any... indirectly, in or in connection with any retail forex transaction: (1) To cheat or defraud or attempt to... prohibited. (1) No person who acts as the counterparty for any retail forex transaction may do so for an...
17 CFR 5.2 - Prohibited transactions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... applicable to any retail forex transaction. (b) Fraudulent conduct prohibited. It shall be unlawful for any... indirectly, in or in connection with any retail forex transaction: (1) To cheat or defraud or attempt to... prohibited. (1) No person who acts as the counterparty for any retail forex transaction may do so for an...
17 CFR 5.2 - Prohibited transactions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... applicable to any retail forex transaction. (b) Fraudulent conduct prohibited. It shall be unlawful for any... indirectly, in or in connection with any retail forex transaction: (1) To cheat or defraud or attempt to... prohibited. (1) No person who acts as the counterparty for any retail forex transaction may do so for an...
77 FR 61330 - Policies Regarding Mobile Spectrum Holdings
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-09
... the transaction and is based on the size of the post-transaction Herfindahl-Hirschman Index (HHI) \\26... further case-by-case market analysis those markets in which, post-transaction, the HHI would be greater... De Facto Transfer Leasing Arrangements and Petition for Declaratory Ruling that the Transaction is...
31 CFR 598.407 - Offshore transactions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Offshore transactions. 598.407 Section 598.407 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Interpretations § 598.407 Offshore transactions. The prohibitions contained in § 598.203 apply to transactions by...
31 CFR 598.407 - Offshore transactions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Offshore transactions. 598.407 Section 598.407 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Interpretations § 598.407 Offshore transactions. The prohibitions contained in § 598.203 apply to transactions by...
31 CFR 598.407 - Offshore transactions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Offshore transactions. 598.407 Section 598.407 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Interpretations § 598.407 Offshore transactions. The prohibitions contained in § 598.203 apply to transactions by...
31 CFR 598.407 - Offshore transactions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Offshore transactions. 598.407 Section 598.407 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... Interpretations § 598.407 Offshore transactions. The prohibitions contained in § 598.203 apply to transactions by...
77 FR 54912 - Proposed Agency Information Collection Activities; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-06
... prepaid card transactions, credit card transactions, mobile payments, and transactions involving third... a remote scanner attached to a PC or point-of-sale device, smartphone or other mobile device, or ATM... mobile payments, including the number and value of relevant bill pay transactions and person-to- person...
5 CFR 919.215 - Which nonprocurement transactions are not covered transactions?
Code of Federal Regulations, 2010 CFR
2010-01-01
... foreign government or foreign governmental entity; (2) A public international organization; (3) An entity... wholly or partially of one or more foreign governments or foreign governmental entities. (b) A benefit to... governmental operations. (g) Any other transaction if the application of an exclusion to the transaction is...
22 CFR 208.215 - Which nonprocurement transactions are not covered transactions?
Code of Federal Regulations, 2010 CFR
2010-04-01
... transactions: (a) A direct award to— (1) A foreign government or foreign governmental entity; (2) A public international organization; (3) An entity owned (in whole or in part) or controlled by a foreign government; or... covered transactions? 208.215 Section 208.215 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT...
31 CFR 538.405 - Transactions incidental to a licensed transaction authorized.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Transactions incidental to a licensed transaction authorized. 538.405 Section 538.405 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY SUDANESE SANCTIONS...
31 CFR 545.403 - Transactions incidental to a licensed transaction authorized.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions incidental to a licensed transaction authorized. 545.403 Section 545.403 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TALIBAN (AFGHANISTAN...
31 CFR 538.405 - Transactions incidental to a licensed transaction authorized.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions incidental to a licensed transaction authorized. 538.405 Section 538.405 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY SUDANESE SANCTIONS...
26 CFR 1.985-3 - United States dollar approximate separate transactions method.
Code of Federal Regulations, 2010 CFR
2010-04-01
... transactions method. 1.985-3 Section 1.985-3 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE... dollar approximate separate transactions method. (a) Scope and effective date—(1) Scope. This section describes the United States dollar (dollar) approximate separate transactions method of accounting (DASTM...
31 CFR 594.405 - Transactions incidental to a licensed transaction.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Transactions incidental to a licensed transaction. 594.405 Section 594.405 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS...
31 CFR 594.405 - Transactions incidental to a licensed transaction.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Transactions incidental to a licensed transaction. 594.405 Section 594.405 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS...
31 CFR 546.404 - Transactions ordinarily incident to a licensed transaction.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions ordinarily incident to a licensed transaction. 546.404 Section 546.404 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY DARFUR SANCTIONS...
12 CFR 303.185 - Merger transactions involving foreign banks or foreign organizations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Merger transactions involving foreign banks or... PROCEDURE AND RULES OF PRACTICE FILING PROCEDURES International Banking § 303.185 Merger transactions involving foreign banks or foreign organizations. (a) Merger transactions involving an insured branch of a...
31 CFR 539.403 - Transactions incidental to a licensed transaction.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions incidental to a licensed transaction. 539.403 Section 539.403 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY WEAPONS OF MASS DESTRUCTION TRADE...
31 CFR 537.404 - Transactions incidental to a licensed transaction authorized.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Transactions incidental to a licensed transaction authorized. 537.404 Section 537.404 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY BURMESE SANCTIONS...
15 CFR 908.14 - Business to be transacted in writing.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Business to be transacted in writing... MAINTAINING RECORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.14 Business to be transacted in writing. All business transacted with the National Oceanic and Atmospheric Administration with...
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
12 CFR 722.3 - Appraisals required; transactions requiring a State certified or licensed appraiser.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Appraisals required; transactions requiring a... ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS APPRAISALS § 722.3 Appraisals required; transactions requiring... certified or licensed appraiser is required for all real estate-related financial transactions except those...
