Sample records for computer access correlations

  1. A National Study of the Relationship between Home Access to a Computer and Academic Performance Scores of Grade 12 U.S. Science Students: An Analysis of the 2009 NAEP Data

    NASA Astrophysics Data System (ADS)

    Coffman, Mitchell Ward

    The purpose of this dissertation was to examine the relationship between student access to a computer at home and academic achievement. The 2009 National Assessment of Educational Progress (NAEP) dataset was probed using the National Data Explorer (NDE) to investigate correlations in the subsets of SES, Parental Education, Race, and Gender as it relates to access of a home computer and improved performance scores for U.S. public school grade 12 science students. A causal-comparative approach was employed seeking clarity on the relationship between home access and performance scores. The influence of home access cannot overcome the challenges students of lower SES face. The achievement gap, or a second digital divide, for underprivileged classes of students, including minorities does not appear to contract via student access to a home computer. Nonetheless, in tests for significance, statistically significant improvement in science performance scores was reported for those having access to a computer at home compared to those not having access. Additionally, regression models reported evidence of correlations between and among subsets of controls for the demographic factors gender, race, and socioeconomic status. Variability in these correlations was high; suggesting influence from unobserved factors may have more impact upon the dependent variable. Having access to a computer at home increases performance scores for grade 12 general science students of all races, genders and socioeconomic levels. However, the performance gap is roughly equivalent to the existing performance gap of the national average for science scores, suggesting little influence from access to a computer on academic achievement. The variability of scores reported in the regression analysis models reflects a moderate to low effect, suggesting an absence of causation. These statistical results are accurate and confirm the literature review, whereby having access to a computer at home and the predictor variables were found to have a significant impact on performance scores, although the data presented suggest computer access at home is less influential upon performance scores than poverty and its correlates.

  2. Blood flow measurement using digital subtraction angiography for assessing hemodialysis access function

    NASA Astrophysics Data System (ADS)

    Koirala, Nischal; Setser, Randolph M.; Bullen, Jennifer; McLennan, Gordon

    2017-03-01

    Blood flow rate is a critical parameter for diagnosing dialysis access function during fistulography where a flow rate of 600 ml/min in arteriovenous graft or 400-500 ml/min in arteriovenous fistula is considered the clinical threshold for fully functioning access. In this study, a flow rate computational model for calculating intra-access flow to evaluate dialysis access patency was developed and validated in an in vitro set up using digital subtraction angiography. Flow rates were computed by tracking the bolus through two regions of interest using cross correlation (XCOR) and mean arrival time (MAT) algorithms, and correlated versus an in-line transonic flow meter measurement. The mean difference (mean +/- standard deviation) between XCOR and in-line flow measurements for in vitro setup at 3, 6, 7.5 and 10 frames/s was 118+/-63 37+/-59 31+/-31 and 46+/-57 ml/min respectively while for MAT method it was 86+/-56 57+/-72 35+/-85 and 19+/-129 ml/min respectively. The result of this investigation will be helpful for selecting candidate algorithms while blood flow computational tool is developed for clinical application.

  3. [Birth and death process of computer viruses].

    PubMed

    Segawa, Katsunori; Nakano, Tatsuya; Nakata, Kotoko; Hayashi, Yuzuru

    2006-01-01

    The daily variations in the number of computer viruses found attaching to e-mails and the number of accesses to the home page of a national institute in Japan are examined. The power spectral densities (PSD) of the variation in the computer viruses show a time-correlation characteristic of Markov process, but the daily access number does not (identified as white noise). Like biological viruses, the variation in the computer viruses can be described by the birth-and-death model known as a Markov process.

  4. Student Perceived Importance and Correlations of Selected Computer Literacy Course Topics

    ERIC Educational Resources Information Center

    Ciampa, Mark

    2013-01-01

    Traditional college-level courses designed to teach computer literacy are in a state of flux. Today's students have high rates of access to computing technology and computer ownership, leading many policy decision makers to conclude that students already are computer literate and thus computer literacy courses are dinosaurs in a modern digital…

  5. SPAN: Astronomy and astrophysics

    NASA Technical Reports Server (NTRS)

    Thomas, Valerie L.; Green, James L.; Warren, Wayne H., Jr.; Lopez-Swafford, Brian

    1987-01-01

    The Space Physics Analysis Network (SPAN) is a multi-mission, correlative data comparison network which links science research and data analysis computers in the U.S., Canada, and Europe. The purpose of this document is to provide Astronomy and Astrophysics scientists, currently reachable on SPAN, with basic information and contacts for access to correlative data bases, star catalogs, and other astrophysic facilities accessible over SPAN.

  6. Change in Computer Access and the Academic Achievement of Immigrant Children

    ERIC Educational Resources Information Center

    Moon, Ui Jeong; Hofferth, Sandra

    2018-01-01

    Background/Context: Increased interest in the correlates of media devices available to children has led to research indicating that access to and use of technology are positively associated with children's academic achievement. However, the digital divide remains; not all children have access to digital technologies, and not all children can…

  7. Computer-Access-Code Matrices

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr.

    1990-01-01

    Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

  8. Video game access, parental rules, and problem behavior: a study of boys with autism spectrum disorder.

    PubMed

    Engelhardt, Christopher R; Mazurek, Micah O

    2014-07-01

    Environmental correlates of problem behavior among individuals with autism spectrum disorder remain relatively understudied. The current study examined the contribution of in-room (i.e. bedroom) access to a video game console as one potential correlate of problem behavior among a sample of 169 boys with autism spectrum disorder (ranging from 8 to 18 years of age). Parents of these children reported on (1) whether they had specific rules regulating their child's video game use, (2) whether their child had in-room access to a variety of screen-based media devices (television, computer, and video game console), and (3) their child's oppositional behaviors. Multivariate regression models showed that in-room access to a video game console predicted oppositional behavior while controlling for in-room access to other media devices (computer and television) and relevant variables (e.g. average number of video game hours played per day). Additionally, the association between in-room access to a video game console and oppositional behavior was particularly large when parents reported no rules on their child's video game use. The current findings indicate that both access and parental rules regarding video games warrant future experimental and longitudinal research as they relate to problem behavior in boys with autism spectrum disorder. © The Author(s) 2013.

  9. High-performance conjugate-gradient benchmark: A new metric for ranking high-performance computing systems

    DOE PAGES

    Dongarra, Jack; Heroux, Michael A.; Luszczek, Piotr

    2015-08-17

    Here, we describe a new high-performance conjugate-gradient (HPCG) benchmark. HPCG is composed of computations and data-access patterns commonly found in scientific applications. HPCG strives for a better correlation to existing codes from the computational science domain and to be representative of their performance. Furthermore, HPCG is meant to help drive the computer system design and implementation in directions that will better impact future performance improvement.

  10. Application Performance Analysis and Efficient Execution on Systems with multi-core CPUs, GPUs and MICs: A Case Study with Microscopy Image Analysis

    PubMed Central

    Teodoro, George; Kurc, Tahsin; Andrade, Guilherme; Kong, Jun; Ferreira, Renato; Saltz, Joel

    2015-01-01

    We carry out a comparative performance study of multi-core CPUs, GPUs and Intel Xeon Phi (Many Integrated Core-MIC) with a microscopy image analysis application. We experimentally evaluate the performance of computing devices on core operations of the application. We correlate the observed performance with the characteristics of computing devices and data access patterns, computation complexities, and parallelization forms of the operations. The results show a significant variability in the performance of operations with respect to the device used. The performances of operations with regular data access are comparable or sometimes better on a MIC than that on a GPU. GPUs are more efficient than MICs for operations that access data irregularly, because of the lower bandwidth of the MIC for random data accesses. We propose new performance-aware scheduling strategies that consider variabilities in operation speedups. Our scheduling strategies significantly improve application performance compared to classic strategies in hybrid configurations. PMID:28239253

  11. Compensated Crystal Assemblies for Type-II Entangled Photon Generation in Quantum Cluster States

    DTIC Science & Technology

    2010-03-01

    in quantum computational architectures that operate by principles entirely distinct from any based on classical physics. In contrast with other...of the SPDC spectral function, to enable applications in regions that have not been accessible with other methods. Quantum Information and Computation ...Eliminating frequency and space-time correlations in multi-photon states, PRA 64, 063815, 2001 [2]A. Zeilinger et.al. Experimental One-way computing

  12. Using Computer-Adaptive Quizzing as a Tool for National Council Licensure Examination Success.

    PubMed

    Pence, Jill; Wood, Felecia

    This study examined the relationship between using computer-adaptive quizzing (CAQ) and first-time National Council Licensure Examination (NCLEX) success. A retrospective, descriptive, correlational design was used to analyze the relationship between use of a CAQ program and first-time NCLEX results of 194 baccalaureate graduates. Chi-square analysis suggested that there was an association between using the software and NCLEX success (p < .001, df = 1), with 16 percent of those without access compared to 1 percent with access being unsuccessful on the licensure exam. Results support using CAQ as formative preparation for the NCLEX.

  13. Spatial correlation of the dynamic propensity of a glass-forming liquid

    NASA Astrophysics Data System (ADS)

    Razul, M. Shajahan G.; Matharoo, Gurpreet S.; Poole, Peter H.

    2011-06-01

    We present computer simulation results on the dynamic propensity (as defined by Widmer-Cooper et al 2004 Phys. Rev. Lett. 93 135701) in a Kob-Andersen binary Lennard-Jones liquid system consisting of 8788 particles. We compute the spatial correlation function for the dynamic propensity as a function of both the reduced temperature T, and the time scale on which the particle displacements are measured. For T <= 0.6, we find that non-zero correlations occur at the largest length scale accessible in our system. We also show that a cluster-size analysis of particles with extremal values of the dynamic propensity, as well as 3D visualizations, reveal spatially correlated regions that approach the size of our system as T decreases, consistently with the behavior of the spatial correlation function. Next, we define and examine the 'coordination propensity', the isoconfigurational average of the coordination number of the minority B particles around the majority A particles. We show that a significant correlation exists between the spatial fluctuations of the dynamic and coordination propensities. In addition, we find non-zero correlations of the coordination propensity occurring at the largest length scale accessible in our system for all T in the range 0.466 < T < 1.0. We discuss the implications of these results for understanding the length scales of dynamical heterogeneity in glass-forming liquids.

  14. Man-Computer Interactive Data Access System (McIDAS). Continued development of McIDAS and operation in the GARP Atlantic tropical experiment

    NASA Technical Reports Server (NTRS)

    Suomi, V. E.

    1975-01-01

    The complete output of the Synchronous Meteorological Satellite was recorded on one inch magnetic tape. A quality control subsystem tests cloud track vectors against four sets of criteria: (1) rejection if best match occurs on correlation boundary; (2) rejection if major correlation peak is not distinct and significantly greater than secondary peak; (3) rejection if correlation is not persistent; and (4) rejection if acceleration is too great. A cloud height program determines cloud optical thickness from visible data and computer infrared emissivity. From infrared data and temperature profile, cloud height is determined. A functional description and electronic schematics of equipment are given.

  15. Validation of computational fluid dynamics-based analysis to evaluate hemodynamic significance of access stenosis.

    PubMed

    Hoganson, David M; Hinkel, Cameron J; Chen, Xiaomin; Agarwal, Ramesh K; Shenoy, Surendra

    2014-01-01

    Stenosis in a vascular access circuit is the predominant cause of access dysfunction. Hemodynamic significance of a stenosis identified by angiography in an access circuit is uncertain. This study utilizes computational fluid dynamics (CFD) to model flow through arteriovenous fistula to predict the functional significance of stenosis in vascular access circuits. Three-dimensional models of fistulas were created with a range of clinically relevant stenoses using SolidWorks. Stenoses diameters ranged from 1.0 to 3.0 mm and lengths from 5 to 60 mm within a fistula diameter of 7 mm. CFD analyses were performed using a blood model over a range of blood pressures. Eight patient-specific stenoses were also modeled and analyzed with CFD and the resulting blood flow calculations were validated by comparison with brachial artery flow measured by duplex ultrasound. Predicted flow rates were derived from CFD analysis of a range of stenoses. These stenoses were modeled by CFD and correlated with the ultrasound measured flow rate through the fistula of eight patients. The calculated flow rate using CFD correlated within 20% of ultrasound measured flow for five of eight patients. The mean difference was 17.2% (ranged from 1.3% to 30.1%). CFD analysis-generated flow rate tables provide valuable information to assess the functional significance of stenosis detected during imaging studies. The CFD study can help in determining the clinical relevance of a stenosis in access dysfunction and guide the need for intervention.

  16. Computer and internet use by ophthalmologists and trainees in an academic centre.

    PubMed

    Somal, Kirandeep; Lam, Wai-Ching; Tam, Eric

    2009-06-01

    The purpose of this study was to determine computer, internet, and department web site use by members of the Department of Ophthalmology and Vision Sciences at the University of Toronto in Toronto, Ont. Cross-sectional analysis. Eighty-eight members of the Department of Ophthalmology and Vision Sciences who responded to a survey. One hundred forty-eight department members (93 staff, 24 residents, and 31 fellows) were invited via e-mail to complete an online survey looking at computer and internet use. Participation was voluntary. Individuals who did not fill in an online response were sent a paper copy of the survey. No identifying fields were used in the data analysis. A response rate of 59% (88/148) was obtained. Fifty-nine percent of respondents described their computer skill as "good" or better; 86.4% utilized a computer in their clinical practice. Performance of computer-related tasks included accessing e-mail (98.9%), accessing medical literature (87.5%), conducting personal affairs (83%), and accessing conference/round schedules (65.9%). The survey indicated that 89.1% of respondents accessed peer-reviewed material online, including eMedicine (60.2%) and UpToDate articles (48.9%). Thirty-three percent of department members reported never having visited the department web site. Impediments to web site use included information not up to date (27.3%), information not of interest (22.1%), and difficulty locating the web site (20.8%). The majority of ophthalmologists and trainees in an academic centre utilize computer and internet resources for various tasks. A weak linear correlation was found between lower age of respondent and higher self-evaluated experience with computers (r = -0.43). Although use of the current department web site was low, respondents were interested in seeing improvements to the web site to increase its utility.

  17. ALMA Correlator Real-Time Data Processor

    NASA Astrophysics Data System (ADS)

    Pisano, J.; Amestica, R.; Perez, J.

    2005-10-01

    The design of a real-time Linux application utilizing Real-Time Application Interface (RTAI) to process real-time data from the radio astronomy correlator for the Atacama Large Millimeter Array (ALMA) is described. The correlator is a custom-built digital signal processor which computes the cross-correlation function of two digitized signal streams. ALMA will have 64 antennas with 2080 signal streams each with a sample rate of 4 giga-samples per second. The correlator's aggregate data output will be 1 gigabyte per second. The software is defined by hard deadlines with high input and processing data rates, while requiring interfaces to non real-time external computers. The designed computer system - the Correlator Data Processor or CDP, consists of a cluster of 17 SMP computers, 16 of which are compute nodes plus a master controller node all running real-time Linux kernels. Each compute node uses an RTAI kernel module to interface to a 32-bit parallel interface which accepts raw data at 64 megabytes per second in 1 megabyte chunks every 16 milliseconds. These data are transferred to tasks running on multiple CPUs in hard real-time using RTAI's LXRT facility to perform quantization corrections, data windowing, FFTs, and phase corrections for a processing rate of approximately 1 GFLOPS. Highly accurate timing signals are distributed to all seventeen computer nodes in order to synchronize them to other time-dependent devices in the observatory array. RTAI kernel tasks interface to the timing signals providing sub-millisecond timing resolution. The CDP interfaces, via the master node, to other computer systems on an external intra-net for command and control, data storage, and further data (image) processing. The master node accesses these external systems utilizing ALMA Common Software (ACS), a CORBA-based client-server software infrastructure providing logging, monitoring, data delivery, and intra-computer function invocation. The software is being developed in tandem with the correlator hardware which presents software engineering challenges as the hardware evolves. The current status of this project and future goals are also presented.

  18. Correlation Filters for Detection of Cellular Nuclei in Histopathology Images.

    PubMed

    Ahmad, Asif; Asif, Amina; Rajpoot, Nasir; Arif, Muhammad; Minhas, Fayyaz Ul Amir Afsar

    2017-11-21

    Nuclei detection in histology images is an essential part of computer aided diagnosis of cancers and tumors. It is a challenging task due to diverse and complicated structures of cells. In this work, we present an automated technique for detection of cellular nuclei in hematoxylin and eosin stained histopathology images. Our proposed approach is based on kernelized correlation filters. Correlation filters have been widely used in object detection and tracking applications but their strength has not been explored in the medical imaging domain up till now. Our experimental results show that the proposed scheme gives state of the art accuracy and can learn complex nuclear morphologies. Like deep learning approaches, the proposed filters do not require engineering of image features as they can operate directly on histopathology images without significant preprocessing. However, unlike deep learning methods, the large-margin correlation filters developed in this work are interpretable, computationally efficient and do not require specialized or expensive computing hardware. A cloud based webserver of the proposed method and its python implementation can be accessed at the following URL: http://faculty.pieas.edu.pk/fayyaz/software.html#corehist .

  19. A Global User-Driven Model for Tile Prefetching in Web Geographical Information Systems.

    PubMed

    Pan, Shaoming; Chong, Yanwen; Zhang, Hang; Tan, Xicheng

    2017-01-01

    A web geographical information system is a typical service-intensive application. Tile prefetching and cache replacement can improve cache hit ratios by proactively fetching tiles from storage and replacing the appropriate tiles from the high-speed cache buffer without waiting for a client's requests, which reduces disk latency and improves system access performance. Most popular prefetching strategies consider only the relative tile popularities to predict which tile should be prefetched or consider only a single individual user's access behavior to determine which neighbor tiles need to be prefetched. Some studies show that comprehensively considering all users' access behaviors and all tiles' relationships in the prediction process can achieve more significant improvements. Thus, this work proposes a new global user-driven model for tile prefetching and cache replacement. First, based on all users' access behaviors, a type of expression method for tile correlation is designed and implemented. Then, a conditional prefetching probability can be computed based on the proposed correlation expression mode. Thus, some tiles to be prefetched can be found by computing and comparing the conditional prefetching probability from the uncached tiles set and, similarly, some replacement tiles can be found in the cache buffer according to multi-step prefetching. Finally, some experiments are provided comparing the proposed model with other global user-driven models, other single user-driven models, and other client-side prefetching strategies. The results show that the proposed model can achieve a prefetching hit rate in approximately 10.6% ~ 110.5% higher than the compared methods.

  20. Newspaper Coverage of Biological Subissues in the Spotted Owl Debate, 1989-1993.

    ERIC Educational Resources Information Center

    Furlow, F. Bryant

    1994-01-01

    Computer archives for 27 U.S. daily newspapers were accessed to evaluate the levels of coverage for 5 biological subissues and 5 ecological concepts in articles on the spotted owl debate. The author identified a correlation between biologist/reporter contact and increased biological subissue and ecological concepts coverage. (LZ)

  1. Imaged document information location and extraction using an optical correlator

    NASA Astrophysics Data System (ADS)

    Stalcup, Bruce W.; Dennis, Phillip W.; Dydyk, Robert B.

    1999-12-01

    Today, the paper document is fast becoming a thing of the past. With the rapid development of fast, inexpensive computing and storage devices, many government and private organizations are archiving their documents in electronic form (e.g., personnel records, medical records, patents, etc.). Many of these organizations are converting their paper archives to electronic images, which are then stored in a computer database. Because of this, there is a need to efficiently organize this data into comprehensive and accessible information resources and provide for rapid access to the information contained within these imaged documents. To meet this need, Litton PRC and Litton Data Systems Division are developing a system, the Imaged Document Optical Correlation and Conversion System (IDOCCS), to provide a total solution to the problem of managing and retrieving textual and graphic information from imaged document archives. At the heart of IDOCCS, optical correlation technology provide a means for the search and retrieval of information from imaged documents. IDOCCS can be used to rapidly search for key words or phrases within the imaged document archives and has the potential to determine the types of languages contained within a document. In addition, IDOCCS can automatically compare an input document with the archived database to determine if it is a duplicate, thereby reducing the overall resources required to maintain and access the document database. Embedded graphics on imaged pages can also be exploited, e.g., imaged documents containing an agency's seal or logo can be singled out. In this paper, we present a description of IDOCCS as well as preliminary performance results and theoretical projections.

  2. The National Virtual Observatory

    NASA Astrophysics Data System (ADS)

    Hanisch, Robert J.

    2001-06-01

    The National Virtual Observatory is a distributed computational facility that will provide access to the ``virtual sky''-the federation of astronomical data archives, object catalogs, and associated information services. The NVO's ``virtual telescope'' is a common framework for requesting, retrieving, and manipulating information from diverse, distributed resources. The NVO will make it possible to seamlessly integrate data from the new all-sky surveys, enabling cross-correlations between multi-Terabyte catalogs and providing transparent access to the underlying image or spectral data. Success requires high performance computational systems, high bandwidth network services, agreed upon standards for the exchange of metadata, and collaboration among astronomers, astronomical data and information service providers, information technology specialists, funding agencies, and industry. International cooperation at the onset will help to assure that the NVO simultaneously becomes a global facility. .

  3. NCI Workshop Report: Clinical and Computational Requirements for Correlating Imaging Phenotypes with Genomics Signatures.

    PubMed

    Colen, Rivka; Foster, Ian; Gatenby, Robert; Giger, Mary Ellen; Gillies, Robert; Gutman, David; Heller, Matthew; Jain, Rajan; Madabhushi, Anant; Madhavan, Subha; Napel, Sandy; Rao, Arvind; Saltz, Joel; Tatum, James; Verhaak, Roeland; Whitman, Gary

    2014-10-01

    The National Cancer Institute (NCI) Cancer Imaging Program organized two related workshops on June 26-27, 2013, entitled "Correlating Imaging Phenotypes with Genomics Signatures Research" and "Scalable Computational Resources as Required for Imaging-Genomics Decision Support Systems." The first workshop focused on clinical and scientific requirements, exploring our knowledge of phenotypic characteristics of cancer biological properties to determine whether the field is sufficiently advanced to correlate with imaging phenotypes that underpin genomics and clinical outcomes, and exploring new scientific methods to extract phenotypic features from medical images and relate them to genomics analyses. The second workshop focused on computational methods that explore informatics and computational requirements to extract phenotypic features from medical images and relate them to genomics analyses and improve the accessibility and speed of dissemination of existing NIH resources. These workshops linked clinical and scientific requirements of currently known phenotypic and genotypic cancer biology characteristics with imaging phenotypes that underpin genomics and clinical outcomes. The group generated a set of recommendations to NCI leadership and the research community that encourage and support development of the emerging radiogenomics research field to address short-and longer-term goals in cancer research.

  4. Rapid and Reliable Binding Affinity Prediction of Bromodomain Inhibitors: A Computational Study

    PubMed Central

    2016-01-01

    Binding free energies of bromodomain inhibitors are calculated with recently formulated approaches, namely ESMACS (enhanced sampling of molecular dynamics with approximation of continuum solvent) and TIES (thermodynamic integration with enhanced sampling). A set of compounds is provided by GlaxoSmithKline, which represents a range of chemical functionality and binding affinities. The predicted binding free energies exhibit a good Spearman correlation of 0.78 with the experimental data from the 3-trajectory ESMACS, and an excellent correlation of 0.92 from the TIES approach where applicable. Given access to suitable high end computing resources and a high degree of automation, we can compute individual binding affinities in a few hours with precisions no greater than 0.2 kcal/mol for TIES, and no larger than 0.34 and 1.71 kcal/mol for the 1- and 3-trajectory ESMACS approaches. PMID:28005370

  5. Online Information-Seeking Behaviors of Parents of Children With ADHD.

    PubMed

    Sage, Adam; Carpenter, Delesha; Sayner, Robyn; Thomas, Kathleen; Mann, Larry; Sulzer, Sandy; Sandler, Adrian; Sleath, Betsy

    2018-01-01

    This article describes ( a) parent questions about ADHD (attention deficit/hyperactivity disorder), ( b) parent Internet use to seek ADHD information, and ( c) associations between type of Internet access and ADHD information-seeking. Seventy parents of children (ages 7-17 years) with ADHD completed questionnaires after their child's visit with their pediatrician. Bivariate relationships were assessed using chi-square statistics, Pearson correlation coefficients, or t tests. Parents identified an average of 8.9 questions about ADHD for their child's provider. Common questions were related to medication and long-term implications of ADHD. A majority of parents searched the Internet for general ADHD information (87%) and ADHD medication information (81%). White parents accessed the Internet significantly more via home computer, mobile phone, and tablet, and significantly less via public library than non-White parents. Parents who accessed the Internet via home computers and tablets were more likely to search the Internet for ADHD medication information than parents who did not.

  6. Feature Statistics Modulate the Activation of Meaning During Spoken Word Processing.

    PubMed

    Devereux, Barry J; Taylor, Kirsten I; Randall, Billi; Geertzen, Jeroen; Tyler, Lorraine K

    2016-03-01

    Understanding spoken words involves a rapid mapping from speech to conceptual representations. One distributed feature-based conceptual account assumes that the statistical characteristics of concepts' features--the number of concepts they occur in (distinctiveness/sharedness) and likelihood of co-occurrence (correlational strength)--determine conceptual activation. To test these claims, we investigated the role of distinctiveness/sharedness and correlational strength in speech-to-meaning mapping, using a lexical decision task and computational simulations. Responses were faster for concepts with higher sharedness, suggesting that shared features are facilitatory in tasks like lexical decision that require access to them. Correlational strength facilitated responses for slower participants, suggesting a time-sensitive co-occurrence-driven settling mechanism. The computational simulation showed similar effects, with early effects of shared features and later effects of correlational strength. These results support a general-to-specific account of conceptual processing, whereby early activation of shared features is followed by the gradual emergence of a specific target representation. Copyright © 2015 The Authors. Cognitive Science published by Cognitive Science Society, Inc.

  7. Real-time autocorrelator for fluorescence correlation spectroscopy based on graphical-processor-unit architecture: method, implementation, and comparative studies

    NASA Astrophysics Data System (ADS)

    Laracuente, Nicholas; Grossman, Carl

    2013-03-01

    We developed an algorithm and software to calculate autocorrelation functions from real-time photon-counting data using the fast, parallel capabilities of graphical processor units (GPUs). Recent developments in hardware and software have allowed for general purpose computing with inexpensive GPU hardware. These devices are more suited for emulating hardware autocorrelators than traditional CPU-based software applications by emphasizing parallel throughput over sequential speed. Incoming data are binned in a standard multi-tau scheme with configurable points-per-bin size and are mapped into a GPU memory pattern to reduce time-expensive memory access. Applications include dynamic light scattering (DLS) and fluorescence correlation spectroscopy (FCS) experiments. We ran the software on a 64-core graphics pci card in a 3.2 GHz Intel i5 CPU based computer running Linux. FCS measurements were made on Alexa-546 and Texas Red dyes in a standard buffer (PBS). Software correlations were compared to hardware correlator measurements on the same signals. Supported by HHMI and Swarthmore College

  8. Intricacies of modern supercomputing illustrated with recent advances in simulations of strongly correlated electron systems

    NASA Astrophysics Data System (ADS)

    Schulthess, Thomas C.

    2013-03-01

    The continued thousand-fold improvement in sustained application performance per decade on modern supercomputers keeps opening new opportunities for scientific simulations. But supercomputers have become very complex machines, built with thousands or tens of thousands of complex nodes consisting of multiple CPU cores or, most recently, a combination of CPU and GPU processors. Efficient simulations on such high-end computing systems require tailored algorithms that optimally map numerical methods to particular architectures. These intricacies will be illustrated with simulations of strongly correlated electron systems, where the development of quantum cluster methods, Monte Carlo techniques, as well as their optimal implementation by means of algorithms with improved data locality and high arithmetic density have gone hand in hand with evolving computer architectures. The present work would not have been possible without continued access to computing resources at the National Center for Computational Science of Oak Ridge National Laboratory, which is funded by the Facilities Division of the Office of Advanced Scientific Computing Research, and the Swiss National Supercomputing Center (CSCS) that is funded by ETH Zurich.

  9. Overview of crew member energy expenditure during Shuttle Flight 61-8 EASE/ACCESS task performance

    NASA Technical Reports Server (NTRS)

    Horrigan, D. J.; Waligora, J. W.; Stanford, J.; Edwards, B. F.

    1987-01-01

    The energy expenditure of the Shuttle Flight 61-B crewmembers during the extravehicular performance of Experimental Assembly of Structures in EVA (EASE) and Assembly Concept of Construction of Space Structures (ACCESS) construction system tasks are reported. These data consist of metabolic rate time profiles correlated with specific EASE and ACCESS tasks and crew comments. Average extravehicular activity metabolic rates are computed and compared with those reported from previous Apollo, Shylab, and Shuttle flights. These data reflect total energy expenditure and not that of individual muscle groups such as hand and forearm. When correlated with specific EVA tasks and subtasks, the metabolic profile data is expected to be useful in planning future EVA protocols. For example, after experiencing high work rates and apparent overheating during some Gemini EVAs, it was found useful to carefully monitor work rates in subsequent flights to assess the adequacy of cooling garments and as an aid to preplanning EVA procedures. This presentation is represented by graphs and charts.

  10. Human- and computer-accessible 2D correlation data for a more reliable structure determination of organic compounds. Future roles of researchers, software developers, spectrometer managers, journal editors, reviewers, publisher and database managers toward artificial-intelligence analysis of NMR spectra.

    PubMed

    Jeannerat, Damien

    2017-01-01

    The introduction of a universal data format to report the correlation data of 2D NMR spectra such as COSY, HSQC and HMBC spectra will have a large impact on the reliability of structure determination of small organic molecules. These lists of assigned cross peaks will bridge signals found in NMR 1D and 2D spectra and the assigned chemical structure. The record could be very compact, human and computer readable so that it can be included in the supplementary material of publications and easily transferred into databases of scientific literature and chemical compounds. The records will allow authors, reviewers and future users to test the consistency and, in favorable situations, the uniqueness of the assignment of the correlation data to the associated chemical structures. Ideally, the data format of the correlation data should include direct links to the NMR spectra to make it possible to validate their reliability and allow direct comparison of spectra. In order to take the full benefits of their potential, the correlation data and the NMR spectra should therefore follow any manuscript in the review process and be stored in open-access database after publication. Keeping all NMR spectra, correlation data and assigned structures together at all time will allow the future development of validation tools increasing the reliability of past and future NMR data. This will facilitate the development of artificial intelligence analysis of NMR spectra by providing a source of data than can be used efficiently because they have been validated or can be validated by future users. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  11. Exploring Social Contextual Correlates of Computer Ownership and Frequency of Use Among Urban, Low-Income, Public Housing Adult Residents

    PubMed Central

    Puleo, Elaine; Bennett, Gary G; Emmons, Karen M

    2007-01-01

    Background As advances in computer access continue to be made, there is a need to better understand the challenges of increasing access for racial/ethnic minorities, particularly among those with lower incomes. Larger social contextual factors, such as social networks and neighborhood factors, may influence computer ownership and the number of places where individuals have access to computers. Objectives We examined the associations of sociodemographic and social contextual factors with computer ownership and frequency of use among 1554 adults living in urban public housing. Methods Bivariate associations between dependent variables (computer ownership and regular computer use) and independent variables were used to build multivariable logistic models adjusted for age and site clusters. Results Participants (N = total weighted size of 2270) were on average 51.0 (± 21.4) years old, primarily African American or Hispanic, and earned less than US $20000 per year. More than half owned a computer, and 42% were regular computer users. Reporting computer ownership was more likely if participants lived above the poverty level (OR = 1.78, 95% CI = 1.39-2.29), completed high school (OR = 2.46, 95% CI = 1.70-3.55), were in financial hardship (OR = 1.38, 95% CI = 1.06-1.81), were employed and supervised others (OR = 1.94, 95% CI = 1.08-3.46), and had multiple role responsibilities (OR = 2.18, 95% CI = 1.31-3.61). Regular computer use was more likely if participants were non-Hispanic (OR = 1.94, 95% CI = 1.30-2.91), lived above the poverty level (OR = 2.84, 95% CI = 1.90-4.24), completed high school (OR = 4.43, 95% CI = 3.04-6.46), were employed and supervised others (OR = 2.41, 95% CI = 1.37-4.22), felt safe in their neighborhood (OR = 1.57, 95% CI = 1.08-2.30), and had greater social network ties (OR = 3.09, 95% CI = 1.26-7.59). Conclusions Disparities in computer ownership and use are narrowing, even among those with very low incomes; however, identifying factors that contribute to disparities in access for these groups will be necessary to ensure the efficacy of future technology-based interventions. A unique finding of our study is that it may be equally as important to consider specific social contextual factors when trying to increase access and use among low-income minorities, such as social network ties, household responsibilities, and neighborhood safety. PMID:18093903

  12. A Global User-Driven Model for Tile Prefetching in Web Geographical Information Systems

    PubMed Central

    Pan, Shaoming; Chong, Yanwen; Zhang, Hang; Tan, Xicheng

    2017-01-01

    A web geographical information system is a typical service-intensive application. Tile prefetching and cache replacement can improve cache hit ratios by proactively fetching tiles from storage and replacing the appropriate tiles from the high-speed cache buffer without waiting for a client’s requests, which reduces disk latency and improves system access performance. Most popular prefetching strategies consider only the relative tile popularities to predict which tile should be prefetched or consider only a single individual user's access behavior to determine which neighbor tiles need to be prefetched. Some studies show that comprehensively considering all users’ access behaviors and all tiles’ relationships in the prediction process can achieve more significant improvements. Thus, this work proposes a new global user-driven model for tile prefetching and cache replacement. First, based on all users’ access behaviors, a type of expression method for tile correlation is designed and implemented. Then, a conditional prefetching probability can be computed based on the proposed correlation expression mode. Thus, some tiles to be prefetched can be found by computing and comparing the conditional prefetching probability from the uncached tiles set and, similarly, some replacement tiles can be found in the cache buffer according to multi-step prefetching. Finally, some experiments are provided comparing the proposed model with other global user-driven models, other single user-driven models, and other client-side prefetching strategies. The results show that the proposed model can achieve a prefetching hit rate in approximately 10.6% ~ 110.5% higher than the compared methods. PMID:28085937

  13. Pedagogical Models of Concordance Use: Correlations between Concordance User Preferences

    ERIC Educational Resources Information Center

    Ballance, Oliver James

    2017-01-01

    One of the most promising avenues of research in computer-assisted language learning is the potential for language learners to make use of language corpora. However, using a corpus requires use of a corpus tool as an interface, typically a concordancer. How such a tool can be made most accessible to learners is an important issue. Specifically,…

  14. Correlates of screen time among 8-19-year-old students in China.

    PubMed

    Ye, Sunyue; Chen, Lijian; Wang, Qineng; Li, Qinggong

    2018-04-10

    Previous studies have shown that prolonged time spent on screen-based sedentary behavior was significantly associated with lower health status in children, independent of physical activity levels. The study aimed to explore the individual and environmental correlates of screen time (ST) among 8-19-year-old students in China. The study surveyed ST using a self-administered questionnaire in Chinese students aged 8-19 years; 1063 participants were included in the final analysis. Individual and environmental correlates of ST were assessed using a mixed-effects model (for continuous outcome variables) and multiple logistic regression model (for binary outcome variables). Prolonged ST was observed in 14.7% of boys and 8.9% of girls. Of the ST, weekend and mobile phone/tablet use represented 80% and 40%, respectively. A positive relationship was observed between media accessibility and ST in both boys and girls (p < 0.05), whereas the presence of parents/others while using screens was a negative factor for longer ST (p < 0.05). Among the assessed correlates, access to a television (TV) in students' bedrooms was associated with prolonged total and weekend ST (p < 0.05 and p < 0.001, respectively). However, spending time on a mobile phone/tablet or a computer rather than viewing a TV, along with increased media accessibility, increased ST. These results indicate that greater media accessibility was positively associated and the presence of parents/others was negatively associated with prolonged ST in both Chinese boys and girls. Development of new and effective strategies against prolonged ST are required, especially for small screen device-based ST on weekends.

  15. Decorrelation of the static and dynamic length scales in hard-sphere glass formers.

    PubMed

    Charbonneau, Patrick; Tarjus, Gilles

    2013-04-01

    We show that, in the equilibrium phase of glass-forming hard-sphere fluids in three dimensions, the static length scales tentatively associated with the dynamical slowdown and the dynamical length characterizing spatial heterogeneities in the dynamics unambiguously decorrelate. The former grow at a much slower rate than the latter when density increases. This observation is valid for the dynamical range that is accessible to computer simulations, which roughly corresponds to that accessible in colloidal experiments. We also find that, in this same range, no one-to-one correspondence between relaxation time and point-to-set correlation length exists. These results point to the coexistence of several relaxation mechanisms in the dynamically accessible regime of three-dimensional hard-sphere glass formers.

  16. Society and personal genome data

    PubMed Central

    2018-01-01

    Abstract Genomic data offer a goldmine of information for understanding the contribution of genetic variation makes to health and disease. The potential of genomic medicine, to predict, diagnose, manage and treat genetic disease, is underpinned by accurate variant interpretation. This in itself hinges on the ability to access large and varied genomic databases. There is now recognition that international collaboration between research and healthcare systems are paramount to delivering the scale of genomic data required. No single research group, institute or country will liberate our understanding, it is only through global cooperation, together with super computing power, will we truly make sense of how genotype and phenotype correlate. Whilst it is logistically possible to create computing systems that talk to each other and aggregate datasets ready to reveal novel correlations, the bottom line is that this will only happen if people (whether they be scientists, clinicians, patients, research participants, policy makers, politicians, law makers) support the principle that we should be donating, accessing and sharing our DNA data in this way. And in order to make the most sense of genomics, given the geographical and ancestral variation between us, such people are likely to be the majority of society. Within this review, a perspective is proffered on the human story that underpins genomic ‘big data’ access and how we are at a tipping point as a society—we need to decide collectively, are we in? and if so, what needs to be in place to protect us? or are we out? PMID:29522190

  17. Computer and internet use in a community health clinic population.

    PubMed

    Peterson, Neeraja B; Dwyer, Kathleen A; Mulvaney, Shelagh A

    2009-01-01

    To determine if patients from a community health clinic have access to computers and/or the Internet and if they believe a computer is useful in their medical care. A convenience sample of 100 subjects, aged 50 years and older, from a community health clinic in Nashville, Tennessee, completed a structured interview and a health literacy assessment. Of the 100 participants, 40 did not have any computer access, 27 had computer but not Internet access, and 33 had Internet access. Participants with computer access (with or without Internet) had higher incomes, higher educational status, and higher literacy status than those without computer access. Of participants reporting current computer use (n = 54), 33% reported never using their computer to look up health and medical information. Of those who "never'' used their computer for this activity, 54% reported they did not have Internet connectivity, whereas 31% reported they did not know how to use the Internet. Although this group of individuals reported that they were comfortable using a computer (77%), they reported being uncomfortable with accessing the Internet (53%). Not only does access to computers and the Internet need to be improved before widespread use by patients, but computer users will need to be instructed on how to navigate the Internet.

  18. Nonlinear circuits for naturalistic visual motion estimation

    PubMed Central

    Fitzgerald, James E; Clark, Damon A

    2015-01-01

    Many animals use visual signals to estimate motion. Canonical models suppose that animals estimate motion by cross-correlating pairs of spatiotemporally separated visual signals, but recent experiments indicate that humans and flies perceive motion from higher-order correlations that signify motion in natural environments. Here we show how biologically plausible processing motifs in neural circuits could be tuned to extract this information. We emphasize how known aspects of Drosophila's visual circuitry could embody this tuning and predict fly behavior. We find that segregating motion signals into ON/OFF channels can enhance estimation accuracy by accounting for natural light/dark asymmetries. Furthermore, a diversity of inputs to motion detecting neurons can provide access to more complex higher-order correlations. Collectively, these results illustrate how non-canonical computations improve motion estimation with naturalistic inputs. This argues that the complexity of the fly's motion computations, implemented in its elaborate circuits, represents a valuable feature of its visual motion estimator. DOI: http://dx.doi.org/10.7554/eLife.09123.001 PMID:26499494

  19. LSST Resources for the Community

    NASA Astrophysics Data System (ADS)

    Jones, R. Lynne

    2011-01-01

    LSST will generate 100 petabytes of images and 20 petabytes of catalogs, covering 18,000-20,000 square degrees of area sampled every few days, throughout a total of ten years of time -- all publicly available and exquisitely calibrated. The primary access to this data will be through Data Access Centers (DACs). DACs will provide access to catalogs of sources (single detections from individual images) and objects (associations of sources from multiple images). Simple user interfaces or direct SQL queries at the DAC can return user-specified portions of data from catalogs or images. More complex manipulations of the data, such as calculating multi-point correlation functions or creating alternative photo-z measurements on terabyte-scale data, can be completed with the DAC's own resources. Even more data-intensive computations requiring access to large numbers of image pixels on petabyte-scale could also be conducted at the DAC, using compute resources allocated in a similar manner to a TAC. DAC resources will be available to all individuals in member countries or institutes and LSST science collaborations. DACs will also assist investigators with requests for allocations at national facilities such as the Petascale Computing Facility, TeraGrid, and Open Science Grid. Using data on this scale requires new approaches to accessibility and analysis which are being developed through interactions with the LSST Science Collaborations. We are producing simulated images (as might be acquired by LSST) based on models of the universe and generating catalogs from these images (as well as from the base model) using the LSST data management framework in a series of data challenges. The resulting images and catalogs are being made available to the science collaborations to verify the algorithms and develop user interfaces. All LSST software is open source and available online, including preliminary catalog formats. We encourage feedback from the community.

  20. Primary health-care nurses and Internet health information-seeking: Access, barriers and quality checks.

    PubMed

    Gilmour, Jean; Strong, Alison; Chan, Helen; Hanna, Sue; Huntington, Annette

    2016-02-01

    Online information is a critical resource for evidence-based practice and patient education. This study aimed to establish New Zealand nurses' access and evaluation of online health information in the primary care context using a postal questionnaire survey; there were 630 respondents from a random sample of 931 nurses. The majority of respondents were satisfied with work access to online information (84.5%, n = 501) and searched for online information at least several times a week (57.5%, n = 343). The major barrier to online information seeking was insufficient time, but 68 respondents had no work online information access. The level of nursing qualification was significantly correlated with computer confidence and information quality checking. A range of information evaluation approaches was used. Most nurses in study accessed and evaluated Internet information in contrast to the findings of earlier studies, but there were barriers preventing universal integration into practice. © 2014 Wiley Publishing Asia Pty Ltd.

  1. Performance Analysis of a De-correlated Modified Code Tracking Loop for Synchronous DS-CDMA System under Multiuser Environment

    NASA Astrophysics Data System (ADS)

    Wu, Ya-Ting; Wong, Wai-Ki; Leung, Shu-Hung; Zhu, Yue-Sheng

    This paper presents the performance analysis of a De-correlated Modified Code Tracking Loop (D-MCTL) for synchronous direct-sequence code-division multiple-access (DS-CDMA) systems under multiuser environment. Previous studies have shown that the imbalance of multiple access interference (MAI) in the time lead and time lag portions of the signal causes tracking bias or instability problem in the traditional correlating tracking loop like delay lock loop (DLL) or modified code tracking loop (MCTL). In this paper, we exploit the de-correlating technique to combat the MAI at the on-time code position of the MCTL. Unlike applying the same technique to DLL which requires an extensive search algorithm to compensate the noise imbalance which may introduce small tracking bias under low signal-to-noise ratio (SNR), the proposed D-MCTL has much lower computational complexity and exhibits zero tracking bias for the whole range of SNR, regardless of the number of interfering users. Furthermore, performance analysis and simulations based on Gold codes show that the proposed scheme has better mean square tracking error, mean-time-to-lose-lock and near-far resistance than the other tracking schemes, including traditional DLL (T-DLL), traditional MCTL (T-MCTL) and modified de-correlated DLL (MD-DLL).

  2. Imaged Document Optical Correlation and Conversion System (IDOCCS)

    NASA Astrophysics Data System (ADS)

    Stalcup, Bruce W.; Dennis, Phillip W.; Dydyk, Robert B.

    1999-03-01

    Today, the paper document is fast becoming a thing of the past. With the rapid development of fast, inexpensive computing and storage devices, many government and private organizations are archiving their documents in electronic form (e.g., personnel records, medical records, patents, etc.). In addition, many organizations are converting their paper archives to electronic images, which are stored in a computer database. Because of this, there is a need to efficiently organize this data into comprehensive and accessible information resources. The Imaged Document Optical Correlation and Conversion System (IDOCCS) provides a total solution to the problem of managing and retrieving textual and graphic information from imaged document archives. At the heart of IDOCCS, optical correlation technology provides the search and retrieval capability of document images. The IDOCCS can be used to rapidly search for key words or phrases within the imaged document archives and can even determine the types of languages contained within a document. In addition, IDOCCS can automatically compare an input document with the archived database to determine if it is a duplicate, thereby reducing the overall resources required to maintain and access the document database. Embedded graphics on imaged pages can also be exploited, e.g., imaged documents containing an agency's seal or logo, or documents with a particular individual's signature block, can be singled out. With this dual capability, IDOCCS outperforms systems that rely on optical character recognition as a basis for indexing and storing only the textual content of documents for later retrieval.

  3. oGNM: online computation of structural dynamics using the Gaussian Network Model

    PubMed Central

    Yang, Lee-Wei; Rader, A. J.; Liu, Xiong; Jursa, Cristopher Jon; Chen, Shann Ching; Karimi, Hassan A.; Bahar, Ivet

    2006-01-01

    An assessment of the equilibrium dynamics of biomolecular systems, and in particular their most cooperative fluctuations accessible under native state conditions, is a first step towards understanding molecular mechanisms relevant to biological function. We present a web-based system, oGNM that enables users to calculate online the shape and dispersion of normal modes of motion for proteins, oligonucleotides and their complexes, or associated biological units, using the Gaussian Network Model (GNM). Computations with the new engine are 5–6 orders of magnitude faster than those using conventional normal mode analyses. Two cases studies illustrate the utility of oGNM. The first shows that the thermal fluctuations predicted for 1250 non-homologous proteins correlate well with X-ray crystallographic data over a broad range [7.3–15 Å] of inter-residue interaction cutoff distances and the correlations improve with increasing observation temperatures. The second study, focused on 64 oligonucleotides and oligonucleotide–protein complexes, shows that good agreement with experiments is achieved by representing each nucleotide by three GNM nodes (as opposed to one-node-per-residue in proteins) along with uniform interaction ranges for all components of the complexes. These results open the way to a rapid assessment of the dynamics of DNA/RNA-containing complexes. The server can be accessed at . PMID:16845002

  4. Household computer and Internet access: The digital divide in a pediatric clinic population

    PubMed Central

    Carroll, Aaron E.; Rivara, Frederick P.; Ebel, Beth; Zimmerman, Frederick J.; Christakis, Dimitri A.

    2005-01-01

    Past studies have noted a digital divide, or inequality in computer and Internet access related to socioeconomic class. This study sought to measure how many households in a pediatric primary care outpatient clinic had household access to computers and the Internet, and whether this access differed by socio-economic status or other demographic information. We conducted a phone survey of a population-based sample of parents with children ages 0 to 11 years old. Analyses assessed predictors of having home access to a computer, the Internet, and high-speed Internet service. Overall, 88.9% of all households owned a personal computer, and 81.4% of all households had Internet access. Among households with Internet access, 48.3% had high speed Internet at home. There were statistically significant associations between parental income or education and home computer ownership and Internet access. However, the impact of this difference was lessened by the fact that over 60% of families with annual household income of $10,000–$25,000, and nearly 70% of families with only a high-school education had Internet access at home. While income and education remain significant predictors of household computer and internet access, many patients and families at all economic levels have access, and might benefit from health promotion interventions using these modalities. PMID:16779012

  5. Elementary School Computer Access, Socioeconomic Status, Ethnicity, and Grade 5 Student Achievement

    ERIC Educational Resources Information Center

    Barrett, Julie Ann

    2013-01-01

    Purpose: The purpose of this study was to describe the current school computer access rates of elementary school students and to determine the extent to which school computer access relates to academic achievement among Grade 5 students in the state of Texas. Specifically, the relationship of school computer access to student passing rates on the…

  6. Quasi-elastic light scattering: Signal storage, correlation, and spectrum analysis under control of an 8-bit microprocessor

    NASA Astrophysics Data System (ADS)

    Glatter, Otto; Fuchs, Heribert; Jorde, Christian; Eigner, Wolf-Dieter

    1987-03-01

    The microprocessor of an 8-bit PC system is used as a central control unit for the acquisition and evaluation of data from quasi-elastic light scattering experiments. Data are sampled with a width of 8 bits under control of the CPU. This limits the minimum sample time to 20 μs. Shorter sample times would need a direct memory access channel. The 8-bit CPU can address a 64-kbyte RAM without additional paging. Up to 49 000 sample points can be measured without interruption. After storage, a correlation function or a power spectrum can be calculated from such a primary data set. Furthermore access is provided to the primary data for stability control, statistical tests, and for comparison of different evaluation methods for the same experiment. A detailed analysis of the signal (histogram) and of the effect of overflows is possible and shows that the number of pulses but not the number of overflows determines the error in the result. The correlation function can be computed with reasonable accuracy from data with a mean pulse rate greater than one, the power spectrum needs a three times higher pulse rate for convergence. The statistical accuracy of the results from 49 000 sample points is of the order of a few percent. Additional averages are necessary to improve their quality. The hardware extensions for the PC system are inexpensive. The main disadvantage of the present system is the high minimum sampling time of 20 μs and the fact that the correlogram or the power spectrum cannot be computed on-line as it can be done with hardware correlators or spectrum analyzers. These shortcomings and the storage size restrictions can be removed with a faster 16/32-bit CPU.

  7. Assessing the Macro-Level Correlates of Malware Infections Using a Routine Activities Framework.

    PubMed

    Holt, Thomas J; Burruss, George W; Bossler, Adam M

    2018-05-01

    The ability to gain unauthorized access to computer systems to engage in espionage and data theft poses a massive threat to individuals worldwide. There has been minimal focus, however, on the role of malicious software, or malware, which can automate this process. This study examined the macro-correlates of malware infection at the national level by using an open repository of known malware infections and utilizing a routine activities framework. Negative inflated binomial models for counts indicated that nations with greater technological infrastructure, more political freedoms, and with less organized crime financial impact were more likely to report malware infections. The number of Computer Emergency Response Teams (CERTs) in a nation was not significantly related with reported malware infection. The implications of the study for the understanding of malware infection, routine activity theory, and target-hardening strategies are discussed.

  8. Flow dynamic environment data base development for the SSME

    NASA Technical Reports Server (NTRS)

    Sundaram, C. V.

    1985-01-01

    The fluid flow-induced vibration of the Space Shuttle main engine (SSME) components are being studied with a view to correlating the frequency characteristics of the pressure fluctuations in a rocket engine to its operating conditions and geometry. An overview of the data base development for SSME test firing results and the interactive computer software used to access, retrieve, and plot or print the results selectively for given thrust levels, engine numbers, etc., is presented. The various statistical methods available in the computer code for data analysis are discussed. Plots of test data, nondimensionalized using parameters such as fluid flow velocities, densities, and pressures, are presented. Results are compared with those available in the literature. Correlations between the resonant peaks observed at higher frequencies in power spectral density plots with pump geometry and operating conditions are discussed. An overview of the status of the investigation is presented and future directions are discussed.

  9. 36 CFR § 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... access use of the Internet on NARA-supplied computers? § 1254.32 Section § 1254.32 Parks, Forests, and... public access use of the Internet on NARA-supplied computers? (a) Public access computers (workstations... equipment. (b) You should not expect privacy while using these workstations. These workstations are operated...

  10. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  11. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  12. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  13. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  14. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  15. Multiple Phenotype Association Tests Using Summary Statistics in Genome-Wide Association Studies

    PubMed Central

    Liu, Zhonghua; Lin, Xihong

    2017-01-01

    Summary We study in this paper jointly testing the associations of a genetic variant with correlated multiple phenotypes using the summary statistics of individual phenotype analysis from Genome-Wide Association Studies (GWASs). We estimated the between-phenotype correlation matrix using the summary statistics of individual phenotype GWAS analyses, and developed genetic association tests for multiple phenotypes by accounting for between-phenotype correlation without the need to access individual-level data. Since genetic variants often affect multiple phenotypes differently across the genome and the between-phenotype correlation can be arbitrary, we proposed robust and powerful multiple phenotype testing procedures by jointly testing a common mean and a variance component in linear mixed models for summary statistics. We computed the p-values of the proposed tests analytically. This computational advantage makes our methods practically appealing in large-scale GWASs. We performed simulation studies to show that the proposed tests maintained correct type I error rates, and to compare their powers in various settings with the existing methods. We applied the proposed tests to a GWAS Global Lipids Genetics Consortium summary statistics data set and identified additional genetic variants that were missed by the original single-trait analysis. PMID:28653391

  16. Multiple phenotype association tests using summary statistics in genome-wide association studies.

    PubMed

    Liu, Zhonghua; Lin, Xihong

    2018-03-01

    We study in this article jointly testing the associations of a genetic variant with correlated multiple phenotypes using the summary statistics of individual phenotype analysis from Genome-Wide Association Studies (GWASs). We estimated the between-phenotype correlation matrix using the summary statistics of individual phenotype GWAS analyses, and developed genetic association tests for multiple phenotypes by accounting for between-phenotype correlation without the need to access individual-level data. Since genetic variants often affect multiple phenotypes differently across the genome and the between-phenotype correlation can be arbitrary, we proposed robust and powerful multiple phenotype testing procedures by jointly testing a common mean and a variance component in linear mixed models for summary statistics. We computed the p-values of the proposed tests analytically. This computational advantage makes our methods practically appealing in large-scale GWASs. We performed simulation studies to show that the proposed tests maintained correct type I error rates, and to compare their powers in various settings with the existing methods. We applied the proposed tests to a GWAS Global Lipids Genetics Consortium summary statistics data set and identified additional genetic variants that were missed by the original single-trait analysis. © 2017, The International Biometric Society.

  17. 7 CFR 1739.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... terrestrial technology having the capacity to provide transmission facilities that enable subscribers of the...) Computer Access Points and wireless access, that is used for the purposes of providing free access to and..., and after normal working hours and on Saturdays or Sunday. Computer Access Point means a new computer...

  18. Who's in the Queue? A Demographic Analysis of Public Access Computer Users and Uses in U.S. Public Libraries. Research Brief Number 4

    ERIC Educational Resources Information Center

    Manjarrez, Carlos A.; Schoembs, Kyle

    2011-01-01

    Over the past decade, policy discussions about public access computing in libraries have focused on the role that these institutions play in bridging the digital divide. In these discussions, public access computing services are generally targeted at individuals who either cannot afford a computer and Internet access, or have never received formal…

  19. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  20. Beyond Access and Exposure: Implications of Sneaky Media Use for Preschoolers' Sleep Behavior.

    PubMed

    Moorman, Jessica D; Harrison, Kristen

    2018-01-09

    Greater consumption of and access to screen media are known correlates of unhealthy sleep behavior in preschoolers. What remains unknown, however, is the role a child's media use plays in this association. Parents and guardians of U.S. preschoolers (N = 278, average child age 56 months) provided information about their child's nightly duration of sleep, daily duration of nap, quantity of screen media use, sneaky media use, and the presence of a screen media device in the bedroom. We assessed four media: television, DVD/VCRs, video games, and computer/Internet. Based on rationales of sleep displacement, the forbidden fruit hypothesis, and social cognitive theory, we predicted that increased consumption of and access to media, along with sneaky media use, would predict a shorter duration of nightly sleep and longer duration of daily nap across the four screen media. In correlational analyses, a clear pattern emerged with quantity of media use, screen media in the bedroom, and sneaky media use associated with shorter nightly duration of sleep and longer duration of daily nap. In regression analyses, only weekday evening television viewing and sneaky media use predicted shorter nightly sleep duration; weekend morning and evening DVD use predicted longer naps.

  1. Correlative visualization techniques for multidimensional data

    NASA Technical Reports Server (NTRS)

    Treinish, Lloyd A.; Goettsche, Craig

    1989-01-01

    Critical to the understanding of data is the ability to provide pictorial or visual representation of those data, particularly in support of correlative data analysis. Despite the advancement of visualization techniques for scientific data over the last several years, there are still significant problems in bringing today's hardware and software technology into the hands of the typical scientist. For example, there are other computer science domains outside of computer graphics that are required to make visualization effective such as data management. Well-defined, flexible mechanisms for data access and management must be combined with rendering algorithms, data transformation, etc. to form a generic visualization pipeline. A generalized approach to data visualization is critical for the correlative analysis of distinct, complex, multidimensional data sets in the space and Earth sciences. Different classes of data representation techniques must be used within such a framework, which can range from simple, static two- and three-dimensional line plots to animation, surface rendering, and volumetric imaging. Static examples of actual data analyses will illustrate the importance of an effective pipeline in data visualization system.

  2. Lagrangian velocity and acceleration correlations of large inertial particles in a closed turbulent flow

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Machicoane, Nathanaël; Volk, Romain

    We investigate the response of large inertial particle to turbulent fluctuations in an inhomogeneous and anisotropic flow. We conduct a Lagrangian study using particles both heavier and lighter than the surrounding fluid, and whose diameters are comparable to the flow integral scale. Both velocity and acceleration correlation functions are analyzed to compute the Lagrangian integral time and the acceleration time scale of such particles. The knowledge of how size and density affect these time scales is crucial in understanding particle dynamics and may permit stochastic process modelization using two-time models (for instance, Sawford’s). As particles are tracked over long timesmore » in the quasi-totality of a closed flow, the mean flow influences their behaviour and also biases the velocity time statistics, in particular the velocity correlation functions. By using a method that allows for the computation of turbulent velocity trajectories, we can obtain unbiased Lagrangian integral time. This is particularly useful in accessing the scale separation for such particles and to comparing it to the case of fluid particles in a similar configuration.« less

  3. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  4. Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?

    PubMed

    Billah, Syed Masum; Ashok, Vikas; Porter, Donald E; Ramakrishnan, I V

    2017-05-01

    Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access-an early forerunner of true ubiquitous access-screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments.

  5. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  6. Assured Access/Mobile Computing Initiatives on Five University Campuses.

    ERIC Educational Resources Information Center

    Blurton, Craig; Chee, Yam San; Long, Phillip D.; Resmer, Mark; Runde, Craig

    Mobile computing and assured access are becoming popular terms to describe a growing number of university programs which take advantage of ubiquitous network access points and the portability of notebook computers to ensure all students have access to digital tools and resources. However, the implementation of such programs varies widely from…

  7. Path Not Found: Disparities in Access to Computer Science Courses in California High Schools

    ERIC Educational Resources Information Center

    Martin, Alexis; McAlear, Frieda; Scott, Allison

    2015-01-01

    "Path Not Found: Disparities in Access to Computer Science Courses in California High Schools" exposes one of the foundational causes of underrepresentation in computing: disparities in access to computer science courses in California's public high schools. This report provides new, detailed data on these disparities by student body…

  8. The meaning of computers to a group of men who are homeless.

    PubMed

    Miller, Kathleen Swenson; Bunch-Harrison, Stacey; Brumbaugh, Brett; Kutty, Rekha Sankaran; FitzGerald, Kathleen

    2005-01-01

    The purpose of this pilot study was to explore the experience with computers and the meaning of computers to a group of homeless men living in a long-term shelter. This descriptive exploratory study used semistructured interviews with seven men who had been given access to computers and had participated in individually tailored occupation based interventions through a Work Readiness Program. Three themes emerged from analyzing the interviews: access to computers, computers as a bridge to life-skill development, and changed self-perceptions as a result of connecting to technology. Because they lacked computer knowledge and feared failure, the majority of study participants had not sought out computers available through public access. The need for access to computers, the potential use of computers as a medium for intervention, and the meaning of computers to these men who represent the digital divide are described in this study.

  9. PageRank as a method to rank biomedical literature by importance.

    PubMed

    Yates, Elliot J; Dixon, Louise C

    2015-01-01

    Optimal ranking of literature importance is vital in overcoming article overload. Existing ranking methods are typically based on raw citation counts, giving a sum of 'inbound' links with no consideration of citation importance. PageRank, an algorithm originally developed for ranking webpages at the search engine, Google, could potentially be adapted to bibliometrics to quantify the relative importance weightings of a citation network. This article seeks to validate such an approach on the freely available, PubMed Central open access subset (PMC-OAS) of biomedical literature. On-demand cloud computing infrastructure was used to extract a citation network from over 600,000 full-text PMC-OAS articles. PageRanks and citation counts were calculated for each node in this network. PageRank is highly correlated with citation count (R = 0.905, P < 0.01) and we thus validate the former as a surrogate of literature importance. Furthermore, the algorithm can be run in trivial time on cheap, commodity cluster hardware, lowering the barrier of entry for resource-limited open access organisations. PageRank can be trivially computed on commodity cluster hardware and is linearly correlated with citation count. Given its putative benefits in quantifying relative importance, we suggest it may enrich the citation network, thereby overcoming the existing inadequacy of citation counts alone. We thus suggest PageRank as a feasible supplement to, or replacement of, existing bibliometric ranking methods.

  10. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available for Internet use in all NARA research rooms. The number of workstations varies per location. We...

  11. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available for Internet use in all NARA research rooms. The number of workstations varies per location. We...

  12. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available... should not expect privacy while using these workstations. These workstations are operated and maintained...

  13. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available... should not expect privacy while using these workstations. These workstations are operated and maintained...

  14. No Special Equipment Required: The Accessibility Features Built into the Windows and Macintosh Operating Systems make Computers Accessible for Students with Special Needs

    ERIC Educational Resources Information Center

    Kimball,Walter H.; Cohen,Libby G.; Dimmick,Deb; Mills,Rick

    2003-01-01

    The proliferation of computers and other electronic learning devices has made knowledge and communication accessible to people with a wide range of abilities. Both Windows and Macintosh computers have accessibility options to help with many different special needs. This documents discusses solutions for: (1) visual impairments; (2) hearing…

  15. Global Pattern of Nasopharyngeal Cancer: Correlation of Outcome With Access to Radiation Therapy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lam, Ka-On; Lee, Anne W.M., E-mail: annelee@hku-szh.org; Choi, Cheuk-Wai

    Purpose: This study aimed to estimate the treatment outcome of nasopharyngeal cancer (NPC) across the world and its correlation with access to radiation therapy (RT). Methods and Materials: The age-standardized mortality (ASM) and age-standardized incidence (ASI) rates of NPC from GLOBOCAN (2012) were summarized, and [1−(ASM/ASI)] was computed to give the proxy relative survival (RS). Data from the International Atomic Energy Agency (IAEA) and the World Bank were used to assess the availability of RT in surrogate terms: the number of RT equipment units and radiation oncologists per million population. Results: A total of 112 countries with complete valid datamore » were analyzed, and the proxy RS varied widely from 0% to 83% (median, 50%). Countries were categorized into Good, Median, and Poor outcome groups on the basis of their proxy RS (<45%, 45%-55%, and >55%). Eighty percent of new cases occurred in the Poor outcome group. Univariable linear regression showed a significant correlation between outcome and the availability of RT: proxy RS increased at 3.4% (P<.001) and 1.5% (P=.001) per unit increase in RT equipment and oncologist per million population, respectively. The median number of RT equipment units per million population increased significantly from 0.5 in the Poor, to 1.5 in the Median, to 4.6 in the Good outcome groups, and the corresponding number of oncologists increased from 1.1 to 3.3 to 7.1 (P<.001). Conclusions: Nasopharyngeal cancer is a highly treatable disease, but the outcome varies widely across the world. The current study shows a significant correlation between survival and access to RT based on available surrogate indicators. However, the possible reasons for poor outcome are likely to be multifactorial and complex. Concerted international efforts are needed not only to address the fundamental requirement for adequate RT access but also to obtain more comprehensive and accurate data for research to improve cancer outcome.« less

  16. Prescription for trouble: Medicare Part D and patterns of computer and internet access among the elderly.

    PubMed

    Wright, David W; Hill, Twyla J

    2009-01-01

    The Medicare Prescription Drug, Improvement, and Modernization Act of 2003 specifically encourages Medicare enrollees to use the Internet to obtain information regarding the new prescription drug insurance plans and to enroll in a plan. This reliance on computer technology and the Internet leads to practical questions regarding implementation of the insurance coverage. For example, it seems unlikely that all Medicare enrollees have access to computers and the Internet or that they are all computer literate. This study uses the 2003 Current Population Survey to examine the effects of disability and income on computer access and Internet use among the elderly. Internet access declines with age and is exacerbated by disabilities. Also, decreases in income lead to decreases in computer ownership and use. Therefore, providing prescription drug coverage primarily through the Internet seems likely to maintain or increase stratification of access to health care, especially for low-income, disabled elderly, who are also a group most in need of health care access.

  17. Usability of a Low-Cost Head Tracking Computer Access Method following Stroke.

    PubMed

    Mah, Jasmine; Jutai, Jeffrey W; Finestone, Hillel; Mckee, Hilary; Carter, Melanie

    2015-01-01

    Assistive technology devices for computer access can facilitate social reintegration and promote independence for people who have had a stroke. This work describes the exploration of the usefulness and acceptability of a new computer access device called the Nouse™ (Nose-as-mouse). The device uses standard webcam and video recognition algorithms to map the movement of the user's nose to a computer cursor, thereby allowing hands-free computer operation. Ten participants receiving in- or outpatient stroke rehabilitation completed a series of standardized and everyday computer tasks using the Nouse™ and then completed a device usability questionnaire. Task completion rates were high (90%) for computer activities only in the absence of time constraints. Most of the participants were satisfied with ease of use (70%) and liked using the Nouse™ (60%), indicating they could resume most of their usual computer activities apart from word-processing using the device. The findings suggest that hands-free computer access devices like the Nouse™ may be an option for people who experience upper motor impairment caused by stroke and are highly motivated to resume personal computing. More research is necessary to further evaluate the effectiveness of this technology, especially in relation to other computer access assistive technology devices.

  18. Program for the analysis of time series. [by means of fast Fourier transform algorithm

    NASA Technical Reports Server (NTRS)

    Brown, T. J.; Brown, C. G.; Hardin, J. C.

    1974-01-01

    A digital computer program for the Fourier analysis of discrete time data is described. The program was designed to handle multiple channels of digitized data on general purpose computer systems. It is written, primarily, in a version of FORTRAN 2 currently in use on CDC 6000 series computers. Some small portions are written in CDC COMPASS, an assembler level code. However, functional descriptions of these portions are provided so that the program may be adapted for use on any facility possessing a FORTRAN compiler and random-access capability. Properly formatted digital data are windowed and analyzed by means of a fast Fourier transform algorithm to generate the following functions: (1) auto and/or cross power spectra, (2) autocorrelations and/or cross correlations, (3) Fourier coefficients, (4) coherence functions, (5) transfer functions, and (6) histograms.

  19. Access to Strong Opioid Analgesics in the Context of Legal and Regulatory Barriers in Eleven Central and Eastern European Countries.

    PubMed

    Vranken, Marjolein J M; Mantel-Teeuwisse, Aukje K; Schutjens, Marie-Hélène D B; Scholten, Willem K; Jünger, Saskia; Medic, Dr Rer; Leufkens, Hubert G M

    2018-04-06

    In 2011-2013, >95% of the global opioid analgesics consumption occurred in three regions, accounting for 15% of the world population. Despite abundant literature on barriers to access, little is known on the correlation between actual access to opioid analgesics and barriers to access, including legal and regulatory barriers. This study aimed to evaluate the correlation between access to strong opioid analgesics and barriers to access in national legislation and regulations in 11 central and eastern European countries that participated in the Access to Opioid Medication in Europe (ATOME) project. Two variables were contrasted to assess their correlation: the country level of access to strong opioid analgesics indicated by the Adequacy of Consumption Measure (ACM) and the number of potential legal and regulatory barriers identified by an external review of legislation and regulations. A linear correlation was evaluated using a squared linear correlation coefficient. Evaluation of the correlation between the ACM and the number of potential barriers produces an R 2 value of 0.023 and a correlation plot trend line gradient of -0.075, indicating no correlation between access to strong opioid analgesics and the number of potential barriers in national legislation and regulations in the countries studied. No correlation was found, which indicates that other factors besides potential legal and regulatory barriers play a critical role in withholding prescribers and patients essential pain medication in the studied countries. More research is needed toward better understanding of the complex interplay of factors that determine access to strong opioid analgesics.

  20. A computational study on outliers in world music.

    PubMed

    Panteli, Maria; Benetos, Emmanouil; Dixon, Simon

    2017-01-01

    The comparative analysis of world music cultures has been the focus of several ethnomusicological studies in the last century. With the advances of Music Information Retrieval and the increased accessibility of sound archives, large-scale analysis of world music with computational tools is today feasible. We investigate music similarity in a corpus of 8200 recordings of folk and traditional music from 137 countries around the world. In particular, we aim to identify music recordings that are most distinct compared to the rest of our corpus. We refer to these recordings as 'outliers'. We use signal processing tools to extract music information from audio recordings, data mining to quantify similarity and detect outliers, and spatial statistics to account for geographical correlation. Our findings suggest that Botswana is the country with the most distinct recordings in the corpus and China is the country with the most distinct recordings when considering spatial correlation. Our analysis includes a comparison of musical attributes and styles that contribute to the 'uniqueness' of the music of each country.

  1. A computational study on outliers in world music

    PubMed Central

    Benetos, Emmanouil; Dixon, Simon

    2017-01-01

    The comparative analysis of world music cultures has been the focus of several ethnomusicological studies in the last century. With the advances of Music Information Retrieval and the increased accessibility of sound archives, large-scale analysis of world music with computational tools is today feasible. We investigate music similarity in a corpus of 8200 recordings of folk and traditional music from 137 countries around the world. In particular, we aim to identify music recordings that are most distinct compared to the rest of our corpus. We refer to these recordings as ‘outliers’. We use signal processing tools to extract music information from audio recordings, data mining to quantify similarity and detect outliers, and spatial statistics to account for geographical correlation. Our findings suggest that Botswana is the country with the most distinct recordings in the corpus and China is the country with the most distinct recordings when considering spatial correlation. Our analysis includes a comparison of musical attributes and styles that contribute to the ‘uniqueness’ of the music of each country. PMID:29253027

  2. Several Families of Sequences with Low Correlation and Large Linear Span

    NASA Astrophysics Data System (ADS)

    Zeng, Fanxin; Zhang, Zhenyu

    In DS-CDMA systems and DS-UWB radios, low correlation of spreading sequences can greatly help to minimize multiple access interference (MAI) and large linear span of spreading sequences can reduce their predictability. In this letter, new sequence sets with low correlation and large linear span are proposed. Based on the construction Trm1[Trnm(αbt+γiαdt)]r for generating p-ary sequences of period pn-1, where n=2m, d=upm±v, b=u±v, γi∈GF(pn), and p is an arbitrary prime number, several methods to choose the parameter d are provided. The obtained sequences with family size pn are of four-valued, five-valued, six-valued or seven-valued correlation and the maximum nontrivial correlation value is (u+v-1)pm-1. The simulation by a computer shows that the linear span of the new sequences is larger than that of the sequences with Niho-type and Welch-type decimations, and similar to that of [10].

  3. Unaffiliated Users' Access to Academic Libraries: A Survey.

    ERIC Educational Resources Information Center

    Courtney, Nancy

    2003-01-01

    Most of 814 academic libraries surveyed allow onsite access to unaffiliated users, and many give borrowing privileges to certain categories of users. Use of library computers to access library resources and other computer applications is commonly allowed although authentication on library computers is increasing. Five tables show statistics.…

  4. Full Computer Access for People with Disabilities: The Goal of Transparency.

    ERIC Educational Resources Information Center

    Scheffel, Debora L.; Agnew, Jo

    This paper examines the goal of providing transparent computer access to people with disabilities, especially those with visual impairments. First, four basic strategies to provide this population with access to technology are identified: (1) building features into the computer, operating system, or application programs; (2) using adaptive…

  5. Method and apparatus for managing access to a memory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DeBenedictis, Erik

    A method and apparatus for managing access to a memory of a computing system. A controller transforms a plurality of operations that represent a computing job into an operational memory layout that reduces a size of a selected portion of the memory that needs to be accessed to perform the computing job. The controller stores the operational memory layout in a plurality of memory cells within the selected portion of the memory. The controller controls a sequence by which a processor in the computing system accesses the memory to perform the computing job using the operational memory layout. The operationalmore » memory layout reduces an amount of energy consumed by the processor to perform the computing job.« less

  6. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  7. Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?

    PubMed Central

    Billah, Syed Masum; Ashok, Vikas; Porter, Donald E.; Ramakrishnan, IV

    2017-01-01

    Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access—an early forerunner of true ubiquitous access—screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments. PMID:28782061

  8. Youth with cerebral palsy with differing upper limb abilities: how do they access computers?

    PubMed

    Davies, T Claire; Chau, Tom; Fehlings, Darcy L; Ameratunga, Shanthi; Stott, N Susan

    2010-12-01

    To identify the current level of awareness of different computer access technologies and the choices made regarding mode of access by youth with cerebral palsy (CP) and their families. Survey. Two tertiary-level rehabilitation centers in New Zealand and Canada. Youth (N=60) with CP, Manual Ability Classification Scale (MACS) levels I to V, age 13 to 25 years. Not applicable. Questionnaire. Fifty (83%) of the 60 youth were aware of at least 1 available assistive technology (AT), such as touch screens and joysticks. However, only 34 youth (57%) were familiar with the accessibility options currently available in the most common operating systems. Thirty-three (94%) of 35 youth who were MACS I and II used a standard mouse and keyboard, while few chose to use assistive technology or accessibility options. In contrast, 10 (40%) of 25 youth who were MACS III to V used a variety of assistive technologies such as touch screens, joysticks, trackballs, and scanning technologies. This group also had the highest use of accessibility options, although only 15 (60%) of the 25 were aware of them. Most youth with CP were aware of, and used, assistive technologies to enhance their computer access but were less knowledgeable about accessibility options. Accessibility options allow users to modify their own computer interface and can thus enhance computer access for youth with CP. Clinicians should be knowledgeable enough to give informed advice in this area of computer access, thus ensuring that all youth with CP can benefit from both AT and accessibility options, as required. Copyright © 2010 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  9. Internet and computer access and use for health information in an underserved community.

    PubMed

    Kind, Terry; Huang, Zhihuan J; Farr, Deeonna; Pomerantz, Karyn L

    2005-01-01

    The "digital divide" is the gap between those with access to information tools such as the Internet and those without access. The gap has been described by income, education, age, and race. Little information exists on computer and Internet access and use for health information by parents, particularly among populations of low income and low education level. To describe computer and Internet access and use, including health information retrieval, among low-income, urban, African American caregivers (parents). Cross-sectional survey administered in pediatric waiting rooms of urban community-based health centers in a low-income area. Caregivers of pediatric outpatients. Access to computers, Internet access, and use of Internet for health information. In 2003, among 260 African Americans who completed surveys, 58% had a computer and 41% had home Internet access. Fifty-two percent had used the Internet for finding health information. Ninety-three percent agreed or strongly agreed that there is useful health information on the Internet. Ninety-two percent agreed or strongly agreed that they would want to talk with a medical professional about health information on the Internet. Sixty-five percent of respondents had no additional schooling after high school. Annual household income was

  10. Virtual Computing Laboratories: A Case Study with Comparisons to Physical Computing Laboratories

    ERIC Educational Resources Information Center

    Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher

    2009-01-01

    Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…

  11. Computers in Academic Architecture Libraries.

    ERIC Educational Resources Information Center

    Willis, Alfred; And Others

    1992-01-01

    Computers are widely used in architectural research and teaching in U.S. schools of architecture. A survey of libraries serving these schools sought information on the emphasis placed on computers by the architectural curriculum, accessibility of computers to library staff, and accessibility of computers to library patrons. Survey results and…

  12. Technological advancements and Internet sexuality: does private access to the Internet influence online sexual behavior?

    PubMed

    Daneback, Kristian; Månsson, Sven-Axel; Ross, Michael W

    2012-08-01

    The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular.

  13. Technological Advancements and Internet Sexuality: Does Private Access to the Internet Influence Online Sexual Behavior?

    PubMed Central

    Månsson, Sven-Axel; Ross, Michael W.

    2012-01-01

    Abstract The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular. PMID:22823598

  14. The differential effects of ecstasy/polydrug use on executive components: shifting, inhibition, updating and access to semantic memory.

    PubMed

    Montgomery, Catharine; Fisk, John E; Newcombe, Russell; Murphy, Phillip N

    2005-10-01

    Recent theoretical models suggest that the central executive may not be a unified structure. The present study explored the nature of central executive deficits in ecstasy users. In study 1, 27 ecstasy users and 34 non-users were assessed using tasks to tap memory updating (computation span; letter updating) and access to long-term memory (a semantic fluency test and the Chicago Word Fluency Test). In study 2, 51 ecstasy users and 42 non-users completed tasks that assess mental set switching (number/letter and plus/minus) and inhibition (random letter generation). MANOVA revealed that ecstasy users performed worse on both tasks used to assess memory updating and on tasks to assess access to long-term memory (C- and S-letter fluency). However, notwithstanding the significant ecstasy group-related effects, indices of cocaine and cannabis use were also significantly correlated with most of the executive measures. Unexpectedly, in study 2, ecstasy users performed significantly better on the inhibition task, producing more letters than non-users. No group differences were observed on the switching tasks. Correlations between indices of ecstasy use and number of letters produced were significant. The present study provides further support for ecstasy/polydrug-related deficits in memory updating and in access to long-term memory. The surplus evident on the inhibition task should be treated with some caution, as this was limited to a single measure and has not been supported by our previous work.

  15. The Education Value of Cloud Computing

    ERIC Educational Resources Information Center

    Katzan, Harry, Jr.

    2010-01-01

    Cloud computing is a technique for supplying computer facilities and providing access to software via the Internet. Cloud computing represents a contextual shift in how computers are provisioned and accessed. One of the defining characteristics of cloud software service is the transfer of control from the client domain to the service provider.…

  16. Bridging the digital divide through the integration of computer and information technology in science education: An action research study

    NASA Astrophysics Data System (ADS)

    Brown, Gail Laverne

    The presence of a digital divide, computer and information technology integration effectiveness, and barriers to continued usage of computer and information technology were investigated. Thirty-four African American and Caucasian American students (17 males and 17 females) in grades 9--11 from 2 Georgia high school science classes were exposed to 30 hours of hands-on computer and information technology skills. The purpose of the exposure was to improve students' computer and information technology skills. Pre-study and post-study skills surveys, and structured interviews were used to compare race, gender, income, grade-level, and age differences with respect to computer usage. A paired t-test and McNemar test determined mean differences between student pre-study and post-study perceived skills levels. The results were consistent with findings of the National Telecommunications and Information Administration (2000) that indicated the presence of a digital divide and digital inclusion. Caucasian American participants were found to have more at-home computer and Internet access than African American participants, indicating that there is a digital divide by ethnicity. Caucasian American females were found to have more computer and Internet access which was an indication of digital inclusion. Sophomores had more at-home computer access and Internet access than other levels indicating digital inclusion. Students receiving regular meals had more computer and Internet access than students receiving free/reduced meals. Older students had more computer and Internet access than younger students. African American males had been using computer and information technology the longest which is an indication of inclusion. The paired t-test and McNemar test revealed significant perceived student increases in all skills levels. Interviews did not reveal any barriers to continued usage of the computer and information technology skills.

  17. SIPP ACCESS: Information Tools Improve Access to National Longitudinal Panel Surveys.

    ERIC Educational Resources Information Center

    Robbin, Alice; David, Martin

    1988-01-01

    A computer-based, integrated information system incorporating data and information about the data, SIPP ACCESS systematically links technologies of laser disk, mainframe computer, microcomputer, and electronic networks, and applies relational technology to provide access to information about complex statistical data collections. Examples are given…

  18. Social Media Use and Access to Digital Technology in US Young Adults in 2016.

    PubMed

    Villanti, Andrea C; Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M

    2017-06-07

    In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these. Access to all digital devices with Internet was lower in those reporting a lower subjective financial situation; there were also significant differences in access to specific digital devices with Internet by race, ethnicity, and education. The high mean number of social media sites used regularly and the substantial overlap in use of multiple social media sites reflect the rapidly changing social media environment. Mobile devices are a primary channel for social media, and our study highlights disparities in access to digital technologies with Internet access among US young adults by race/ethnicity, education, and subjective financial status. Findings from this study may guide the development and implementation of future health interventions for young adults delivered via the Internet or social media sites. ©Andrea C Villanti, Amanda L Johnson, Vinu Ilakkuvan, Megan A Jacobs, Amanda L Graham, Jessica M Rath. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 07.06.2017.