78 FR 39023 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-28
... confirmations than larger firms because they effect fewer transactions. The Commission staff estimates the costs... regarding their securities transactions. This information includes: the date and time of the transaction... as well as mark-up and mark-down information. For transactions in debt securities, Rule 10b-10...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-12
... Transaction Exemption 98-54 Relating to Certain Employee Benefit Plan Foreign Exchange Transactions Executed..., ``Prohibited Transaction Exemption 98-54 Relating to Certain Employee Benefit Plan Foreign Exchange Transactions Executed Pursuant to Standing Instructions,'' to the Office of Management and Budget (OMB) for...
31 CFR 1026.310 - Reports of transactions in currency.
Code of Federal Regulations, 2011 CFR
2011-07-01
... and Introducing Brokers in Commodities § 1026.310 Reports of transactions in currency. The reports of transactions in currency requirements for futures commission merchants and introducing brokers in commodities... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Reports of transactions in currency...
17 CFR 5.9 - Security deposits for retail forex transactions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Security deposits for retail forex transactions. 5.9 Section 5.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.9 Security deposits for retail forex transactions...
17 CFR 5.20 - Special calls for account and transaction information.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Special calls for account and transaction information. 5.20 Section 5.20 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OFF-EXCHANGE FOREIGN CURRENCY TRANSACTIONS § 5.20 Special calls for account and transaction...
29 CFR 98.220 - Are any procurement contracts included as covered transactions?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 1 2011-07-01 2011-07-01 false Are any procurement contracts included as covered... SUSPENSION (NONPROCUREMENT) Covered Transactions § 98.220 Are any procurement contracts included as covered transactions? (a) Covered transactions under this part— (1) Do not include any procurement contracts awarded...
29 CFR 98.220 - Are any procurement contracts included as covered transactions?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 1 2010-07-01 2010-07-01 true Are any procurement contracts included as covered... SUSPENSION (NONPROCUREMENT) Covered Transactions § 98.220 Are any procurement contracts included as covered transactions? (a) Covered transactions under this part— (1) Do not include any procurement contracts awarded...
31 CFR 551.404 - Transactions ordinarily incident to a licensed transaction authorized.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions ordinarily incident to a licensed transaction authorized. 551.404 Section 551.404 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY SOMALIA...
12 CFR 223.33 - What rules apply to derivative transactions?
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 3 2011-01-01 2011-01-01 false What rules apply to derivative transactions... Requirements Under Section 23A § 223.33 What rules apply to derivative transactions? (a) Market terms requirement. Derivative transactions between a member bank and its affiliates (other than depository...
Electronic Business Transaction Infrastructure Analysis Using Petri Nets and Simulation
ERIC Educational Resources Information Center
Feller, Andrew Lee
2010-01-01
Rapid growth in eBusiness has made industry and commerce increasingly dependent on the hardware and software infrastructure that enables high-volume transaction processing across the Internet. Large transaction volumes at major industrial-firm data centers rely on robust transaction protocols and adequately provisioned hardware capacity to ensure…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-26
... relating to the MSRB's Real-time Transaction Reporting System (``RTRS''). The proposed rule change was... Change Consisting of Fee Changes to Its Real-Time Transaction Price Service and Comprehensive Transaction... change consists of fee changes to the MSRB's Real-Time Transaction Price Service and Comprehensive...
12 CFR 155.310 - How do I notify the OCC?
Code of Federal Regulations, 2014 CFR
2014-01-01
... least 30 days before you establish a transactional Web site. The notice must do three things: (a) Describe the transactional web site. (b) Indicate the date the transactional web site will become operational. (c) List a contact familiar with the deployment, operation, and security of the transactional web...
12 CFR 390.222 - How do I notify FDIC?
Code of Federal Regulations, 2013 CFR
2013-01-01
... 30 days before you establish a transactional Web site. The notice must do three things: (1) Describe the transactional Web site. (2) Indicate the date the transactional Web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional Web...
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2013 CFR
2013-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
12 CFR 390.222 - How do I notify FDIC?
Code of Federal Regulations, 2012 CFR
2012-01-01
... 30 days before you establish a transactional Web site. The notice must do three things: (1) Describe the transactional Web site. (2) Indicate the date the transactional Web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional Web...
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2012 CFR
2012-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
12 CFR 155.310 - How do I notify the OCC?
Code of Federal Regulations, 2013 CFR
2013-01-01
... least 30 days before you establish a transactional Web site. The notice must do three things: (a) Describe the transactional web site. (b) Indicate the date the transactional web site will become operational. (c) List a contact familiar with the deployment, operation, and security of the transactional web...
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2014 CFR
2014-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
12 CFR 390.222 - How do I notify FDIC?
Code of Federal Regulations, 2014 CFR
2014-01-01
... 30 days before you establish a transactional Web site. The notice must do three things: (1) Describe the transactional Web site. (2) Indicate the date the transactional Web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional Web...
12 CFR 155.310 - How do I notify the OCC?
Code of Federal Regulations, 2012 CFR
2012-01-01
... least 30 days before you establish a transactional Web site. The notice must do three things: (a) Describe the transactional web site. (b) Indicate the date the transactional web site will become operational. (c) List a contact familiar with the deployment, operation, and security of the transactional web...
Code of Federal Regulations, 2010 CFR
2010-04-01
... corporation immediately after the restructuring transaction, the earnings and profits attributable to the... 80% of the $100 of earnings and profits of CFC accumulated after the restructuring transaction... and profits of CFC accumulated after the restructuring transaction. (B) DC1 sale. Pursuant to...
42 CFR 455.105 - Disclosure by providers: Information related to business transactions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... subcontractor with whom the provider has had business transactions totaling more than $25,000 during the 12... business transactions. 455.105 Section 455.105 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... related to business transactions. (a) Provider agreements. A Medicaid agency must enter into an agreement...