  19. Social Media Use and Access to Digital Technology in US Young Adults in 2016

    PubMed Central

    Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M

    2017-01-01

    Background In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. Objective The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Methods Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. Results In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these. Access to all digital devices with Internet was lower in those reporting a lower subjective financial situation; there were also significant differences in access to specific digital devices with Internet by race, ethnicity, and education. Conclusions The high mean number of social media sites used regularly and the substantial overlap in use of multiple social media sites reflect the rapidly changing social media environment. Mobile devices are a primary channel for social media, and our study highlights disparities in access to digital technologies with Internet access among US young adults by race/ethnicity, education, and subjective financial status. Findings from this study may guide the development and implementation of future health interventions for young adults delivered via the Internet or social media sites. PMID:28592394

  20. Generic approach to access barriers in dehydrogenation reactions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yu, Liang; Vilella, Laia; Abild-Pedersen, Frank

    The introduction of linear energy correlations, which explicitly relate adsorption energies of reaction intermediates and activation energies in heterogeneous catalysis, has proven to be a key component in the computational search for new and promising catalysts. A simple linear approach to estimate activation energies still requires a significant computational effort. To simplify this process and at the same time incorporate the need for enhanced complexity of reaction intermediates, we generalize a recently proposed approach that evaluates transition state energies based entirely on bond-order conservation arguments. Here, we show that similar variation of the local electronic structure along the reaction coordinatemore » introduces a set of general functions that accurately defines the transition state energy and are transferable to other reactions with similar bonding nature. With such an approach, more complex reaction intermediates can be targeted with an insignificant increase in computational effort and without loss of accuracy.« less

  1. Generic approach to access barriers in dehydrogenation reactions

    DOE PAGES

    Yu, Liang; Vilella, Laia; Abild-Pedersen, Frank

    2018-03-08

    The introduction of linear energy correlations, which explicitly relate adsorption energies of reaction intermediates and activation energies in heterogeneous catalysis, has proven to be a key component in the computational search for new and promising catalysts. A simple linear approach to estimate activation energies still requires a significant computational effort. To simplify this process and at the same time incorporate the need for enhanced complexity of reaction intermediates, we generalize a recently proposed approach that evaluates transition state energies based entirely on bond-order conservation arguments. Here, we show that similar variation of the local electronic structure along the reaction coordinatemore » introduces a set of general functions that accurately defines the transition state energy and are transferable to other reactions with similar bonding nature. With such an approach, more complex reaction intermediates can be targeted with an insignificant increase in computational effort and without loss of accuracy.« less

  2. Valuable use of computer-aided surgery in congenital bony aural atresia.

    PubMed

    Caversaccio, Marco; Romualdez, Joel; Baechler, Richard; Nolte, Lutz-Peter; Kompis, Martin; Häusler, Rudolf

    2003-04-01

    Congenital aural atresia repair is difficult owing to unpredictable anatomy. Benefits may be gained from computer-aided surgery (CAS), but its exact role has yet to be clearly defined. This is a retrospective study of 18 patients with bony type C (Schuknecht classification) congenital atresia. In the first group (n = 9), repair was performed with CAS while in the second group (n = 9), similar intervention was applied without CAS. Intra- and post-operative clinical and audiological findings were compared. CAS computed tomography (CT) images correlated well with intra-operative findings giving the surgeon more security and reducing operative time by 25 minutes. In our estimation, CAS is valuable for type C congenital aural atresia repair. It serves as an educational tool and as a guide for the experienced surgeon in critical situations where anatomical landmarks are distorted and where access is limited.

  3. What we talk about when we talk about access deficits

    PubMed Central

    Mirman, Daniel; Britt, Allison E.

    2014-01-01

    Semantic impairments have been divided into storage deficits, in which the semantic representations themselves are damaged, and access deficits, in which the representations are intact but access to them is impaired. The behavioural phenomena that have been associated with access deficits include sensitivity to cueing, sensitivity to presentation rate, performance inconsistency, negative serial position effects, sensitivity to number and strength of competitors, semantic blocking effects, disordered selection between strong and weak competitors, correlation between semantic deficits and executive function deficits and reduced word frequency effects. Four general accounts have been proposed for different subsets of these phenomena: abnormal refractoriness, too much activation, impaired competitive selection and deficits of semantic control. A combination of abnormal refractoriness and impaired competitive selection can account for most of the behavioural phenomena, but there remain several open questions. In particular, it remains unclear whether access deficits represent a single syndrome, a syndrome with multiple subtypes or a variable collection of phenomena, whether the underlying deficit is domain-general or domain-specific, whether it is owing to disorders of inhibition, activation or selection, and the nature of the connection (if any) between access phenomena in aphasia and in neurologically intact controls. Computational models offer a promising approach to answering these questions. PMID:24324232

  4. A sparse autoencoder-based deep neural network for protein solvent accessibility and contact number prediction.

    PubMed

    Deng, Lei; Fan, Chao; Zeng, Zhiwen

    2017-12-28

    Direct prediction of the three-dimensional (3D) structures of proteins from one-dimensional (1D) sequences is a challenging problem. Significant structural characteristics such as solvent accessibility and contact number are essential for deriving restrains in modeling protein folding and protein 3D structure. Thus, accurately predicting these features is a critical step for 3D protein structure building. In this study, we present DeepSacon, a computational method that can effectively predict protein solvent accessibility and contact number by using a deep neural network, which is built based on stacked autoencoder and a dropout method. The results demonstrate that our proposed DeepSacon achieves a significant improvement in the prediction quality compared with the state-of-the-art methods. We obtain 0.70 three-state accuracy for solvent accessibility, 0.33 15-state accuracy and 0.74 Pearson Correlation Coefficient (PCC) for the contact number on the 5729 monomeric soluble globular protein dataset. We also evaluate the performance on the CASP11 benchmark dataset, DeepSacon achieves 0.68 three-state accuracy and 0.69 PCC for solvent accessibility and contact number, respectively. We have shown that DeepSacon can reliably predict solvent accessibility and contact number with stacked sparse autoencoder and a dropout approach.

  5. He just wants to play: how goals determine the influence of violent computer games on aggression.

    PubMed

    Denzler, Markus; Häfner, Michael; Förster, Jens

    2011-12-01

    Generally, the accessibility of goal-related constructs is inhibited upon goal fulfillment. In line with this notion, the current studies explored whether violent computer games may reduce relative accessibility of aggression if the game involves the fulfillment of an aggressive goal. Specifically, in Study 1, participants who watched a trailer for a violent computer game that fulfilled the goal of venting anger showed less relative accessibility of aggression compared to participants who watched the trailer without goal fulfillment. In Study 2, actually playing a violent computer game to vent anger also decreased the relative accessibility of aggression compared to a control condition in which the game was played without such a goal. Lastly, in Study 3, the relative accessibility of aggression was reduced after playing a violent computer game for participants who reported a high general tendency to vent their anger.

  6. High-Performance Computing User Facility | Computational Science | NREL

    Science.gov Websites

    User Facility High-Performance Computing User Facility The High-Performance Computing User Facility technologies. Photo of the Peregrine supercomputer The High Performance Computing (HPC) User Facility provides Gyrfalcon Mass Storage System. Access Our HPC User Facility Learn more about these systems and how to access

  7. Comparison of perceived and modelled geographical access to accident and emergency departments: a cross-sectional analysis from the Caerphilly Health and Social Needs Study.

    PubMed

    Fone, David L; Christie, Stephen; Lester, Nathan

    2006-04-13

    Assessment of the spatial accessibility of hospital accident and emergency departments as perceived by local residents has not previously been investigated. Perceived accessibility may affect where, when, and whether potential patients attend for treatment. Using data on 11,853 respondents to a population survey in Caerphilly county borough, Wales, UK, we present an analysis comparing the accessibility of accident and emergency departments as reported by local residents and drive-time to the nearest accident and emergency department modelled using a geographical information system (GIS). Median drive-times were significantly shorter in the lowest perceived access category and longer in the best perceived access category (p < 0.001). The perceived access and GIS modelled drive-time variables were positively correlated (Spearman's rank correlation coefficient, r = 0.38, p < 0.01). The strongest correlation was found for respondents living in areas in which nearly all households had a car or van (r = 0.47, p < 0.01). Correlations were stronger among respondents reporting good access to public transport and among those reporting a recent accident and emergency attendance for injury treatment compared to other respondents. Correlation coefficients did not vary substantially by levels of household income. Drive-time, road distance and straight-line distance were highly inter-correlated and substituting road distance or straight-line distance as the GIS modelled spatial accessibility measure only marginally decreased the magnitude of the correlations between perceived and GIS modelled access. This study provides evidence that the accessibility of hospital-based health care services as perceived by local residents is related to measures of spatial accessibility modelled using GIS. For studies that aim to model geographical separation in a way that correlates well with the perception of local residents, there may be minimal advantage in using sophisticated measures. Straight-line distance, which can be calculated without GIS, may be as good as GIS-modelled drive-time or distance for this purpose. These findings will be of importance to health policy makers and local planners who seek to obtain local information on access to services through focussed assessments of residents' concerns over accessibility and GIS modelling.

  8. Simultaneous epicardial and noncontact endocardial mapping of the canine right atrium: simulation and experiment.

    PubMed

    Sabouri, Sepideh; Matene, Elhacene; Vinet, Alain; Richer, Louis-Philippe; Cardinal, René; Armour, J Andrew; Pagé, Pierre; Kus, Teresa; Jacquemet, Vincent

    2014-01-01

    Epicardial high-density electrical mapping is a well-established experimental instrument to monitor in vivo the activity of the atria in response to modulations of the autonomic nervous system in sinus rhythm. In regions that are not accessible by epicardial mapping, noncontact endocardial mapping performed through a balloon catheter may provide a more comprehensive description of atrial activity. We developed a computer model of the canine right atrium to compare epicardial and noncontact endocardial mapping. The model was derived from an experiment in which electroanatomical reconstruction, epicardial mapping (103 electrodes), noncontact endocardial mapping (2048 virtual electrodes computed from a 64-channel balloon catheter), and direct-contact endocardial catheter recordings were simultaneously performed in a dog. The recording system was simulated in the computer model. For simulations and experiments (after atrio-ventricular node suppression), activation maps were computed during sinus rhythm. Repolarization was assessed by measuring the area under the atrial T wave (ATa), a marker of repolarization gradients. Results showed an epicardial-endocardial correlation coefficients of 0.80 and 0.63 (two dog experiments) and 0.96 (simulation) between activation times, and a correlation coefficients of 0.57 and 0.46 (two dog experiments) and 0.92 (simulation) between ATa values. Despite distance (balloon-atrial wall) and dimension reduction (64 electrodes), some information about atrial repolarization remained present in noncontact signals.

  9. Simultaneous Epicardial and Noncontact Endocardial Mapping of the Canine Right Atrium: Simulation and Experiment

    PubMed Central

    Sabouri, Sepideh; Matene, Elhacene; Vinet, Alain; Richer, Louis-Philippe; Cardinal, René; Armour, J. Andrew; Pagé, Pierre; Kus, Teresa; Jacquemet, Vincent

    2014-01-01

    Epicardial high-density electrical mapping is a well-established experimental instrument to monitor in vivo the activity of the atria in response to modulations of the autonomic nervous system in sinus rhythm. In regions that are not accessible by epicardial mapping, noncontact endocardial mapping performed through a balloon catheter may provide a more comprehensive description of atrial activity. We developed a computer model of the canine right atrium to compare epicardial and noncontact endocardial mapping. The model was derived from an experiment in which electroanatomical reconstruction, epicardial mapping (103 electrodes), noncontact endocardial mapping (2048 virtual electrodes computed from a 64-channel balloon catheter), and direct-contact endocardial catheter recordings were simultaneously performed in a dog. The recording system was simulated in the computer model. For simulations and experiments (after atrio-ventricular node suppression), activation maps were computed during sinus rhythm. Repolarization was assessed by measuring the area under the atrial T wave (ATa), a marker of repolarization gradients. Results showed an epicardial-endocardial correlation coefficients of 0.80 and 0.63 (two dog experiments) and 0.96 (simulation) between activation times, and a correlation coefficients of 0.57 and 0.46 (two dog experiments) and 0.92 (simulation) between ATa values. Despite distance (balloon-atrial wall) and dimension reduction (64 electrodes), some information about atrial repolarization remained present in noncontact signals. PMID:24598778

  10. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  11. Computer Access. Tech Use Guide: Using Computer Technology.

    ERIC Educational Resources Information Center

    Council for Exceptional Children, Reston, VA. Center for Special Education Technology.

    One of nine brief guides for special educators on using computer technology, this guide focuses on access including adaptations in input devices, output devices, and computer interfaces. Low technology devices include "no-technology" devices (usually modifications to existing devices), simple switches, and multiple switches. High technology input…

  12. Optical memories in digital computing

    NASA Technical Reports Server (NTRS)

    Alford, C. O.; Gaylord, T. K.

    1979-01-01

    High capacity optical memories with relatively-high data-transfer rate and multiport simultaneous access capability may serve as basis for new computer architectures. Several computer structures that might profitably use memories are: a) simultaneous record-access system, b) simultaneously-shared memory computer system, and c) parallel digital processing structure.

  13. Integrating Web-based technology into distance education for nurses in China: computer and Internet access and attitudes.

    PubMed

    Cragg, C E Betty; Edwards, Nancy; Yue, Zhao; Xin, Song Li; Hui, Zou Dao

    2003-01-01

    To increase continuing education accessibility, nurses around the world are turning to Web-based instruction. However, for Internet education to be successful, particularly in developing countries, nurses must have access to computers and the Internet as well as positive attitudes toward this form of learning. As part of a distance education project for nurses of the Tianjin Municipality in China, a survey of nurses was conducted to examine their sources of professional knowledge as well as their computer and Internet access and attitudes. The attitudes of the nurses were generally positive, and there was evidence of rapidly increasing use of and access to computers and the Internet. This article reports the results of that survey and their implications for Web-based teaching of Chinese nurses.

  14. Optimizing the technological and informational relationship of the health care process and of the communication between physician and patient--factors that have an impact on the process of diagnosis from the physician's and the patient's perspectives.

    PubMed

    Purcarea, V L; Petrescu, D G; Gheorghe, I R; Petrescu, C M

    2011-05-15

    The optimization of a diagnosis process and fluency in the Health Care sector in Romania. A key to discover this complex process was to determine a correlation between the physicians and the use of information technology, on one side and the patients' perspective on the other. Integrating information technology in a physician's activity will lead to lower costs and less time spent while diagnosing patients. Using the electronic medical records and introducing a unified database with the patients' medical histories will make the process of diagnosis easier. We studied the diagnosis from the point of view of 304 patients in a public hospital and 320 physicians working there. We believed that time and accessibility to different physicians makes the diagnosis process a burden for a patient and implicitly lead to dissatisfaction with health care services. We supposed that the burden of diagnosis for physicians comes from the lack of Internet connection and computer usage knowledge. We have found out that most physicians know how to use the computer at an intermediate level and have access to Internet, online journals and databases and do not use emails to a higher extent to communicate to other specialists, but do not rely entirely on the electronic medical records. Most physicians think that it is not technology, which stands in the way of proper and fast diagnosis but the financing and the paper work from the Romanian health system. Solutions that might be taken into account to entirely motivate physicians to use electronic medical records are: 1. Adjustments can be made to the computer software interface in order to make the design more consistent (to eliminate the paper forms) and user friendly. 2. Physicians can be provided with more training and knowledge. After some statistical tests have been applied to find a correlation between the chosen variables, we have reached the conclusion that the results are encouraging and there is no correlation between the degree of the impact of Preventive Medicine and the healthy behavior of the respondents.

  15. Ab Initio Optimized Effective Potentials for Real Molecules in Optical Cavities: Photon Contributions to the Molecular Ground State

    PubMed Central

    2018-01-01

    We introduce a simple scheme to efficiently compute photon exchange-correlation contributions due to the coupling to transversal photons as formulated in the newly developed quantum-electrodynamical density-functional theory (QEDFT).1−5 Our construction employs the optimized-effective potential (OEP) approach by means of the Sternheimer equation to avoid the explicit calculation of unoccupied states. We demonstrate the efficiency of the scheme by applying it to an exactly solvable GaAs quantum ring model system, a single azulene molecule, and chains of sodium dimers, all located in optical cavities and described in full real space. While the first example is a two-dimensional system and allows to benchmark the employed approximations, the latter two examples demonstrate that the correlated electron-photon interaction appreciably distorts the ground-state electronic structure of a real molecule. By using this scheme, we not only construct typical electronic observables, such as the electronic ground-state density, but also illustrate how photon observables, such as the photon number, and mixed electron-photon observables, for example, electron–photon correlation functions, become accessible in a density-functional theory (DFT) framework. This work constitutes the first three-dimensional ab initio calculation within the new QEDFT formalism and thus opens up a new computational route for the ab initio study of correlated electron–photon systems in quantum cavities. PMID:29594185

  16. Student Use of Computers. Indicator of the Month.

    ERIC Educational Resources Information Center

    National Center for Education Statistics (ED), Washington, DC.

    Exposure to computers in school may help young people gain the computer literacy they will need to function effectively in society. The amount of access to computers at home is often directly related to socioeconomic factors. Examining the extent to which students have access to computers either at school or at home may help predict how prepared…

  17. Equity and Computers for Mathematics Learning: Access and Attitudes

    ERIC Educational Resources Information Center

    Forgasz, Helen J.

    2004-01-01

    Equity and computer use for secondary mathematics learning was the focus of a three year study. In 2003, a survey was administered to a large sample of grade 7-10 students. Some of the survey items were aimed at determining home access to and ownership of computers, and students' attitudes to mathematics, computers, and computer use for…

  18. Cloud Computing with iPlant Atmosphere.

    PubMed

    McKay, Sheldon J; Skidmore, Edwin J; LaRose, Christopher J; Mercer, Andre W; Noutsos, Christos

    2013-10-15

    Cloud Computing refers to distributed computing platforms that use virtualization software to provide easy access to physical computing infrastructure and data storage, typically administered through a Web interface. Cloud-based computing provides access to powerful servers, with specific software and virtual hardware configurations, while eliminating the initial capital cost of expensive computers and reducing the ongoing operating costs of system administration, maintenance contracts, power consumption, and cooling. This eliminates a significant barrier to entry into bioinformatics and high-performance computing for many researchers. This is especially true of free or modestly priced cloud computing services. The iPlant Collaborative offers a free cloud computing service, Atmosphere, which allows users to easily create and use instances on virtual servers preconfigured for their analytical needs. Atmosphere is a self-service, on-demand platform for scientific computing. This unit demonstrates how to set up, access and use cloud computing in Atmosphere. Copyright © 2013 John Wiley & Sons, Inc.

  19. Evaluation of an Application for Making Palmtop Computers Accessible to Individuals with Intellectual Disabilities

    ERIC Educational Resources Information Center

    Stock, Steven E.; Davies, Daniel K.; Davies, Katelyn R.; Wehmeyer, Michael L.

    2006-01-01

    Background: Palmtop computers provide a promising mobile platform to address barriers to computer-based supports for people with intellectual disabilities. This study evaluated a specially designed interface to make navigation and features of palmtop computers more accessible to users with intellectual disabilities. Method: The specialised…

  20. Student Empowerment. The Influence of High Computer Access on Student Empowerment (An Exploratory Study of the Nashville ACOT Site). ACOT Report #1.

    ERIC Educational Resources Information Center

    Fisher, Charles W.

    This study identifies classroom conditions that affect student empowerment and examines the relationship between student empowerment and high computer access (HCA). The study involved observation in two fourth grade classrooms--one week in an ACOT classroom (with high computer access), and one week in a non-ACOT classroom (without high computer…

  1. Computer and Internet Interventions to Optimize Listening and Learning for People With Hearing Loss: Accessibility, Use, and Adherence.

    PubMed

    Ferguson, Melanie; Henshaw, Helen

    2015-09-01

    The aim of this research forum article was to examine accessibility, use, and adherence to computerized and online interventions for people with hearing loss. Four intervention studies of people with hearing loss were examined: 2 auditory training studies, 1 working memory training study, and 1 study of multimedia educational support. A small proportion (approximately 15%) of participants had never used a computer, which may be a barrier to the accessibility of computer and Internet-based interventions. Computer competence was not a factor in intervention use or adherence. Computer skills and Internet access influenced participant preference for the delivery method of the multimedia educational support program. It is important to be aware of current barriers to computer and Internet-delivered interventions for people with hearing loss. However, there is a clear need to develop and future-proof hearing-related applications for online delivery.

  2. Beyond the constraints underlying Kolmogorov-Johnson-Mehl-Avrami theory related to the growth laws.

    PubMed

    Tomellini, M; Fanfoni, M

    2012-02-01

    The theory of Kolmogorov-Johnson-Mehl-Avrami for phase transition kinetics is subjected to severe limitations concerning the functional form of the growth law. This paper is devoted to sidestepping this drawback through the use of the correlation function approach. Moreover, we put forward an easy-to-handle formula, written in terms of the experimentally accessible actual extended volume fraction, which is found to match several types of growths. Computer simulations have been performed for corroborating the theoretical approach. © 2012 American Physical Society

  3. Evaluation of Advanced Reactive Surface Area Estimates for Improved Prediction of Mineral Reaction Rates in Porous Media

    NASA Astrophysics Data System (ADS)

    Beckingham, L. E.; Mitnick, E. H.; Zhang, S.; Voltolini, M.; Yang, L.; Steefel, C. I.; Swift, A.; Cole, D. R.; Sheets, J.; Kneafsey, T. J.; Landrot, G.; Anovitz, L. M.; Mito, S.; Xue, Z.; Ajo Franklin, J. B.; DePaolo, D.

    2015-12-01

    CO2 sequestration in deep sedimentary formations is a promising means of reducing atmospheric CO2 emissions but the rate and extent of mineral trapping remains difficult to predict. Reactive transport models provide predictions of mineral trapping based on laboratory mineral reaction rates, which have been shown to have large discrepancies with field rates. This, in part, may be due to poor quantification of mineral reactive surface area in natural porous media. Common estimates of mineral reactive surface area are ad hoc and typically based on grain size, adjusted several orders of magnitude to account for surface roughness and reactivity. This results in orders of magnitude discrepancies in estimated surface areas that directly translate into orders of magnitude discrepancies in model predictions. Additionally, natural systems can be highly heterogeneous and contain abundant nano- and micro-porosity, which can limit connected porosity and access to mineral surfaces. In this study, mineral-specific accessible surface areas are computed for a sample from the reservoir formation at the Nagaoka pilot CO2 injection site (Japan). Accessible mineral surface areas are determined from a multi-scale image analysis including X-ray microCT, SEM QEMSCAN, XRD, SANS, and SEM-FIB. Powder and flow-through column laboratory experiments are performed and the evolution of solutes in the aqueous phase is tracked. Continuum-scale reactive transport models are used to evaluate the impact of reactive surface area on predictions of experimental reaction rates. Evaluated reactive surface areas include geometric and specific surface areas (eg. BET) in addition to their reactive-site weighted counterparts. The most accurate predictions of observed powder mineral dissolution rates were obtained through use of grain-size specific surface areas computed from a BET-based correlation. Effectively, this surface area reflects the grain-fluid contact area, or accessible surface area, in the powder dissolution experiment. In the model of the flow-through column experiment, the accessible mineral surface area, computed from the multi-scale image analysis, is evaluated in addition to the traditional surface area estimates.

  4. Is there a necessity for individual blood water corrections when conductivity-based access blood flow measurements are made?

    PubMed

    Huang, Shih-Han S; Heidenheim, Paul A; Gallo, Kerri; Jayakumar, Saumya; Lindsay, Robert M

    2011-01-01

    Access blood water flow rate (Qaw) can be measured during hemodialysis using an online effective ionic dialysance (EID) methodology. Fresenius employ this methodology in their 2008K dialysis machine. The machine computer converts Qaw to an access blood flow rate (Fresenius Qa) using a generic blood water constant (BWC). We wished to validate this BWC. 18 patients had Fresenius Qa measurements using the EID and these were compared with a 'gold standard' ultrasound dilution methodology (Transonic Qa). Qa values were also obtained by removing the BWC from Fresenius Qa values to obtain the Qaw and recorrecting it with individualized patient factors using hematocrit and total protein values (HctTp Qa). The measurements were repeated after 1 h. There were no significant differences between Fresenius and Transonic, nor between HctTp and Transonic Qa values (p > 0.17). There were strong correlations between both sets of values (r > 0.856; p < 0.001). There was a significant correlation between the pairs of Transonic Qa values (r = 0.823; p < 0.007), but not for Fresenius Qa pairs (r = 0.573; p > 0.07). It was surmised that the BWC was not valid post-dialysis. The generic BWC is comparable to individualized blood water correction factors when Qa measures are made early in dialysis and prior to ultrafiltration treatment. Copyright © 2011 S. Karger AG, Basel.

  5. ABSENTEE COMPUTATIONS IN A MULTIPLE-ACCESS COMPUTER SYSTEM.

    DTIC Science & Technology

    require user interaction, and the user may therefore want to run these computations ’ absentee ’ (or, user not present). A mechanism is presented which...provides for the handling of absentee computations in a multiple-access computer system. The design is intended to be implementation-independent...Some novel features of the system’s design are: a user can switch computations from interactive to absentee (and vice versa), the system can

  6. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    NASA Astrophysics Data System (ADS)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  7. AAC menu interface: effectiveness of active versus passive learning to master abbreviation-expansion codes.

    PubMed

    Gregory, Ellyn; Soderman, Melinda; Ward, Christy; Beukelman, David R; Hux, Karen

    2006-06-01

    This study investigated the accuracy with which 30 young adults without disabilities learned abbreviation expansion codes associated with specific vocabulary items that were stored in an AAC device with two accessing methods: mouse access and keyboard access. Both accessing methods utilized a specialized computer application, called AAC Menu, which allowed for errorless practice. Mouse access prompted passive learning, whereas keyboard access prompted active learning. Results revealed that participants who accessed words via a keyboard demonstrated significantly higher mastery of abbreviation-expansion codes than those who accessed words via a computer mouse.

  8. Bond Order Correlations in the 2D Hubbard Model

    NASA Astrophysics Data System (ADS)

    Moore, Conrad; Abu Asal, Sameer; Yang, Shuxiang; Moreno, Juana; Jarrell, Mark

    We use the dynamical cluster approximation to study the bond correlations in the Hubbard model with next nearest neighbor (nnn) hopping to explore the region of the phase diagram where the Fermi liquid phase is separated from the pseudogap phase by the Lifshitz line at zero temperature. We implement the Hirsch-Fye cluster solver that has the advantage of providing direct access to the computation of the bond operators via the decoupling field. In the pseudogap phase, the parallel bond order susceptibility is shown to persist at zero temperature while it vanishes for the Fermi liquid phase which allows the shape of the Lifshitz line to be mapped as a function of filling and nnn hopping. Our cluster solver implements NVIDIA's CUDA language to accelerate the linear algebra of the Quantum Monte Carlo to help alleviate the sign problem by allowing for more Monte Carlo updates to be performed in a reasonable amount of computation time. Work supported by the NSF EPSCoR Cooperative Agreement No. EPS-1003897 with additional support from the Louisiana Board of Regents.

  9. Access to electronic health knowledge in five countries in Africa: a descriptive study.

    PubMed

    Smith, Helen; Bukirwa, Hasifa; Mukasa, Oscar; Snell, Paul; Adeh-Nsoh, Sylvester; Mbuyita, Selemani; Honorati, Masanja; Orji, Bright; Garner, Paul

    2007-05-17

    Access to medical literature in developing countries is helped by open access publishing and initiatives to allow free access to subscription only journals. The effectiveness of these initiatives in Africa has not been assessed. This study describes awareness, reported use and factors influencing use of on-line medical literature via free access initiatives. Descriptive study in four teaching hospitals in Cameroon, Nigeria, Tanzania and Uganda plus one externally funded research institution in The Gambia. Survey with postgraduate doctors and research scientists to determine Internet access patterns, reported awareness of on-line medical information and free access initiatives; semi structured interviews with a sub-sample of survey participants to explore factors influencing use. In the four African teaching hospitals, 70% of the 305 postgraduate doctors reported textbooks as their main source of information; 66% had used the Internet for health information in the last week. In two hospitals, Internet cafés were the main Internet access point. For researchers at the externally-funded research institution, electronic resources were their main source, and almost all had used the Internet in the last week. Across all 333 respondents, 90% had heard of PubMed, 78% of BMJ on line, 49% the Cochrane Library, 47% HINARI, and 19% BioMedCentral. HINARI use correlates with accessing the Internet on computers located in institutions. Qualitative data suggested there are difficulties logging into HINARI and that sometimes it is librarians that limit access to passwords. Text books remain an important resource for postgraduate doctors in training. Internet use is common, but awareness of free-access initiatives is limited. HINARI and other initiatives could be more effective with strong institutional endorsement and management to promote and ensure access.

  10. Computer Access and Flowcharting as Variables in Learning Computer Programming.

    ERIC Educational Resources Information Center

    Ross, Steven M.; McCormick, Deborah

    Manipulation of flowcharting was crossed with in-class computer access to examine flowcharting effects in the traditional lecture/laboratory setting and in a classroom setting where online time was replaced with manual simulation. Seventy-two high school students (24 male and 48 female) enrolled in a computer literacy course served as subjects.…

  11. 10 CFR 727.1 - What is the purpose and scope of this part?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 727.1 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS... requirements applicable to each individual granted access to a DOE computer or to information on a DOE computer... computer used in the performance of the individual's duties during the term of that individual's employment...

  12. 10 CFR 727.1 - What is the purpose and scope of this part?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 727.1 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS... requirements applicable to each individual granted access to a DOE computer or to information on a DOE computer... computer used in the performance of the individual's duties during the term of that individual's employment...

  13. 10 CFR 727.1 - What is the purpose and scope of this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 727.1 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS... requirements applicable to each individual granted access to a DOE computer or to information on a DOE computer... computer used in the performance of the individual's duties during the term of that individual's employment...

  14. 10 CFR 727.1 - What is the purpose and scope of this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 727.1 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS... requirements applicable to each individual granted access to a DOE computer or to information on a DOE computer... computer used in the performance of the individual's duties during the term of that individual's employment...

  15. 10 CFR 727.1 - What is the purpose and scope of this part?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 727.1 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS... requirements applicable to each individual granted access to a DOE computer or to information on a DOE computer... computer used in the performance of the individual's duties during the term of that individual's employment...

  16. Pervasive access to images and data--the use of computing grids and mobile/wireless devices across healthcare enterprises.

    PubMed

    Pohjonen, Hanna; Ross, Peeter; Blickman, Johan G; Kamman, Richard

    2007-01-01

    Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented that provide computing grids and streaming-based access to image and data management functions, and system architectures that enable pervasive computing on a cost-effective basis. Finally, the implications of such technologies are investigated regarding the positive impacts on clinical workflows.

  17. Computers for Political Change: PeaceNet and Public Data Access.

    ERIC Educational Resources Information Center

    Downing, John D. H.

    1989-01-01

    Describes two computer communication projects: PeaceNet, devoted to peace issues; and Public Data Access, devoted to making U.S. government information more broadly available. Discusses the potential of new technology (computer communication) for grass-roots political movements. (SR)

  18. Bridging the digital divide: mobile access to personal health records among patients with diabetes.

    PubMed

    Graetz, Ilana; Huang, Jie; Brand, Richard J; Hsu, John; Yamin, Cyrus K; Reed, Mary E

    2018-01-01

    Some patients lack regular computer access and experience a digital divide that causes them to miss internet-based health innovations. The diffusion of smartphones has increased internet access across the socioeconomic spectrum, and increasing the channels through which patients can access their personal health records (PHRs) could help bridge the divide in PHR use. We examined PHR use through a computer-based Web browser or mobile device. Cross-sectional historical cohort analysis. Among adult patients in the diabetes registry of an integrated healthcare delivery system, we studied the devices used to access their PHR during 2016. Among 267,208 patients with diabetes, 68.1% used the PHR in 2016; 60.6% of all log-ins were via computer and 39.4% were via mobile device. Overall, 63.9% used it from both a computer and mobile device, 29.6% used only a computer, and 6.5% used only a mobile device. After adjustment, patients who were black, Hispanic, or Asian; lived in lower socioeconomic status (SES) neighborhoods; or had lower engagement were all significantly more likely to use the PHR only from a mobile device (P <.05). Patients using the PHR only via mobile device used it less frequently. Mobile-ready PHRs may increase access among patients facing a digital divide in computer use, disproportionately reaching racial/ethnic minorities and lower SES patients. Nonetheless, even with a mobile-optimized and app-accessible PHR, differences in PHR use by race/ethnicity and SES remain. Continued efforts are needed to increase equitable access to PHRs among patients with chronic conditions.

  19. 38 CFR 1.603 - Disqualification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Utilizes unapproved computer hardware or software to obtain or attempt to obtain access to VBA computer... that the individual's access privileges were revoked and the reasons why. (e) The VBA Regional Office... Director or the Regional Office Director's designee may revoke an individual's or an organization's access...

  20. Simple video format for mobile applications

    NASA Astrophysics Data System (ADS)

    Smith, John R.; Miao, Zhourong; Li, Chung-Sheng

    2000-04-01

    With the advent of pervasive computing, there is a growing demand for enabling multimedia applications on mobile devices. Large numbers of pervasive computing devices, such as personal digital assistants (PDAs), hand-held computer (HHC), smart phones, portable audio players, automotive computing devices, and wearable computers are gaining access to online information sources. However, the pervasive computing devices are often constrained along a number of dimensions, such as processing power, local storage, display size and depth, connectivity, and communication bandwidth, which makes it difficult to access rich image and video content. In this paper, we report on our initial efforts in designing a simple scalable video format with low-decoding and transcoding complexity for pervasive computing. The goal is to enable image and video access for mobile applications such as electronic catalog shopping, video conferencing, remote surveillance and video mail using pervasive computing devices.

  1. Efficient Memory Access with NumPy Global Arrays using Local Memory Access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Daily, Jeffrey A.; Berghofer, Dan C.

    This paper discusses the work completed working with Global Arrays of data on distributed multi-computer systems and improving their performance. The tasks completed were done at Pacific Northwest National Laboratory in the Science Undergrad Laboratory Internship program in the summer of 2013 for the Data Intensive Computing Group in the Fundamental and Computational Sciences DIrectorate. This work was done on the Global Arrays Toolkit developed by this group. This toolkit is an interface for programmers to more easily create arrays of data on networks of computers. This is useful because scientific computation is often done on large amounts of datamore » sometimes so large that individual computers cannot hold all of it. This data is held in array form and can best be processed on supercomputers which often consist of a network of individual computers doing their computation in parallel. One major challenge for this sort of programming is that operations on arrays on multiple computers is very complex and an interface is needed so that these arrays seem like they are on a single computer. This is what global arrays does. The work done here is to use more efficient operations on that data that requires less copying of data to be completed. This saves a lot of time because copying data on many different computers is time intensive. The way this challenge was solved is when data to be operated on with binary operations are on the same computer, they are not copied when they are accessed. When they are on separate computers, only one set is copied when accessed. This saves time because of less copying done although more data access operations were done.« less

  2. Physical Medicine and Rehabilitation Resident Use of iPad Mini Mobile Devices.

    PubMed

    Niehaus, William; Boimbo, Sandra; Akuthota, Venu

    2015-05-01

    Previous research on the use of tablet devices in residency programs has been undertaken in radiology and medicine or with standard-sized tablet devices. With new, smaller tablet devices, there is an opportunity to assess their effect on resident behavior. This prospective study attempts to evaluate resident behavior after receiving a smaller tablet device. To evaluate whether smaller tablet computers facilitate residents' daily tasks. Prospective study that administered surveys to evaluate tablet computer use. Residency program. Thirteen physical medicine and rehabilitation residents. Residents were provided 16-GB iPad Minis and surveyed with Redcap to collect usage information at baseline, 3, and 6 months. Survey analysis was conducted using SAS (SAS, Cary, NC) for descriptive analysis. To evaluate multiple areas of resident education, the following tasks were selected: accessing e-mail, logging duty hours, logging procedures, researching clinical information, accessing medical journals, reviewing didactic presentations, and completing evaluations. Then, measurements were taken of: (1) residents' response to how tablet computers made it easier to access the aforementioned tasks; and (2) residents' response to how tablet computers affected the frequency they performed the aforementioned tasks. After being provided tablet computers, our physical medicine and rehabilitation residents reported significantly greater access to e-mail, medical journals, and didactic material. Also, receiving tablet computers was reported to increase the frequency that residents accessed e-mail, researched clinical information, accessed medical journals, reviewed didactic presentations, and completed evaluations. After receiving a tablet computer, residents reported an increase in the use of calendar programs, note-taking programs, PDF readers, online storage programs, and file organization programs. These physical medicine and rehabilitation residents reported tablet computers increased access to e-mail, presentation material, and medical journals. Tablet computers also were reported to increase the frequency residents were able to complete tasks associated with residency training. Copyright © 2015 American Academy of Physical Medicine and Rehabilitation. Published by Elsevier Inc. All rights reserved.

  3. Computer Access and Computer Use for Science Performance of Racial and Linguistic Minority Students

    ERIC Educational Resources Information Center

    Chang, Mido; Kim, Sunha

    2009-01-01

    This study examined the effects of computer access and computer use on the science achievement of elementary school students, with focused attention on the effects for racial and linguistic minority students. The study used the Early Childhood Longitudinal Study (ECLS-K) database and conducted statistical analyses with proper weights and…

  4. Rydberg Atoms in Strong Fields: a Testing Ground for Quantum Chaos.

    NASA Astrophysics Data System (ADS)

    Courtney, Michael

    1995-01-01

    Rydberg atoms in strong static electric and magnetic fields provide experimentally accessible systems for studying the connections between classical chaos and quantum mechanics in the semiclassical limit. This experimental accessibility has motivated the development of reliable quantum mechanical solutions. This thesis uses both experimental and computed quantum spectra to test the central approaches to quantum chaos. These central approaches consist mainly of developing methods to compute the spectra of quantum systems in non -perturbative regimes, correlating statistical descriptions of eigenvalues with the classical behavior of the same Hamiltonian, and the development of semiclassical methods such as periodic-orbit theory. Particular emphasis is given to identifying the spectral signature of recurrences --quantum wave packets which follow classical orbits. The new findings include: the breakdown of the connection between energy-level statistics and classical chaos in odd-parity diamagnetic lithium, the discovery of the signature of very long period orbits in atomic spectra, quantitative evidence for the scattering of recurrences by the alkali -metal core, quantitative description of the behavior of recurrences near bifurcations, and a semiclassical interpretation of the evolution of continuum Stark spectra. (Copies available exclusively from MIT Libraries, Rm. 14-0551, Cambridge, MA 02139-4307. Ph. 617-253-5668; Fax 617-253-1690.).

  5. 64-slice MDCT angiography of upper extremity in assessment of native hemodialysis access.

    PubMed

    Wasinrat, Jitladda; Siriapisith, Thanongchai; Thamtorawat, Somrach; Tongdee, Trongtum

    2011-01-01

    To compare multidetector row computed tomographic (MDCT) angiography with conventional digital subtraction angiography (DSA) in the evaluation of vascular access stenoses in hemodialysis patients. Twenty-one consecutive patients were imaged with MDCT angiography and subsequent DSA. The superficial vein of leg was used as the route for intravenous administration. The vascular stenosis was assessed in not significant (<50% stenosis), moderate stenosis (50%-74% stenosis), severe stenosis (75%-99%), and total occlusion (100%). The accuracy, sensitivity, specificity, positive, and negative predictive values were calculated for significant vascular stenosis using DSA as the standard reference. The sensitivity and specificity of MDCT angiography for the detection of significant hemodialysis vascular access were 100% (95% CI, 89.3%-100%) and 94.8% (95% CI, 89.1%-97.6%), respectively. The positive and negative predictive values were 84.2% (95% CI, 68.1%-93.4%) and 100% (95% CI, 95.8%-100%), respectively. The accuracy of MDCT angiography for detection of significant stenoses was 95.9% (95% CI, 91.4%-97.0%). MDCT angiography provides excellent correlation in vascular stenosis as compared with DSA in hemodialysis access. Complete assessment of entire vascular segments could be performing with MDCT angiography in planning before endovascular intervention or surgical correction.

  6. Exploring Situational Factors Shaping Access in a Laptop Program for Socially Disadvantaged Children in India: A Case Study

    ERIC Educational Resources Information Center

    Padmanabhan, Poornima; Wise, Alyssa Friend

    2012-01-01

    Low-cost laptop programs attempt to address gaps in access to computers in developing countries. However, the translation of computing access from intention to actuality is mediated by many situational factors. This research presents a case study of how access to a set of laptops donated to a school for socially disadvantaged children in India was…

  7. The Internet in Swaziland: Services under Transformation.

    ERIC Educational Resources Information Center

    Muswazi, Paiki

    2000-01-01

    Reviews the history of libraries in Swaziland and discusses the introduction of computers in 1974 and Internet access in 1996. Topics include censorship laws that have restricted access; e-commerce; e-mail; obstacles, including limited user access in libraries and lack of computer literacy; and suggestions for extending Internet information…

  8. Computer access and Internet use by urban and suburban emergency department customers.

    PubMed

    Bond, Michael C; Klemt, Ryan; Merlis, Jennifer; Kopinski, Judith E; Hirshon, Jon Mark

    2012-07-01

    Patients are increasingly using the Internet (43% in 2000 vs. 70% in 2006) to obtain health information, but is there a difference in the ability of urban and suburban emergency department (ED) customers to access the Internet? To assess computer and Internet resources available to and used by people waiting to be seen in an urban ED and a suburban ED. Individuals waiting in the ED were asked survey questions covering demographics, type of insurance, access to a primary care provider, reason for their ED visit, computer access, and ability to access the Internet for health-related matters. There were 304 individuals who participated, 185 in the urban ED and 119 in the suburban ED. Urban subjects were more likely than suburban to be women, black, have low household income, and were less likely to have insurance. The groups were similar in regard to average age, education, and having a primary care physician. Suburban respondents were more likely to own a computer, but the majority in both groups had access to computers and the Internet. Their frequency of accessing the Internet was similar, as were their reasons for using it. Individuals from the urban ED were less willing to schedule appointments via the Internet but more willing to contact their health care provider via e-mail. The groups were equally willing to use the Internet to fill prescriptions and view laboratory results. Urban and suburban ED customers had similar access to the Internet. Both groups were willing to use the Internet to access personal health information. Copyright © 2012 Elsevier Inc. All rights reserved.

  9. Adolescents’ Use of Indoor Tanning: A Large-Scale Evaluation of Psychosocial, Environmental, and Policy-Level Correlates

    PubMed Central

    Woodruff, Susan I.; Slymen, Donald J.; Sallis, James F.; Forster, Jean L.; Clapp, Elizabeth J.; Hoerster, Katherine D.; Pichon, Latrice C.; Weeks, John R.; Belch, George E.; Weinstock, Martin A.; Gilmer, Todd

    2011-01-01

    Objectives. We evaluated psychosocial, built-environmental, and policy-related correlates of adolescents’ indoor tanning use. Methods. We developed 5 discrete data sets in the 100 most populous US cities, based on interviews of 6125 adolescents (aged 14–17 years) and their parents, analysis of state indoor tanning laws, interviews with enforcement experts, computed density of tanning facilities, and evaluations of these 3399 facilities’ practices regarding access by youths. After univariate analyses, we constructed multilevel models with generalized linear mixed models (GLMMs). Results. In the past year, 17.1% of girls and 3.2% of boys had used indoor tanning. The GLMMs indicated that several psychosocial or demographic variables significantly predicted use, including being female, older, and White; having a larger allowance and a parent who used indoor tanning and allowed their adolescent to use it; and holding certain beliefs about indoor tanning's consequences. Living within 2 miles of a tanning facility also was a significant predictor. Residing in a state with youth-access legislation was not significantly associated with use. Conclusions. Current laws appear ineffective in reducing indoor tanning; bans likely are needed. Parents have an important role in prevention efforts. PMID:21421947

  10. Rapid assessment of oxidation via middle-down LCMS correlates with methionine side-chain solvent-accessible surface area for 121 clinical stage monoclonal antibodies.

    PubMed

    Yang, Rong; Jain, Tushar; Lynaugh, Heather; Nobrega, R Paul; Lu, Xiaojun; Boland, Todd; Burnina, Irina; Sun, Tingwan; Caffry, Isabelle; Brown, Michael; Zhi, Xiaoyong; Lilov, Asparouh; Xu, Yingda

    Susceptibility of methionine to oxidation is an important concern for chemical stability during the development of a monoclonal antibody (mAb) therapeutic. To minimize downstream risks, leading candidates are usually screened under forced oxidation conditions to identify oxidation-labile molecules. Here we report results of forced oxidation on a large set of in-house expressed and purified mAbs with variable region sequences corresponding to 121 clinical stage mAbs. These mAb samples were treated with 0.1% H 2 O 2 for 24 hours before enzymatic cleavage below the hinge, followed by reduction of inter-chain disulfide bonds for the detection of the light chain, Fab portion of heavy chain (Fd) and Fc by liquid chromatography-mass spectrometry. This high-throughput, middle-down approach allows detection of oxidation site(s) at the resolution of 3 distinct segments. The experimental oxidation data correlates well with theoretical predictions based on the solvent-accessible surface area of the methionine side-chains within these segments. These results validate the use of upstream computational modeling to predict mAb oxidation susceptibility at the sequence level.

  11. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  12. GPUs: An Emerging Platform for General-Purpose Computation

    DTIC Science & Technology

    2007-08-01

    programming; real-time cinematic quality graphics Peak stream (26) License required (limited time no- cost evaluation program) Commercially...folding.stanford.edu (accessed 30 March 2007). 2. Fan, Z.; Qiu, F.; Kaufman, A.; Yoakum-Stover, S. GPU Cluster for High Performance Computing. ACM/IEEE...accessed 30 March 2007). 8. Goodnight, N.; Wang, R.; Humphreys, G. Computation on Programmable Graphics Hardware. IEEE Computer Graphics and

  13. Computer and Internet use among Undergraduate Medical Students in Iran

    PubMed Central

    Ayatollahi, Ali; Ayatollahi, Jamshid; Ayatollahi, Fatemeh; Ayatollahi, Reza; Shahcheraghi, Seyed Hossein

    2014-01-01

    Objective: Although computer technologies are now widely used in medicine, little is known about its use among medical students in Iran. The aim of this study was to determine the competence and access to computer and internet among the medical students. Methods: In this descriptive study, medical students of Shahid Sadoughi University of Medical Science, Yazd, Iran from the fifth years were asked to answer a questionnaire during a time-tabled lecture slot. The chi-square test was used to compare the frequency of computer and internet use between the two genders, and the level of statistical significance for all test was set at 0.05. Results: All the students have a personal computer and internet access. There were no statistically significant differences between men and women for the computer and internet access, use wireless device to access internet, having laptop and e-mail address and the difficulties encountered using internet. The main reason for less utilization of internet was slow speed of data transfer. Conclusions: Because of the wide range of computer skills and internet information among medical students in our institution, a single computer and internet course for all students would not be useful nor would it be accepted. PMID:25225525

  14. Templet Web: the use of volunteer computing approach in PaaS-style cloud

    NASA Astrophysics Data System (ADS)

    Vostokin, Sergei; Artamonov, Yuriy; Tsarev, Daniil

    2018-03-01

    This article presents the Templet Web cloud service. The service is designed for high-performance scientific computing automation. The use of high-performance technology is specifically required by new fields of computational science such as data mining, artificial intelligence, machine learning, and others. Cloud technologies provide a significant cost reduction for high-performance scientific applications. The main objectives to achieve this cost reduction in the Templet Web service design are: (a) the implementation of "on-demand" access; (b) source code deployment management; (c) high-performance computing programs development automation. The distinctive feature of the service is the approach mainly used in the field of volunteer computing, when a person who has access to a computer system delegates his access rights to the requesting user. We developed an access procedure, algorithms, and software for utilization of free computational resources of the academic cluster system in line with the methods of volunteer computing. The Templet Web service has been in operation for five years. It has been successfully used for conducting laboratory workshops and solving research problems, some of which are considered in this article. The article also provides an overview of research directions related to service development.

  15. Paging memory from random access memory to backing storage in a parallel computer

    DOEpatents

    Archer, Charles J; Blocksome, Michael A; Inglett, Todd A; Ratterman, Joseph D; Smith, Brian E

    2013-05-21

    Paging memory from random access memory (`RAM`) to backing storage in a parallel computer that includes a plurality of compute nodes, including: executing a data processing application on a virtual machine operating system in a virtual machine on a first compute node; providing, by a second compute node, backing storage for the contents of RAM on the first compute node; and swapping, by the virtual machine operating system in the virtual machine on the first compute node, a page of memory from RAM on the first compute node to the backing storage on the second compute node.

  16. Blood Flow in Idealized Vascular Access for Hemodialysis: A Review of Computational Studies.

    PubMed

    Ene-Iordache, Bogdan; Remuzzi, Andrea

    2017-09-01

    Although our understanding of the failure mechanism of vascular access for hemodialysis has increased substantially, this knowledge has not translated into successful therapies. Despite advances in technology, it is recognized that vascular access is difficult to maintain, due to complications such as intimal hyperplasia. Computational studies have been used to estimate hemodynamic changes induced by vascular access creation. Due to the heterogeneity of patient-specific geometries, and difficulties with obtaining reliable models of access vessels, idealized models were often employed. In this review we analyze the knowledge gained with the use of computational such simplified models. A review of the literature was conducted, considering studies employing a computational fluid dynamics approach to gain insights into the flow field phenotype that develops in idealized models of vascular access. Several important discoveries have originated from idealized model studies, including the detrimental role of disturbed flow and turbulent flow, and the beneficial role of spiral flow in intimal hyperplasia. The general flow phenotype was consistent among studies, but findings were not treated homogeneously since they paralleled achievements in cardiovascular biomechanics which spanned over the last two decades. Computational studies in idealized models are important for studying local blood flow features and evaluating new concepts that may improve the patency of vascular access for hemodialysis. For future studies we strongly recommend numerical modelling targeted at accurately characterizing turbulent flows and multidirectional wall shear disturbances.

  17. 48 CFR 209.505-4 - Obtaining access to proprietary information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) For contractors accessing third party proprietary technical data or computer software, non-disclosure... limited rights technical data, commercial technical data, or restricted rights computer software. The...

  18. Policy Issues in Computer Networks: Multi-Access Information Systems.

    ERIC Educational Resources Information Center

    Lyons, Patrice A.

    As computer databases become more publicly accessible through public networks, there is a growing need to provide effective protection for proprietary information. Without adequate assurances that their works will be protected, authors and other copyright owners may be reluctant to allow the full text of their works to be accessed through computer…

  19. The Cybermobile: A Gateway for Public Access to Network-Based Information.

    ERIC Educational Resources Information Center

    Drumm, John E.; Groom, Frank M.

    1997-01-01

    Though the bookmobile has fallen on hard times, the cybermobile, a technology platform combining personal computing, CD-ROMs, fiber network, and wireless access to the Internet, may be the next step in mobile library services. Discusses standard vehicle, computer hardware, software, wireless access, and alliances with users, vendors, and community…

  20. An evaluation of three methods of saying "no" to avoid an escalating response class hierarchy.

    PubMed

    Mace, F Charles; Pratt, Jamie L; Prager, Kevin L; Pritchard, Duncan

    2011-01-01

    We evaluated the effects of three different methods of denying access to requested high-preference activities on escalating problem behavior. Functional analysis and response class hierarchy (RCH) assessment results indicated that 4 topographies of problem behaviors displayed by a 13-year-old boy with high-functioning autism constituted an RCH maintained by positive (tangible) reinforcement. Identification of the RCH comprised the baseline phase, during which computer access was denied by saying "no" and providing an explanation for the restriction. Two alternative methods of saying "no" were then evaluated. These methods included (a) denying computer access while providing an opportunity to engage in an alternative preferred activity and (b) denying immediate computer access by arranging a contingency between completion of a low-preference task and subsequent computer access. Results indicated that a hierarchy of problem behavior may be identified in the context of denying access to a preferred activity and that it may be possible to prevent occurrences of escalating problem behavior by either presenting alternative options or arranging contingencies when saying "no" to a child's requests.

  1. Asynchronous brain-computer interface for cognitive assessment in people with cerebral palsy

    NASA Astrophysics Data System (ADS)

    Alcaide-Aguirre, R. E.; Warschausky, S. A.; Brown, D.; Aref, A.; Huggins, J. E.

    2017-12-01

    Objective. Typically, clinical measures of cognition require motor or speech responses. Thus, a significant percentage of people with disabilities are not able to complete standardized assessments. This situation could be resolved by employing a more accessible test administration method, such as a brain-computer interface (BCI). A BCI can circumvent motor and speech requirements by translating brain activity to identify a subject’s response. By eliminating the need for motor or speech input, one could use a BCI to assess an individual who previously did not have access to clinical tests. Approach. We developed an asynchronous, event-related potential BCI-facilitated administration procedure for the peabody picture vocabulary test (PPVT-IV). We then tested our system in typically developing individuals (N  =  11), as well as people with cerebral palsy (N  =  19) to compare results to the standardized PPVT-IV format and administration. Main results. Standard scores on the BCI-facilitated PPVT-IV, and the standard PPVT-IV were highly correlated (r  =  0.95, p  <  0.001), with a mean difference of 2.0  ±  6.4 points, which is within the standard error of the PPVT-IV. Significance. Thus, our BCI-facilitated PPVT-IV provided comparable results to the standard PPVT-IV, suggesting that populations for whom standardized cognitive tests are not accessible could benefit from our BCI-facilitated approach.

  2. The Influence of Mexican Hat Recurrent Connectivity on Noise Correlations and Stimulus Encoding

    PubMed Central

    Meyer, Robert; Ladenbauer, Josef; Obermayer, Klaus

    2017-01-01

    Noise correlations are a common feature of neural responses and have been observed in many cortical areas across different species. These correlations can influence information processing by enhancing or diminishing the quality of the neural code, but the origin of these correlations is still a matter of controversy. In this computational study we explore the hypothesis that noise correlations are the result of local recurrent excitatory and inhibitory connections. We simulated two-dimensional networks of adaptive spiking neurons with local connection patterns following Gaussian kernels. Noise correlations decay with distance between neurons but are only observed if the range of excitatory connections is smaller than the range of inhibitory connections (“Mexican hat” connectivity) and if the connection strengths are sufficiently strong. These correlations arise from a moving blob-like structure of evoked activity, which is absent if inhibitory interactions have a smaller range (“inverse Mexican hat” connectivity). Spatially structured external inputs fixate these blobs to certain locations and thus effectively reduce noise correlations. We further investigated the influence of these network configurations on stimulus encoding. On the one hand, the observed correlations diminish information about a stimulus encoded by a network. On the other hand, correlated activity allows for more precise encoding of stimulus information if the decoder has only access to a limited amount of neurons. PMID:28539881

  3. A fuzzy measure approach to motion frame analysis for scene detection. M.S. Thesis - Houston Univ.

    NASA Technical Reports Server (NTRS)

    Leigh, Albert B.; Pal, Sankar K.

    1992-01-01

    This paper addresses a solution to the problem of scene estimation of motion video data in the fuzzy set theoretic framework. Using fuzzy image feature extractors, a new algorithm is developed to compute the change of information in each of two successive frames to classify scenes. This classification process of raw input visual data can be used to establish structure for correlation. The algorithm attempts to fulfill the need for nonlinear, frame-accurate access to video data for applications such as video editing and visual document archival/retrieval systems in multimedia environments.

  4. People with Profound and Multiple Intellectual Disabilities Using Symbols to Control a Computer: Exploration of User Engagement and Supporter Facilitation

    ERIC Educational Resources Information Center

    Bunning, Karen; Kwiatkowska, Gosia; Weldin, Nick

    2012-01-01

    Computer usage features in everyday life for the majority of people in developed countries. Access is a problem for many users with intellectual disability. Action-research was conducted to develop and explore the potential of specially adapted, computer readable symbols for choosing and accessing media on a computer. Five people with profound and…

  5. Photonic multipartite entanglement conversion using nonlocal operations

    NASA Astrophysics Data System (ADS)

    Tashima, T.; Tame, M. S.; Özdemir, Ş. K.; Nori, F.; Koashi, M.; Weinfurter, H.

    2016-11-01

    We propose a simple setup for the conversion of multipartite entangled states in a quantum network with restricted access. The scheme uses nonlocal operations to enable the preparation of states that are inequivalent under local operations and classical communication, but most importantly does not require full access to the states. It is based on a flexible linear optical conversion gate that uses photons, which are ideally suited for distributed quantum computation and quantum communication in extended networks. In order to show the basic working principles of the gate, we focus on converting a four-qubit entangled cluster state to other locally inequivalent four-qubit states, such as the Greenberger-Horne-Zeilinger and symmetric Dicke states. We also show how the gate can be incorporated into extended graph state networks and can be used to generate variable entanglement and quantum correlations without entanglement but nonvanishing quantum discord.

  6. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    PubMed

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  7. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    PubMed

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  8. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon.

    PubMed

    de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources.

  9. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon

    PubMed Central

    de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources. PMID:27035577

  10. Access to computer-based leisure for individuals with profound disabilities.

    PubMed

    Bache, Jane; Derwent, Gary

    2008-01-01

    Advances in computer technology and the Internet have meant that more and more occupations can be made available to disabled individuals, including occupations generally considered to be leisure. However, computers and the Internet also provide barriers to access for these individuals. This article discusses some of these barriers, solutions to them and highlights the complexities involved in the provision of a computer-based assistive technology solution for access to leisure for a profoundly disabled young lady. It also points out the need for the input of a highly skilled, multi-disciplinary team in the assessment for and provision of such a system.

  11. Mobile Recommender Apps with Privacy Management for Accessible and Usable Technologies.

    PubMed

    Hersh, Marion; Leporini, Barbara

    2017-01-01

    The paper presents the preliminary results of an ongoing survey of the use of computers and mobile devices, interest in recommender apps and knowledge and concerns about privacy issues amongst English and Italian speaking disabled people. Participants were found to be regular users of computers and mobile devices for a range of applications. They were interested in recommender apps for household items, computer software and apps that met their accessibility and other requirements. They showed greater concerns about controlling access to personal data of different types than this data being retained by the computer or mobile device. They were also willing to make tradeoffs to improve device performance.

  12. Planning health education: Internet and computer resources in southwestern Nigeria. 2000-2001.

    PubMed

    Oyadoke, Adebola A; Salami, Kabiru K; Brieger, William R

    The use of the Internet as a health education tool and as a resource in health education planning is widely accepted as the norm in industrialized countries. Unfortunately, access to computers and the Internet is quite limited in developing countries. Not all licensed service providers operate, many users are actually foreign nationals, telephone connections are unreliable, and electricity supplies are intermittent. In this context, computer, e-mail, Internet, and CD-Rom use by health and health education program officers in five states in southwestern Nigeria were assessed to document their present access and use. Eight of the 30 organizations visited were government health ministry departments, while the remainder were non-governmental organizations (NGOs). Six NGOs and four State Ministry of Health (MOH) departments had no computers, but nearly two-thirds of both types of agency had e-mail, less than one-third had Web browsing facilities, and six had CD-Roms, all of whom were NGOs. Only 25 of the 48 individual respondents had computer use skills. Narrative responses from individual employees showed a qualitative difference between computer and Internet access and use and type of agency. NGO staff in organizations with computers indicated having relatively free access to a computer and the Internet and used these for both program planning and administrative purposes. In government offices it appeared that computers were more likely to be located in administrative or statistics offices and used for management tasks like salaries and correspondence, limiting the access of individual health staff. These two different organizational cultures must be considered when plans are made for increasing computer availability and skills for health education planning.

  13. Bridging the Digital Divide in Diabetes: Family Support and Implications for Health Literacy

    PubMed Central

    Mayberry, Lindsay S.; Kripalani, Sunil; Rothman, Russell L.

    2011-01-01

    Abstract Background Patient web portals (PWPs) offer patients remote access to their medical record and communication with providers. Adults with health literacy limitations are less likely to access and use health information technology (HIT), including PWPs. In diabetes, PWP use has been associated with patient satisfaction, patient–provider communication, and glycemic control. Methods Using mixed methods, we explored the relationships between health literacy, numeracy, and computer literacy and the usage of a PWP and HIT. Participants (N=61 adults with type 2 diabetes) attended focus groups and completed surveys, including measures of health literacy, numeracy, and computer anxiety (an indicator of computer literacy) and frequency of PWP and HIT use. Results Computer literacy was positively associated with health literacy (r=0.41, P<0.001) and numeracy (r=0.35, P<0.001), but health literacy was not associated with numeracy. Participants with limited health literacy (23%), numeracy (43%), or computer literacy (25%) were no less likely to access PWPs or HIT, but lower health literacy was associated with less frequent use of a computer to research diabetes medications or treatments. In focus groups, participants spontaneously commented on family support when accessing and using PWPs or HIT for diabetes management. Conclusions Participants reported family members facilitated access and usage of HIT, taught them usage skills, and acted as online delegates. Participant statements suggest family members may bridge the HIT “digital divide” in diabetes by helping adults access a PWP or HIT for diabetes management. PMID:21718098

  14. Alternative Computer Access for Young Handicapped Children: A Systematic Selection Procedure.

    ERIC Educational Resources Information Center

    Morris, Karen J.

    The paper describes the type of computer access products appropriate for use by handicapped children and presents a systematic procedure for selection of such input and output devices. Modification of computer input is accomplished by three strategies: modifying the keyboard, adding alternative keyboards, and attaching switches to the keyboard.…

  15. Public Computer Assisted Learning Facilities for Children with Visual Impairment: Universal Design for Inclusive Learning

    ERIC Educational Resources Information Center

    Siu, Kin Wai Michael; Lam, Mei Seung

    2012-01-01

    Although computer assisted learning (CAL) is becoming increasingly popular, people with visual impairment face greater difficulty in accessing computer-assisted learning facilities. This is primarily because most of the current CAL facilities are not visually impaired friendly. People with visual impairment also do not normally have access to…

  16. Do Your School Policies Provide Equal Access to Computers? Are You Sure?

    ERIC Educational Resources Information Center

    DuBois, Phyllis A.; Schubert, Jane G.

    1986-01-01

    Outlines how school policies can unintentionally perpetuate gender discrimination in student computer use and access. Describes four areas of administrative policies that can cause inequities and provides ways for administrators to counteract these policies. Includes discussion of a program to balance computer use, and an abstract of an article…

  17. The "Magic" of Wireless Access in the Library

    ERIC Educational Resources Information Center

    Balas, Janet L.

    2006-01-01

    It seems that the demand for public access computers grows exponentially every time a library network is expanded, making it impossible to ever have enough computers available for patrons. One solution that many libraries are implementing to ease the demand for public computer use is to offer wireless technology that allows patrons to bring in…

  18. The Evolution of Teachers' Instructional Beliefs and Practices in High-Access-to-Technology Classrooms.

    ERIC Educational Resources Information Center

    Dwyer, David C.; And Others

    Beginning in 1985, Apple Computer, Inc., and several school districts began a collaboration to examine the impact of computer saturation on instruction and learning in K-12 classrooms. The initial guiding question was simply put: What happens when teachers and students have constant access to technology? To provide "constant access,"…

  19. Effects of Computer Assisted Learning Instructions on Reading Achievement among Middle School English Language Learners

    ERIC Educational Resources Information Center

    Bayley-Hamlet, Simone O.

    2017-01-01

    The purpose of this study was to examine the effect of Imagine Learning, a computer assisted language learning (CALL) program, on addressing reading achievement for English language learners (ELLs). This is a measurement used in the Accessing Comprehension and Communication in English State-to-State (ACCESS for ELLs or ACCESS) reading scale…

  20. Impact of the Digital Divide on Computer Use and Internet Access on the Poor in Nigeria

    ERIC Educational Resources Information Center

    Tayo, Omolara; Thompson, Randall; Thompson, Elizabeth

    2016-01-01

    We recruited 20 community members in Ido Local Government Area, Oyo state and Yewa Local Government Area, Ogun state in Nigeria to explore experiences and perceptions of Internet access and computer use. Face-to-face interviews were conducted using open-ended questions to collect qualitative data regarding accessibility of information and…

  1. Providing the Public with Online Access to Large Bibliographic Data Bases.

    ERIC Educational Resources Information Center

    Firschein, Oscar; Summit, Roger K.

    DIALOG, an interactive, computer-based information retrieval language, consists of a series of computer programs designed to make use of direct access memory devices in order to provide the user with a rapid means of identifying records within a specific memory bank. Using the system, a library user can be provided access to sixteen distinct and…

  2. Accessibility of e-Learning and Computer and Information Technologies for Students with Visual Impairments in Postsecondary Education

    ERIC Educational Resources Information Center

    Fichten, Catherine S.; Asuncion, Jennison V.; Barile, Maria; Ferraro, Vittoria; Wolforth, Joan

    2009-01-01

    This article presents the results of two studies on the accessibility of e-learning materials and other information and computer and communication technologies for 143 Canadian college and university students with low vision and 29 who were blind. It offers recommendations for enhancing access, creating new learning opportunities, and eliminating…

  3. Computational modeling in cognitive science: a manifesto for change.

    PubMed

    Addyman, Caspar; French, Robert M

    2012-07-01

    Computational modeling has long been one of the traditional pillars of cognitive science. Unfortunately, the computer models of cognition being developed today have not kept up with the enormous changes that have taken place in computer technology and, especially, in human-computer interfaces.  For all intents and purposes, modeling is still done today as it was 25, or even 35, years ago. Everyone still programs in his or her own favorite programming language, source code is rarely made available, accessibility of models to non-programming researchers is essentially non-existent, and even for other modelers, the profusion of source code in a multitude of programming languages, written without programming guidelines, makes it almost impossible to access, check, explore, re-use, or continue to develop. It is high time to change this situation, especially since the tools are now readily available to do so. We propose that the modeling community adopt three simple guidelines that would ensure that computational models would be accessible to the broad range of researchers in cognitive science. We further emphasize the pivotal role that journal editors must play in making computational models accessible to readers of their journals. Copyright © 2012 Cognitive Science Society, Inc.

  4. Statistical modeling of the Internet traffic dynamics: To which extent do we need long-term correlations?

    NASA Astrophysics Data System (ADS)

    Markelov, Oleg; Nguyen Duc, Viet; Bogachev, Mikhail

    2017-11-01

    Recently we have suggested a universal superstatistical model of user access patterns and aggregated network traffic. The model takes into account the irregular character of end user access patterns on the web via the non-exponential distributions of the local access rates, but neglects the long-term correlations between these rates. While the model is accurate for quasi-stationary traffic records, its performance under highly variable and especially non-stationary access dynamics remains questionable. In this paper, using an example of the traffic patterns from a highly loaded network cluster hosting the website of the 1998 FIFA World Cup, we suggest a generalization of the previously suggested superstatistical model by introducing long-term correlations between access rates. Using queueing system simulations, we show explicitly that this generalization is essential for modeling network nodes with highly non-stationary access patterns, where neglecting long-term correlations leads to the underestimation of the empirical average sojourn time by several decades under high throughput utilization.

  5. Access to, interest in and attitude toward e-learning for continuous education among Malaysian nurses.

    PubMed

    Chong, Mei Chan; Francis, Karen; Cooper, Simon; Abdullah, Khatijah Lim; Hmwe, Nant Thin Thin; Sohod, Salina

    2016-01-01

    Continuous nursing education (CNE) courses delivered through e-learning is believed to be an effective mode of learning for nurses. Implementation of e-learning modules requires pre-assessment of infrastructure and learners' characteristics. Understanding the learners' needs and their perspectives would facilitate effective e-learning delivery by addressing the underlying issues and providing necessary support to learners. The aim of this study was to examine access to computer and Internet facilities, interest in and preferences regarding e-learning, and attitudes toward e-learning among nurses in Peninsular Malaysia. The study utilized a cross-sectional descriptive survey. Government hospitals and community clinics in four main regions of Peninsular Malaysia. A total of 300 registered nurses. Data were collected using questionnaires, which consisted of demographic and background items and questions on access to computer and Internet facilities, interest and preferences in e-learning, and attitudes toward e-learning. Descriptive analysis and a chi-squared test were used to identify associations between variables. Most Malaysian nurses had access to a personal or home computer (85.3%, n=256) and computer access at work (85.3%, n=256). The majority had Internet access at home (84%, n=252) and at work (71.8%, n=215); however, average hours of weekly computer use were low. Most nurses (83%, n=249) did not have an e-learning experience but were interested in e-learning activities. Most nurses displayed positive attitudes toward e-learning. Average weekly computer use and interest in e-learning were positively associated with attitudes toward e-learning. Study findings suggest that organizational support is needed to promote accessibility of information and communications technology (ICT) facilities for Malaysian nurses to motivate their involvement in e-learning. Copyright © 2015. Published by Elsevier Ltd.

  6. CAD/CAE Integration Enhanced by New CAD Services Standard

    NASA Technical Reports Server (NTRS)

    Claus, Russell W.

    2002-01-01

    A Government-industry team led by the NASA Glenn Research Center has developed a computer interface standard for accessing data from computer-aided design (CAD) systems. The Object Management Group, an international computer standards organization, has adopted this CAD services standard. The new standard allows software (e.g., computer-aided engineering (CAE) and computer-aided manufacturing software to access multiple CAD systems through one programming interface. The interface is built on top of a distributed computing system called the Common Object Request Broker Architecture (CORBA). CORBA allows the CAD services software to operate in a distributed, heterogeneous computing environment.

  7. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  8. Computer and internet use by persons after traumatic spinal cord injury.

    PubMed

    Goodman, Naomi; Jette, Alan M; Houlihan, Bethlyn; Williams, Steve

    2008-08-01

    To determine whether computer and internet use by persons post spinal cord injury (SCI) is sufficiently prevalent and broad-based to consider using this technology as a long-term treatment modality for patients who have sustained SCI. A multicenter cohort study. Twenty-six past and current U.S. regional Model Spinal Cord Injury Systems. Patients with traumatic SCI (N=2926) with follow-up interviews between 2004 and 2006, conducted at 1 or 5 years postinjury. Not applicable. Results revealed that 69.2% of participants with SCI used a computer; 94.2% of computer users accessed the internet. Among computer users, 19.1% used assistive devices for computer access. Of the internet users, 68.6% went online 5 to 7 days a week. The most frequent use for internet was e-mail (90.5%) and shopping sites (65.8%), followed by health sites (61.1%). We found no statistically significant difference in computer use by sex or level of neurologic injury, and no difference in internet use by level of neurologic injury. Computer and internet access differed significantly by age, with use decreasing as age group increased. The highest computer and internet access rates were seen among participants injured before the age of 18. Computer and internet use varied by race: 76% of white compared with 46% of black subjects were computer users (P<.001), and 95.3% of white respondents who used computers used the internet, compared with 87.6% of black respondents (P<.001). Internet use increased with education level (P<.001): eighty-six percent of participants who did not graduate from high school or receive a degree used the internet, while over 97% of those with a college or associate's degree did. While the internet holds considerable potential as a long-term treatment modality after SCI, limited access to the internet by those who are black, those injured after age 18, and those with less education does reduce its usefulness in the short term for these subgroups.

  9. The efficacy of World Wide Web-mediated microcomputer-based laboratory activities in the high school physics classroom

    NASA Astrophysics Data System (ADS)

    Slykhuis, David A.

    This research project examined the efficacy of an online microcomputer-based laboratory based (MBL) physics unit. One hundred and fifty physics students from five high schools in North Carolina were divided into online and classroom groups. The classroom group completed the MBL unit in small groups with assistance from their teachers. The online groups completed the MBL unit in small groups using a website designed for this project for guidance. Pre- and post-unit content specific tests and surveys were given. Statistical analysis of the content tests showed significant development of conceptual understanding by the online group over the course of the unit. There was not a significant difference between the classroom and online group with relation to the amount of conceptual understanding developed. Correlations with post-test achievement showed that pre-test scores and math background were the most significant correlates with success. Computer related variables, such as computer comfort and online access, were only mildly correlated with the online group. Students' views about the nature of physics were not well developed prior to the unit and did not significantly change over the course of the unit. Examination of the students' physics conceptions after instruction revealed common alternative conceptions such as confusing position and velocity variables and incorrect interpretations of graphical features such as slope.

  10. Metabolism and development – integration of micro computed tomography data and metabolite profiling reveals metabolic reprogramming from floral initiation to silique development

    PubMed Central

    Bellaire, Anke; Ischebeck, Till; Staedler, Yannick; Weinhaeuser, Isabell; Mair, Andrea; Parameswaran, Sriram; Ito, Toshiro; Schönenberger, Jürg; Weckwerth, Wolfram

    2014-01-01

    The interrelationship of morphogenesis and metabolism is a poorly studied phenomenon. The main paradigm is that development is controlled by gene expression. The aim of the present study was to correlate metabolism to early and late stages of flower and fruit development in order to provide the basis for the identification of metabolic adjustment and limitations. A highly detailed picture of morphogenesis is achieved using nondestructive micro computed tomography. This technique was used to quantify morphometric parameters of early and late flower development in an Arabidopsis thaliana mutant with synchronized flower initiation. The synchronized flower phenotype made it possible to sample enough early floral tissue otherwise not accessible for metabolomic analysis. The integration of metabolomic and morphometric data enabled the correlation of metabolic signatures with the process of flower morphogenesis. These signatures changed significantly during development, indicating a pronounced metabolic reprogramming in the tissue. Distinct sets of metabolites involved in these processes were identified and were linked to the findings of previous gene expression studies of flower development. High correlations with basic leucine zipper (bZIP) transcription factors and nitrogen metabolism genes involved in the control of metabolic carbon : nitrogen partitioning were revealed. Based on these observations a model for metabolic adjustment during flower development is proposed. PMID:24350948

  11. Matching and correlation computations in stereoscopic depth perception.

    PubMed

    Doi, Takahiro; Tanabe, Seiji; Fujita, Ichiro

    2011-03-02

    A fundamental task of the visual system is to infer depth by using binocular disparity. To encode binocular disparity, the visual cortex performs two distinct computations: one detects matched patterns in paired images (matching computation); the other constructs the cross-correlation between the images (correlation computation). How the two computations are used in stereoscopic perception is unclear. We dissociated their contributions in near/far discrimination by varying the magnitude of the disparity across separate sessions. For small disparity (0.03°), subjects performed at chance level to a binocularly opposite-contrast (anti-correlated) random-dot stereogram (RDS) but improved their performance with the proportion of contrast-matched (correlated) dots. For large disparity (0.48°), the direction of perceived depth reversed with an anti-correlated RDS relative to that for a correlated one. Neither reversed nor normal depth was perceived when anti-correlation was applied to half of the dots. We explain the decision process as a weighted average of the two computations, with the relative weight of the correlation computation increasing with the disparity magnitude. We conclude that matching computation dominates fine depth perception, while both computations contribute to coarser depth perception. Thus, stereoscopic depth perception recruits different computations depending on the disparity magnitude.

  12. Spatial versus sequential correlations for random access coding

    NASA Astrophysics Data System (ADS)

    Tavakoli, Armin; Marques, Breno; Pawłowski, Marcin; Bourennane, Mohamed

    2016-03-01

    Random access codes are important for a wide range of applications in quantum information. However, their implementation with quantum theory can be made in two very different ways: (i) by distributing data with strong spatial correlations violating a Bell inequality or (ii) using quantum communication channels to create stronger-than-classical sequential correlations between state preparation and measurement outcome. Here we study this duality of the quantum realization. We present a family of Bell inequalities tailored to the task at hand and study their quantum violations. Remarkably, we show that the use of spatial and sequential quantum correlations imposes different limitations on the performance of quantum random access codes: Sequential correlations can outperform spatial correlations. We discuss the physics behind the observed discrepancy between spatial and sequential quantum correlations.

  13. Protein Solvent-Accessibility Prediction by a Stacked Deep Bidirectional Recurrent Neural Network.

    PubMed

    Zhang, Buzhong; Li, Linqing; Lü, Qiang

    2018-05-25

    Residue solvent accessibility is closely related to the spatial arrangement and packing of residues. Predicting the solvent accessibility of a protein is an important step to understand its structure and function. In this work, we present a deep learning method to predict residue solvent accessibility, which is based on a stacked deep bidirectional recurrent neural network applied to sequence profiles. To capture more long-range sequence information, a merging operator was proposed when bidirectional information from hidden nodes was merged for outputs. Three types of merging operators were used in our improved model, with a long short-term memory network performing as a hidden computing node. The trained database was constructed from 7361 proteins extracted from the PISCES server using a cut-off of 25% sequence identity. Sequence-derived features including position-specific scoring matrix, physical properties, physicochemical characteristics, conservation score and protein coding were used to represent a residue. Using this method, predictive values of continuous relative solvent-accessible area were obtained, and then, these values were transformed into binary states with predefined thresholds. Our experimental results showed that our deep learning method improved prediction quality relative to current methods, with mean absolute error and Pearson's correlation coefficient values of 8.8% and 74.8%, respectively, on the CB502 dataset and 8.2% and 78%, respectively, on the Manesh215 dataset.

  14. Quantum free energy landscapes from ab initio path integral metadynamics: Double proton transfer in the formic acid dimer is concerted but not correlated.

    PubMed

    Ivanov, Sergei D; Grant, Ian M; Marx, Dominik

    2015-09-28

    With the goal of computing quantum free energy landscapes of reactive (bio)chemical systems in multi-dimensional space, we combine the metadynamics technique for sampling potential energy surfaces with the ab initio path integral approach to treating nuclear quantum motion. This unified method is applied to the double proton transfer process in the formic acid dimer (FAD), in order to study the nuclear quantum effects at finite temperatures without imposing a one-dimensional reaction coordinate or reducing the dimensionality. Importantly, the ab initio path integral metadynamics technique allows one to treat the hydrogen bonds and concomitant proton transfers in FAD strictly independently and thus provides direct access to the much discussed issue of whether the double proton transfer proceeds via a stepwise or concerted mechanism. The quantum free energy landscape we compute for this H-bonded molecular complex reveals that the two protons move in a concerted fashion from initial to product state, yet world-line analysis of the quantum correlations demonstrates that the protons are as quantum-uncorrelated at the transition state as they are when close to the equilibrium structure.

  15. Who's Surfing? Internet Access and Computer Use by Visually Impaired Youths and Adults.

    ERIC Educational Resources Information Center

    Gerber, Elaine; Kirchner, Corinne

    2001-01-01

    The Census Bureau's 1999 Survey of Income and Program Participation found that Internet access and computer use by people with visual impairments is substantially (30 percent) less than that for people with no disabilities. Age, employment, and the presence of additional impairments also affected computer use. Results suggest over a million…

  16. ICT Oriented toward Nyaya: Community Computing in India's Slums

    ERIC Educational Resources Information Center

    Byker, Erik J.

    2014-01-01

    In many schools across India, access to information and communication technology (ICT) is still a rare privilege. While the Annual Status of Education Report in India (2013) showed a marginal uptick in the amount of computers, the opportunities for children to use those computers have remained stagnant. The lack of access to ICT is especially…

  17. 10 CFR 727.3 - To whom does this part apply?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.3 To whom does... subcontractor employees, and any other individual who has been granted access to a DOE computer or to information on a DOE computer. (b) Section 727.4 of this part also applies to any person who uses a DOE...

  18. 10 CFR 727.3 - To whom does this part apply?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.3 To whom does... subcontractor employees, and any other individual who has been granted access to a DOE computer or to information on a DOE computer. (b) Section 727.4 of this part also applies to any person who uses a DOE...

  19. 10 CFR 727.3 - To whom does this part apply?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.3 To whom does... subcontractor employees, and any other individual who has been granted access to a DOE computer or to information on a DOE computer. (b) Section 727.4 of this part also applies to any person who uses a DOE...

  20. Gender Differences in Availability, Internet Access and Rate of Usage of Computers among Distance Education Learners.

    ERIC Educational Resources Information Center

    Atan, Hanafi; Sulaiman, Fauziah; Rahman, Zuraidah Abd; Idrus, Rozhan Mohammed

    2002-01-01

    Explores the level of availability of computers, Internet accessibility, and the rate of usage of computers both at home and at the workplace between distance education learners according to gender. Results of questionnaires completed at the Universiti Sains Malaysia indicate that distance education reduces the gender gap. (Author/LRW)

  1. Application of Computer Simulation to Teach ATM Access to Individuals with Intellectual Disabilities

    ERIC Educational Resources Information Center

    Davies, Daniel K.; Stock, Steven E.; Wehmeyer, Michael L.

    2003-01-01

    This study investigates use of computer simulation for teaching ATM use to adults with intellectual disabilities. ATM-SIM is a computer-based trainer used for teaching individuals with intellectual disabilities how to use an automated teller machine (ATM) to access their personal bank accounts. In the pilot evaluation, a prototype system was…

  2. 10 CFR 727.3 - To whom does this part apply?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.3 To whom does... subcontractor employees, and any other individual who has been granted access to a DOE computer or to information on a DOE computer. (b) Section 727.4 of this part also applies to any person who uses a DOE...

  3. 10 CFR 727.3 - To whom does this part apply?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.3 To whom does... subcontractor employees, and any other individual who has been granted access to a DOE computer or to information on a DOE computer. (b) Section 727.4 of this part also applies to any person who uses a DOE...

  4. Z. Smith Reynolds Library: Its Role in Wake Forest University's Access 2000 Project.

    ERIC Educational Resources Information Center

    Smith, Susan

    1996-01-01

    Describes the Access 2000 project at Wake Forest University (North Carolina) where students should have access to computers by the year 2000. Highlights include its history and goals; and the library's part in training faculty, staff, and students to use the new technology that includes an IBM ThinkPad laptop computer for each incoming first-year…

  5. Correlates of Access to Business Research Databases

    ERIC Educational Resources Information Center

    Gottfried, John C.

    2010-01-01

    This study examines potential correlates of business research database access through academic libraries serving top business programs in the United States. Results indicate that greater access to research databases is related to enrollment in graduate business programs, but not to overall enrollment or status as a public or private institution.…

  6. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

    PubMed Central

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-01-01

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840

  7. Information Power Grid Posters

    NASA Technical Reports Server (NTRS)

    Vaziri, Arsi

    2003-01-01

    This document is a summary of the accomplishments of the Information Power Grid (IPG). Grids are an emerging technology that provide seamless and uniform access to the geographically dispersed, computational, data storage, networking, instruments, and software resources needed for solving large-scale scientific and engineering problems. The goal of the NASA IPG is to use NASA's remotely located computing and data system resources to build distributed systems that can address problems that are too large or complex for a single site. The accomplishments outlined in this poster presentation are: access to distributed data, IPG heterogeneous computing, integration of large-scale computing node into distributed environment, remote access to high data rate instruments,and exploratory grid environment.