Transactive Systems Simulation and Valuation Platform Trial Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Widergren, Steven E.; Hammerstrom, Donald J.; Huang, Qiuhua
Transactive energy systems use principles of value to coordinate responsive supply and demand in energy systems. Work continues within the Transactive Systems Program, which is funded by the U.S. Department of Energy at Pacific Northwest National Laboratory, to understand the value of, understand the theory behind, and simulate the behaviors of transactive energy systems. This report summarizes recent advances made by this program. The main capability advances include a more comprehensive valuation model, including recommended documentation that should make valuation studies of all sorts more transparent, definition of economic metrics with which transactive mechanisms can be evaluated, and multiple improvementsmore » to the time-simulation environment that is being used to evaluate transactive scenarios.« less
NASA Astrophysics Data System (ADS)
Takaishi, Tetsuya; Chen, Ting Ting
2016-08-01
We examine the relationship between trading volumes, number of transactions, and volatility using daily stock data of the Tokyo Stock Exchange. Following the mixture of distributions hypothesis, we use trading volumes and the number of transactions as proxy for the rate of information arrivals affecting stock volatility. The impact of trading volumes or number of transactions on volatility is measured using the generalized autoregressive conditional heteroscedasticity (GARCH) model. We find that the GARCH effects, that is, persistence of volatility, is not always removed by adding trading volumes or number of transactions, indicating that trading volumes and number of transactions do not adequately represent the rate of information arrivals.
NASA Technical Reports Server (NTRS)
Smith, W. W.
1973-01-01
A Langley Research Center version of NASTRAN Level 15.1.0 designed to provide the analyst with an added tool for debugging massive NASTRAN input data is described. The program checks all NASTRAN input data cards and displays on a CRT the graphic representation of the undeformed structure. In addition, the program permits the display and alteration of input data and allows reexecution without physically resubmitting the job. Core requirements on the CDC 6000 computer are approximately 77,000 octal words of central memory.
Structural Integrity Recording System (SIRS) for U.S. Army AH-1G helicopters
1981-03-01
location was detected during the diagnostic check of the recorder’s data storage memory. BATTERY Denotes that the recorder’s battery power supply is...Condition- ing Board 074032D30019 50.6592 19,740 Power Supply CS/TlS/165/x 16.6667 60,000 Filter RF6125 0.0560 17,857,143 *Termination Assembly 074032C30011...whatsoever; and the fact that the Government may have formulated, furnished, or in any way supplied the said drawings, specifications, or other date is
Transactional Sex among Noninjecting Illicit Drug Users: Implications for HIV Transmission.
Guimarães, Rafael Alves; Rodovalho, Aurélio Goulart; Fernandes, Inaina Lara; Silva, Graciele Cristina; de Felipe, Rodrigo Lopes; Vera, Ivânia; Gregório, Valéria Duarte; Lucchese, Roselma
2016-01-01
Noninjecting illicit drug users (NIDUs) present high risk for HIV infection, due especially to transactional sex. This study aimed to estimate the prevalence and risk factors for transactional sex among NIDUs in the Southwest region of Goiás State, Central Brazil. The prevalence of self-reported transactional sex was 22.8%. Prevalence in women and men was 52.7% and 16.8%, respectively, a significant difference (p < 0.001). Crack use and history of sexually transmitted infections (STI) were risk factors for transactional sex in men. Homelessness, crack use, sex under the influence of drugs, and history of sexual violence were risk factors for transactional sex in women. A high prevalence of transactional sex was observed among NIDUs. This risk behavior may contribute to the high rates of HIV among this population and their social networks and in the general population.
Transactional Sex among Noninjecting Illicit Drug Users: Implications for HIV Transmission
Rodovalho, Aurélio Goulart; Fernandes, Inaina Lara; Silva, Graciele Cristina; de Felipe, Rodrigo Lopes; Vera, Ivânia; Gregório, Valéria Duarte; Lucchese, Roselma
2016-01-01
Noninjecting illicit drug users (NIDUs) present high risk for HIV infection, due especially to transactional sex. This study aimed to estimate the prevalence and risk factors for transactional sex among NIDUs in the Southwest region of Goiás State, Central Brazil. The prevalence of self-reported transactional sex was 22.8%. Prevalence in women and men was 52.7% and 16.8%, respectively, a significant difference (p < 0.001). Crack use and history of sexually transmitted infections (STI) were risk factors for transactional sex in men. Homelessness, crack use, sex under the influence of drugs, and history of sexual violence were risk factors for transactional sex in women. A high prevalence of transactional sex was observed among NIDUs. This risk behavior may contribute to the high rates of HIV among this population and their social networks and in the general population. PMID:27648467
Adaptive salinity management in the Murray-Darling Basin: a transaction cost study
NASA Astrophysics Data System (ADS)
Loch, A. J.
2017-12-01
Transaction costs hinder or promote effective management of common good resource intertemporal externalities. Appropriate policy choices may reduce externalities and improve social welfare, and transaction cost analysis can help to evaluate policy choices. However, without measurement of relevant transaction costs such policy evaluation remains challenging. This article uses a time series dataset of salinity management program to test theory aimed at transaction cost-based policy evaluation and adaptive resource management over a period of 30 years worth of data. We identify peaks and troughs in transaction costs over time, lag-effects in program expenditure, and calculate the decay in transaction cost impacts. We conclude that Australian salinity management programs are achieving flexible institutional outcomes and effective policy arrangements with long-term benefits. Proposed changes to the program moving forward add weight to our assertions of adaptive strategies, and illustrate the value of the novel data-driven tracnsaction cost analysis approach for other jurisdictions.
17 CFR 5.3 - Registration of persons engaged in retail forex transactions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... engaged in retail forex transactions. 5.3 Section 5.3 Commodity and Securities Exchanges COMMODITY FUTURES... retail forex transactions. (a) Subject to paragraph (b) of this section, each of the following is subject... any retail forex transaction; or (B) Accepts money, securities, or property (or extends credit in lieu...
17 CFR 5.3 - Registration of persons engaged in retail forex transactions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... engaged in retail forex transactions. 5.3 Section 5.3 Commodity and Securities Exchanges COMMODITY FUTURES... retail forex transactions. (a) Subject to paragraph (b) of this section, each of the following is subject... any retail forex transaction; or (B) Accepts money, securities, or property (or extends credit in lieu...
17 CFR 5.3 - Registration of persons engaged in retail forex transactions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... engaged in retail forex transactions. 5.3 Section 5.3 Commodity and Securities Exchanges COMMODITY FUTURES... retail forex transactions. (a) Subject to paragraph (b) of this section, each of the following is subject... any retail forex transaction; or (B) Accepts money, securities, or property (or extends credit in lieu...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-24
... BE-45: Quarterly Survey of Insurance Transactions by U.S. Insurance Companies With Foreign Persons... conducting the mandatory survey titled Quarterly Survey of Insurance Transactions by U.S. Insurance Companies... survey is intended to collect information on cross-border insurance transactions between U.S. insurance...
Department of Defense Transactions Entering the International Balance of Payments
1963-07-01
divisions of funds under the provisions of Section 3679, Revised Statutes. D. Accounting and ,eport.tn6 1. -he accout !. C rEporting of transactIons enterina...management and control of transactions entering the international balance of payments will ino’.ude a programming, budgEting, 5 accouting , and reporting s
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Trading standards for the transaction of business on registered derivatives transaction execution facilities. 155.6 Section 155.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.6 Trading...
31 CFR 596.304 - Financial transaction.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Financial transaction. 596.304... REGULATIONS General Definitions § 596.304 Financial transaction. The term financial transaction shall have the meaning set forth in 18 U.S.C. 1956(c)(4), as from time to time amended. As of the effective date, this...
26 CFR 1.995-2 - Deemed distributions in qualified years.
Code of Federal Regulations, 2010 CFR
2010-04-01
... boycott income, and (iii) An amount equal to the sum of any illegal bribes, kickbacks, or other payments... first transaction. Thus, if the first transaction is a purchase of the property for cash, then... transaction if X had acquired the property in a first transaction by a purchase for cash. If, however, X...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... Options Transaction Charge (including the Cabinet Options Transaction Charge) as well as the Broker-Dealer FLEX transaction fee, for members executing facilitation orders pursuant to Exchange Rule 1064 when... average daily volume (including both FLEX and non-FLEX transactions) exceeds 10,000 contracts per day in a...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-26
... a means for OCC clearing members to submit broker-to-broker stock loan transactions to OCC for clearance. Broker-to-broker transactions are independently- executed stock loan transactions that are negotiated directly between two OCC clearing members. Where a stock loan transaction is submitted to, and...
77 FR 54808 - Integrated Hedging Transactions of Qualifying Debt
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-06
... integrated transactions that involve a foreign currency denominated debt instrument and multiple associated... currency). See Sec. 1.988-5(a)(9). A qualified hedging transaction is an integrated economic transaction...) regardless of its denominated currency. See Sec. 1.988-5(a)(3). A Sec. 1.988-5(a) hedge is a spot contract...
Aid Effectiveness, Transaction Costs and Conditionality in the Education Sector
ERIC Educational Resources Information Center
Ashford, Richard; Biswas, Shampa
2010-01-01
The reduction of transaction costs is a commonly mentioned yet rarely elaborated goal for aid effectiveness in educational development. The casual use of the concept of transaction costs conceals which costs may be reduced, which costs are required and, indeed, what transaction costs actually are. Examining issues related to harmonizing the…
7 CFR 3017.325 - What happens if I do business with an excluded person in a covered transaction?
Code of Federal Regulations, 2010 CFR
2010-01-01
... knowingly do business with an excluded person, we may disallow costs, annul or terminate the transaction... in a covered transaction? 3017.325 Section 3017.325 Agriculture Regulations of the Department of... DEBARMENT AND SUSPENSION (NONPROCUREMENT) Responsibilities of Participants Regarding Transactions § 3017.325...
17 CFR 32.1 - Scope of part 32; definitions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... OF COMMODITY OPTION TRANSACTIONS § 32.1 Scope of part 32; definitions. (a) Scope. The provisions of... commodity option transactions, shall apply to all commodity option transactions except for commodity option transactions conducted or executed on or subject to the rules of a contract market, or a foreign board of trade...
22 CFR 1006.325 - What happens if I do business with an excluded person in a covered transaction?
Code of Federal Regulations, 2010 CFR
2010-04-01
... disallow costs, annul or terminate the transaction, issue a stop work order, debar or suspend you, or take... person in a covered transaction? 1006.325 Section 1006.325 Foreign Relations INTER-AMERICAN FOUNDATION GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Responsibilities of Participants Regarding Transactions...
12 CFR 34.43 - Appraisals required; transactions requiring a State certified or licensed appraiser.
Code of Federal Regulations, 2010 CFR
2010-01-01
... advancement of new monies, other than funds necessary to cover reasonable closing costs; (8) The transaction... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Appraisals required; transactions requiring a...; transactions requiring a State certified or licensed appraiser. (a) Appraisals required. An appraisal performed...
29 CFR 98.325 - What happens if I do business with an excluded person in a covered transaction?
Code of Federal Regulations, 2010 CFR
2010-07-01
... transaction? If as a participant you knowingly do business with an excluded person, we may disallow costs... covered transaction? 98.325 Section 98.325 Labor Office of the Secretary of Labor GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Responsibilities of Participants Regarding Transactions Doing Business...
12 CFR 564.3 - Appraisals required; transactions requiring a State certified or licensed appraiser.
Code of Federal Regulations, 2010 CFR
2010-01-01
... than funds necessary to cover reasonable closing costs; (8) The transaction involves the purchase, sale... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Appraisals required; transactions requiring a... SUPERVISION, DEPARTMENT OF THE TREASURY APPRAISALS § 564.3 Appraisals required; transactions requiring a State...
12 CFR 323.3 - Appraisals required; transactions requiring a State certified or licensed appraiser.
Code of Federal Regulations, 2010 CFR
2010-01-01
... advancement of new monies, other than funds necessary to cover reasonable closing costs; (8) The transaction... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Appraisals required; transactions requiring a... CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY APPRAISALS § 323.3 Appraisals required; transactions...