  8. The potential of multi-port optical memories in digital computing

    NASA Technical Reports Server (NTRS)

    Alford, C. O.; Gaylord, T. K.

    1975-01-01

    A high-capacity memory with a relatively high data transfer rate and multi-port simultaneous access capability may serve as the basis for new computer architectures. The implementation of a multi-port optical memory is discussed. Several computer structures are presented that might profitably use such a memory. These structures include (1) a simultaneous record access system, (2) a simultaneously shared memory computer system, and (3) a parallel digital processing structure.

  9. Drug-related stigma and access to care among people who inject drugs in Vietnam.

    PubMed

    Lan, Chiao-Wen; Lin, Chunqing; Thanh, Duong Cong; Li, Li

    2018-03-01

    There are considerable challenges faced by people with a history of injecting drug use (PWID) in Vietnam, including drug-related stigma and lack of access to healthcare. Seeking and utilising healthcare, as well as harm reduction programs for PWID, are often hampered by drug-related stigma. This study aimed to examine the impacts of drug-related stigma on access to care and utilisation of harm reduction programs among PWID in Vietnam. A cross-sectional study was conducted in two provinces in Vietnam, Phú Thọ and Vinh Phúc. The study participants completed the survey by using Audio Computer-Assisted Self-Interview between late 2014 and early 2015. Linear multiple regression models and logistic regression models were used to assess the relationship among drug-related stigma, access to care and utilisation of harm reduction programs, including methadone maintenance treatment (MMT) and needle exchange programs (NEP). A total of 900 PWID participated in this study. Drug-related stigma was significantly associated with lower level of access to care, but not with utilisation of MMT or NEP. Older age was positively associated with higher levels of access to care. Levels of education were positively correlated with access to care, as well as utilisation of MMT and NEP. This study underscores the need for future interventions to reduce drug-related stigma in society and in health-care settings to improve PWID's utilisation of care services. Special attention should be paid to younger PWID and those with lower levels of education. © 2017 Australasian Professional Society on Alcohol and other Drugs.

  10. Age and gender considerations for technology-assisted delivery of therapy for substance use disorder treatment: A patient survey of access to electronic devices.

    PubMed

    Antoine, Denis; Heffernan, Sean; Chaudhry, Amina; King, Van; Strain, Eric C

    2016-12-01

    Technology-assisted treatment (TAT) can be an effective supplement to established face-to-face therapy modalities with a growing literature in substance use disorder (SUD) treatment. TAT access, interest, and familiarity are potential limitations to the use and efficacy of these approaches to treatment. 174 participants in outpatient SUD treatment were administered a survey regarding technology device and Internet access, and interest in engaging in TAT SUD counseling (SUDC). The group was dichotomized by mean age and gender to examine potential variations in in these subgroups. Forty-three (43%) of participants were female, and the mean age was 44.8 years, and 89% of participants had Internet access. 83% of participants were interested in TAT for SUD counseling; 81% expected it to be at least "moderately helpful." 34% of participants noted they would choose to continue face-to-face therapy exclusively. 91% of participants had cell phones, but only 50% could access data or the Internet via their handheld device. 80% of participants stated they would be interested in trying SUDC via their phone. Women had a higher preference for computer-based SUDC than men, with gender being significantly correlated with TAT perceive helpfulness. These findings suggest that patients in outpatient SUD treatment have access to resources for TAT implementation, although access was not always readily available. Future research will be needed to determine whether the technology that this population possesses will be able to support the evolving TAT modalities and whether interest in TAT across age and gender groups equalizes over time.

  11. Personal use of work computers: distraction versus destruction.

    PubMed

    Mastrangelo, Paul M; Everton, Wendi; Jolton, Jeffery A

    2006-12-01

    To explore definitions, frequencies, and motivation for personal use of work computers, we analyzed 329 employees' responses to an online survey, which asked participants to self-report frequencies for 41 computer behaviors at work. This sample (65% female, 74% European ethnicity, mean age of 36 years) was formed by soliciting participants through Internet Usenet groups, emails, and listservs. Results support a distinction between computer use that is counterproductive and that which is merely not productive. Nonproductive Computer Use occurred more when employees were younger (r = -0.31, p < 0.01), had Internet access at work longer (r = +0.16, p < 0.01), and had faster Internet connections at work than at home (r = +0.14, p < 0.01). Counterproductive Computer Use occurred more when Internet access was newer (r = -0.16, p < 0.01) and employees knew others who had been warned about misuse (r = +0.11, p < 0.05). While most employees who engaged in computer counterproductivity also engaged in computer nonproductivity, the inverse was uncommon, suggesting the need to distinguish between the two when establishing computer policies and Internet accessibility.

  12. Consumer and provider responses to a computerized version of the Illness Management and Recovery Program.

    PubMed

    Wright-Berryman, Jennifer L; Salyers, Michelle P; O'Halloran, James P; Kemp, Aaron S; Mueser, Kim T; Diazoni, Amanda J

    2013-12-01

    To explore mental health consumer and provider responses to a computerized version of the Illness Management and Recovery (IMR) program. Semistructured interviews were conducted to gather data from 6 providers and 12 consumers who participated in a computerized prototype of the IMR program. An inductive-consensus-based approach was used to analyze the interview responses. Qualitative analysis revealed consumers perceived various personal benefits and ease of use afforded by the new technology platform. Consumers also highly valued provider assistance and offered several suggestions to improve the program. The largest perceived barriers to future implementation were lack of computer skills and access to computers. Similarly, IMR providers commented on its ease and convenience, and the reduction of time intensive material preparation. Providers also expressed that the use of technology creates more options for the consumer to access treatment. The technology was acceptable, easy to use, and well-liked by consumers and providers. Clinician assistance with technology was viewed as helpful to get clients started with the program, as lack of computer skills and access to computers was a concern. Access to materials between sessions appears to be desired; however, given perceived barriers of computer skills and computer access, additional supports may be needed for consumers to achieve full benefits of a computerized version of IMR. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  13. Calculation of Crystallographic Texture of BCC Steels During Cold Rolling

    NASA Astrophysics Data System (ADS)

    Das, Arpan

    2017-05-01

    BCC alloys commonly tend to develop strong fibre textures and often represent as isointensity diagrams in φ 1 sections or by fibre diagrams. Alpha fibre in bcc steels is generally characterised by <110> crystallographic axis parallel to the rolling direction. The objective of present research is to correlate carbon content, carbide dispersion, rolling reduction, Euler angles (ϕ) (when φ 1 = 0° and φ 2 = 45° along alpha fibre) and the resulting alpha fibre texture orientation intensity. In the present research, Bayesian neural computation has been employed to correlate these and compare with the existing feed-forward neural network model comprehensively. Excellent match to the measured texture data within the bounding box of texture training data set has been already predicted through the feed-forward neural network model by other researchers. Feed-forward neural network prediction outside the bounds of training texture data showed deviations from the expected values. Currently, Bayesian computation has been similarly applied to confirm that the predictions are reasonable in the context of basic metallurgical principles, and matched better outside the bounds of training texture data set than the reported feed-forward neural network. Bayesian computation puts error bars on predicted values and allows significance of each individual parameters to be estimated. Additionally, it is also possible by Bayesian computation to estimate the isolated influence of particular variable such as carbon concentration, which exactly cannot in practice be varied independently. This shows the ability of the Bayesian neural network to examine the new phenomenon in situations where the data cannot be accessed through experiments.

  14. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    PubMed Central

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  15. Experiences of registered nurses with regard to accessing health information at the point-of-care via mobile computing devices.

    PubMed

    Ricks, Esmeralda; Benjamin, Valencia; Williams, Margaret

    2015-11-19

    The volume of health information necessary to provide competent health care today has become overwhelming. Mobile computing devices are fast becoming an essential clinical tool for accessing health information at the point-of-care of patients. This study explored and described how registered nurses experienced accessing information at the point-of-care via mobile computing devices (MCDs). A qualitative, exploratory, descriptive and contextual design was used. Ten in-depth interviews were conducted with purposively sampled registered nurses employed by a state hospital in the Nelson Mandela Bay Municipality (NMBM). Interviews were recorded, transcribed verbatim and analysed using Tesch's data analysis technique. Ethical principles were adhered to throughout the study. Guba's model of trustworthiness was used to confirm integrity of the study. Four themes emerged which revealed that the registered nurses benefited from the training they received by enabling them to develop, and improve, their computer literacy levels. Emphasis was placed on the benefits that the accessed information had for educational purposes for patients and the public, for colleagues and students. Furthermore the ability to access information at the point-of-care was considered by registered nurses as valuable to improve patient care because of the wide range of accurate and readily accessible information available via the mobile computing device. The registered nurses in this study felt that being able to access information at the point-of-care increased their confidence and facilitated the provision of quality care because it assisted them in being accurate and sure of what they were doing.

  16. Post-basic nursing students' access to and attitudes toward the use of information technology in practice: a descriptive analysis.

    PubMed

    Nkosi, Z Z; Asah, F; Pillay, P

    2011-10-01

    Nurses are exposed to the changing demands in technology as they execute their patient-related duties in the workplace. Integration of Information Technology (IT) in healthcare systems improves the quality of care provided. Nursing students with prior exposure to computers tend to have a positive influence IT. A descriptive study design using a quantitative approach and structured questionnaire was used to measure the nurses' attitudes towards computer usage. A census of 45 post-basic first year nursing management students were participated in this study. The students demonstrated a positive attitude towards the use of a computer. But access to and use of a computer and IT was limited and nurses in clinics had no access to IT. A lack of computer skills was identified as a factor that hinders access to IT. Nursing students agreed that computer literacy should be included in the curriculum to allow them to become independent computer users. The Department of Health should have IT in all health-care facilities and also train all health-care workers to use IT. With the positive attitudes expressed by the students, nurse managers need to create a conducive environment to ensure such a positive attitude continues to excel. © 2011 Blackwell Publishing Ltd.

  17. Flexible services for the support of research.

    PubMed

    Turilli, Matteo; Wallom, David; Williams, Chris; Gough, Steve; Curran, Neal; Tarrant, Richard; Bretherton, Dan; Powell, Andy; Johnson, Matt; Harmer, Terry; Wright, Peter; Gordon, John

    2013-01-28

    Cloud computing has been increasingly adopted by users and providers to promote a flexible, scalable and tailored access to computing resources. Nonetheless, the consolidation of this paradigm has uncovered some of its limitations. Initially devised by corporations with direct control over large amounts of computational resources, cloud computing is now being endorsed by organizations with limited resources or with a more articulated, less direct control over these resources. The challenge for these organizations is to leverage the benefits of cloud computing while dealing with limited and often widely distributed computing resources. This study focuses on the adoption of cloud computing by higher education institutions and addresses two main issues: flexible and on-demand access to a large amount of storage resources, and scalability across a heterogeneous set of cloud infrastructures. The proposed solutions leverage a federated approach to cloud resources in which users access multiple and largely independent cloud infrastructures through a highly customizable broker layer. This approach allows for a uniform authentication and authorization infrastructure, a fine-grained policy specification and the aggregation of accounting and monitoring. Within a loosely coupled federation of cloud infrastructures, users can access vast amount of data without copying them across cloud infrastructures and can scale their resource provisions when the local cloud resources become insufficient.

  18. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 2: Switches and Environmental Controls. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…

  19. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 1: Communication Aids. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on communication aids. The book's six chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  20. Process for selecting NEAMS applications for access to Idaho National Laboratory high performance computing resources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michael Pernice

    2010-09-01

    INL has agreed to provide participants in the Nuclear Energy Advanced Mod- eling and Simulation (NEAMS) program with access to its high performance computing (HPC) resources under sponsorship of the Enabling Computational Technologies (ECT) program element. This report documents the process used to select applications and the software stack in place at INL.

  1. Telecommunications Options Connect OCLC and Libraries to the Future: The Co-Evolution of OCLC Connectivity Options and the Library Computing Environment.

    ERIC Educational Resources Information Center

    Breeding, Marshall

    1998-01-01

    The Online Computer Library Center's (OCLC) access options have kept pace with the evolving trends in telecommunications and the library computing environment. As libraries deploy microcomputers and develop networks, OCLC offers access methods consistent with these environments. OCLC works toward reorienting its network paradigm through TCP/IP…

  2. A MAP fixed-point, packing-unpacking routine for the IBM 7094 computer

    Treesearch

    Robert S. Helfman

    1966-01-01

    Two MAP (Macro Assembly Program) computer routines for packing and unpacking fixed point data are described. Use of these routines with Fortran IV Programs provides speedy access to quantities of data which far exceed the normal storage capacity of IBM 7000-series computers. Many problems that could not be attempted because of the slow access-speed of tape...

  3. Manycore Performance-Portability: Kokkos Multidimensional Array Library

    DOE PAGES

    Edwards, H. Carter; Sunderland, Daniel; Porter, Vicki; ...

    2012-01-01

    Large, complex scientific and engineering application code have a significant investment in computational kernels to implement their mathematical models. Porting these computational kernels to the collection of modern manycore accelerator devices is a major challenge in that these devices have diverse programming models, application programming interfaces (APIs), and performance requirements. The Kokkos Array programming model provides library-based approach to implement computational kernels that are performance-portable to CPU-multicore and GPGPU accelerator devices. This programming model is based upon three fundamental concepts: (1) manycore compute devices each with its own memory space, (2) data parallel kernels and (3) multidimensional arrays. Kernel executionmore » performance is, especially for NVIDIA® devices, extremely dependent on data access patterns. Optimal data access pattern can be different for different manycore devices – potentially leading to different implementations of computational kernels specialized for different devices. The Kokkos Array programming model supports performance-portable kernels by (1) separating data access patterns from computational kernels through a multidimensional array API and (2) introduce device-specific data access mappings when a kernel is compiled. An implementation of Kokkos Array is available through Trilinos [Trilinos website, http://trilinos.sandia.gov/, August 2011].« less

  4. Public computing options for individuals with cognitive impairments: survey outcomes.

    PubMed

    Fox, Lynn Elizabeth; Sohlberg, McKay Moore; Fickas, Stephen; Lemoncello, Rik; Prideaux, Jason

    2009-09-01

    To examine availability and accessibility of public computing for individuals with cognitive impairment (CI) who reside in the USA. A telephone survey was administered as a semi-structured interview to 145 informants representing seven types of public facilities across three geographically distinct regions using a snowball sampling technique. An Internet search of wireless (Wi-Fi) hotspots supplemented the survey. Survey results showed the availability of public computer terminals and Internet hotspots was greatest in the urban sample, followed by the mid-sized and rural cities. Across seven facility types surveyed, libraries had the highest percentage of access barriers, including complex queue procedures, login and password requirements, and limited technical support. University assistive technology centres and facilities with a restricted user policy, such as brain injury centres, had the lowest incidence of access barriers. Findings suggest optimal outcomes for people with CI will result from a careful match of technology and the user that takes into account potential barriers and opportunities to computing in an individual's preferred public environments. Trends in public computing, including the emergence of widespread Wi-Fi and limited access to terminals that permit auto-launch applications, should guide development of technology designed for use in public computing environments.

  5. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  6. Efficient Unsteady Flow Visualization with High-Order Access Dependencies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Jiang; Guo, Hanqi; Yuan, Xiaoru

    We present a novel high-order access dependencies based model for efficient pathline computation in unsteady flow visualization. By taking longer access sequences into account to model more sophisticated data access patterns in particle tracing, our method greatly improves the accuracy and reliability in data access prediction. In our work, high-order access dependencies are calculated by tracing uniformly-seeded pathlines in both forward and backward directions in a preprocessing stage. The effectiveness of our proposed approach is demonstrated through a parallel particle tracing framework with high-order data prefetching. Results show that our method achieves higher data locality and hence improves the efficiencymore » of pathline computation.« less

  7. A computing method for spatial accessibility based on grid partition

    NASA Astrophysics Data System (ADS)

    Ma, Linbing; Zhang, Xinchang

    2007-06-01

    An accessibility computing method and process based on grid partition was put forward in the paper. As two important factors impacting on traffic, density of road network and relative spatial resistance for difference land use was integrated into computing traffic cost in each grid. A* algorithms was inducted to searching optimum traffic cost of grids path, a detailed searching process and definition of heuristic evaluation function was described in the paper. Therefore, the method can be implemented more simply and its data source is obtained more easily. Moreover, by changing heuristic searching information, more reasonable computing result can be obtained. For confirming our research, a software package was developed with C# language under ArcEngine9 environment. Applying the computing method, a case study on accessibility of business districts in Guangzhou city was carried out.

  8. Student Engagement in a Computer Rich Science Classroom

    NASA Astrophysics Data System (ADS)

    Hunter, Jeffrey C.

    The purpose of this study was to examine the student lived experience when using computers in a rural science classroom. The overarching question the project sought to examine was: How do rural students relate to computers as a learning tool in comparison to a traditional science classroom? Participant data were collected using a pre-study survey, Experience Sampling during class and post-study interviews. Students want to use computers in their classrooms. Students shared that they overwhelmingly (75%) preferred a computer rich classroom to a traditional classroom (25%). Students reported a higher level of engagement in classes that use technology/computers (83%) versus those that do not use computers (17%). A computer rich classroom increased student control and motivation as reflected by a participant who shared; "by using computers I was more motivated to get the work done" (Maggie, April 25, 2014, survey). The researcher explored a rural school environment. Rural populations represent a large number of students and appear to be underrepresented in current research. The participants, tenth grade Biology students, were sampled in a traditional teacher led class without computers for one week followed by a week using computers daily. Data supported that there is a new gap that separates students, a device divide. This divide separates those who have access to devices that are robust enough to do high level class work from those who do not. Although cellular phones have reduced the number of students who cannot access the Internet, they may have created a false feeling that access to a computer is no longer necessary at home. As this study shows, although most students have Internet access, fewer have access to a device that enables them to complete rigorous class work at home. Participants received little or no training at school in proper, safe use of a computer and the Internet. It is clear that the majorities of students are self-taught or receive guidance from peers resulting in lower self-confidence or the development of misconceptions of their skill or ability.

  9. Leveraging Google Trends, Twitter, and Wikipedia to Investigate the Impact of a Celebrity's Death From Rheumatoid Arthritis.

    PubMed

    Mahroum, Naim; Bragazzi, Nicola Luigi; Sharif, Kassem; Gianfredi, Vincenza; Nucci, Daniele; Rosselli, Roberto; Brigo, Francesco; Adawi, Mohammad; Amital, Howard; Watad, Abdulla

    2018-06-01

    Technological advancements, such as patient-centered smartphone applications, have enabled to support self-management of the disease. Further, the accessibility to health information through the Internet has grown tremendously. This article aimed to investigate how big data can be useful to assess the impact of a celebrity's rheumatic disease on the public opinion. Variable tools and statistical/computational approaches have been used, including massive data mining of Google Trends, Wikipedia, Twitter, and big data analytics. These tools were mined using an in-house script, which facilitated the process of data collection, parsing, handling, processing, and normalization. From Google Trends, the temporal correlation between "Anna Marchesini" and rheumatoid arthritis (RA) queries resulted 0.66 before Anna Marchesini's death and 0.90 after Anna Marchesini's death. The geospatial correlation between "Anna Marchesini" and RA queries resulted 0.45 before Anna Marchesini's death and 0.52 after Anna Marchesini's death. From Wikitrends, after Anna Marchesini's death, the number of accesses to Wikipedia page for RA has increased 5770%. From Twitter, 1979 tweets have been retrieved. Numbers of likes, retweets, and hashtags have increased throughout time. Novel data streams and big data analytics are effective to assess the impact of a disease in a famous person on the laypeople.

  10. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access scheme in Cloud computing environments is proven flexible and secure and could effectively correspond to real-time appending and deleting user access authorization and appending and revising PHR records.

  11. Disaster easily averted? Data confidentiality and the hospital desktop computer.

    PubMed

    Sethi, Neeraj; Lane, Gethin; Newton, Sophie; Egan, Philip; Ghosh, Samit

    2014-05-01

    We specifically identified the hospital desktop computer as a potential source of breaches in confidentiality. We aimed to evaluate if there was accessible, unprotected, confidential information stored on the desktop screen on computers in a district general hospital and if so, how a teaching intervention could improve this situation. An unannounced spot check of 59 ward computers was performed. Data were collected regarding how many had confidential information stored on the desktop screen without any password protection. An online learning module was mandated for healthcare staff and a second cycle of inspection performed. A district general hospital. Two doctors conducted the audit. Computers in clinical areas were assessed. All clinical staff with computer access underwent the online learning module. An online learning module regarding data protection and confidentiality. In the first cycle, 55% of ward computers had easily accessible patient or staff confidential information stored on their desktop screen. This included handovers, referral letters, staff sick leave lists, audits and nursing reports. The majority (85%) of computers accessed were logged in under a generic username and password. The intervention produced an improvement in the second cycle findings with only 26% of computers being found to have unprotected confidential information stored on them. The failure to comply with appropriate confidential data protection regulations is a persistent problem. Education produces some improvement but we also propose a systemic approach to solving this problem. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  12. AIRMICS (U.S. Army Institute for Research in Management Information, Communications and Computer Sciences) Information Center Model Site Evaluation

    DTIC Science & Technology

    1986-10-01

    34 syndrome . Five techniques for developing user self-sufficiency were discussed in-depth: (1) provide training at different proficiency levels, id provide...WY aba. 4 ’-a ’aba. @9 "a,.. I bJ~ V N- S ha. E-ii S ’a ’baa .4, .;y ’. ; . a.,. ~ ~ .: ;r YK’.- xYY I. r d’...da.4/ 4/ tq..ttf.%r./..v-./ - "cc~’ v,-r...data base, accessible through a user friendly interfaces, to correlate and deliver crime , traffic, vehicle, and personnel information to " / fixed and

  13. Provenance for Runtime Workflow Steering and Validation in Computational Seismology

    NASA Astrophysics Data System (ADS)

    Spinuso, A.; Krischer, L.; Krause, A.; Filgueira, R.; Magnoni, F.; Muraleedharan, V.; David, M.

    2014-12-01

    Provenance systems may be offered by modern workflow engines to collect metadata about the data transformations at runtime. If combined with effective visualisation and monitoring interfaces, these provenance recordings can speed up the validation process of an experiment, suggesting interactive or automated interventions with immediate effects on the lifecycle of a workflow run. For instance, in the field of computational seismology, if we consider research applications performing long lasting cross correlation analysis and high resolution simulations, the immediate notification of logical errors and the rapid access to intermediate results, can produce reactions which foster a more efficient progress of the research. These applications are often executed in secured and sophisticated HPC and HTC infrastructures, highlighting the need for a comprehensive framework that facilitates the extraction of fine grained provenance and the development of provenance aware components, leveraging the scalability characteristics of the adopted workflow engines, whose enactment can be mapped to different technologies (MPI, Storm clusters, etc). This work looks at the adoption of W3C-PROV concepts and data model within a user driven processing and validation framework for seismic data, supporting also computational and data management steering. Validation needs to balance automation with user intervention, considering the scientist as part of the archiving process. Therefore, the provenance data is enriched with community-specific metadata vocabularies and control messages, making an experiment reproducible and its description consistent with the community understandings. Moreover, it can contain user defined terms and annotations. The current implementation of the system is supported by the EU-Funded VERCE (http://verce.eu). It provides, as well as the provenance generation mechanisms, a prototypal browser-based user interface and a web API built on top of a NoSQL storage technology, experimenting ways to ensure a rapid and flexible access to the lineage traces. It supports the users with the visualisation of graphical products and offers combined operations to access and download the data which may be selectively stored at runtime, into dedicated data archives.

  14. Analysis of outcomes in radiation oncology: An integrated computational platform

    PubMed Central

    Liu, Dezhi; Ajlouni, Munther; Jin, Jian-Yue; Ryu, Samuel; Siddiqui, Farzan; Patel, Anushka; Movsas, Benjamin; Chetty, Indrin J.

    2009-01-01

    Radiotherapy research and outcome analyses are essential for evaluating new methods of radiation delivery and for assessing the benefits of a given technology on locoregional control and overall survival. In this article, a computational platform is presented to facilitate radiotherapy research and outcome studies in radiation oncology. This computational platform consists of (1) an infrastructural database that stores patient diagnosis, IMRT treatment details, and follow-up information, (2) an interface tool that is used to import and export IMRT plans in DICOM RT and AAPM/RTOG formats from a wide range of planning systems to facilitate reproducible research, (3) a graphical data analysis and programming tool that visualizes all aspects of an IMRT plan including dose, contour, and image data to aid the analysis of treatment plans, and (4) a software package that calculates radiobiological models to evaluate IMRT treatment plans. Given the limited number of general-purpose computational environments for radiotherapy research and outcome studies, this computational platform represents a powerful and convenient tool that is well suited for analyzing dose distributions biologically and correlating them with the delivered radiation dose distributions and other patient-related clinical factors. In addition the database is web-based and accessible by multiple users, facilitating its convenient application and use. PMID:19544785

  15. GeoBrain Computational Cyber-laboratory for Earth Science Studies

    NASA Astrophysics Data System (ADS)

    Deng, M.; di, L.

    2009-12-01

    Computational approaches (e.g., computer-based data visualization, analysis and modeling) are critical for conducting increasingly data-intensive Earth science (ES) studies to understand functions and changes of the Earth system. However, currently Earth scientists, educators, and students have met two major barriers that prevent them from being effectively using computational approaches in their learning, research and application activities. The two barriers are: 1) difficulties in finding, obtaining, and using multi-source ES data; and 2) lack of analytic functions and computing resources (e.g., analysis software, computing models, and high performance computing systems) to analyze the data. Taking advantages of recent advances in cyberinfrastructure, Web service, and geospatial interoperability technologies, GeoBrain, a project funded by NASA, has developed a prototype computational cyber-laboratory to effectively remove the two barriers. The cyber-laboratory makes ES data and computational resources at large organizations in distributed locations available to and easily usable by the Earth science community through 1) enabling seamless discovery, access and retrieval of distributed data, 2) federating and enhancing data discovery with a catalogue federation service and a semantically-augmented catalogue service, 3) customizing data access and retrieval at user request with interoperable, personalized, and on-demand data access and services, 4) automating or semi-automating multi-source geospatial data integration, 5) developing a large number of analytic functions as value-added, interoperable, and dynamically chainable geospatial Web services and deploying them in high-performance computing facilities, 6) enabling the online geospatial process modeling and execution, and 7) building a user-friendly extensible web portal for users to access the cyber-laboratory resources. Users can interactively discover the needed data and perform on-demand data analysis and modeling through the web portal. The GeoBrain cyber-laboratory provides solutions to meet common needs of ES research and education, such as, distributed data access and analysis services, easy access to and use of ES data, and enhanced geoprocessing and geospatial modeling capability. It greatly facilitates ES research, education, and applications. The development of the cyber-laboratory provides insights, lessons-learned, and technology readiness to build more capable computing infrastructure for ES studies, which can meet wide-range needs of current and future generations of scientists, researchers, educators, and students for their formal or informal educational training, research projects, career development, and lifelong learning.

  16. Cloud computing for context-aware enhanced m-Health services.

    PubMed

    Fernandez-Llatas, Carlos; Pileggi, Salvatore F; Ibañez, Gema; Valero, Zoe; Sala, Pilar

    2015-01-01

    m-Health services are increasing its presence in our lives due to the high penetration of new smartphone devices. This new scenario proposes new challenges in terms of information accessibility that require new paradigms which enable the new applications to access the data in a continuous and ubiquitous way, ensuring the privacy required depending on the kind of data accessed. This paper proposes an architecture based on cloud computing paradigms in order to empower new m-Health applications to enrich their results by providing secure access to user data.

  17. Mobility for GCSS-MC through virtual PCs

    DTIC Science & Technology

    2017-06-01

    their productivity. Mobile device access to GCSS-MC would allow Marines to access a required program for their mission using a form of computing ...network throughput applications with a device running on various operating systems with limited computational ability. The use of VPCs leads to a...reduced need for network throughput and faster overall execution. 14. SUBJECT TERMS GCSS-MC, enterprise resource planning, virtual personal computer

  18. Guidelines for the Design of Computers and Information Processing Systems to Increase Their Access by Persons with Disabilities. Version 2.0.

    ERIC Educational Resources Information Center

    Vanderheiden, Gregg C.; Lee, Charles C.

    Many low-cost and no-cost modifications to computers would greatly increase the number of disabled individuals who could use standard computers without requiring custom modifications, and would increase the ability to attach special input and output systems. The purpose of the Guidelines is to provide an awareness of these access problems and a…

  19. A Lightweight Remote Parallel Visualization Platform for Interactive Massive Time-varying Climate Data Analysis

    NASA Astrophysics Data System (ADS)

    Li, J.; Zhang, T.; Huang, Q.; Liu, Q.

    2014-12-01

    Today's climate datasets are featured with large volume, high degree of spatiotemporal complexity and evolving fast overtime. As visualizing large volume distributed climate datasets is computationally intensive, traditional desktop based visualization applications fail to handle the computational intensity. Recently, scientists have developed remote visualization techniques to address the computational issue. Remote visualization techniques usually leverage server-side parallel computing capabilities to perform visualization tasks and deliver visualization results to clients through network. In this research, we aim to build a remote parallel visualization platform for visualizing and analyzing massive climate data. Our visualization platform was built based on Paraview, which is one of the most popular open source remote visualization and analysis applications. To further enhance the scalability and stability of the platform, we have employed cloud computing techniques to support the deployment of the platform. In this platform, all climate datasets are regular grid data which are stored in NetCDF format. Three types of data access methods are supported in the platform: accessing remote datasets provided by OpenDAP servers, accessing datasets hosted on the web visualization server and accessing local datasets. Despite different data access methods, all visualization tasks are completed at the server side to reduce the workload of clients. As a proof of concept, we have implemented a set of scientific visualization methods to show the feasibility of the platform. Preliminary results indicate that the framework can address the computation limitation of desktop based visualization applications.

  20. Use of handheld computers in clinical practice: a systematic review.

    PubMed

    Mickan, Sharon; Atherton, Helen; Roberts, Nia Wyn; Heneghan, Carl; Tilson, Julie K

    2014-07-06

    Many healthcare professionals use smartphones and tablets to inform patient care. Contemporary research suggests that handheld computers may support aspects of clinical diagnosis and management. This systematic review was designed to synthesise high quality evidence to answer the question; Does healthcare professionals' use of handheld computers improve their access to information and support clinical decision making at the point of care? A detailed search was conducted using Cochrane, MEDLINE, EMBASE, PsycINFO, Science and Social Science Citation Indices since 2001. Interventions promoting healthcare professionals seeking information or making clinical decisions using handheld computers were included. Classroom learning and the use of laptop computers were excluded. Two authors independently selected studies, assessed quality using the Cochrane Risk of Bias tool and extracted data. High levels of data heterogeneity negated statistical synthesis. Instead, evidence for effectiveness was summarised narratively, according to each study's aim for assessing the impact of handheld computer use. We included seven randomised trials investigating medical or nursing staffs' use of Personal Digital Assistants. Effectiveness was demonstrated across three distinct functions that emerged from the data: accessing information for clinical knowledge, adherence to guidelines and diagnostic decision making. When healthcare professionals used handheld computers to access clinical information, their knowledge improved significantly more than peers who used paper resources. When clinical guideline recommendations were presented on handheld computers, clinicians made significantly safer prescribing decisions and adhered more closely to recommendations than peers using paper resources. Finally, healthcare professionals made significantly more appropriate diagnostic decisions using clinical decision making tools on handheld computers compared to colleagues who did not have access to these tools. For these clinical decisions, the numbers need to test/screen were all less than 11. Healthcare professionals' use of handheld computers may improve their information seeking, adherence to guidelines and clinical decision making. Handheld computers can provide real time access to and analysis of clinical information. The integration of clinical decision support systems within handheld computers offers clinicians the highest level of synthesised evidence at the point of care. Future research is needed to replicate these early results and to identify beneficial clinical outcomes.

  1. Use of handheld computers in clinical practice: a systematic review

    PubMed Central

    2014-01-01

    Background Many healthcare professionals use smartphones and tablets to inform patient care. Contemporary research suggests that handheld computers may support aspects of clinical diagnosis and management. This systematic review was designed to synthesise high quality evidence to answer the question; Does healthcare professionals’ use of handheld computers improve their access to information and support clinical decision making at the point of care? Methods A detailed search was conducted using Cochrane, MEDLINE, EMBASE, PsycINFO, Science and Social Science Citation Indices since 2001. Interventions promoting healthcare professionals seeking information or making clinical decisions using handheld computers were included. Classroom learning and the use of laptop computers were excluded. Two authors independently selected studies, assessed quality using the Cochrane Risk of Bias tool and extracted data. High levels of data heterogeneity negated statistical synthesis. Instead, evidence for effectiveness was summarised narratively, according to each study’s aim for assessing the impact of handheld computer use. Results We included seven randomised trials investigating medical or nursing staffs’ use of Personal Digital Assistants. Effectiveness was demonstrated across three distinct functions that emerged from the data: accessing information for clinical knowledge, adherence to guidelines and diagnostic decision making. When healthcare professionals used handheld computers to access clinical information, their knowledge improved significantly more than peers who used paper resources. When clinical guideline recommendations were presented on handheld computers, clinicians made significantly safer prescribing decisions and adhered more closely to recommendations than peers using paper resources. Finally, healthcare professionals made significantly more appropriate diagnostic decisions using clinical decision making tools on handheld computers compared to colleagues who did not have access to these tools. For these clinical decisions, the numbers need to test/screen were all less than 11. Conclusion Healthcare professionals’ use of handheld computers may improve their information seeking, adherence to guidelines and clinical decision making. Handheld computers can provide real time access to and analysis of clinical information. The integration of clinical decision support systems within handheld computers offers clinicians the highest level of synthesised evidence at the point of care. Future research is needed to replicate these early results and to identify beneficial clinical outcomes. PMID:24998515

  2. Computers, Technology, and Disability. [Update.

    ERIC Educational Resources Information Center

    American Council on Education, Washington, DC. HEATH Resource Center.

    This paper describes programs and resources that focus on access of postsecondary students with disabilities to computers and other forms of technology. Increased access to technological devices and services is provided to students with disabilities under the Technology-Related Assistance for Individuals with Disabilities Act (Tech Act). Section…

  3. A Computationally-Efficient Inverse Approach to Probabilistic Strain-Based Damage Diagnosis

    NASA Technical Reports Server (NTRS)

    Warner, James E.; Hochhalter, Jacob D.; Leser, William P.; Leser, Patrick E.; Newman, John A

    2016-01-01

    This work presents a computationally-efficient inverse approach to probabilistic damage diagnosis. Given strain data at a limited number of measurement locations, Bayesian inference and Markov Chain Monte Carlo (MCMC) sampling are used to estimate probability distributions of the unknown location, size, and orientation of damage. Substantial computational speedup is obtained by replacing a three-dimensional finite element (FE) model with an efficient surrogate model. The approach is experimentally validated on cracked test specimens where full field strains are determined using digital image correlation (DIC). Access to full field DIC data allows for testing of different hypothetical sensor arrangements, facilitating the study of strain-based diagnosis effectiveness as the distance between damage and measurement locations increases. The ability of the framework to effectively perform both probabilistic damage localization and characterization in cracked plates is demonstrated and the impact of measurement location on uncertainty in the predictions is shown. Furthermore, the analysis time to produce these predictions is orders of magnitude less than a baseline Bayesian approach with the FE method by utilizing surrogate modeling and effective numerical sampling approaches.

  4. Internet Use and Access Among Pregnant Women via Computer and Mobile Phone: Implications for Delivery of Perinatal Care.

    PubMed

    Peragallo Urrutia, Rachel; Berger, Alexander A; Ivins, Amber A; Beckham, A Jenna; Thorp, John M; Nicholson, Wanda K

    2015-03-30

    The use of Internet-based behavioral programs may be an efficient, flexible method to enhance prenatal care and improve pregnancy outcomes. There are few data about access to, and use of, the Internet via computers and mobile phones among pregnant women. We describe pregnant women's access to, and use of, computers, mobile phones, and computer technologies (eg, Internet, blogs, chat rooms) in a southern United States population. We describe the willingness of pregnant women to participate in Internet-supported weight-loss interventions delivered via computers or mobile phones. We conducted a cross-sectional survey among 100 pregnant women at a tertiary referral center ultrasound clinic in the southeast United States. Data were analyzed using Stata version 10 (StataCorp) and R (R Core Team 2013). Means and frequency procedures were used to describe demographic characteristics, access to computers and mobile phones, and use of specific Internet modalities. Chi-square testing was used to determine whether there were differences in technology access and Internet modality use according to age, race/ethnicity, income, or children in the home. The Fisher's exact test was used to describe preferences to participate in Internet-based postpartum weight-loss interventions via computer versus mobile phone. Logistic regression was used to determine demographic characteristics associated with these preferences. The study sample was 61.0% white, 26.0% black, 6.0% Hispanic, and 7.0% Asian with a mean age of 31.0 (SD 5.1). Most participants had access to a computer (89/100, 89.0%) or mobile phone (88/100, 88.0%) for at least 8 hours per week. Access remained high (>74%) across age groups, racial/ethnic groups, income levels, and number of children in the home. Internet/Web (94/100, 94.0%), email (90/100, 90.0%), and Facebook (50/100, 50.0%) were the most commonly used Internet technologies. Women aged less than 30 years were more likely to report use of Twitter and chat rooms compared to women 30 years of age or older. Of the participants, 82.0% (82/100) were fairly willing or very willing to participate in postpartum lifestyle intervention. Of the participants, 83.0% (83/100) were fairly willing or very willing to participate in an Internet intervention delivered via computer, while only 49.0% (49/100) were fairly willing or very willing to do so via mobile phone technology. Older women and women with children tended to be less likely to desire a mobile phone-based program. There is broad access and use of computer and mobile phone technology among southern US pregnant women with varied demographic characteristics. Pregnant women are willing to participate in Internet-supported perinatal interventions. Our findings can inform the development of computer- and mobile phone-based approaches for the delivery of clinical and educational interventions.

  5. Internet Use and Access Among Pregnant Women via Computer and Mobile Phone: Implications for Delivery of Perinatal Care

    PubMed Central

    Peragallo Urrutia, Rachel; Berger, Alexander A; Ivins, Amber A; Beckham, A Jenna; Thorp Jr, John M

    2015-01-01

    Background The use of Internet-based behavioral programs may be an efficient, flexible method to enhance prenatal care and improve pregnancy outcomes. There are few data about access to, and use of, the Internet via computers and mobile phones among pregnant women. Objective We describe pregnant women’s access to, and use of, computers, mobile phones, and computer technologies (eg, Internet, blogs, chat rooms) in a southern United States population. We describe the willingness of pregnant women to participate in Internet-supported weight-loss interventions delivered via computers or mobile phones. Methods We conducted a cross-sectional survey among 100 pregnant women at a tertiary referral center ultrasound clinic in the southeast United States. Data were analyzed using Stata version 10 (StataCorp) and R (R Core Team 2013). Means and frequency procedures were used to describe demographic characteristics, access to computers and mobile phones, and use of specific Internet modalities. Chi-square testing was used to determine whether there were differences in technology access and Internet modality use according to age, race/ethnicity, income, or children in the home. The Fisher’s exact test was used to describe preferences to participate in Internet-based postpartum weight-loss interventions via computer versus mobile phone. Logistic regression was used to determine demographic characteristics associated with these preferences. Results The study sample was 61.0% white, 26.0% black, 6.0% Hispanic, and 7.0% Asian with a mean age of 31.0 (SD 5.1). Most participants had access to a computer (89/100, 89.0%) or mobile phone (88/100, 88.0%) for at least 8 hours per week. Access remained high (>74%) across age groups, racial/ethnic groups, income levels, and number of children in the home. Internet/Web (94/100, 94.0%), email (90/100, 90.0%), and Facebook (50/100, 50.0%) were the most commonly used Internet technologies. Women aged less than 30 years were more likely to report use of Twitter and chat rooms compared to women 30 years of age or older. Of the participants, 82.0% (82/100) were fairly willing or very willing to participate in postpartum lifestyle intervention. Of the participants, 83.0% (83/100) were fairly willing or very willing to participate in an Internet intervention delivered via computer, while only 49.0% (49/100) were fairly willing or very willing to do so via mobile phone technology. Older women and women with children tended to be less likely to desire a mobile phone-based program. Conclusions There is broad access and use of computer and mobile phone technology among southern US pregnant women with varied demographic characteristics. Pregnant women are willing to participate in Internet-supported perinatal interventions. Our findings can inform the development of computer- and mobile phone-based approaches for the delivery of clinical and educational interventions. PMID:25835744

  6. The Quake-Catcher Network: Improving Earthquake Strong Motion Observations Through Community Engagement

    NASA Astrophysics Data System (ADS)

    Cochran, E. S.; Lawrence, J. F.; Christensen, C. M.; Chung, A. I.; Neighbors, C.; Saltzman, J.

    2010-12-01

    The Quake-Catcher Network (QCN) involves the community in strong motion data collection by utilizing volunteer computing techniques and low-cost MEMS accelerometers. Volunteer computing provides a mechanism to expand strong-motion seismology with minimal infrastructure costs, while promoting community participation in science. Micro-Electro-Mechanical Systems (MEMS) triaxial accelerometers can be attached to a desktop computer via USB and are internal to many laptops. Preliminary shake table tests show the MEMS accelerometers can record high-quality seismic data with instrument response similar to research-grade strong-motion sensors. QCN began distributing sensors and software to K-12 schools and the general public in April 2008 and has grown to roughly 1500 stations worldwide. We also recently tested whether sensors could be quickly deployed as part of a Rapid Aftershock Mobilization Program (RAMP) following the 2010 M8.8 Maule, Chile earthquake. Volunteers are recruited through media reports, web-based sensor request forms, as well as social networking sites. Using data collected to date, we examine whether a distributed sensing network can provide valuable seismic data for earthquake detection and characterization while promoting community participation in earthquake science. We utilize client-side triggering algorithms to determine when significant ground shaking occurs and this metadata is sent to the main QCN server. On average, trigger metadata are received within 1-10 seconds from the observation of a trigger; the larger data latencies are correlated with greater server-station distances. When triggers are detected, we determine if the triggers correlate to others in the network using spatial and temporal clustering of incoming trigger information. If a minimum number of triggers are detected then a QCN-event is declared and an initial earthquake location and magnitude is estimated. Initial analysis suggests that the estimated locations and magnitudes are similar to those reported in regional and global catalogs. As the network expands, it will become increasingly important to provide volunteers access to the data they collect, both to encourage continued participation in the network and to improve community engagement in scientific discourse related to seismic hazard. In the future, we hope to provide access to both images and raw data from seismograms in formats accessible to the general public through existing seismic data archives (e.g. IRIS, SCSN) and/or through the QCN project website. While encouraging community participation in seismic data collection, we can extend the capabilities of existing seismic networks to rapidly detect and characterize strong motion events. In addition, the dense waveform observations may provide high-resolution ground shaking information to improve source imaging and seismic risk assessment.

  7. Probing the non-locality of Majorana fermions via quantum correlations

    PubMed Central

    Li, Jun; Yu, Ting; Lin, Hai-Qing; You, J. Q.

    2014-01-01

    Majorana fermions (MFs) are exotic particles that are their own anti-particles. Recently, the search for the MFs occurring as quasi-particle excitations in solid-state systems has attracted widespread interest, because of their fundamental importance in fundamental physics and potential applications in topological quantum computation based on solid-state devices. Here we study the quantum correlations between two spatially separate quantum dots induced by a pair of MFs emerging at the two ends of a semiconductor nanowire, in order to develop a new method for probing the MFs. We find that without the tunnel coupling between these paired MFs, quantum entanglement cannot be induced from an unentangled (i.e., product) state, but quantum discord is observed due to the intrinsic nonlocal correlations of the paired MFs. This finding reveals that quantum discord can indeed demonstrate the intrinsic non-locality of the MFs formed in the nanowire. Also, quantum discord can be employed to discriminate the MFs from the regular fermions. Furthermore, we propose an experimental setup to measure the onset of quantum discord due to the nonlocal correlations. Our approach provides a new, and experimentally accessible, method to study the Majorana bound states by probing their intrinsic non-locality signature. PMID:24816484

  8. Reliable computation from contextual correlations

    NASA Astrophysics Data System (ADS)

    Oestereich, André L.; Galvão, Ernesto F.

    2017-12-01

    An operational approach to the study of computation based on correlations considers black boxes with one-bit inputs and outputs, controlled by a limited classical computer capable only of performing sums modulo-two. In this setting, it was shown that noncontextual correlations do not provide any extra computational power, while contextual correlations were found to be necessary for the deterministic evaluation of nonlinear Boolean functions. Here we investigate the requirements for reliable computation in this setting; that is, the evaluation of any Boolean function with success probability bounded away from 1 /2 . We show that bipartite CHSH quantum correlations suffice for reliable computation. We also prove that an arbitrarily small violation of a multipartite Greenberger-Horne-Zeilinger noncontextuality inequality also suffices for reliable computation.

  9. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    PubMed

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  10. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing

    PubMed Central

    Yang, Yixian; Shi, Yuxiang

    2018-01-01

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC. PMID:29495269

  11. 37 CFR 201.40 - Exemption to prohibition against circumvention.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... by the operator of the network. (4) Video games accessible on personal computers and protected by... copyright infringement or a violation of applicable law. (5) Computer programs protected by dongles that... editions of the work (including digital text editions made available by authorized entities) contain access...

  12. 40 CFR 63.1416 - Recordkeeping requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Recordkeeping requirements. (a) Data retention. Unless otherwise specified in this subpart, each owner or... shall be accessible from a central location by computer or other means that provides access within 2... may be maintained in hard copy or computer-readable form including, but not limited to, on paper...

  13. 40 CFR 63.1416 - Recordkeeping requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... § 63.1416 Recordkeeping requirements. (a) Data retention. Unless otherwise specified in this subpart... site or shall be accessible from a central location by computer or other means that provides access.... Records may be maintained in hard copy or computer-readable form including, but not limited to, on paper...

  14. 40 CFR 63.1416 - Recordkeeping requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... § 63.1416 Recordkeeping requirements. (a) Data retention. Unless otherwise specified in this subpart... site or shall be accessible from a central location by computer or other means that provides access.... Records may be maintained in hard copy or computer-readable form including, but not limited to, on paper...

  15. 40 CFR 63.1416 - Recordkeeping requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Recordkeeping requirements. (a) Data retention. Unless otherwise specified in this subpart, each owner or... shall be accessible from a central location by computer or other means that provides access within 2... may be maintained in hard copy or computer-readable form including, but not limited to, on paper...

  16. Cloud Computing Based E-Learning System

    ERIC Educational Resources Information Center

    Al-Zoube, Mohammed; El-Seoud, Samir Abou; Wyne, Mudasser F.

    2010-01-01

    Cloud computing technologies although in their early stages, have managed to change the way applications are going to be developed and accessed. These technologies are aimed at running applications as services over the internet on a flexible infrastructure. Microsoft office applications, such as word processing, excel spreadsheet, access database…

  17. A survey of the computer literacy of undergraduate dental students at a University Dental School in Ireland during the academic year 1997-98.

    PubMed

    Ray, N J; Hannigan, A

    1999-05-01

    As dental practice management becomes more computer-based, the efficient functioning of the dentist will become dependent on adequate computer literacy. A survey has been carried out into the computer literacy of a cohort of 140 undergraduate dental students at a University Dental School in Ireland (years 1-5), in the academic year 1997-98. Aspects investigated by anonymous questionnaire were: (1) keyboard skills; (2) computer skills; (3) access to computer facilities; (4) software competencies and (5) use of medical library computer facilities. The students are relatively unfamiliar with basic computer hardware and software: 51.1% considered their expertise with computers as "poor"; 34.3% had taken a formal typewriting or computer keyboarding course; 7.9% had taken a formal computer course at university level and 67.2% were without access to computer facilities at their term-time residences. A majority of students had never used either word-processing, spreadsheet, or graphics programs. Programs relating to "informatics" were more popular, such as literature searching, accessing the Internet and the use of e-mail which represent the major use of the computers in the medical library. The lack of experience with computers may be addressed by including suitable computing courses at the secondary level (age 13-18 years) and/or tertiary level (FE/HE) education programmes. Such training may promote greater use of generic softwares, particularly in the library, with a more electronic-based approach to data handling.

  18. How medical students use the computer and Internet at a Turkish military medical school.

    PubMed

    Kir, Tayfun; Ogur, Recai; Kilic, Selim; Tekbas, Omer Faruk; Hasde, Metin

    2004-12-01

    The aim of this study was to determine how medical students use the computer and World Wide Web at a Turkish military medical school and to discuss characteristics related to this computer use. The study was conducted in 2003 in the Department of Public Health at the Gulhane Military Medical School in Ankara, Turkey. A survey developed by the authors was distributed to 508 students, after pretest. Responses were analyzed statistically by using a computer. Most of the students (86.4%) could access a computer and the Internet and all of the computers that were used by students had Internet connections, and a small group (8.9%) had owned their own computers. One-half of the students use notes provided by attending stuff and textbooks as assistant resources for their studies. The most common usage of computers was connecting to the Internet (91.9%), and the most common use of the Internet was e-mail communication (81.6%). The most preferred site category for daily visit was newspaper sites (62.8%). Approximately 44.1% of students visited medical sites when they were surfing. Also, there was a negative correlation between school performance and the time spent for computer and Internet use (-0.056 and -0.034, respectively). It was observed that medical students used the computer and Internet essentially for nonmedical purposes. To encourage students to use the computer and Internet for medical purposes, tutors should use the computer and Internet during their teaching activities, and software companies should produce assistant applications for medical students. Also, medical schools should build interactive World Wide Web sites, e-mail groups, discussion boards, and study areas for medical students.

  19. PRANAS: A New Platform for Retinal Analysis and Simulation.

    PubMed

    Cessac, Bruno; Kornprobst, Pierre; Kraria, Selim; Nasser, Hassan; Pamplona, Daniela; Portelli, Geoffrey; Viéville, Thierry

    2017-01-01

    The retina encodes visual scenes by trains of action potentials that are sent to the brain via the optic nerve. In this paper, we describe a new free access user-end software allowing to better understand this coding. It is called PRANAS (https://pranas.inria.fr), standing for Platform for Retinal ANalysis And Simulation. PRANAS targets neuroscientists and modelers by providing a unique set of retina-related tools. PRANAS integrates a retina simulator allowing large scale simulations while keeping a strong biological plausibility and a toolbox for the analysis of spike train population statistics. The statistical method (entropy maximization under constraints) takes into account both spatial and temporal correlations as constraints, allowing to analyze the effects of memory on statistics. PRANAS also integrates a tool computing and representing in 3D (time-space) receptive fields. All these tools are accessible through a friendly graphical user interface. The most CPU-costly of them have been implemented to run in parallel.

  20. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  1. A Method for Selection of Appropriate Assistive Technology for Computer Access

    ERIC Educational Resources Information Center

    Jenko, Mojca

    2010-01-01

    Assistive technologies (ATs) for computer access enable people with disabilities to be included in the information society. Current methods for assessment and selection of the most appropriate AT for each individual are nonstandardized, lengthy, subjective, and require substantial clinical experience of a multidisciplinary team. This manuscript…

  2. Techtalk: Telecommunications for Improving Developmental Education.

    ERIC Educational Resources Information Center

    Caverly, David C.; Broderick, Bill

    1993-01-01

    Explains how to access the Internet, discussing hardware and software considerations, connectivity, and types of access available to users. Describes the uses of electronic mail; TELNET, a method for remotely logging onto another computer; and anonymous File Transfer Protocol (FTP), a method for downloading files from a remote computer. (MAB)

  3. Developing and Applying Smartphone Apps in Online Courses

    ERIC Educational Resources Information Center

    Yan, Gongjun; Rawat, Danda B.; Shi, Hui; Alnusair, Awny

    2014-01-01

    Online courses provide students flexible access to class at anytime and anywhere. Most online courses currently rely on computer-based delivery. However, computers still burden instructors and students with limited mobility and flexibility. To provide more convenient access to online courses, smartphones have been increasingly adopted as a mobile…

  4. Divergence of Digital World of Teachers

    ERIC Educational Resources Information Center

    Uzunboylu, Huseyin; Tuncay, Nazime

    2010-01-01

    There exists great diversity in the teachers' digital world. Teachers are being discriminated based on numerous educational gaps. This paper seeks to assess the extent of the digital divide among the North Cyprus vocational teachers along the four axes: age, Internet access, computer access, and performance (computing knowledge/experience). A…

  5. Computer Exercises to Encourage Rethinking and Revision.

    ERIC Educational Resources Information Center

    Duin, Ann

    1987-01-01

    Discusses writing instruction with the use of ACCESS (A Computer Composing Educational Software System), a program that allows the design of virtually any lesson or exercise a teacher envisions. Describes how ACCESS does the actual programming while the instructor provides the menus and overall program design. Appends 22 practical exercises. (NKA)

  6. The Classroom in Your Pocket?

    ERIC Educational Resources Information Center

    Power, Tom; Thomas, Rhodri

    2007-01-01

    Research exploring the ways in which information communication technologies (ICTs) could improve access to, and the quality of, teacher education in the global south (Leach et al., 2006) showed that when teachers were given sustained training, support and access to laptop and handheld computers, they found the handheld and laptop computers equally…

  7. Circuit-Switched Memory Access in Photonic Interconnection Networks for High-Performance Embedded Computing

    DTIC Science & Technology

    2010-07-22

    dependent , providing a natural bandwidth match between compute cores and the memory subsystem. • High Bandwidth Dcnsity. Waveguides crossing the chip...simulate this memory access architecture on a 2S6-core chip with a concentrated 64-node network lIsing detailed traces of high-performance embedded...memory modulcs, wc placc memory access poi nts (MAPs) around the pcriphery of the chip connected to thc nctwork. These MAPs, shown in Figure 4, contain

  8. Comparative adoption of cone beam computed tomography and panoramic radiography machines across Australia.

    PubMed

    Zhang, A; Critchley, S; Monsour, P A

    2016-12-01

    The aim of the present study was to assess the current adoption of cone beam computed tomography (CBCT) and panoramic radiography (PR) machines across Australia. Information regarding registered CBCT and PR machines was obtained from radiation regulators across Australia. The number of X-ray machines was correlated with the population size, the number of dentists, and the gross state product (GSP) per capita, to determine the best fitting regression model(s). In 2014, there were 232 CBCT and 1681 PR machines registered in Australia. Based on absolute counts, Queensland had the largest number of CBCT and PR machines whereas the Northern Territory had the smallest number. However, when based on accessibility in terms of the population size and the number of dentists, the Australian Capital Territory had the most CBCT machines and Western Australia had the most PR machines. The number of X-ray machines correlated strongly with both the population size and the number of dentists, but not with the GSP per capita. In 2014, the ratio of PR to CBCT machines was approximately 7:1. Projected increases in either the population size or the number of dentists could positively impact on the adoption of PR and CBCT machines in Australia. © 2016 Australian Dental Association.

  9. Scanless nonlinear optical microscope for image reconstruction and space-time correlation analysis

    NASA Astrophysics Data System (ADS)

    Ceffa, N. G.; Radaelli, F.; Pozzi, P.; Collini, M.; Sironi, L.; D'alfonso, L.; Chirico, G.

    2017-06-01

    Optical Microscopy has been applied to life science from its birth and reached widespread application due to its major advantages: limited perturbation of the biological tissue and the easy accessibility of the light sources. However, as the spatial and time resolution requirements and the time stability of the microscopes increase, researchers are struggling against some of its limitations: limited transparency and the refractivity of the living tissue to light and the field perturbations induced by the path in the tissue. We have developed a compact stand-alone, completely scan-less, optical setup that allows to acquire non-linear excitation images and to measure the sample dynamics simultaneously on an ensemble of arbitrary chosen regions of interests. The image is obtained by shining a square array of spots on the sample obtained by a spatial light modulator and by shifting it (10 ms refresh time) on the sample. The final image is computed from the superposition of (100-1000) images. Filtering procedures can be applied to the raw images of the excitation array before building the image. We discuss results that show how this setup can be used for the correction of wave front aberrations induced by turbid samples (such as living tissues) and for the computation of space-time cross-correlations in complex networks.

  10. Complementarity of information and the emergence of the classical world

    NASA Astrophysics Data System (ADS)

    Zwolak, Michael; Zurek, Wojciech

    2013-03-01

    We prove an anti-symmetry property relating accessible information about a system through some auxiliary system F and the quantum discord with respect to a complementary system F'. In Quantum Darwinism, where fragments of the environment relay information to observers - this relation allows us to understand some fundamental properties regarding correlations between a quantum system and its environment. First, it relies on a natural separation of accessible information and quantum information about a system. Under decoherence, this separation shows that accessible information is maximized for the quasi-classical pointer observable. Other observables are accessible only via correlations with the pointer observable. Second, It shows that objective information becomes accessible to many observers only when quantum information is relegated to correlations with the global environment, and, therefore, locally inaccessible. The resulting complementarity explains why, in a quantum Universe, we perceive objective classical reality, and supports Bohr's intuition that quantum phenomena acquire classical reality only when communicated.

  11. Complementarity of quantum discord and classically accessible information

    DOE PAGES

    Zwolak, Michael P.; Zurek, Wojciech H.

    2013-05-20

    The sum of the Holevo quantity (that bounds the capacity of quantum channels to transmit classical information about an observable) and the quantum discord (a measure of the quantumness of correlations of that observable) yields an observable-independent total given by the quantum mutual information. This split naturally delineates information about quantum systems accessible to observers – information that is redundantly transmitted by the environment – while showing that it is maximized for the quasi-classical pointer observable. Other observables are accessible only via correlations with the pointer observable. In addition, we prove an anti-symmetry property relating accessible information and discord. Itmore » shows that information becomes objective – accessible to many observers – only as quantum information is relegated to correlations with the global environment, and, therefore, locally inaccessible. Lastly, the resulting complementarity explains why, in a quantum Universe, we perceive objective classical reality while flagrantly quantum superpositions are out of reach.« less

  12. Temporal and spatial organization of doctors' computer usage in a UK hospital department.

    PubMed

    Martins, H M G; Nightingale, P; Jones, M R

    2005-06-01

    This paper describes the use of an application accessible via distributed desktop computing and wireless mobile devices in a specialist department of a UK acute hospital. Data (application logs, in-depth interviews, and ethnographic observation) were simultaneously collected to study doctors' work via this application, when and where they accessed different areas of it, and from what computing devices. These show that the application is widely used, but in significantly different ways over time and space. For example, physicians and surgeons differ in how they use the application and in their choice of mobile or desktop computing. Consultants and junior doctors in the same teams also seem to access different sources of patient information, at different times, and from different locations. Mobile technology was used almost exclusively during the morning by groups of clinicians, predominantly for ward rounds.

  13. Pilot study utilizing Fluorine-18 fluorodeoxyglucose-positron emission tomography/computed tomography for glycolytic phenotyping of canine mast cell tumors.

    PubMed

    Griffin, Lynn R; Thamm, Doug H; Selmic, Laura E; Ehrhart, E J; Randall, Elissa

    2018-03-23

    The goal of this prospective pilot study was to use naturally occurring canine mast cell tumors of various grades and stages as a model for attempting to determine how glucose uptake and markers of biologic behavior are correlated. It was hypothesized that enhanced glucose uptake, as measured by 2-[fluorine-18]fluoro-d-glucose-positron emission tomography/computed tomography (F18 FDG PET-CT), would correlate with histologic grade. Dogs were recruited for this study from a population referred for treatment of cytologically or histologically confirmed mast cell tumors. Patients were staged utilizing standard of care methods (abdominal ultrasound and three view thoracic radiographs), followed by a whole body F18 FDG PET-CT. Results of the F18 FDG PET-CT were analyzed for possible metastasis and standard uptake value maximum (SUV max ) of identified lesions. Incisional or excisional biopsies of the accessible mast cell tumors were obtained and histology performed. Results were then analyzed to look for a possible correlation between the grade of mast cell tumors and SUV max . A total of nine animals were included in the sample. Findings indicated that there was a correlation between grade of mast cell tumors and SUV max as determined by F18 FDG PET-CT (p-value = 0.073, significance ≤ 0.1). Based on the limited power of this study, it is felt that further research to examine the relationship between glucose utilization and biologic aggressiveness in canine mast cell tumors is warranted. This study was unable to show that F18 FDG PET-CT was a better staging tool than standard of care methods. © 2018 American College of Veterinary Radiology.

  14. Computer and cell phone access for individuals with mobility impairments: an overview and case studies.

    PubMed

    Burgstahler, Sheryl; Comden, Dan; Lee, Sang-Mook; Arnold, Anthony; Brown, Kayla

    2011-01-01

    Computers, telephones, and assistive technology hold promise for increasing the independence, productivity, and participation of individuals with disabilities in academic, employment, recreation, and other activities. However, to reach this goal, technology must be accessible to, available to, and usable by everyone. The authors of this article share computer and telephone access challenges faced by individuals with neurological and other impairments, assistive technology solutions, issues that impact product adoption and use, needs for new technologies, and recommendations for practitioners and researchers. They highlight the stories of three individuals with neurological/mobility impairments, the technology they have found useful to them, and their recommendations for future product development.

  15. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  16. Evidence of effectiveness of health care professionals using handheld computers: a scoping review of systematic reviews.

    PubMed

    Mickan, Sharon; Tilson, Julie K; Atherton, Helen; Roberts, Nia Wyn; Heneghan, Carl

    2013-10-28

    Handheld computers and mobile devices provide instant access to vast amounts and types of useful information for health care professionals. Their reduced size and increased processing speed has led to rapid adoption in health care. Thus, it is important to identify whether handheld computers are actually effective in clinical practice. A scoping review of systematic reviews was designed to provide a quick overview of the documented evidence of effectiveness for health care professionals using handheld computers in their clinical work. A detailed search, sensitive for systematic reviews was applied for Cochrane, Medline, EMBASE, PsycINFO, Allied and Complementary Medicine Database (AMED), Global Health, and Cumulative Index to Nursing and Allied Health Literature (CINAHL) databases. All outcomes that demonstrated effectiveness in clinical practice were included. Classroom learning and patient use of handheld computers were excluded. Quality was assessed using the Assessment of Multiple Systematic Reviews (AMSTAR) tool. A previously published conceptual framework was used as the basis for dual data extraction. Reported outcomes were summarized according to the primary function of the handheld computer. Five systematic reviews met the inclusion and quality criteria. Together, they reviewed 138 unique primary studies. Most reviewed descriptive intervention studies, where physicians, pharmacists, or medical students used personal digital assistants. Effectiveness was demonstrated across four distinct functions of handheld computers: patient documentation, patient care, information seeking, and professional work patterns. Within each of these functions, a range of positive outcomes were reported using both objective and self-report measures. The use of handheld computers improved patient documentation through more complete recording, fewer documentation errors, and increased efficiency. Handheld computers provided easy access to clinical decision support systems and patient management systems, which improved decision making for patient care. Handheld computers saved time and gave earlier access to new information. There were also reports that handheld computers enhanced work patterns and efficiency. This scoping review summarizes the secondary evidence for effectiveness of handheld computers and mhealth. It provides a snapshot of effective use by health care professionals across four key functions. We identified evidence to suggest that handheld computers provide easy and timely access to information and enable accurate and complete documentation. Further, they can give health care professionals instant access to evidence-based decision support and patient management systems to improve clinical decision making. Finally, there is evidence that handheld computers allow health professionals to be more efficient in their work practices. It is anticipated that this evidence will guide clinicians and managers in implementing handheld computers in clinical practice and in designing future research.

  17. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  18. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, Xiuying; Deng, Donglin; Yuan, Xinxing; Hou, Panyu; Huang, Yuanyuan; Duan, Luming; Department of Physics, University of Michigan Collaboration; CenterQuantum Information in Tsinghua University Team

    2017-04-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  19. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  20. ACCESS 1: Approximation Concepts Code for Efficient Structural Synthesis program documentation and user's guide

    NASA Technical Reports Server (NTRS)

    Miura, H.; Schmit, L. A., Jr.

    1976-01-01

    The program documentation and user's guide for the ACCESS-1 computer program is presented. ACCESS-1 is a research oriented program which implements a collection of approximation concepts to achieve excellent efficiency in structural synthesis. The finite element method is used for structural analysis and general mathematical programming algorithms are applied in the design optimization procedure. Implementation of the computer program, preparation of input data and basic program structure are described, and three illustrative examples are given.

  1. Computer and Internet usage by Canadian dentists.

    PubMed

    Flores-Mir, Carlos; Palmer, Neal G; Northcott, Herbert C; Huston, Carolyn; Major, Paul W

    2006-03-01

    To determine the frequency of computers in Canadian dental offices and to assess their use; to evaluate Internet access and use in Canadian dental offices; and to compare use of computers and the Internet by Canadian dentists, by the general public and by other dental groups. An anonymous, self-administered survey of Canadian dentists was conducted by mail. A potential mailing list of 14,052 active Canadian dentists was compiled from the 2003 records of provincial regulatory bodies. For each province, 7.8% of the general dentists were randomly selected with the help of computer software. The surveys were mailed to this stratified random sample of 1,096 dentists. The response rate was 28%. Of the 312 respondents, 4 (1%) were in full-time academic positions, 15 (5%) were not practising, and 9 (3%) provided incomplete data. Therefore, 284 survey responses were available for descriptive analysis. Two hundred and fifty-seven (90%) of the respondents had a computer in their primary practice. Computers were used mainly for administrative tasks (accounting, bookkeeping and scheduling) rather than clinical tasks. Internet access was common (185/250 or 74%), and high-speed Internet access (93/250 or 37%) was increasingly common, judging from the results of previous studies on computer use. The main reasons given for not having in-office Internet access were security or privacy concerns and no reported need for or interest in the service. Computer use was high in this sample of Canadian dentists, but a small proportion of dental offices remained without computers. Canadian dentists" use of the Internet was greater than that of American dentists, private enterprise and the North American public in general.

  2. Exploring the experience of clients with tetraplegia utilizing assistive technology for computer access.

    PubMed

    Folan, Alyce; Barclay, Linda; Cooper, Cathy; Robinson, Merren

    2015-01-01

    Assistive technology for computer access can be used to facilitate people with a spinal cord injury to utilize mainstream computer applications, thereby enabling participation in a variety of meaningful occupations. The aim of this study was to gain an understanding of the experiences of clients with tetraplegia trialing assistive technologies for computer access during different stages in a public rehabilitation service. In order to explore the experiences of clients with tetraplegia trialing assistive technologies for computer use, qualitative methodology was selected. Data were collected from seven participants using semi-structured interviews, which were audio-taped, transcribed and analyzed thematically. Three main themes were identified. These were: getting back into life, assisting in adjusting to injury and learning new skills. The findings from this study demonstrated that people with tetraplegia can be assisted to return to previous life roles or engage in new roles, through developing skills in the use of assistive technology for computer access. Being able to use computers for meaningful activities contributed to the participants gaining an enhanced sense of self-efficacy, and thereby quality of life. Implications for Rehabilitation Findings from this pilot study indicate that people with tetraplegia can be assisted to return to previous life roles, and develop new roles that have meaning to them through the use of assistive technologies for computer use. Being able to use the internet to socialize, and complete daily tasks, contributed to the participants gaining a sense of control over their lives. Early introduction to assistive technology is important to ensure sufficient time for newly injured people to feel comfortable enough with the assistive technology to use the computers productively by the time of discharge. Further research into this important and expanding area is indicated.

  3. Trace-Authored Papers from the Annual Conference on Rehabilitation Technology (11th, Montreal, Canada, 1988). Trace Reprint Series.

    ERIC Educational Resources Information Center

    Borden, P. A.; And Others

    Summaries are presented of five conference papers on communication, control, and computer access for handicapped individuals. Papers have the following titles and authors: "Accessibility of Graphically Based User Interface Computer Systems for Individuals with Visual Impairments" (Charles Lee and Gregg Vanderheiden); "Data Base vs. Information…

  4. 78 FR 47805 - Test Documentation for Digital Computer Software Used in Safety Systems of Nuclear Power Plants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-06

    ... Documents Access and Management System (ADAMS): You may access publicly available documents online in the... Management Plans for Digital Computer Software used in Safety Systems of Nuclear Power Plants,'' issued for... Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear Regulatory Commission. ACTION: Revision...

  5. Computer Access and Use: Understanding the Expectations of Indian Rural Students

    ERIC Educational Resources Information Center

    Kumar, B. T. Sampath; Basavaraja, M. T.

    2016-01-01

    Purpose: This study aims to understand the expectations of rural students with respect to their computer access and use. It also made an attempt to learn the expectations of rural students from their schools and local government in providing the information and communication technology (ICT) infrastructure. Design/methodology/approach: Interview…

  6. Contextual Factors Influencing Access to Teaching Computational Thinking

    ERIC Educational Resources Information Center

    Kale, Ugur; Akcaoglu, Mete; Cullen, Theresa; Goh, Debbie

    2018-01-01

    This study attempts to determine whether teachers' access to computational thinking (CT) and CT technologies varies by rurality (rural versus urban) of the school county and grade level taught (primary versus secondary). A total of 81 teachers from West Virginia, Georgia, and Oklahoma participated in this survey study. Overall, teachers found CT…

  7. Their World, Our World--Bridging the Divide

    ERIC Educational Resources Information Center

    Oldknow, Adrian

    2009-01-01

    Students worldwide are gaining access to powerful computing devices and services. They are learning from each other how to find and share information, how to carry out useful tasks such as editing images and video, where to find the best entertainment, etc. Classrooms, especially in the UK, are changing to make better access to computer technology…

  8. Predictors of Creative Computing Participation and Profiles of Experience in Two Silicon Valley Middle Schools

    ERIC Educational Resources Information Center

    Barron, Brigid; Walter, Sarah E.; Martin, Caitlin Kennedy; Schatz, Colin

    2010-01-01

    Examination of the "digital divide" has increasingly gone beyond the study of differences in physical access to computers to focus on individuals' use of technological tools for empowered and generative uses. In this research study, we investigated the relationship between access to tools and experience with creative production…

  9. 41 CFR 105-72.603 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... representatives, have the right of timely and unrestricted access to any books, documents, papers, or other... accounting computations of the rate at which a particular group of costs is chargeable (such as computer... records starts at the end of the fiscal year (or other accounting period) covered by the proposal, plan...

  10. 29 CFR 95.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., have the right of timely and unrestricted access to any books, documents, papers, or other records of... allocation plans, and any similar accounting computations of the rate at which a particular group of costs is... of the fiscal year (or other accounting period) covered by the proposal, plan, or other computation...

  11. CART (Communication Access Realtime Translation). PEPNet Tipsheet

    ERIC Educational Resources Information Center

    Larson, Judy, Comp.

    1999-01-01

    Communication Access Realtime Translation--(CART)--is the instant translation of the spoken word into English text performed by a CART reporter using a stenotype machine, notebook computer and realtime software. The text is then displayed on a computer monitor or other display device for the student who is deaf or hard of hearing to read. This…

  12. Information Systems at Enterprise. Design of Secure Network of Enterprise

    NASA Astrophysics Data System (ADS)

    Saigushev, N. Y.; Mikhailova, U. V.; Vedeneeva, O. A.; Tsaran, A. A.

    2018-05-01

    No enterprise and company can do without designing its own corporate network in today's information society. It accelerates and facilitates the work of employees at any level, but contains a big threat to confidential information of the company. In addition to the data theft attackers, there are plenty of information threats posed by modern malware effects. In this regard, the computational security of corporate networks is an important component of modern information technologies of computer security for any enterprise. This article says about the design of the protected corporate network of the enterprise that provides the computers on the network access to the Internet, as well interoperability with the branch. The access speed to the Internet at a high level is provided through the use of high-speed access channels and load balancing between devices. The security of the designed network is performed through the use of VLAN technology as well as access lists and AAA server.

  13. Utilization of internet technology by low-income adults: the role of health literacy, health numeracy, and computer assistance.

    PubMed

    Jensen, Jakob D; King, Andy J; Davis, LaShara A; Guntzviller, Lisa M

    2010-09-01

    To examine whether low-income adults' utilization of Internet technology is predicted or mediated by health literacy, health numeracy, and computer assistance. Low-income adults (N = 131) from the midwestern United States were surveyed about their technology access and use. Individuals with low health literacy skills were less likely to use Internet technology (e.g., email, search engines, and online health information seeking), and those with low health numeracy skills were less likely to have access to Internet technology (e.g., computers and cell phones). Consistent with past research, males, older participants, and those with less education were less likely to search for health information online. The relationship between age and online health information seeking was mediated by participant literacy. The present study suggests that significant advances in technology access and use could be sparked by developing technology interfaces that are accessible to individuals with limited literacy skills.

  14. A Big Data Platform for Storing, Accessing, Mining and Learning Geospatial Data

    NASA Astrophysics Data System (ADS)

    Yang, C. P.; Bambacus, M.; Duffy, D.; Little, M. M.

    2017-12-01

    Big Data is becoming a norm in geoscience domains. A platform that is capable to effiently manage, access, analyze, mine, and learn the big data for new information and knowledge is desired. This paper introduces our latest effort on developing such a platform based on our past years' experiences on cloud and high performance computing, analyzing big data, comparing big data containers, and mining big geospatial data for new information. The platform includes four layers: a) the bottom layer includes a computing infrastructure with proper network, computer, and storage systems; b) the 2nd layer is a cloud computing layer based on virtualization to provide on demand computing services for upper layers; c) the 3rd layer is big data containers that are customized for dealing with different types of data and functionalities; d) the 4th layer is a big data presentation layer that supports the effient management, access, analyses, mining and learning of big geospatial data.

  15. Optimizing physician access to surgical intensive care unit laboratory information through mobile computing.

    PubMed

    Strain, J J; Felciano, R M; Seiver, A; Acuff, R; Fagan, L

    1996-01-01

    Approximately 30 minutes of computer access time are required by surgical residents at Stanford University Medical Center (SUMC) to examine the lab values of all patients on a surgical intensive care unit (ICU) service, a task that must be performed several times a day. To reduce the time accessing this information and simultaneously increase the readability and currency of the data, we have created a mobile, pen-based user interface and software system that delivers lab results to surgeons in the ICU. The ScroungeMaster system, loaded on a portable tablet computer, retrieves lab results for a subset of patients from the central laboratory computer and stores them in a local database cache. The cache can be updated on command; this update takes approximately 2.7 minutes for all ICU patients being followed by the surgeon, and can be performed as a background task while the user continues to access selected lab results. The user interface presents lab results according to physiologic system. Which labs are displayed first is governed by a layout selection algorithm based on previous accesses to the patient's lab information, physician preferences, and the nature of the patient's medical condition. Initial evaluation of the system has shown that physicians prefer the ScroungeMaster interface to that of existing systems at SUMC and are satisfied with the system's performance. We discuss the evolution of ScroungeMaster and make observations on changes to physician work flow with the presence of mobile, pen-based computing in the ICU.

  16. NEMAR plotting computer program

    NASA Technical Reports Server (NTRS)

    Myler, T. R.

    1981-01-01

    A FORTRAN coded computer program which generates CalComp plots of trajectory parameters is examined. The trajectory parameters are calculated and placed on a data file by the Near Earth Mission Analysis Routine computer program. The plot program accesses the data file and generates the plots as defined by inputs to the plot program. Program theory, user instructions, output definitions, subroutine descriptions and detailed FORTRAN coding information are included. Although this plot program utilizes a random access data file, a data file of the same type and formatted in 102 numbers per record could be generated by any computer program and used by this plot program.

  17. Integrated system for well-to-well correlation with geological knowledge base

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saito, K.; Doi, E.; Uchiyama, T.

    1987-05-01

    A task of well-to-well correlation is an essential part of the reservoir description study. Since the task is involved with diverse data such as logs, dipmeter, seismic, and reservoir engineering, a system with simultaneous access to such data is desirable. A system is developed to aid stratigraphic correlation under a Xerox 1108 workstation, written in INTERLISP-D. The system uses log, dipmeter, seismic, and computer-processed results such as Litho-Analysis and LSA (Log Shape Analyzer). The system first defines zones which are segmentations of log data into consistent layers using Litho-Analysis and LSA results. Each zone is defined as a minimum unitmore » for correlation with slot values of lithology, thickness, log values, and log shape such as bell, cylinder, and funnel. Using a user's input of local geological knowledge such as depositional environment, the system selects marker beds and performs correlation among the wells chosen from the base map. Correlation is performed first with markers and then with sandstones of lesser lateral extent. Structural dip and seismic horizon are guides for seeking a correlatable event. Knowledge of sand body geometry such as ratio of thickness and width is also used to provide a guide on how far a correlation should be made. Correlation results performed by the system are displayed on the screen for the user to examine and modify. The system has been tested with data sets from several depositional settings and has shown to be a useful tool for correlation work. The results are stored as a data base for structural mapping and reservoir engineering study.« less

  18. Ferumoxytol MRA for transcatheter aortic valve replacement planning with renal insufficiency.

    PubMed

    Kallianos, Kimberly; Henry, Travis S; Yeghiazarians, Yerem; Zimmet, Jeffrey; Shunk, Kendrick A; Tseng, Elaine E; Mahadevan, Vaikom; Hope, Michael D

    2017-03-15

    Computed tomography angiography (CTA) is the test of choice for pre-procedure imaging of transcatheter aortic valve replacement (TAVR) candidates. The iodinated contrast required, however, increases the risk of renal dysfunction in patients with pre-existing renal failure. Ferumoxytol is a magnetic resonance imaging (MRI) contrast agent that can be used with renal failure. Its long vascular resonance time allows gated MRA sequences that approach CTA in image quality. We present respiratory and cardiac gated MRA enabled by ferumoxytol that can be post-processed in an analogous fashion to CTA. Seven patients with renal failure presenting for TAVR were imaged with respiratory and cardiac gated MRA at 3T using ferumoxtyol for contrast. Aortic annulus, root and peripheral access dimensions were calculated in a fashion identical to that used for CTA. Of these, 6 patients underwent a TAVR procedure and 5 had intraoperative valve assessment with transesophageal echocardiograph (TEE) using standard clinical protocols that employed both two- and three-dimensional techniques. Good correlation between MRA aortic annulus measurements and those from TEE were shown in 5 patients with mean annulus area of 392.4mm 2 (290-470 range) versus 374.1mm 2 (285-440 range), with a pairwise correlation coefficient of 0.92, p=0.029. All patients received Sapien valve implants (one 20mm, three 23mm, and two 26mm valves). Access decisions were guided by MRA with no complications. Annulus sizing resulted in no greater than trace/mild aortic regurgitation in all patients. Ferumoxytol MRA is a safe alternative to CTA in patients with renal failure for pre-TAVR analysis of the aortic root and peripheral access. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. OMPC: an Open-Source MATLAB®-to-Python Compiler

    PubMed Central

    Jurica, Peter; van Leeuwen, Cees

    2008-01-01

    Free access to scientific information facilitates scientific progress. Open-access scientific journals are a first step in this direction; a further step is to make auxiliary and supplementary materials that accompany scientific publications, such as methodological procedures and data-analysis tools, open and accessible to the scientific community. To this purpose it is instrumental to establish a software base, which will grow toward a comprehensive free and open-source language of technical and scientific computing. Endeavors in this direction are met with an important obstacle. MATLAB®, the predominant computation tool in many fields of research, is a closed-source commercial product. To facilitate the transition to an open computation platform, we propose Open-source MATLAB®-to-Python Compiler (OMPC), a platform that uses syntax adaptation and emulation to allow transparent import of existing MATLAB® functions into Python programs. The imported MATLAB® modules will run independently of MATLAB®, relying on Python's numerical and scientific libraries. Python offers a stable and mature open source platform that, in many respects, surpasses commonly used, expensive commercial closed source packages. The proposed software will therefore facilitate the transparent transition towards a free and general open-source lingua franca for scientific computation, while enabling access to the existing methods and algorithms of technical computing already available in MATLAB®. OMPC is available at http://ompc.juricap.com. PMID:19225577

  20. Math and science technology access and use in South Dakota public schools grades three through five

    NASA Astrophysics Data System (ADS)

    Schwietert, Debra L.

    The development of K-12 technology standards, soon to be added to state testing of technology proficiency, and the increasing presence of computers in homes and classrooms reflects the growing importance of technology in current society. This study examined math and science teachers' responses on a survey of technology use in grades three through five in South Dakota. A researcher-developed survey instrument was used to collect data from a random sample of 100 public schools throughout the South Dakota. Forced choice and open-ended responses were recorded. Most teachers have access to computers, but they lack resources to purchase software for their content areas, especially in science areas. Three-fourths of teachers in this study reported multiple computers in their classrooms and 67% reported access to labs in other areas of the school building. These numbers are lower than the national average of 84% of teachers with computers in their classrooms and 95% with access to computers elsewhere in the building (USDOE, 2000). Almost eight out of 10 teachers noted time as a barrier to learning more about educational software. Additional barriers included lack of school funds (38%), access to relevant training (32%), personal funds (30%), and poor quality of training (7%). Teachers most often use math and science software as supplemental, with practice tutorials cited as another common use. The most common interest for software was math for both boys and girls. The second most common choice for boys was science and for girls, language arts. Teachers reported that there was no preference for either individual or group work on computers for girls or boys. Most teachers do not systematically evaluate software for gender preferences, but review software over subjectively.

  1. Computer Instrumentation and the New Tools of Science.

    ERIC Educational Resources Information Center

    Snyder, H. David

    1990-01-01

    The impact and uses of new technologies in science teaching are discussed. Included are computers, software, sensors, integrated circuits, computer signal access, and computer interfaces. Uses and advantages of these new technologies are suggested. (CW)

  2. Demonstrate provider accessibility with desktop and online services.

    PubMed

    2001-10-01

    It's available on personal computers with a CD or through Internet access. Assess instantly the accessibility of your provider network or the most promising areas to establish a health service with new GIS tools.