45 CFR 162.925 - Additional requirements for health plans.
Code of Federal Regulations, 2010 CFR
2010-10-01
... clearinghouse to receive, process, or transmit a standard transaction may not charge fees or costs in excess of... RELATED REQUIREMENTS ADMINISTRATIVE REQUIREMENTS General Provisions for Transactions § 162.925 Additional... transaction as a standard transaction, the health plan must do so. (2) A health plan may not delay or reject a...
12 CFR 12.101 - National bank disclosure of remuneration for mutual fund transactions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mutual fund transactions. 12.101 Section 12.101 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT... Interpretations § 12.101 National bank disclosure of remuneration for mutual fund transactions. A national bank... by § 12.4, for mutual fund transactions by providing this information to the customer in a current...
12 CFR 12.101 - National bank disclosure of remuneration for mutual fund transactions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... mutual fund transactions. 12.101 Section 12.101 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT... Interpretations § 12.101 National bank disclosure of remuneration for mutual fund transactions. A national bank... by § 12.4, for mutual fund transactions by providing this information to the customer in a current...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-01
... Determined by In-House Asset Managers Agency: Employee Benefits Security Administration, Labor. Action... various transactions involving employee benefit plans whose assets are managed by in-house asset managers... Asset Transactions Determined by In-House Asset Managers to OMB for review and clearance at the time the...
31 CFR 593.404 - Transactions ordinarily incident to a licensed transaction.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Transactions ordinarily incident to a licensed transaction. 593.404 Section 593.404 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FORMER LIBERIAN REGIME OF...
31 CFR 593.404 - Transactions ordinarily incident to a licensed transaction.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Transactions ordinarily incident to a licensed transaction. 593.404 Section 593.404 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FORMER LIBERIAN REGIME OF...
31 CFR 593.404 - Transactions ordinarily incident to a licensed transaction.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions ordinarily incident to a licensed transaction. 593.404 Section 593.404 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FORMER LIBERIAN REGIME OF...
31 CFR 593.404 - Transactions ordinarily incident to a licensed transaction.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Transactions ordinarily incident to a licensed transaction. 593.404 Section 593.404 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FORMER LIBERIAN REGIME OF...
31 CFR 593.404 - Transactions ordinarily incident to a licensed transaction.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Transactions ordinarily incident to a licensed transaction. 593.404 Section 593.404 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FORMER LIBERIAN REGIME OF...
41 CFR 105-68.220 - Are any procurement contracts included as covered transactions?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Are any procurement contracts included as covered transactions? 105-68.220 Section 105-68.220 Public Contracts and Property...) Covered Transactions § 105-68.220 Are any procurement contracts included as covered transactions? (a...
41 CFR 105-68.220 - Are any procurement contracts included as covered transactions?
Code of Federal Regulations, 2011 CFR
2011-01-01
... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Are any procurement contracts included as covered transactions? 105-68.220 Section 105-68.220 Public Contracts and Property...) Covered Transactions § 105-68.220 Are any procurement contracts included as covered transactions? (a...
5 CFR 919.220 - Are any procurement contracts included as covered transactions?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Are any procurement contracts included as...) Covered Transactions § 919.220 Are any procurement contracts included as covered transactions? (a) Covered transactions under this part— (1) Do not include any procurement contracts awarded directly by a Federal agency...
31 CFR 800.220 - Party or parties to a transaction.
Code of Federal Regulations, 2010 CFR
2010-07-01
... (Continued) OFFICE OF INVESTMENT SECURITY, DEPARTMENT OF THE TREASURY REGULATIONS PERTAINING TO MERGERS, ACQUISITIONS, AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.220 Party or parties to a transaction. The terms party to a transaction and parties to a transaction mean: (a) In the case of an acquisition of an...
26 CFR 31.3406(b)(2)-3 - Window transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 15 2010-04-01 2010-04-01 false Window transactions. 31.3406(b)(2)-3 Section 31... SOURCE Collection of Income Tax at Source § 31.3406(b)(2)-3 Window transactions. (a) Requirement to backup withhold. Withholding under section 3406 applies to a window transaction (as defined in paragraph...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for the transaction of business on registered derivatives transaction execution facilities. 155.6 Section 155.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.6 Trading...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Trading standards for the transaction of business on registered derivatives transaction execution facilities. 155.6 Section 155.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.6 Trading...
31 CFR 800.302 - Transactions that are not covered transactions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... transaction is solely for the purpose of passive investment. (See § 800.223.) Example 1. In an open market purchase solely for the purpose of passive investment, Corporation A, a foreign person, acquires seven... purpose of passive investment and is a covered transaction. Example 3. Corporation A, a foreign person...
17 CFR 270.17a-6 - Exemption for transactions with portfolio affiliates.
Code of Federal Regulations, 2010 CFR
2010-04-01
... with portfolio affiliates. 270.17a-6 Section 270.17a-6 Commodity and Securities Exchanges SECURITIES... Exemption for transactions with portfolio affiliates. (a) Exemption for transactions with portfolio affiliates. A transaction to which a fund, or a company controlled by a fund, and a portfolio affiliate of...
Influence of sociodemographics on human mobility
NASA Astrophysics Data System (ADS)
Lenormand, Maxime; Louail, Thomas; Cantú-Ros, Oliva G.; Picornell, Miguel; Herranz, Ricardo; Arias, Juan Murillo; Barthelemy, Marc; Miguel, Maxi San; Ramasco, José J.
2015-05-01
Human mobility has been traditionally studied using surveys that deliver snapshots of population displacement patterns. The growing accessibility to ICT information from portable digital media has recently opened the possibility of exploring human behavior at high spatio-temporal resolutions. Mobile phone records, geolocated tweets, check-ins from Foursquare or geotagged photos, have contributed to this purpose at different scales, from cities to countries, in different world areas. Many previous works lacked, however, details on the individuals’ attributes such as age or gender. In this work, we analyze credit-card records from Barcelona and Madrid and by examining the geolocated credit-card transactions of individuals living in the two provinces, we find that the mobility patterns vary according to gender, age and occupation. Differences in distance traveled and travel purpose are observed between younger and older people, but, curiously, either between males and females of similar age. While mobility displays some generic features, here we show that sociodemographic characteristics play a relevant role and must be taken into account for mobility and epidemiological modelization.