  3. Variability of nutritional and cooking quality in bean (Phaseolus vulgaris L) as a function of genotype.

    PubMed

    Saha, Supradip; Singh, Gyanendra; Mahajan, V; Gupta, H S

    2009-06-01

    Screening of natural biodiversity for the better quality traits are of prime importance for quality breeding programs. The objective of this investigation was to select candidate accession of bean having high concentrations of protein as well as macro and micro minerals with good cooking quality for use as parents in breeding programme for these compounds. Thirty-five accessions of bean (Phaseolus vulgaris L) were field grown and their seeds were analyzed for their cooking quality and nutritional composition. Wide variations were observed in most of the measurements e.g. protein (18.7-26.2%), iron (79.4-137.6 ppm) and hardness after cooking (4.65-9.88 Kg) suggesting that there are considerable levels of genetic diversity. Across all accessions the concentration of potassium was negatively correlated with protein (r = -0.43, P < 0.05). Concentrations of protein was significantly greater in accessions VIII, XIII and XIX compared to other accessions analyzed. Iron concentrations were greatest (137 ppm) in XIX and lowest (79 ppm) in XXVII. Lines with less cooking time were line III, X, XXVI, XXX and XXXI. Bean line XIX contains high protein (24.9%) with high zinc (33.3 ppm) and highest iron (137.6 ppm), but it has high hardness after cooking (7.32 kg). Four clusters were computed by cluster analysis that explained quite a good variation in the traits. The great variability for these attributes suggests that these selected accessions may be useful as parents in hybridization programs to produce bean with value-added traits. This information was also potentially useful for pulse breeders working on the development of new varieties.

  4. A computational framework for the study of confidence in humans and animals

    PubMed Central

    Kepecs, Adam; Mainen, Zachary F.

    2012-01-01

    Confidence judgements, self-assessments about the quality of a subject's knowledge, are considered a central example of metacognition. Prima facie, introspection and self-report appear the only way to access the subjective sense of confidence or uncertainty. Contrary to this notion, overt behavioural measures can be used to study confidence judgements by animals trained in decision-making tasks with perceptual or mnemonic uncertainty. Here, we suggest that a computational approach can clarify the issues involved in interpreting these tasks and provide a much needed springboard for advancing the scientific understanding of confidence. We first review relevant theories of probabilistic inference and decision-making. We then critically discuss behavioural tasks employed to measure confidence in animals and show how quantitative models can help to constrain the computational strategies underlying confidence-reporting behaviours. In our view, post-decision wagering tasks with continuous measures of confidence appear to offer the best available metrics of confidence. Since behavioural reports alone provide a limited window into mechanism, we argue that progress calls for measuring the neural representations and identifying the computations underlying confidence reports. We present a case study using such a computational approach to study the neural correlates of decision confidence in rats. This work shows that confidence assessments may be considered higher order, but can be generated using elementary neural computations that are available to a wide range of species. Finally, we discuss the relationship of confidence judgements to the wider behavioural uses of confidence and uncertainty. PMID:22492750

  5. Examining Stakeholder Perceptions of Accessibility and Utilization of Computer and Internet Technology in the Selinsgrove Area School District

    ERIC Educational Resources Information Center

    Krause, Lorinda M.

    2014-01-01

    This study utilized a mixed methods approach to examine the issue of how parents, students, and teachers (stakeholders) perceive accessibility and the utilization of computer and Internet technology within the Selinsgrove, Pennsylvania Area School District. Quantitative data was collected through the use of questionnaires distributed to the…

  6. Running GUI Applications on Peregrine from OSX | High-Performance Computing

    Science.gov Websites

    Learn how to use Virtual Network Computing to access a Linux graphical desktop environment on Peregrine local port (on, e.g., your laptop), starts a VNC server process that manages a virtual desktop on your virtual desktop. This is persistent, so remember it-you will use this password whenever accessing

  7. Trace Authored Papers from the Annual Conference on Rehabilitation Technology (13th, Washington, D.C., 1990).

    ERIC Educational Resources Information Center

    Wisconsin Univ., Madison. Trace Center.

    This document brings together eight papers presented at a rehabilitation technology conference, authored by individuals affiliated with the Trace R & D Center on Communication, Control and Computer Access for Handicapped Individuals. Titles and authors of the papers are as follows: "Current Initiatives in Accessible Computing" (Jane Berliss);…

  8. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...) separate from the computer to which the practitioner is gaining access. (b) If one factor is a hard token, it must be separate from the computer to which it is gaining access and must meet at least the criteria of FIPS 140-2 Security Level 1, as incorporated by reference in § 1311.08, for cryptographic...

  9. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) separate from the computer to which the practitioner is gaining access. (b) If one factor is a hard token, it must be separate from the computer to which it is gaining access and must meet at least the criteria of FIPS 140-2 Security Level 1, as incorporated by reference in § 1311.08, for cryptographic...

  10. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) separate from the computer to which the practitioner is gaining access. (b) If one factor is a hard token, it must be separate from the computer to which it is gaining access and must meet at least the criteria of FIPS 140-2 Security Level 1, as incorporated by reference in § 1311.08, for cryptographic...

  11. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) separate from the computer to which the practitioner is gaining access. (b) If one factor is a hard token, it must be separate from the computer to which it is gaining access and must meet at least the criteria of FIPS 140-2 Security Level 1, as incorporated by reference in § 1311.08, for cryptographic...

  12. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...) separate from the computer to which the practitioner is gaining access. (b) If one factor is a hard token, it must be separate from the computer to which it is gaining access and must meet at least the criteria of FIPS 140-2 Security Level 1, as incorporated by reference in § 1311.08, for cryptographic...

  13. Designing Programs for Multiple Configurations: "You Mean Everyone Doesn't Have a Pentium or Better!"

    ERIC Educational Resources Information Center

    Conkright, Thomas D.; Joliat, Judy

    1996-01-01

    Discusses the challenges, solutions, and compromises involved in creating computer-delivered training courseware for Apollo Travel Services, a company whose 50,000 agents must access a mainframe from many different computing configurations. Initial difficulties came in trying to manage random access memory and quicken response time, but the future…

  14. Machine learning of molecular electronic properties in chemical compound space

    NASA Astrophysics Data System (ADS)

    Montavon, Grégoire; Rupp, Matthias; Gobre, Vivekanand; Vazquez-Mayagoitia, Alvaro; Hansen, Katja; Tkatchenko, Alexandre; Müller, Klaus-Robert; Anatole von Lilienfeld, O.

    2013-09-01

    The combination of modern scientific computing with electronic structure theory can lead to an unprecedented amount of data amenable to intelligent data analysis for the identification of meaningful, novel and predictive structure-property relationships. Such relationships enable high-throughput screening for relevant properties in an exponentially growing pool of virtual compounds that are synthetically accessible. Here, we present a machine learning model, trained on a database of ab initio calculation results for thousands of organic molecules, that simultaneously predicts multiple electronic ground- and excited-state properties. The properties include atomization energy, polarizability, frontier orbital eigenvalues, ionization potential, electron affinity and excitation energies. The machine learning model is based on a deep multi-task artificial neural network, exploiting the underlying correlations between various molecular properties. The input is identical to ab initio methods, i.e. nuclear charges and Cartesian coordinates of all atoms. For small organic molecules, the accuracy of such a ‘quantum machine’ is similar, and sometimes superior, to modern quantum-chemical methods—at negligible computational cost.

  15. Role asymmetry and code transmission in signaling games: an experimental and computational investigation.

    PubMed

    Moreno, Maggie; Baggio, Giosuè

    2015-07-01

    In signaling games, a sender has private access to a state of affairs and uses a signal to inform a receiver about that state. If no common association of signals and states is initially available, sender and receiver must coordinate to develop one. How do players divide coordination labor? We show experimentally that, if players switch roles at each communication round, coordination labor is shared. However, in games with fixed roles, coordination labor is divided: Receivers adjust their mappings more frequently, whereas senders maintain the initial code, which is transmitted to receivers and becomes the common code. In a series of computer simulations, player and role asymmetry as observed experimentally were accounted for by a model in which the receiver in the first signaling round has a higher chance of adjusting its code than its partner. From this basic division of labor among players, certain properties of role asymmetry, in particular correlations with game complexity, are seen to follow. Copyright © 2014 Cognitive Science Society, Inc.

  16. Signals in inferotemporal and perirhinal cortex suggest an “untangling” of visual target information

    PubMed Central

    Pagan, Marino; Urban, Luke S.; Wohl, Margot P.; Rust, Nicole C.

    2013-01-01

    Finding sought visual targets requires our brains to flexibly combine working memory information about what we are looking for with visual information about what we are looking at. To investigate the neural computations involved in finding visual targets, we recorded neural responses in inferotemporal (IT) and perirhinal (PRH) cortex as macaque monkeys performed a task that required them to find targets within sequences of distractors. We found similar amounts of total task-specific information in both areas, however, information about whether a target was in view was more accessible using a linear read-out (i.e. was more “untangled”) in PRH. Consistent with the flow of information from IT to PRH, we also found that task-relevant information arrived earlier in IT. PRH responses were well-described by a functional model in which “untangling” computations in PRH reformat input from IT by combining neurons with asymmetric tuning correlations for target matches and distractors. PMID:23792943

  17. Ab-initio molecular dynamics in electric fields via Wannier functions: Dielectric properties of liquid water.

    NASA Astrophysics Data System (ADS)

    Sharma, Manu; Resta, Raffaele; Car, Roberto

    2004-03-01

    We have implemented a modified Car-Parrinello molecular dynamics scheme in which maximally localized Wannier functions, instead of delocalized Bloch orbitals, are used to represent ``on the fly'' the electronic wavefunction of an insulating system. Within our scheme, we account for the effects of a finite homogeneous field applied to the simulation cell; we then use the ideas of the modern theory of polarization to investigate the system's response. The dielectric response (linear and nonlinear) of a given material is thus directly accessible at a reasonable computational cost. We have performed a thorough study of the behavior of a computational sample of liquid water under the effect of an electric field. We used norm-conserving pseudopotentials, the PBE exchange-correlation potential, and supercell containing water 64 molecules. Besides providing the static response of the liquid at a given temperature, our simulations yield microscopic insight into features wich are not easily measured in experiments, particularly regarding relaxation phenomena.

  18. Variable effects of arbuscular mycorrhizal fungal inoculation on physiological and molecular measures of root and stomatal conductance of diverse Medicago truncatula accessions.

    PubMed

    Watts-Williams, Stephanie J; Cavagnaro, Timothy R; Tyerman, Stephen D

    2018-06-22

    Association with arbuscular mycorrhizal fungi (AMF) can impact on plant water relations; mycorrhizal plants can exhibit increased stomatal conductance (g s ) and root hydraulic conductance (normalised to root dry weight, L o ), and altered expression of aquaporins (AQP). Many factors regulate such responses, however, plant intraspecific diversity effects have yet to be explored. Twenty geographically diverse accessions of Medicago truncatula were inoculated with the AMF Funneliformis mosseae or mock-inoculated, and grown under well-watered conditions. Biomass, g s , shoot nutrient concentrations and mycorrhizal colonisation were measured in all accessions, and L o and gene expression in five accessions. The diverse accessions varied in physiology and gene expression; some accessions were also larger or had higher g s when colonised by F. mosseae. In the five accessions, L o was higher in two accessions when colonised by AMF, and also maintained within a much smaller range than the mock-inoculated plants. Expression of MtPIP1 correlated with both g s and L o , and when plants were more than 3% colonised, mycorrhizal colonisation correlated with L o . Accession and AMF treatments had profound effects on M. truncatula, including several measures of plant water relations. Correlations between response variables, especially between molecular and physiological variables, across genotypes, highlight the findings of this study. This article is protected by copyright. All rights reserved.

  19. Correlates of sedentary time in children: a multilevel modelling approach.

    PubMed

    Gomes, Thayse Natacha; dos Santos, Fernanda Karina; Santos, Daniel; Pereira, Sara; Chaves, Raquel; Katzmarzyk, Peter Todd; Maia, José

    2014-08-30

    Sedentary behaviour (SB) has been implicated as a potential risk factor for chronic disease. Since children spend most of their awake time in schools, this study aimed to identify individual- and school-level correlates of sedentary time using a multilevel approach, and to determine if these correlates have a similar effect in normal weight (NW) and overweight/obese (O/O) children. Sample comprised 686 Portuguese children aged 9-10 years from 23 schools that took part in the ISCOLE project. Actigraph GT3X + accelerometers were used 24 hours/day for 7 days to assess sedentary time (daily minutes <100 counts/min); BMI was computed and WHO cut-points were used to classify subjects as NW or O/O. Sex, BMI, number of siblings, family income, computer use on school days, and sleep time on school days were used as individual-level correlates. At the school level, school size (number of students), percentage of students involved in sports or physical activity (PA) clubs, school promotion of active transportation, and students' access to equipment outside school hours were used. All multilevel modelling analysis was done in SPSS, WINPEPI, and HLM. School-level correlates explain ≈ 6.0% of the total variance in sedentary time. Results (β ± SE) showed that boys (-30.85 ± 5.23), children with more siblings (-8.56 ± 2.71) and those who sleep more (-17.78 ± 3.06) were less sedentary, while children with higher family income were more sedentary (4.32 ± 1.68). At the school level, no variable was significantly correlated with sedentary time. Among weight groups, variables related to sedentary time in NW were sex, sleep time and family income, while in O/O sex, number of siblings and sleep time were significant correlates. No school-level predictors were significantly associated in either of the weight groups. Notwithstanding the relevance of the school environment in the reduction of children's sedentary time, individual and family characteristics played a more relevant role than the school context in this study.

  20. Measuring geographical accessibility to palliative and end of life (PEoLC) related facilities: a comparative study in an area with well-developed specialist palliative care (SPC) provision.

    PubMed

    Pearson, Clare; Verne, Julia; Wells, Claudia; Polato, Giovanna M; Higginson, Irene J; Gao, Wei

    2017-01-26

    Geographical accessibility is important in accessing healthcare services. Measuring it has evolved alongside technological and data analysis advances. High correlations between different methods have been detected, but no comparisons exist in the context of palliative and end of life care (PEoLC) studies. To assess how geographical accessibility can affect PEoLC, selection of an appropriate method to capture it is crucial. We therefore aimed to compare methods of measuring geographical accessibility of decedents to PEoLC-related facilities in South London, an area with well-developed SPC provision. Individual-level death registration data in 2012 (n = 18,165), from the Office for National Statistics (ONS) were linked to area-level PEoLC-related facilities from various sources. Simple and more complex measures of geographical accessibility were calculated using the residential postcodes of the decedents and postcodes of the nearest hospital, care home and hospice. Distance measures (straight-line, travel network) and travel times along the road network were compared using geographic information system (GIS) mapping and correlation analysis (Spearman rho). Borough-level maps demonstrate similarities in geographical accessibility measures. Strong positive correlation exist between straight-line and travel distances to the nearest hospital (rho = 0.97), care home (rho = 0.94) and hospice (rho = 0.99). Travel times were also highly correlated with distance measures to the nearest hospital (rho range = 0.84-0.88), care home (rho = 0.88-0.95) and hospice (rho = 0.93-0.95). All correlations were significant at p < 0.001 level. Distance-based and travel-time measures of geographical accessibility to PEoLC-related facilities in South London are similar, suggesting the choice of measure can be based on the ease of calculation.

  1. Rotational and translational dynamics and their relation to hydrogen bond lifetimes in an ionic liquid by means of NMR relaxation time experiments and molecular dynamics simulation

    NASA Astrophysics Data System (ADS)

    Strate, Anne; Neumann, Jan; Overbeck, Viviane; Bonsa, Anne-Marie; Michalik, Dirk; Paschek, Dietmar; Ludwig, Ralf

    2018-05-01

    We report a concerted theoretical and experimental effort to determine the reorientational dynamics as well as hydrogen bond lifetimes for the doubly ionic hydrogen bond +OH⋯O- in the ionic liquid (2-hydroxyethyl)trimethylammonium bis(trifluoromethylsulfonyl)imide [Ch][NTf2] by using a combination of NMR relaxation time experiments, density functional theory (DFT) calculations, and molecular dynamics (MD) simulations. Due to fast proton exchange, the determination of rotational correlation times is challenging. For molecular liquids, 17O-enhanced proton relaxation time experiments have been used to determine the rotational correlation times for the OH vectors in water or alcohols. As an alternative to those expensive isotopic substitution experiments, we employed a recently introduced approach which is providing access to the rotational dynamics from a single NMR deuteron quadrupolar relaxation time experiment. Here, the deuteron quadrupole coupling constants (DQCCs) are obtained from a relation between the DQCC and the δ1H proton chemical shifts determined from a set of DFT calculated clusters in combination with experimentally determined proton chemical shifts. The NMR-obtained rotational correlation times were compared to those obtained from MD simulations and then related to viscosities for testing the applicability of popular hydrodynamic models. In addition, hydrogen bond lifetimes were derived, using hydrogen bond population correlation functions computed from MD simulations. Here, two different time domains were observed: The short-time contributions to the hydrogen lifetimes and the reorientational correlation times have roughly the same size and are located in the picosecond range, whereas the long-time contributions decay with relaxation times in the nanosecond regime and are related to rather slow diffusion processes. The computed average hydrogen bond lifetime is dominated by the long-time process, highlighting the importance and longevity of hydrogen-bonded ion pairs in these ionic liquids.

  2. An Implemented Strategy for Campus Connectivity and Cooperative Computing.

    ERIC Educational Resources Information Center

    Halaris, Antony S.; Sloan, Lynda W.

    1989-01-01

    ConnectPac, a software package developed at Iona College to allow a computer user to access all services from a single personal computer, is described. ConnectPac uses mainframe computing to support a campus computing network, integrating personal and centralized computing into a menu-driven user environment. (Author/MLW)

  3. Spectrum of tablet computer use by medical students and residents at an academic medical center.

    PubMed

    Robinson, Robert

    2015-01-01

    Introduction. The value of tablet computer use in medical education is an area of considerable interest, with preliminary investigations showing that the majority of medical trainees feel that tablet computers added value to the curriculum. This study investigated potential differences in tablet computer use between medical students and resident physicians. Materials & Methods. Data collection for this survey was accomplished with an anonymous online questionnaire shared with the medical students and residents at Southern Illinois University School of Medicine (SIU-SOM) in July and August of 2012. Results. There were 76 medical student responses (26% response rate) and 66 resident/fellow responses to this survey (21% response rate). Residents/fellows were more likely to use tablet computers several times daily than medical students (32% vs. 20%, p = 0.035). The most common reported uses were for accessing medical reference applications (46%), e-Books (45%), and board study (32%). Residents were more likely than students to use a tablet computer to access an electronic medical record (41% vs. 21%, p = 0.010), review radiology images (27% vs. 12%, p = 0.019), and enter patient care orders (26% vs. 3%, p < 0.001). Discussion. This study shows a high prevalence and frequency of tablet computer use among physicians in training at this academic medical center. Most residents and students use tablet computers to access medical references, e-Books, and to study for board exams. Residents were more likely to use tablet computers to complete clinical tasks. Conclusions. Tablet computer use among medical students and resident physicians was common in this survey. All learners used tablet computers for point of care references and board study. Resident physicians were more likely to use tablet computers to access the EMR, enter patient care orders, and review radiology studies. This difference is likely due to the differing educational and professional demands placed on resident physicians. Further study is needed better understand how tablet computers and other mobile devices may assist in medical education and patient care.

  4. Spectrum of tablet computer use by medical students and residents at an academic medical center

    PubMed Central

    2015-01-01

    Introduction. The value of tablet computer use in medical education is an area of considerable interest, with preliminary investigations showing that the majority of medical trainees feel that tablet computers added value to the curriculum. This study investigated potential differences in tablet computer use between medical students and resident physicians. Materials & Methods. Data collection for this survey was accomplished with an anonymous online questionnaire shared with the medical students and residents at Southern Illinois University School of Medicine (SIU-SOM) in July and August of 2012. Results. There were 76 medical student responses (26% response rate) and 66 resident/fellow responses to this survey (21% response rate). Residents/fellows were more likely to use tablet computers several times daily than medical students (32% vs. 20%, p = 0.035). The most common reported uses were for accessing medical reference applications (46%), e-Books (45%), and board study (32%). Residents were more likely than students to use a tablet computer to access an electronic medical record (41% vs. 21%, p = 0.010), review radiology images (27% vs. 12%, p = 0.019), and enter patient care orders (26% vs. 3%, p < 0.001). Discussion. This study shows a high prevalence and frequency of tablet computer use among physicians in training at this academic medical center. Most residents and students use tablet computers to access medical references, e-Books, and to study for board exams. Residents were more likely to use tablet computers to complete clinical tasks. Conclusions. Tablet computer use among medical students and resident physicians was common in this survey. All learners used tablet computers for point of care references and board study. Resident physicians were more likely to use tablet computers to access the EMR, enter patient care orders, and review radiology studies. This difference is likely due to the differing educational and professional demands placed on resident physicians. Further study is needed better understand how tablet computers and other mobile devices may assist in medical education and patient care. PMID:26246973

  5. An inexpensive modification of the laboratory computer display changes emergency physicians' work habits and perceptions.

    PubMed

    Marinakis, Harry A; Zwemer, Frank L

    2003-02-01

    Little is known about how the availability of laboratory data affects emergency physicians' practice habits and satisfaction. We modified our clinical information system to display laboratory test status with continuous updates, similar to an airport arrival display. The objective of this study was to determine whether the laboratory test status display altered emergency physicians' work habits and increased satisfaction compared with the time period before implementation of laboratory test status. A retrospective analysis was performed of emergency physicians' actual use of the clinical information system before and after implementation of the laboratory test status display. Emergency physicians were retrospectively surveyed regarding the effect of laboratory test status display on their practice habits and clinical information system use. Survey responses were matched with actual use of the clinical information system. Data were analyzed by using dependent t tests and Pearson correlation coefficients. The study was conducted at a university hospital. Clinical information system use by 46 emergency physicians was analyzed. Twenty-five surveys were returned (71.4% of available emergency physicians). All emergency physicians perceived fewer clinical information system log ons per day after laboratory test status display. The actual average decrease was 19%. Emergency physicians who reported the greatest decrease in log ons per day tended to have the greatest actual decrease (r =-0.36). There was no significant correlation between actual and perceived total time logged on (r =0.08). In regard to effect on emergency physicians' practice habits, 95% reported increased efficiency, 80% reported improved satisfaction with data access, and 65% reported improved communication with patients. An inexpensive computer modification, laboratory test status display, significantly increased subjective efficiency, changed work habits, and improved satisfaction regarding data access and patient communication among emergency physicians. Knowledge of the test queue changed emergency physician behavior and improved satisfaction.

  6. Acquisition of electroencephalographic data in a large regional hospital - Bringing the brain waves to the computer.

    NASA Technical Reports Server (NTRS)

    Low, M. D.; Baker, M.; Ferguson, R.; Frost, J. D., Jr.

    1972-01-01

    This paper describes a complete electroencephalographic acquisition and transmission system, designed to meet the needs of a large hospital with multiple critical care patient monitoring units. The system provides rapid and prolonged access to a centralized recording and computing area from remote locations within the hospital complex, and from locations in other hospitals and other cities. The system includes quick-on electrode caps, amplifier units and cable transmission for access from within the hospital, and EEG digitization and telephone transmission for access from other hospitals or cities.

  7. Experimental realization of an entanglement access network and secure multi-party computation

    PubMed Central

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  8. National Computer Security Conference (16th) held at Baltimore Convention Center, Baltimore, Maryland on September 20-23, 1993. Proceedings

    DTIC Science & Technology

    1993-09-23

    answer to the question: Is subject s allowed access type a on object o? An authorization was thus seen as a 3-tuple (s,o,a). This view of access...called trusted in a Bell-LaPadula architecture. Work at Carnegie Mellon University on type enforcement contemporaneous with Denning’s was not addressed in...34Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment," Proceedings of the 15th National Computer Security

  9. Connectivity to computers and the Internet among patients with schizophrenia spectrum disorders: a cross-sectional study.

    PubMed

    Välimäki, Maritta; Kuosmanen, Lauri; Hätönen, Heli; Koivunen, Marita; Pitkänen, Anneli; Athanasopoulou, Christina; Anttila, Minna

    2017-01-01

    Information and communication technologies have been developed for a variety of health care applications and user groups in the field of health care. This study examined the connectivity to computers and the Internet among patients with schizophrenia spectrum disorders (SSDs). A cross-sectional survey design was used to study 311 adults with SSDs from the inpatient units of two psychiatric hospitals in Finland. The data collection lasted for 20 months and was done through patients' medical records and a self-reported, structured questionnaire. Data analysis included descriptive statistics. In total, 297 patients were included in this study (response rate =96%). More than half of them (n=156; 55%) had a computer and less than half of them (n=127; 44%) had the Internet at home. Of those who generally had access to computers and the Internet, more than one-fourth (n=85; 29%) used computers daily, and >30% (n=96; 33%) never accessed the Internet. In total, approximately one-fourth of them (n=134; 25%) learned to use computers, and less than one-third of them (n=143; 31%) were known to use the Internet by themselves. Older people (aged 45-65 years) and those with less years of education (primary school) tended not to use the computers and the Internet at all ( P <0.001), and younger people and those with higher education were associated with more active use. Patients had quite good access to use computers and the Internet, and they mainly used the Internet to seek information. Social, occupational, and psychological functioning (which were evaluated with Global Assessment of Functioning) were not associated with access to and frequency of computer and the Internet use. The results support the use of computers and the Internet as part of clinical work in mental health care.

  10. Centralized Authorization Using a Direct Service, Part II

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wachsmann, A

    Authorization is the process of deciding if entity X is allowed to have access to resource Y. Determining the identity of X is the job of the authentication process. One task of authorization in computer networks is to define and determine which user has access to which computers in the network. On Linux, the tendency exists to create a local account for each single user who should be allowed to logon to a computer. This is typically the case because a user not only needs login privileges to a computer but also additional resources like a home directory to actuallymore » do some work. Creating a local account on every computer takes care of all this. The problem with this approach is that these local accounts can be inconsistent with each other. The same user name could have a different user ID and/or group ID on different computers. Even more problematic is when two different accounts share the same user ID and group ID on different computers: User joe on computer1 could have user ID 1234 and group ID 56 and user jane on computer2 could have the same user ID 1234 and group ID 56. This is a big security risk in case shared resources like NFS are used. These two different accounts are the same for an NFS server so that these users can wipe out each other's files. The solution to this inconsistency problem is to have only one central, authoritative data source for this kind of information and a means of providing all your computers with access to this central source. This is what a ''Directory Service'' is. The two directory services most widely used for centralizing authorization data are the Network Information Service (NIS, formerly known as Yellow Pages or YP) and Lightweight Directory Access Protocol (LDAP).« less

  11. Connectivity to computers and the Internet among patients with schizophrenia spectrum disorders: a cross-sectional study

    PubMed Central

    Välimäki, Maritta; Kuosmanen, Lauri; Hätönen, Heli; Koivunen, Marita; Pitkänen, Anneli; Athanasopoulou, Christina; Anttila, Minna

    2017-01-01

    Purpose Information and communication technologies have been developed for a variety of health care applications and user groups in the field of health care. This study examined the connectivity to computers and the Internet among patients with schizophrenia spectrum disorders (SSDs). Patients and methods A cross-sectional survey design was used to study 311 adults with SSDs from the inpatient units of two psychiatric hospitals in Finland. The data collection lasted for 20 months and was done through patients’ medical records and a self-reported, structured questionnaire. Data analysis included descriptive statistics. Results In total, 297 patients were included in this study (response rate =96%). More than half of them (n=156; 55%) had a computer and less than half of them (n=127; 44%) had the Internet at home. Of those who generally had access to computers and the Internet, more than one-fourth (n=85; 29%) used computers daily, and >30% (n=96; 33%) never accessed the Internet. In total, approximately one-fourth of them (n=134; 25%) learned to use computers, and less than one-third of them (n=143; 31%) were known to use the Internet by themselves. Older people (aged 45–65 years) and those with less years of education (primary school) tended not to use the computers and the Internet at all (P<0.001), and younger people and those with higher education were associated with more active use. Conclusion Patients had quite good access to use computers and the Internet, and they mainly used the Internet to seek information. Social, occupational, and psychological functioning (which were evaluated with Global Assessment of Functioning) were not associated with access to and frequency of computer and the Internet use. The results support the use of computers and the Internet as part of clinical work in mental health care. PMID:28490882

  12. The geography of recreational open space: influence of neighborhood racial composition and neighborhood poverty.

    PubMed

    Duncan, Dustin T; Kawachi, Ichiro; White, Kellee; Williams, David R

    2013-08-01

    The geography of recreational open space might be inequitable in terms of minority neighborhood racial/ethnic composition and neighborhood poverty, perhaps due in part to residential segregation. This study evaluated the association between minority neighborhood racial/ethnic composition, neighborhood poverty, and recreational open space in Boston, Massachusetts (US). Across Boston census tracts, we computed percent non-Hispanic Black, percent Hispanic, and percent families in poverty as well as recreational open space density. We evaluated spatial autocorrelation in study variables and in the ordinary least squares (OLS) regression residuals via the Global Moran's I. We then computed Spearman correlations between the census tract socio-demographic characteristics and recreational open space density, including correlations adjusted for spatial autocorrelation. After this, we computed OLS regressions or spatial regressions as appropriate. Significant positive spatial autocorrelation was found for neighborhood socio-demographic characteristics (all p value = 0.001). We found marginally significant positive spatial autocorrelation in recreational open space (Global Moran's I = 0.082; p value = 0.053). However, we found no spatial autocorrelation in the OLS regression residuals, which indicated that spatial models were not appropriate. There was a negative correlation between census tract percent non-Hispanic Black and recreational open space density (r S = -0.22; conventional p value = 0.005; spatially adjusted p value = 0.019) as well as a negative correlation between predominantly non-Hispanic Black census tracts (>60 % non-Hispanic Black in a census tract) and recreational open space density (r S = -0.23; conventional p value = 0.003; spatially adjusted p value = 0.007). In bivariate and multivariate OLS models, percent non-Hispanic Black in a census tract and predominantly Black census tracts were associated with decreased density of recreational open space (p value < 0.001). Consistent with several previous studies in other geographic locales, we found that Black neighborhoods in Boston were less likely to have recreational open spaces, indicating the need for policy interventions promoting equitable access. Such interventions may contribute to reductions and disparities in obesity.

  13. Application of conventional molecular dynamics simulation in evaluating the stability of apomyoglobin in urea solution

    PubMed Central

    Zhang, Dawei; Lazim, Raudah

    2017-01-01

    In this study, we had exploited the advancement in computer technology to determine the stability of four apomyoglobin variants namely wild type, E109A, E109G and G65A/G73A by conducting conventional molecular dynamics simulations in explicit urea solution. Variations in RMSD, native contacts and solvent accessible surface area of the apomyoglobin variants during the simulation were calculated to probe the effect of mutation on the overall conformation of the protein. Subsequently, the mechanism leading to the destabilization of the apoMb variants was studied through the calculation of correlation matrix, principal component analyses, hydrogen bond analyses and RMSF. The results obtained here correlate well with the study conducted by Baldwin and Luo which showed improved stability of apomyoglobin with E109A mutation and contrariwise for E109G and G65A/G73A mutation. These positive observations showcase the feasibility of exploiting MD simulation in determining protein stability prior to protein expression. PMID:28300210

  14. Electronic digital display watch having solar and geographical functions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Salah, I.M.

    1984-10-30

    In order to provide easily accessible knowledge of the correlations between time, the geographical locale and the solar positions, the watch in question in addition to time-keeping means capable of displaying the current time also provides means capable of storing, processing in a microprocessor mode and displaying in a particular panel mode data of solar elevation and azimuth as well as date data, a computer performing correlating operations between these various values. Pushbuttons (BPH', BPM', BPB') allow using this watch in various operational and correction situations, and other pushbuttons (BPH, BPM, BPB) allow more specific commands for correction, for searchmore » operations regarding date and place based on the solar data, for storage and call from memory of the various processed data. This watch can easily be implemented as a small wrist watch. It will be advantageously used by those interested in knowing the solar positions, by solar facility engineers, architects, airline pilots, believers in the Moslem faith etc.« less

  15. Assessing Health Literacy in Deaf American Sign Language Users.

    PubMed

    McKee, Michael M; Paasche-Orlow, Michael K; Winters, Paul C; Fiscella, Kevin; Zazove, Philip; Sen, Ananda; Pearson, Thomas

    2015-01-01

    Communication and language barriers isolate Deaf American Sign Language (ASL) users from mass media, health care messages, and health care communication, which, when coupled with social marginalization, places them at a high risk for inadequate health literacy. Our objectives were to translate, adapt, and develop an accessible health literacy instrument in ASL and to assess the prevalence and correlates of inadequate health literacy among Deaf ASL users and hearing English speakers using a cross-sectional design. A total of 405 participants (166 Deaf and 239 hearing) were enrolled in the study. The Newest Vital Sign was adapted, translated, and developed into an ASL version (ASL-NVS). We found that 48% of Deaf participants had inadequate health literacy, and Deaf individuals were 6.9 times more likely than hearing participants to have inadequate health literacy. The new ASL-NVS, available on a self-administered computer platform, demonstrated good correlation with reading literacy. The prevalence of Deaf ASL users with inadequate health literacy is substantial, warranting further interventions and research.

  16. Assessing Health Literacy in Deaf American Sign Language Users

    PubMed Central

    McKee, Michael M.; Paasche-Orlow, Michael; Winters, Paul C.; Fiscella, Kevin; Zazove, Philip; Sen, Ananda; Pearson, Thomas

    2015-01-01

    Communication and language barriers isolate Deaf American Sign Language (ASL) users from mass media, healthcare messages, and health care communication, which when coupled with social marginalization, places them at a high risk for inadequate health literacy. Our objectives were to translate, adapt, and develop an accessible health literacy instrument in ASL and to assess the prevalence and correlates of inadequate health literacy among Deaf ASL users and hearing English speakers using a cross-sectional design. A total of 405 participants (166 Deaf and 239 hearing) were enrolled in the study. The Newest Vital Sign was adapted, translated, and developed into an ASL version of the NVS (ASL-NVS). Forty-eight percent of Deaf participants had inadequate health literacy, and Deaf individuals were 6.9 times more likely than hearing participants to have inadequate health literacy. The new ASL-NVS, available on a self-administered computer platform, demonstrated good correlation with reading literacy. The prevalence of Deaf ASL users with inadequate health literacy is substantial, warranting further interventions and research. PMID:26513036

  17. Application of conventional molecular dynamics simulation in evaluating the stability of apomyoglobin in urea solution

    NASA Astrophysics Data System (ADS)

    Zhang, Dawei; Lazim, Raudah

    2017-03-01

    In this study, we had exploited the advancement in computer technology to determine the stability of four apomyoglobin variants namely wild type, E109A, E109G and G65A/G73A by conducting conventional molecular dynamics simulations in explicit urea solution. Variations in RMSD, native contacts and solvent accessible surface area of the apomyoglobin variants during the simulation were calculated to probe the effect of mutation on the overall conformation of the protein. Subsequently, the mechanism leading to the destabilization of the apoMb variants was studied through the calculation of correlation matrix, principal component analyses, hydrogen bond analyses and RMSF. The results obtained here correlate well with the study conducted by Baldwin and Luo which showed improved stability of apomyoglobin with E109A mutation and contrariwise for E109G and G65A/G73A mutation. These positive observations showcase the feasibility of exploiting MD simulation in determining protein stability prior to protein expression.

  18. Application of conventional molecular dynamics simulation in evaluating the stability of apomyoglobin in urea solution.

    PubMed

    Zhang, Dawei; Lazim, Raudah

    2017-03-16

    In this study, we had exploited the advancement in computer technology to determine the stability of four apomyoglobin variants namely wild type, E109A, E109G and G65A/G73A by conducting conventional molecular dynamics simulations in explicit urea solution. Variations in RMSD, native contacts and solvent accessible surface area of the apomyoglobin variants during the simulation were calculated to probe the effect of mutation on the overall conformation of the protein. Subsequently, the mechanism leading to the destabilization of the apoMb variants was studied through the calculation of correlation matrix, principal component analyses, hydrogen bond analyses and RMSF. The results obtained here correlate well with the study conducted by Baldwin and Luo which showed improved stability of apomyoglobin with E109A mutation and contrariwise for E109G and G65A/G73A mutation. These positive observations showcase the feasibility of exploiting MD simulation in determining protein stability prior to protein expression.

  19. Détermination assistée par ordinateur de la structure des molécules organiques

    NASA Astrophysics Data System (ADS)

    Nuzillard, J.-M.

    1998-02-01

    Nuclear Magnetic Resonance spectroscopy offers the unique possibility of accessing proximity relationships between atoms by means of chemical shift correlation experiments. Structure determination of small molecules has become thus much simpler. Computer programs can use directly correlation information for structure analysis. The use and operation mechanism of such a program, LSD (Logic for Structure Determination) are presented. The example compound is gibberellic acid, a natural product. La spectroscopie de Résonance Magnétique Nucléaire offre un moyen unique de déterminer des relations de proximité entre atomes par le biais des expériences de corrélation. L'analyse structurale de petites molécules organiques s'en trouve extrêmement facilitée. Des programmes informatiques peuvent utiliser directement les informations de corrélation pour déduire des structures. Le fonctionnement et l'usage d'un tel programme, LSD (Logic for Structure Determination), sont détaillés sur un exemple, l'acide gibberellique.

  20. Imitating intrinsic alignments: a bias to the CMB lensing-galaxy shape cross-correlation power spectrum induced by the large-scale structure bispectrum

    NASA Astrophysics Data System (ADS)

    Merkel, Philipp M.; Schäfer, Björn Malte

    2017-10-01

    Cross-correlating the lensing signals of galaxies and comic microwave background (CMB) fluctuations is expected to provide valuable cosmological information. In particular, it may help tighten constraints on parameters describing the properties of intrinsically aligned galaxies at high redshift. To access the information conveyed by the cross-correlation signal, its accurate theoretical description is required. We compute the bias to CMB lensing-galaxy shape cross-correlation measurements induced by non-linear structure growth. Using tree-level perturbation theory for the large-scale structure bispectrum, we find that the bias is negative on most angular scales, therefore mimicking the signal of intrinsic alignments. Combining Euclid-like galaxy lensing data with a CMB experiment comparable to the Planck satellite mission, the bias becomes significant only on smallest scales (ℓ ≳ 2500). For improved CMB observations, however, the corrections amount to 10-15 per cent of the CMB lensing-intrinsic alignment signal over a wide multipole range (10 ≲ ℓ ≲ 2000). Accordingly, the power spectrum bias, if uncorrected, translates into 2σ and 3σ errors in the determination of the intrinsic alignment amplitude in the case of CMB stage III and stage IV experiments, respectively.

  1. Engineering and Computing Portal to Solve Environmental Problems

    NASA Astrophysics Data System (ADS)

    Gudov, A. M.; Zavozkin, S. Y.; Sotnikov, I. Y.

    2018-01-01

    This paper describes architecture and services of the Engineering and Computing Portal, which is considered to be a complex solution that provides access to high-performance computing resources, enables to carry out computational experiments, teach parallel technologies and solve computing tasks, including technogenic safety ones.

  2. Bringing the CMS distributed computing system into scalable operations

    NASA Astrophysics Data System (ADS)

    Belforte, S.; Fanfani, A.; Fisk, I.; Flix, J.; Hernández, J. M.; Kress, T.; Letts, J.; Magini, N.; Miccio, V.; Sciabà, A.

    2010-04-01

    Establishing efficient and scalable operations of the CMS distributed computing system critically relies on the proper integration, commissioning and scale testing of the data and workload management tools, the various computing workflows and the underlying computing infrastructure, located at more than 50 computing centres worldwide and interconnected by the Worldwide LHC Computing Grid. Computing challenges periodically undertaken by CMS in the past years with increasing scale and complexity have revealed the need for a sustained effort on computing integration and commissioning activities. The Processing and Data Access (PADA) Task Force was established at the beginning of 2008 within the CMS Computing Program with the mandate of validating the infrastructure for organized processing and user analysis including the sites and the workload and data management tools, validating the distributed production system by performing functionality, reliability and scale tests, helping sites to commission, configure and optimize the networking and storage through scale testing data transfers and data processing, and improving the efficiency of accessing data across the CMS computing system from global transfers to local access. This contribution reports on the tools and procedures developed by CMS for computing commissioning and scale testing as well as the improvements accomplished towards efficient, reliable and scalable computing operations. The activities include the development and operation of load generators for job submission and data transfers with the aim of stressing the experiment and Grid data management and workload management systems, site commissioning procedures and tools to monitor and improve site availability and reliability, as well as activities targeted to the commissioning of the distributed production, user analysis and monitoring systems.