Mechanistic approach to generalized technical analysis of share prices and stock market indices
NASA Astrophysics Data System (ADS)
Ausloos, M.; Ivanova, K.
2002-05-01
Classical technical analysis methods of stock evolution are recalled, i.e. the notion of moving averages and momentum indicators. The moving averages lead to define death and gold crosses, resistance and support lines. Momentum indicators lead the price trend, thus give signals before the price trend turns over. The classical technical analysis investment strategy is thereby sketched. Next, we present a generalization of these tricks drawing on physical principles, i.e. taking into account not only the price of a stock but also the volume of transactions. The latter becomes a time dependent generalized mass. The notion of pressure, acceleration and force are deduced. A generalized (kinetic) energy is easily defined. It is understood that the momentum indicators take into account the sign of the fluctuations, while the energy is geared toward the absolute value of the fluctuations. They have different patterns which are checked by searching for the crossing points of their respective moving averages. The case of IBM evolution over 1990-2000 is used for illustrations.
Influence of sociodemographic characteristics on human mobility [corrected].
Lenormand, Maxime; Louail, Thomas; Cantú-Ros, Oliva G; Picornell, Miguel; Herranz, Ricardo; Arias, Juan Murillo; Barthelemy, Marc; Miguel, Maxi San; Ramasco, José J
2015-05-20
Human mobility has been traditionally studied using surveys that deliver snapshots of population displacement patterns. The growing accessibility to ICT information from portable digital media has recently opened the possibility of exploring human behavior at high spatio-temporal resolutions. Mobile phone records, geolocated tweets, check-ins from Foursquare or geotagged photos, have contributed to this purpose at different scales, from cities to countries, in different world areas. Many previous works lacked, however, details on the individuals' attributes such as age or gender. In this work, we analyze credit-card records from Barcelona and Madrid and by examining the geolocated credit-card transactions of individuals living in the two provinces, we find that the mobility patterns vary according to gender, age and occupation. Differences in distance traveled and travel purpose are observed between younger and older people, but, curiously, either between males and females of similar age. While mobility displays some generic features, here we show that sociodemographic characteristics play a relevant role and must be taken into account for mobility and epidemiological modelization.
Kim, Hyoun S; Hollingshead, Samantha; Wohl, Michael J A
2017-06-01
Social casino games are online gambling-like games found on social networking sites. They are initially free to play, however, players are encouraged to make micro-transactions (i.e., in-game purchases) for additional game credits or functionality. As a result, they generate billions of dollars in revenue. Yet, little is known as to who purchases virtual credits, let alone why. In the present research, we assessed whether there are individual differences (impulsivity, reward sensitivity, competitiveness, and problem gambling severity) between who is and who is not likely to make micro-transactions during social casino game play. Moreover, we examined possible motivations for making micro-transactions (e.g., extend play, win back lost credits) and whether the individual difference variables of interest predict reported motivation(s) for making micro-transactions. Results showed that social casino gamers who engaged in micro-transactions reported significantly higher levels of impulsivity, reward sensitivity and problem gambling severity, but not competitiveness. In terms of motivation to make micro-transactions, desire to extend play was endorsed most frequently, followed by a desire to access additional features, chasing lost credits, and to speed up play. Lastly, among participants who made micro-transactions, reward sensitivity predicted making micro-transactions to chase lost credits. These results suggest the personality make-up of social casino gamers is important to understand who is likely to make micro-transactions as well as their motivation to do so-information that could prove useful for regulation of the industry.
Magni, Sarah; Christofides, Nicola; Johnson, Saul; Weiner, Renay
2015-01-01
Background Transactional sex is a risk factor for HIV infection. Alcohol use may increase the risk of transactional sex. No nationally-representative studies have examined the relationship between multiple dimensions of alcohol use and transactional sex in women in South Africa. The aim of the study was to examine the relationship between alcohol dependence, binge drinking and frequency of drinking in the past month and transactional sex in adult women in South Africa. Methods A cross-sectional study using multi-stage, cluster sampling collected data from a nationally representative sample of 5,969 women aged 16–55 years in 2012. The analysis conducted for this paper was restricted to women reporting sexual activity in the past 12 months (n = 3,594). Transactional sex was defined as having received money/gifts in exchange for sex with any sex partner in the past year. Alcohol use measures included: alcohol dependence (≥2 positive responses to the CAGE questionnaire); binge drinking (≥4 drinks for women on one occasion); and drinking frequency in the previous month. Logistic regression models were built to test the hypotheses that each dimension of alcohol use was associated with transactional sex. Results About 6.3% (n = 225) of sexually active women reported transactional sex. Almost a third (30.6%) of sexually active women had ever drunk alcohol, and 19.2% were current (past month) drinkers. Among lifetime drinkers, 28.0% were alcohol dependent and 56.6% were binge drinkers. Alcohol dependent women were twice as likely to report transactional sex (AOR 2.0, 95% CI 1.1–4.3, p<0.05) than those not alcohol dependent. Binge drinkers were 3.1 times more likely to have had transactional sex (95% CI 1.5–6.6, p<0.01) than non-binge drinkers. There was no significant relationship between frequency of drinking in the past month and transactional sex. Conclusion Alcohol dependency and binge drinking are significantly associated with transactional sex in South African women. HIV prevention programmes need to target these women, and address both their alcohol use, as well as the HIV risks associated with transactional sex. PMID:26683812
Allocation and management issues in multiple-transaction open access transmission networks
NASA Astrophysics Data System (ADS)
Tao, Shu
This thesis focuses on some key issues related to allocation and management by the independent grid operator (IGO) of unbundled services in multiple-transaction open access transmission networks. The three unbundled services addressed in the thesis are transmission real power losses, reactive power support requirements from generation sources, and transmission congestion management. We develop the general framework that explicitly represents multiple transactions undertaken simultaneously in the transmission grid. This framework serves as the basis for formulating various problems treated in the thesis. We use this comprehensive framework to develop a physical-flow-based mechanism to allocate the total transmission losses to each transaction using the system. An important property of the allocation scheme is its capability to effectively deal with counter flows that result in the presence of specific transactions. Using the loss allocation results as the basis, we construct the equivalent loss compensation concept and apply it to develop flexible and effective procedures for compensating losses in multiple-transaction networks. We present a new physical-flow-based mechanism for allocating the reactive power support requirements provided by generators in multiple-transaction networks. The allocatable reactive support requirements are formulated as the sum of two specific components---the voltage magnitude variation component and the voltage angle variation component. The formulation utilizes the multiple-transaction framework and makes use of certain simplifying approximations. The formulation leads to a natural allocation as a function of the amount of each transaction. The physical interpretation of each allocation as a sensitivity of the reactive output of a generator is discussed. We propose a congestion management allocation scheme for multiple-transaction networks. The proposed scheme determines the allocation of congestion among the transactions on a physical-flow basis. It also proposes a congestion relief scheme that removes the congestion attributed to each transaction on the network in a least-cost manner to the IGO and determines the appropriate transmission charges to each transaction for its transmission usage. The thesis provides a compendium of problems that are natural extensions of the research results reported here and appear to be good candidates for future work.
2011-01-01
Background 'Transactional sex' was regarded by the mid-1990s as an important determinant of HIV transmission, particularly in sub-Saharan Africa. Little attention has been paid to what the terms used to denote transactional sex suggest about how it is understood. This study provides a nuanced set of descriptions of the meaning of transactional sex in three settings. Furthermore, we discuss how discourses around transactional sex suggest linkages to processes of globalization and hold implications for vulnerability to HIV. Methods The analysis in this article is based on three case studies conducted as part of a multi-country research project that investigated linkages between economic globalization and HIV. In this analysis, we contextualize and contrast the 'talk' about transactional sex through the following research methods in three study sites: descriptions revealed through semi-structured interviews with garment workers in Lesotho; focus groups with young women and men in Antananarivo, Madagascar; and focus groups and in-depth interviews with young women and men in Mbekweni, South Africa. Results Participants' talk about transactional sex reveals two themes: (1) 'The politics of differentiation' reflects how participants used language to demarcate identities, and distance themselves from contextually-based marginalized identities; and (2) 'Gender, agency and power' describes how participants frame gendered-power within the context of transactional sex practices, and reflects on the limitations to women's power as sexual agents in these exchanges. Talk about transactional sex in our study settings supports the assertion that emerging transactional sexual practices are linked with processes of globalization tied to consumerism. Conclusions By focusing on 'talk' about transactional sex, we locate definitions of transactional sex, and how terms used to describe transactional sex are morally framed for people within their local context. We take advantage of an opportunity to comparatively explore such talk across three different study sites, and contribute to a better understanding of both emerging sexual practices and their implications for HIV vulnerability. Our work underlines that transactional sex needs to be reflected as it is perceived: something very different from, but of at least equal concern to, formal sex work in the efforts to curb HIV transmission. PMID:21961516
Han, Ji Won; Oh, Kyusoo; Yoo, Sooyoung; Kim, Eunhye; Ahn, Ki-Hwan; Son, Yeon-Joo; Kim, Tae Hui; Chi, Yeon Kyung
2014-01-01
Objective The Ubiquitous Spaced Retrieval-based Memory Advancement and Rehabilitation Training (USMART) program was developed by transforming the spaced retrieval-based memory training which consisted of 24 face-to-face sessions into a self-administered program with an iPAD app. The objective of this study was to evaluate the feasibility and efficacy of USMART in elderly subjects with mild cognitive impairment (MCI). Methods Feasibility was evaluated by checking the satisfaction of the participants with a 5-point Likert scale. The efficacy of the program on cognitive functions was evaluated by the Korean version of the Consortium to Establish a Registry for Alzheimer's Disease Neuropsychological Assessment Battery before and after USMART. Results Among the 10 participants, 7 completed both pre- and post-USMART assessments. The overall satisfaction score was 8.0±1.0 out of 10. The mean Word List Memory Test (WLMT) scores significantly increased after USMART training after adjusting for age, educational levels, baseline Mini-Mental Status Examination scores, and the number of training sessions (pre-USMART, 16.0±4.1; post-USMART, 17.9±4.5; p=0.014, RM-ANOVA). The magnitude of the improvements in the WLMT scores significantly correlated with the number of training sessions during 4 weeks (r=0.793; p=0.033). Conclusion USMART was effective in improving memory and was well tolerated by most participants with MCI, suggesting that it may be a convenient and cost-effective alternative for the cognitive rehabilitation of elderly subjects with cognitive impairments. Further studies with large numbers of participants are necessary to examine the relationship between the number of training sessions and the improvements in memory function. PMID:24605124
Aligning observed and modelled behaviour based on workflow decomposition
NASA Astrophysics Data System (ADS)
Wang, Lu; Du, YuYue; Liu, Wei
2017-09-01
When business processes are mostly supported by information systems, the availability of event logs generated from these systems, as well as the requirement of appropriate process models are increasing. Business processes can be discovered, monitored and enhanced by extracting process-related information. However, some events cannot be correctly identified because of the explosion of the amount of event logs. Therefore, a new process mining technique is proposed based on a workflow decomposition method in this paper. Petri nets (PNs) are used to describe business processes, and then conformance checking of event logs and process models is investigated. A decomposition approach is proposed to divide large process models and event logs into several separate parts that can be analysed independently; while an alignment approach based on a state equation method in PN theory enhances the performance of conformance checking. Both approaches are implemented in programmable read-only memory (ProM). The correctness and effectiveness of the proposed methods are illustrated through experiments.
NASA Technical Reports Server (NTRS)
Pasareanu, Corina S.; Giannakopoulou, Dimitra
2006-01-01
This paper discusses our initial experience with introducing automated assume-guarantee verification based on learning in the SPIN tool. We believe that compositional verification techniques such as assume-guarantee reasoning could complement the state-reduction techniques that SPIN already supports, thus increasing the size of systems that SPIN can handle. We present a "light-weight" approach to evaluating the benefits of learning-based assume-guarantee reasoning in the context of SPIN: we turn our previous implementation of learning for the LTSA tool into a main program that externally invokes SPIN to provide the model checking-related answers. Despite its performance overheads (which mandate a future implementation within SPIN itself), this approach provides accurate information about the savings in memory. We have experimented with several versions of learning-based assume guarantee reasoning, including a novel heuristic introduced here for generating component assumptions when their environment is unavailable. We illustrate the benefits of learning-based assume-guarantee reasoning in SPIN through the example of a resource arbiter for a spacecraft. Keywords: assume-guarantee reasoning, model checking, learning.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Dissemination of transaction reports and last sale data with respect to transactions in NMS stocks. 242.601 Section 242.601 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-12
... off-exchange foreign currency transactions with members of the retail public (i.e., retail forex... various provisions of the CEA as amended by the Dodd-Frank Act with respect to retail forex transactions... counterparty to a retail forex transaction under CEA Section 2(c)(2)(B) (``permitted counterparty''), which...
Code of Federal Regulations, 2014 CFR
2014-07-01
... conducting or facilitating the financial transaction described in paragraph (b) of § 561.204 and the National Iranian Oil Company (“NIOC”), the Naftiran Intertrade Company (“NICO”), any entity owned or controlled by... Human Rights Act of 2012 (“TRA”), or of the financial transaction on the objectives of the National...
12 CFR 229.40 - Effect of merger transaction.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Effect of merger transaction. 229.40 Section... Effect of merger transaction. (a) In general. For purposes of this subpart, two or more banks that have engaged in a merger transaction may be considered to be separate banks for a period of one year following...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-06
... transaction fee for executions in standard option contracts and $0.008 transaction fee for Mini Option... Exchange for purposes of the transaction fee and Section 1(a)(i) of the Fee Schedule include: (i... (``DPLMM''). See MIAX Options Fee Schedule, Section 1(a)(i)--Market Maker Transaction Fees. The current...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-10
... options transactions executed or cleared by the member that are cleared by The Options Clearing... imposed upon all transactions executed by a member, even if such transactions do not take place on the Exchange.\\3\\ The ORF also includes options transactions that are not executed by an Exchange member but are...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-09
... decrease the current $.0035 per contract fee to each member for all options transactions executed or... exceed costs. The ORF is imposed upon all such transactions executed by a member, even if such transactions do not take place on the Exchange.\\3\\ The ORF also includes options transactions that are not...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-18
... Customers in Section 1c is $0.07 per executed contract for all non-PIP transactions. The Exchange proposes to amend Section 1c to expand this applicable fee to all non-Auction Transactions and define the term ``Auction Transactions'' to include all transactions executed through PIP, the Solicitation Auction...
77 FR 28819 - Second Amendment to July 14, 2011 Order for Swap Regulation
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-16
... described herein; and (4) removing any reference to the exempt commercial market (``ECM'') and exempt board... scope of transactions eligible to be transacted on either an ECM or EBOT to include transactions in... transactions) that: (1) Are executed on an ECM or EBOT that is operating under the terms of the Commission's...
29 CFR 1471.325 - What happens if I do business with an excluded person in a covered transaction?
Code of Federal Regulations, 2010 CFR
2010-07-01
... business with an excluded person, we may disallow costs, annul or terminate the transaction, issue a stop... covered transaction? 1471.325 Section 1471.325 Labor Regulations Relating to Labor (Continued) FEDERAL... of Participants Regarding Transactions Doing Business with Other Persons § 1471.325 What happens if I...
2 CFR 180.325 - What happens if I do business with an excluded person in a covered transaction?
Code of Federal Regulations, 2010 CFR
2010-01-01
... person, the Federal agency responsible for your transaction may disallow costs, annul or terminate the... excluded person in a covered transaction? 180.325 Section 180.325 Grants and Agreements OFFICE OF... Regarding Transactions Doing Business With Other Persons § 180.325 What happens if I do business with an...
7 CFR 1927.53 - Costs of title clearance and closing of transactions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 12 2010-01-01 2010-01-01 false Costs of title clearance and closing of transactions... and Loan Closing § 1927.53 Costs of title clearance and closing of transactions. The borrower or the... payment of all costs of title clearance and closing of the transaction and will arrange for payment before...
22 CFR 1508.325 - What happens if I do business with an excluded person in a covered transaction?
Code of Federal Regulations, 2010 CFR
2010-04-01
... person, we may disallow costs, annul or terminate the transaction, issue a stop work order, debar or... person in a covered transaction? 1508.325 Section 1508.325 Foreign Relations AFRICAN DEVELOPMENT... Regarding Transactions Doing Business with Other Persons § 1508.325 What happens if I do business with an...
22 CFR 208.305 - May I enter into a covered transaction with an excluded or disqualified person?
Code of Federal Regulations, 2011 CFR
2011-04-01
... excluded or disqualified person? 208.305 Section 208.305 Foreign Relations AGENCY FOR INTERNATIONAL... Regarding Transactions Doing Business with Other Persons § 208.305 May I enter into a covered transaction... transaction with an excluded person, unless the U.S. Agency for International Development grants an exception...
22 CFR 208.305 - May I enter into a covered transaction with an excluded or disqualified person?
Code of Federal Regulations, 2010 CFR
2010-04-01
... excluded or disqualified person? 208.305 Section 208.305 Foreign Relations AGENCY FOR INTERNATIONAL... Regarding Transactions Doing Business with Other Persons § 208.305 May I enter into a covered transaction... transaction with an excluded person, unless the U.S. Agency for International Development grants an exception...
Code of Federal Regulations, 2013 CFR
2013-01-01
... of personal securities trading transactions? 151.150 Section 151.150 Banks and Banking COMPTROLLER OF... TRANSACTIONS Securities Trading Policies and Procedures § 151.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 151.140(d) must...