  3. Nanoinformatics knowledge infrastructures: bringing efficient information management to nanomedical research.

    PubMed

    de la Iglesia, D; Cachau, R E; García-Remesal, M; Maojo, V

    2013-11-27

    Nanotechnology represents an area of particular promise and significant opportunity across multiple scientific disciplines. Ongoing nanotechnology research ranges from the characterization of nanoparticles and nanomaterials to the analysis and processing of experimental data seeking correlations between nanoparticles and their functionalities and side effects. Due to their special properties, nanoparticles are suitable for cellular-level diagnostics and therapy, offering numerous applications in medicine, e.g. development of biomedical devices, tissue repair, drug delivery systems and biosensors. In nanomedicine, recent studies are producing large amounts of structural and property data, highlighting the role for computational approaches in information management. While in vitro and in vivo assays are expensive, the cost of computing is falling. Furthermore, improvements in the accuracy of computational methods (e.g. data mining, knowledge discovery, modeling and simulation) have enabled effective tools to automate the extraction, management and storage of these vast data volumes. Since this information is widely distributed, one major issue is how to locate and access data where it resides (which also poses data-sharing limitations). The novel discipline of nanoinformatics addresses the information challenges related to nanotechnology research. In this paper, we summarize the needs and challenges in the field and present an overview of extant initiatives and efforts.

  4. Computational structure analysis of biomacromolecule complexes by interface geometry.

    PubMed

    Mahdavi, Sedigheh; Salehzadeh-Yazdi, Ali; Mohades, Ali; Masoudi-Nejad, Ali

    2013-12-01

    The ability to analyze and compare protein-nucleic acid and protein-protein interaction interface has critical importance in understanding the biological function and essential processes occurring in the cells. Since high-resolution three-dimensional (3D) structures of biomacromolecule complexes are available, computational characterizing of the interface geometry become an important research topic in the field of molecular biology. In this study, the interfaces of a set of 180 protein-nucleic acid and protein-protein complexes are computed to understand the principles of their interactions. The weighted Voronoi diagram of the atoms and the Alpha complex has provided an accurate description of the interface atoms. Our method is implemented in the presence and absence of water molecules. A comparison among the three types of interaction interfaces show that RNA-protein complexes have the largest size of an interface. The results show a high correlation coefficient between our method and the PISA server in the presence and absence of water molecules in the Voronoi model and the traditional model based on solvent accessibility and the high validation parameters in comparison to the classical model. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Introduction into the Virtual Olympic Games Framework for online communities.

    PubMed

    Stoilescu, Dorian

    2009-06-01

    This paper presents the design of the Virtual Olympic Games Framework (VOGF), a computer application designated for athletics, health care, general well-being, nutrition and fitness, which offers multiple benefits for its participants. A special interest in starting the design of the framework was in exploring how people can connect and participate together using existing computer technologies (i.e. gaming consoles, exercise equipment with computer interfaces, devices of measuring health, speed, force and distance and Web 2.0 applications). A stationary bike set-up offering information to users about their individual health and athletic performances has been considered as a starting model. While this model is in the design stage, some preliminary findings are encouraging, suggesting the potential for various fields: sports, medicine, theories of learning, technologies and cybercultural studies. First, this framework would allow participants to perform a variety of sports and improve their health. Second, this would involve creating an online environment able to store health information and sport performances correlated with accessing multi-media data and research about performing sports. Third, participants could share experiences with other athletes, coaches and researchers. Fourth, this framework also provides support for the research community in their future investigations.

  6. Nanoinformatics knowledge infrastructures: bringing efficient information management to nanomedical research

    NASA Astrophysics Data System (ADS)

    de la Iglesia, D.; Cachau, R. E.; García-Remesal, M.; Maojo, V.

    2013-01-01

    Nanotechnology represents an area of particular promise and significant opportunity across multiple scientific disciplines. Ongoing nanotechnology research ranges from the characterization of nanoparticles and nanomaterials to the analysis and processing of experimental data seeking correlations between nanoparticles and their functionalities and side effects. Due to their special properties, nanoparticles are suitable for cellular-level diagnostics and therapy, offering numerous applications in medicine, e.g. development of biomedical devices, tissue repair, drug delivery systems and biosensors. In nanomedicine, recent studies are producing large amounts of structural and property data, highlighting the role for computational approaches in information management. While in vitro and in vivo assays are expensive, the cost of computing is falling. Furthermore, improvements in the accuracy of computational methods (e.g. data mining, knowledge discovery, modeling and simulation) have enabled effective tools to automate the extraction, management and storage of these vast data volumes. Since this information is widely distributed, one major issue is how to locate and access data where it resides (which also poses data-sharing limitations). The novel discipline of nanoinformatics addresses the information challenges related to nanotechnology research. In this paper, we summarize the needs and challenges in the field and present an overview of extant initiatives and efforts.

  7. Evidence of Effectiveness of Health Care Professionals Using Handheld Computers: A Scoping Review of Systematic Reviews

    PubMed Central

    2013-01-01

    Background Handheld computers and mobile devices provide instant access to vast amounts and types of useful information for health care professionals. Their reduced size and increased processing speed has led to rapid adoption in health care. Thus, it is important to identify whether handheld computers are actually effective in clinical practice. Objective A scoping review of systematic reviews was designed to provide a quick overview of the documented evidence of effectiveness for health care professionals using handheld computers in their clinical work. Methods A detailed search, sensitive for systematic reviews was applied for Cochrane, Medline, EMBASE, PsycINFO, Allied and Complementary Medicine Database (AMED), Global Health, and Cumulative Index to Nursing and Allied Health Literature (CINAHL) databases. All outcomes that demonstrated effectiveness in clinical practice were included. Classroom learning and patient use of handheld computers were excluded. Quality was assessed using the Assessment of Multiple Systematic Reviews (AMSTAR) tool. A previously published conceptual framework was used as the basis for dual data extraction. Reported outcomes were summarized according to the primary function of the handheld computer. Results Five systematic reviews met the inclusion and quality criteria. Together, they reviewed 138 unique primary studies. Most reviewed descriptive intervention studies, where physicians, pharmacists, or medical students used personal digital assistants. Effectiveness was demonstrated across four distinct functions of handheld computers: patient documentation, patient care, information seeking, and professional work patterns. Within each of these functions, a range of positive outcomes were reported using both objective and self-report measures. The use of handheld computers improved patient documentation through more complete recording, fewer documentation errors, and increased efficiency. Handheld computers provided easy access to clinical decision support systems and patient management systems, which improved decision making for patient care. Handheld computers saved time and gave earlier access to new information. There were also reports that handheld computers enhanced work patterns and efficiency. Conclusions This scoping review summarizes the secondary evidence for effectiveness of handheld computers and mhealth. It provides a snapshot of effective use by health care professionals across four key functions. We identified evidence to suggest that handheld computers provide easy and timely access to information and enable accurate and complete documentation. Further, they can give health care professionals instant access to evidence-based decision support and patient management systems to improve clinical decision making. Finally, there is evidence that handheld computers allow health professionals to be more efficient in their work practices. It is anticipated that this evidence will guide clinicians and managers in implementing handheld computers in clinical practice and in designing future research. PMID:24165786

  8. High Temporal Resolution Mapping of Seismic Noise Sources Using Heterogeneous Supercomputers

    NASA Astrophysics Data System (ADS)

    Paitz, P.; Gokhberg, A.; Ermert, L. A.; Fichtner, A.

    2017-12-01

    The time- and space-dependent distribution of seismic noise sources is becoming a key ingredient of modern real-time monitoring of various geo-systems like earthquake fault zones, volcanoes, geothermal and hydrocarbon reservoirs. We present results of an ongoing research project conducted in collaboration with the Swiss National Supercomputing Centre (CSCS). The project aims at building a service providing seismic noise source maps for Central Europe with high temporal resolution. We use source imaging methods based on the cross-correlation of seismic noise records from all seismic stations available in the region of interest. The service is hosted on the CSCS computing infrastructure; all computationally intensive processing is performed on the massively parallel heterogeneous supercomputer "Piz Daint". The solution architecture is based on the Application-as-a-Service concept to provide the interested researchers worldwide with regular access to the noise source maps. The solution architecture includes the following sub-systems: (1) data acquisition responsible for collecting, on a periodic basis, raw seismic records from the European seismic networks, (2) high-performance noise source mapping application responsible for the generation of source maps using cross-correlation of seismic records, (3) back-end infrastructure for the coordination of various tasks and computations, (4) front-end Web interface providing the service to the end-users and (5) data repository. The noise source mapping itself rests on the measurement of logarithmic amplitude ratios in suitably pre-processed noise correlations, and the use of simplified sensitivity kernels. During the implementation we addressed various challenges, in particular, selection of data sources and transfer protocols, automation and monitoring of daily data downloads, ensuring the required data processing performance, design of a general service-oriented architecture for coordination of various sub-systems, and engineering an appropriate data storage solution. The present pilot version of the service implements noise source maps for Switzerland. Extension of the solution to Central Europe is planned for the next project phase.

  9. Direct Access to Peregrine for External Users | High-Performance Computing

    Science.gov Websites

    | NREL Direct Access to Peregrine for External Users Direct Access to Peregrine for External : ssh yourHPCuserid@peregrine-ssh.nrel.gov For more information, please read this page. About direct ssh allow access to VPNs. Our current jump-node (hpcsh.nrel.gov) does not provide direct-to-peregrine access

  10. Computational perspectives in the history of science: to the memory of Peter Damerow.

    PubMed

    Laubichler, Manfred D; Maienschein, Jane; Renn, Jürgen

    2013-03-01

    Computational methods and perspectives can transform the history of science by enabling the pursuit of novel types of questions, dramatically expanding the scale of analysis (geographically and temporally), and offering novel forms of publication that greatly enhance access and transparency. This essay presents a brief summary of a computational research system for the history of science, discussing its implications for research, education, and publication practices and its connections to the open-access movement and similar transformations in the natural and social sciences that emphasize big data. It also argues that computational approaches help to reconnect the history of science to individual scientific disciplines.

  11. A Magneto-Inductive Sensor Based Wireless Tongue-Computer Interface

    PubMed Central

    Huo, Xueliang; Wang, Jia; Ghovanloo, Maysam

    2015-01-01

    We have developed a noninvasive, unobtrusive magnetic wireless tongue-computer interface, called “Tongue Drive,” to provide people with severe disabilities with flexible and effective computer access and environment control. A small permanent magnet secured on the tongue by implantation, piercing, or tissue adhesives, is utilized as a tracer to track the tongue movements. The magnetic field variations inside and around the mouth due to the tongue movements are detected by a pair of three-axial linear magneto-inductive sensor modules mounted bilaterally on a headset near the user’s cheeks. After being wirelessly transmitted to a portable computer, the sensor output signals are processed by a differential field cancellation algorithm to eliminate the external magnetic field interference, and translated into user control commands, which could then be used to access a desktop computer, maneuver a powered wheelchair, or control other devices in the user’s environment. The system has been successfully tested on six able-bodied subjects for computer access by defining six individual commands to resemble mouse functions. Results show that the Tongue Drive system response time for 87% correctly completed commands is 0.8 s, which yields to an information transfer rate of ~130 b/min. PMID:18990653

  12. The Use of a Computer-Controlled Random Access Slide Projector for Rapid Information Display.

    ERIC Educational Resources Information Center

    Muller, Mark T.

    A 35mm random access slide projector operated in conjunction with a computer terminal was adapted to meet the need for a more rapid and complex graphic display mechanism than is currently available with teletypewriter terminals. The model projector can be operated manually to provide for a maintenance checkout of the electromechanical system.…

  13. Japan's Widespread Use of Cellular Telephones To Access the Internet: Implications for Educational Telecommunications.

    ERIC Educational Resources Information Center

    Scott, Douglass J.

    In the 3 years since their introduction, Internet-capable cellular telephones are used by over 47 million Japanese (37% of the population) which nearly equals the number of people using personal computers to access the Internet. If this trend continues, the cellular telephone will overtake the personal computer as the most widely used Internet…

  14. The Potential Use of Mobile Technology: Enhancing Accessibility and Communication in a Blended Learning Course

    ERIC Educational Resources Information Center

    Mayisela, Tabisa

    2013-01-01

    Mobile technology is increasingly being used to support blended learning beyond computer centres. It has been considered as a potential solution to the problem of a shortage of computers for accessing online learning materials (courseware) in a blended learning course. The purpose of the study was to establish how the use of mobile technology…

  15. A Survey of Exemplar Teachers' Perceptions, Use, and Access of Computer-Based Games and Technology for Classroom Instruction

    ERIC Educational Resources Information Center

    Proctor, Michael D.; Marks, Yaela

    2013-01-01

    This research reports and analyzes for archival purposes surveyed perceptions, use, and access by 259 United States based exemplar Primary and Secondary educators of computer-based games and technology for classroom instruction. Participating respondents were considered exemplary as they each won the Milken Educator Award during the 1996-2009…

  16. The Use of Public Computing Facilities by Library Patrons: Demography, Motivations, and Barriers

    ERIC Educational Resources Information Center

    DeMaagd, Kurt; Chew, Han Ei; Huang, Guanxiong; Khan, M. Laeeq; Sreenivasan, Akshaya; LaRose, Robert

    2013-01-01

    Public libraries play an important part in the development of a community. Today, they are seen as more than store houses of books; they are also responsible for the dissemination of online, and offline information. Public access computers are becoming increasingly popular as more and more people understand the need for internet access. Using a…

  17. Assessment of Computer Technology Availability, Accessibility and Usage by Agricultural Education Student Teachers in Secondary Schools in Botswana

    ERIC Educational Resources Information Center

    Hulela, K.; Rammolai, M.; Mpatane, W.

    2014-01-01

    This study examines the availability, accessibility and usability of computer as a form of information and communication technologies (ICTs) by student teachers in secondary schools. 44 out of 51 student teachers of Agriculture responded to the questionnaire. Means and percentages were used to analyze the data to establish the availability,…

  18. A Critical Pedagogy Approach for Engaging Urban Youth in Mobile App Development in an After-School Program

    ERIC Educational Resources Information Center

    Vakil, Sepehr

    2014-01-01

    To understand the digital divide as a matter of social justice, I identify access to computational fluency as a civil rights issue. "Access" refers to material as well as social resources, including meaningful learning opportunities that create the conditions for urban youth to engage in computational thinking. In this article, I explore…

  19. Application of ICT by Students at Selected Universities in Poland

    ERIC Educational Resources Information Center

    Lorencowicz, Edmund; Kocira, Slawomir; Uziak, Jacek; Tarasinska, Joanna

    2014-01-01

    The aim of the study was to investigate access and use of computers and internet by students during their studies. The results are based on a survey conducted in 2009-2012 on groups of 320 to 405 students (each year) from two universities in eastern Poland. It was concluded that during the period under study access of students to computers and…

  20. P43-S Computational Biology Applications Suite for High-Performance Computing (BioHPC.net)

    PubMed Central

    Pillardy, J.

    2007-01-01

    One of the challenges of high-performance computing (HPC) is user accessibility. At the Cornell University Computational Biology Service Unit, which is also a Microsoft HPC institute, we have developed a computational biology application suite that allows researchers from biological laboratories to submit their jobs to the parallel cluster through an easy-to-use Web interface. Through this system, we are providing users with popular bioinformatics tools including BLAST, HMMER, InterproScan, and MrBayes. The system is flexible and can be easily customized to include other software. It is also scalable; the installation on our servers currently processes approximately 8500 job submissions per year, many of them requiring massively parallel computations. It also has a built-in user management system, which can limit software and/or database access to specified users. TAIR, the major database of the plant model organism Arabidopsis, and SGN, the international tomato genome database, are both using our system for storage and data analysis. The system consists of a Web server running the interface (ASP.NET C#), Microsoft SQL server (ADO.NET), compute cluster running Microsoft Windows, ftp server, and file server. Users can interact with their jobs and data via a Web browser, ftp, or e-mail. The interface is accessible at http://cbsuapps.tc.cornell.edu/.

  1. Adolescent Sedentary Behaviors: Correlates Differ for Television Viewing and Computer Use

    PubMed Central

    Babey, Susan H.; Hastert, Theresa A.; Wolstein, Joelle

    2013-01-01

    Purpose Sedentary behavior is associated with obesity in youth. Understanding correlates of specific sedentary behaviors can inform the development of interventions to reduce sedentary time. The current research examines correlates of leisure computer use and television viewing among California adolescents. Methods Using data from the 2005 California Health Interview Survey (CHIS), we examined individual, family and environmental correlates of two sedentary behaviors among 4,029 adolescents: leisure computer use and television watching. Results Linear regression analyses adjusting for a range of factors indicated several differences in the correlates of television watching and computer use. Correlates of additional time spent watching television included male sex, American Indian and African American race, lower household income, lower levels of physical activity, lower parent educational attainment, and additional hours worked by parents. Correlates of a greater amount of time spent using the computer for fun included older age, Asian race, higher household income, lower levels of physical activity, less parental knowledge of free time activities, and living in neighborhoods with higher proportions of non-white residents and higher proportions of low-income residents. Only physical activity was associated similarly with both watching television and computer use. Conclusions These results suggest that correlates of time spent on television watching and leisure computer use are different. Reducing screen time is a potentially successful strategy in combating childhood obesity, and understanding differences in the correlates of different screen time behaviors can inform the development of more effective interventions to reduce sedentary time. PMID:23260837

  2. Computational neuroanatomy: ontology-based representation of neural components and connectivity.

    PubMed

    Rubin, Daniel L; Talos, Ion-Florin; Halle, Michael; Musen, Mark A; Kikinis, Ron

    2009-02-05

    A critical challenge in neuroscience is organizing, managing, and accessing the explosion in neuroscientific knowledge, particularly anatomic knowledge. We believe that explicit knowledge-based approaches to make neuroscientific knowledge computationally accessible will be helpful in tackling this challenge and will enable a variety of applications exploiting this knowledge, such as surgical planning. We developed ontology-based models of neuroanatomy to enable symbolic lookup, logical inference and mathematical modeling of neural systems. We built a prototype model of the motor system that integrates descriptive anatomic and qualitative functional neuroanatomical knowledge. In addition to modeling normal neuroanatomy, our approach provides an explicit representation of abnormal neural connectivity in disease states, such as common movement disorders. The ontology-based representation encodes both structural and functional aspects of neuroanatomy. The ontology-based models can be evaluated computationally, enabling development of automated computer reasoning applications. Neuroanatomical knowledge can be represented in machine-accessible format using ontologies. Computational neuroanatomical approaches such as described in this work could become a key tool in translational informatics, leading to decision support applications that inform and guide surgical planning and personalized care for neurological disease in the future.

  3. The Role Of Moral Awareness In Computer Security

    NASA Astrophysics Data System (ADS)

    Stawinski, Arthur

    1984-08-01

    Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.

  4. Workarounds to computer access in healthcare organizations: you want my password or a dead patient?

    PubMed

    Koppel, Ross; Smith, Sean; Blythe, Jim; Kothari, Vijay

    2015-01-01

    Workarounds to computer access in healthcare are sufficiently common that they often go unnoticed. Clinicians focus on patient care, not cybersecurity. We argue and demonstrate that understanding workarounds to healthcare workers' computer access requires not only analyses of computer rules, but also interviews and observations with clinicians. In addition, we illustrate the value of shadowing clinicians and conducing focus groups to understand their motivations and tradeoffs for circumvention. Ethnographic investigation of the medical workplace emerges as a critical method of research because in the inevitable conflict between even well-intended people versus the machines, it's the people who are the more creative, flexible, and motivated. We conducted interviews and observations with hundreds of medical workers and with 19 cybersecurity experts, CIOs, CMIOs, CTO, and IT workers to obtain their perceptions of computer security. We also shadowed clinicians as they worked. We present dozens of ways workers ingeniously circumvent security rules. The clinicians we studied were not "black hat" hackers, but just professionals seeking to accomplish their work despite the security technologies and regulations.

  5. A Low Cost Micro-Computer Based Local Area Network for Medical Office and Medical Center Automation

    PubMed Central

    Epstein, Mel H.; Epstein, Lynn H.; Emerson, Ron G.

    1984-01-01

    A Low Cost Micro-computer based Local Area Network for medical office automation is described which makes use of an array of multiple and different personal computers interconnected by a local area network. Each computer on the network functions as fully potent workstations for data entry and report generation. The network allows each workstation complete access to the entire database. Additionally, designated computers may serve as access ports for remote terminals. Through “Gateways” the network may serve as a front end for a large mainframe, or may interface with another network. The system provides for the medical office environment the expandability and flexibility of a multi-terminal mainframe system at a far lower cost without sacrifice of performance.

  6. A scoping review of cloud computing in healthcare.

    PubMed

    Griebel, Lena; Prokosch, Hans-Ulrich; Köpcke, Felix; Toddenroth, Dennis; Christoph, Jan; Leb, Ines; Engel, Igor; Sedlmayr, Martin

    2015-03-19

    Cloud computing is a recent and fast growing area of development in healthcare. Ubiquitous, on-demand access to virtually endless resources in combination with a pay-per-use model allow for new ways of developing, delivering and using services. Cloud computing is often used in an "OMICS-context", e.g. for computing in genomics, proteomics and molecular medicine, while other field of application still seem to be underrepresented. Thus, the objective of this scoping review was to identify the current state and hot topics in research on cloud computing in healthcare beyond this traditional domain. MEDLINE was searched in July 2013 and in December 2014 for publications containing the terms "cloud computing" and "cloud-based". Each journal and conference article was categorized and summarized independently by two researchers who consolidated their findings. 102 publications have been analyzed and 6 main topics have been found: telemedicine/teleconsultation, medical imaging, public health and patient self-management, hospital management and information systems, therapy, and secondary use of data. Commonly used features are broad network access for sharing and accessing data and rapid elasticity to dynamically adapt to computing demands. Eight articles favor the pay-for-use characteristics of cloud-based services avoiding upfront investments. Nevertheless, while 22 articles present very general potentials of cloud computing in the medical domain and 66 articles describe conceptual or prototypic projects, only 14 articles report from successful implementations. Further, in many articles cloud computing is seen as an analogy to internet-/web-based data sharing and the characteristics of the particular cloud computing approach are unfortunately not really illustrated. Even though cloud computing in healthcare is of growing interest only few successful implementations yet exist and many papers just use the term "cloud" synonymously for "using virtual machines" or "web-based" with no described benefit of the cloud paradigm. The biggest threat to the adoption in the healthcare domain is caused by involving external cloud partners: many issues of data safety and security are still to be solved. Until then, cloud computing is favored more for singular, individual features such as elasticity, pay-per-use and broad network access, rather than as cloud paradigm on its own.

  7. Microsoft's Vista: Guarantees People with Special Needs Access to Computers

    ERIC Educational Resources Information Center

    Williams, John M.

    2006-01-01

    In this article, the author discusses the accessibility features of Microsoft's Windows Vista. One of the most innovative aspects of Windows Vista is a new accessibility and automated testing model called Microsoft UI Automation, which reduces development costs not only for accessible and assistive technology (AT) developers, but also for…

  8. An Intelligent Terminal for Access to a Medical Database

    PubMed Central

    Womble, M. E.; Wilson, S. D.; Keiser, H. N.; Tworek, M. L.

    1978-01-01

    Very powerful data base management systems (DBMS) now exist which allow medical personnel access to patient record data bases. DBMS's make it easy to retrieve either complete or abbreviated records of patients with similar characteristics. In addition, statistics on data base records are immediately accessible. However, the price of this power is a large computer with the inherent problems of access, response time, and reliability. If a general purpose, time-shared computer is used to get this power, the response time to a request can be either rapid or slow, depending upon loading by other users. Furthermore, if the computer is accessed via dial-up telephone lines, there is competition with other users for telephone ports. If either the DBMS or the host machine is replaced, the medical users, who are typically not sophisticated in computer usage, are forced to learn the new system. Microcomputers, because of their low cost and adaptability, lend themselves to a solution of these problems. A microprocessor-based intelligent terminal has been designed and implemented at the USAF School of Aerospace Medicine to provide a transparent interface between the user and his data base. The intelligent terminal system includes multiple microprocessors, floppy disks, a CRT terminal, and a printer. Users interact with the system at the CRT terminal using menu selection (framing). The system translates the menu selection into the query language of the DBMS and handles all actual communication with the DBMS and its host computer, including telephone dialing and sign on procedures, as well as the actual data base query and response. Retrieved information is stored locally for CRT display, hard copy production, and/or permanent retention. Microprocessor-based communication units provide security for sensitive medical data through encryption/decryption algorithms and high reliability error detection transmission schemes. Highly modular software design permits adapation to a different DBMS and/or host computer with only minor localized software changes. Importantly, this portability is completely transparent to system users. Although the terminal system is independent of the host computer and its DBMS, it has been linked to a UNIVAC 1108 computer supporting MRI's SYSTEM 2000 DBMS.

  9. INFN-Pisa scientific computation environment (GRID, HPC and Interactive Analysis)

    NASA Astrophysics Data System (ADS)

    Arezzini, S.; Carboni, A.; Caruso, G.; Ciampa, A.; Coscetti, S.; Mazzoni, E.; Piras, S.

    2014-06-01

    The INFN-Pisa Tier2 infrastructure is described, optimized not only for GRID CPU and Storage access, but also for a more interactive use of the resources in order to provide good solutions for the final data analysis step. The Data Center, equipped with about 6700 production cores, permits the use of modern analysis techniques realized via advanced statistical tools (like RooFit and RooStat) implemented in multicore systems. In particular a POSIX file storage access integrated with standard SRM access is provided. Therefore the unified storage infrastructure is described, based on GPFS and Xrootd, used both for SRM data repository and interactive POSIX access. Such a common infrastructure allows a transparent access to the Tier2 data to the users for their interactive analysis. The organization of a specialized many cores CPU facility devoted to interactive analysis is also described along with the login mechanism integrated with the INFN-AAI (National INFN Infrastructure) to extend the site access and use to a geographical distributed community. Such infrastructure is used also for a national computing facility in use to the INFN theoretical community, it enables a synergic use of computing and storage resources. Our Center initially developed for the HEP community is now growing and includes also HPC resources fully integrated. In recent years has been installed and managed a cluster facility (1000 cores, parallel use via InfiniBand connection) and we are now updating this facility that will provide resources for all the intermediate level HPC computing needs of the INFN theoretical national community.

  10. Mobile computing in critical care.

    PubMed

    Lapinsky, Stephen E

    2007-03-01

    Handheld computing devices are increasingly used by health care workers, and offer a mobile platform for point-of-care information access. Improved technology, with larger memory capacity, higher screen resolution, faster processors, and wireless connectivity has broadened the potential roles for these devices in critical care. In addition to the personal information management functions, handheld computers have been used to access reference information, management guidelines and pharmacopoeias as well as to track the educational experience of trainees. They can act as an interface with a clinical information system, providing rapid access to patient information. Despite their popularity, these devices have limitations related to their small size, and acceptance by physicians has not been uniform. In the critical care environment, the risk of transmitting microorganisms by such a portable device should always be considered.

  11. Towards ubiquitous access of computer-assisted surgery systems.

    PubMed

    Liu, Hui; Lufei, Hanping; Shi, Weishong; Chaudhary, Vipin

    2006-01-01

    Traditional stand-alone computer-assisted surgery (CAS) systems impede the ubiquitous and simultaneous access by multiple users. With advances in computing and networking technologies, ubiquitous access to CAS systems becomes possible and promising. Based on our preliminary work, CASMIL, a stand-alone CAS server developed at Wayne State University, we propose a novel mobile CAS system, UbiCAS, which allows surgeons to retrieve, review and interpret multimodal medical images, and to perform some critical neurosurgical procedures on heterogeneous devices from anywhere at anytime. Furthermore, various optimization techniques, including caching, prefetching, pseudo-streaming-model, and compression, are used to guarantee the QoS of the UbiCAS system. UbiCAS enables doctors at remote locations to actively participate remote surgeries, share patient information in real time before, during, and after the surgery.

  12. Ubiquitous Versus One-to-One

    ERIC Educational Resources Information Center

    McAnear, Anita

    2006-01-01

    When we planned the editorial calendar with the topic ubiquitous computing, we were thinking of ubiquitous computing as the one-to-one ratio of computers to students and teachers and 24/7 access to electronic resources. At the time, we were aware that ubiquitous computing in the computer science field had more to do with wearable computers. Our…

  13. Democratizing Computer Science

    ERIC Educational Resources Information Center

    Margolis, Jane; Goode, Joanna; Ryoo, Jean J.

    2015-01-01

    Computer science programs are too often identified with a narrow stratum of the student population, often white or Asian boys who have access to computers at home. But because computers play such a huge role in our world today, all students can benefit from the study of computer science and the opportunity to build skills related to computing. The…

  14. OMPC: an Open-Source MATLAB-to-Python Compiler.

    PubMed

    Jurica, Peter; van Leeuwen, Cees

    2009-01-01

    Free access to scientific information facilitates scientific progress. Open-access scientific journals are a first step in this direction; a further step is to make auxiliary and supplementary materials that accompany scientific publications, such as methodological procedures and data-analysis tools, open and accessible to the scientific community. To this purpose it is instrumental to establish a software base, which will grow toward a comprehensive free and open-source language of technical and scientific computing. Endeavors in this direction are met with an important obstacle. MATLAB((R)), the predominant computation tool in many fields of research, is a closed-source commercial product. To facilitate the transition to an open computation platform, we propose Open-source MATLAB((R))-to-Python Compiler (OMPC), a platform that uses syntax adaptation and emulation to allow transparent import of existing MATLAB((R)) functions into Python programs. The imported MATLAB((R)) modules will run independently of MATLAB((R)), relying on Python's numerical and scientific libraries. Python offers a stable and mature open source platform that, in many respects, surpasses commonly used, expensive commercial closed source packages. The proposed software will therefore facilitate the transparent transition towards a free and general open-source lingua franca for scientific computation, while enabling access to the existing methods and algorithms of technical computing already available in MATLAB((R)). OMPC is available at http://ompc.juricap.com.

  15. Internet addiction: definition, assessment, epidemiology and clinical management.

    PubMed

    Shaw, Martha; Black, Donald W

    2008-01-01

    Internet addiction is characterized by excessive or poorly controlled preoccupations, urges or behaviours regarding computer use and internet access that lead to impairment or distress. The condition has attracted increasing attention in the popular media and among researchers, and this attention has paralleled the growth in computer (and Internet) access. Prevalence estimates vary widely, although a recent random telephone survey of the general US population reported an estimate of 0.3-0.7%. The disorder occurs worldwide, but mainly in countries where computer access and technology are widespread. Clinical samples and a majority of relevant surveys report a male preponderance. Onset is reported to occur in the late 20s or early 30s age group, and there is often a lag of a decade or more from initial to problematic computer usage. Internet addiction has been associated with dimensionally measured depression and indicators of social isolation. Psychiatric co-morbidity is common, particularly mood, anxiety, impulse control and substance use disorders. Aetiology is unknown, but probably involves psychological, neurobiological and cultural factors. There are no evidence-based treatments for internet addiction. Cognitive behavioural approaches may be helpful. There is no proven role for psychotropic medication. Marital and family therapy may help in selected cases, and online self-help books and tapes are available. Lastly, a self-imposed ban on computer use and Internet access may be necessary in some cases.

  16. Psychiatrists’ Comfort Using Computers and Other Electronic Devices in Clinical Practice

    PubMed Central

    Fochtmann, Laura J.; Clarke, Diana E.; Barber, Keila; Hong, Seung-Hee; Yager, Joel; Mościcki, Eve K.; Plovnick, Robert M.

    2015-01-01

    This report highlights findings from the Study of Psychiatrists’ Use of Informational Resources in Clinical Practice, a cross-sectional Web- and paper-based survey that examined psychiatrists’ comfort using computers and other electronic devices in clinical practice. One-thousand psychiatrists were randomly selected from the American Medical Association Physician Masterfile and asked to complete the survey between May and August, 2012. A total of 152 eligible psychiatrists completed the questionnaire (response rate 22.2 %). The majority of psychiatrists reported comfort using computers for educational and personal purposes. However, 26 % of psychiatrists reported not using or not being comfortable using computers for clinical functions. Psychiatrists under age 50 were more likely to report comfort using computers for all purposes than their older counterparts. Clinical tasks for which computers were reportedly used comfortably, specifically by psychiatrists younger than 50, included documenting clinical encounters, prescribing, ordering laboratory tests, accessing read-only patient information (e.g., test results), conducting internet searches for general clinical information, accessing online patient educational materials, and communicating with patients or other clinicians. Psychiatrists generally reported comfort using computers for personal and educational purposes. However, use of computers in clinical care was less common, particularly among psychiatrists 50 and older. Information and educational resources need to be available in a variety of accessible, user-friendly, computer and non-computer-based formats, to support use across all ages. Moreover, ongoing training and technical assistance with use of electronic and mobile device technologies in clinical practice is needed. Research on barriers to clinical use of computers is warranted. PMID:26667248

  17. Psychiatrists' Comfort Using Computers and Other Electronic Devices in Clinical Practice.

    PubMed

    Duffy, Farifteh F; Fochtmann, Laura J; Clarke, Diana E; Barber, Keila; Hong, Seung-Hee; Yager, Joel; Mościcki, Eve K; Plovnick, Robert M

    2016-09-01

    This report highlights findings from the Study of Psychiatrists' Use of Informational Resources in Clinical Practice, a cross-sectional Web- and paper-based survey that examined psychiatrists' comfort using computers and other electronic devices in clinical practice. One-thousand psychiatrists were randomly selected from the American Medical Association Physician Masterfile and asked to complete the survey between May and August, 2012. A total of 152 eligible psychiatrists completed the questionnaire (response rate 22.2 %). The majority of psychiatrists reported comfort using computers for educational and personal purposes. However, 26 % of psychiatrists reported not using or not being comfortable using computers for clinical functions. Psychiatrists under age 50 were more likely to report comfort using computers for all purposes than their older counterparts. Clinical tasks for which computers were reportedly used comfortably, specifically by psychiatrists younger than 50, included documenting clinical encounters, prescribing, ordering laboratory tests, accessing read-only patient information (e.g., test results), conducting internet searches for general clinical information, accessing online patient educational materials, and communicating with patients or other clinicians. Psychiatrists generally reported comfort using computers for personal and educational purposes. However, use of computers in clinical care was less common, particularly among psychiatrists 50 and older. Information and educational resources need to be available in a variety of accessible, user-friendly, computer and non-computer-based formats, to support use across all ages. Moreover, ongoing training and technical assistance with use of electronic and mobile device technologies in clinical practice is needed. Research on barriers to clinical use of computers is warranted.

  18. Computation of canonical correlation and best predictable aspect of future for time series

    NASA Technical Reports Server (NTRS)

    Pourahmadi, Mohsen; Miamee, A. G.

    1989-01-01

    The canonical correlation between the (infinite) past and future of a stationary time series is shown to be the limit of the canonical correlation between the (infinite) past and (finite) future, and computation of the latter is reduced to a (generalized) eigenvalue problem involving (finite) matrices. This provides a convenient and essentially, finite-dimensional algorithm for computing canonical correlations and components of a time series. An upper bound is conjectured for the largest canonical correlation.

  19. Report of the Defense Science Board Task Force on Military Applications of New-Generation Computing Technologies.

    DTIC Science & Technology

    1984-12-01

    1980’s we are seeing enhancement of breadth, power, and accessibility of computers in many dimensions: o Pov~erfu1, costly fragile mainframes for...During the 1980’s we are seeing enhancement of breadth, power and accessibility of computers in many dimensions. (1) Powerful, costly, fragile mainframes... X A~ ’ EMORANDlUM FOR THE t-RAIRMAN, DEFENSE<. ’ ’...’"" S!B.FECT: Defense Science Board T is F- Supercomputei Applicai io, Yoi are requested to

  20. ED adds business center to wait area.

    PubMed

    2007-10-01

    Providing your patients with Internet access in the waiting area can do wonders for their attitudes and make them much more understanding of long wait times. What's more, it doesn't take a fortune to create a business center. The ED at Florida Hospital Celebration (FL) Health made a world of difference with just a couple of computers and a printer. Have your information technology staff set the computers up to preserve the privacy of your internal computer system, and block out offensive sites. Access to medical sites can help reinforce your patient education efforts.

  1. On the Use of CAD-Native Predicates and Geometry in Surface Meshing

    NASA Technical Reports Server (NTRS)

    Aftosmis, M. J.

    1999-01-01

    Several paradigms for accessing computer-aided design (CAD) geometry during surface meshing for computational fluid dynamics are discussed. File translation, inconsistent geometry engines, and nonnative point construction are all identified as sources of nonrobustness. The paper argues in favor of accessing CAD parts and assemblies in their native format, without translation, and for the use of CAD-native predicates and constructors in surface mesh generation. The discussion also emphasizes the importance of examining the computational requirements for exact evaluation of triangulation predicates during surface meshing.

  2. Polyphenolic Composition and Antioxidant Activities of 6 New Turmeric (Curcuma Longa L.) Accessions.

    PubMed

    Chinedum, Eleazu; Kate, Eleazu; Sonia, Chukwuma; Ironkwe, Adanma; Andrew, Igwe

    2015-01-01

    The phytochemical composition and antioxidant capacities of 6 new NRCRI turmeric (Curcuma longa L.) accessions (39, 35, 60, 30, 50 and 41) were determined using standard techniques. The moisture contents of the tumeric samples ranged from 15.75 to 47.80% and the curcumin contents of the turmeric samples fell within the range of curcumin obtained from turmeric in other countries of the world. Furthermore, the turmeric accessions contained considerable amounts of antioxidants (measured using 2,2-diphenyl-1-picrylhydrazyl (DPPH) radical and reducing power assays), alkaloids, flavonoids, anthocyanins, and phenolics. There was significant correlation between the anthocyanin contents of the tumeric accessions versus their alkaloid (0.744) and flavonoid contents (0.986) suggesting an additive effect between the anthocyanins and alkaloids in turmeric; significant correlation between the inhibition of the turmeric accessions on DPPH radical versus their flavonoid (0.892) and anthocyanin (0.949) contents and significant correlation between the reducing power of the turmeric accessions versus their flavonoid (0.973) and anthocyanin (0.974) contents suggesting that anthocyanins as flavonoids largely contribute to the antioxidant activities of turmeric. The positive regression recorded between inhibition of DPPH radical by the turmeric accessions and quercetin versus reducing power (R2 = 0.852) suggest that any of these methods could be used to assess the antioxidant activities of tumeric. Finally, the study indicated the potentials of the turmeric accessions especially accessions 30 and 50 as promising sources of antioxidants.

  3. Hybrid optical CDMA-FSO communications network under spatially correlated gamma-gamma scintillation.

    PubMed

    Jurado-Navas, Antonio; Raddo, Thiago R; Garrido-Balsells, José María; Borges, Ben-Hur V; Olmos, Juan José Vegas; Monroy, Idelfonso Tafur

    2016-07-25

    In this paper, we propose a new hybrid network solution based on asynchronous optical code-division multiple-access (OCDMA) and free-space optical (FSO) technologies for last-mile access networks, where fiber deployment is impractical. The architecture of the proposed hybrid OCDMA-FSO network is thoroughly described. The users access the network in a fully asynchronous manner by means of assigned fast frequency hopping (FFH)-based codes. In the FSO receiver, an equal gain-combining technique is employed along with intensity modulation and direct detection. New analytical formalisms for evaluating the average bit error rate (ABER) performance are also proposed. These formalisms, based on the spatially correlated gamma-gamma statistical model, are derived considering three distinct scenarios, namely, uncorrelated, totally correlated, and partially correlated channels. Numerical results show that users can successfully achieve error-free ABER levels for the three scenarios considered as long as forward error correction (FEC) algorithms are employed. Therefore, OCDMA-FSO networks can be a prospective alternative to deliver high-speed communication services to access networks with deficient fiber infrastructure.

  4. Development of a Web Based Simulating System for Earthquake Modeling on the Grid

    NASA Astrophysics Data System (ADS)

    Seber, D.; Youn, C.; Kaiser, T.

    2007-12-01

    Existing cyberinfrastructure-based information, data and computational networks now allow development of state- of-the-art, user-friendly simulation environments that democratize access to high-end computational environments and provide new research opportunities for many research and educational communities. Within the Geosciences cyberinfrastructure network, GEON, we have developed the SYNSEIS (SYNthetic SEISmogram) toolkit to enable efficient computations of 2D and 3D seismic waveforms for a variety of research purposes especially for helping to analyze the EarthScope's USArray seismic data in a speedy and efficient environment. The underlying simulation software in SYNSEIS is a finite difference code, E3D, developed by LLNL (S. Larsen). The code is embedded within the SYNSEIS portlet environment and it is used by our toolkit to simulate seismic waveforms of earthquakes at regional distances (<1000km). Architecturally, SYNSEIS uses both Web Service and Grid computing resources in a portal-based work environment and has a built in access mechanism to connect to national supercomputer centers as well as to a dedicated, small-scale compute cluster for its runs. Even though Grid computing is well-established in many computing communities, its use among domain scientists still is not trivial because of multiple levels of complexities encountered. We grid-enabled E3D using our own dialect XML inputs that include geological models that are accessible through standard Web services within the GEON network. The XML inputs for this application contain structural geometries, source parameters, seismic velocity, density, attenuation values, number of time steps to compute, and number of stations. By enabling a portal based access to a such computational environment coupled with its dynamic user interface we enable a large user community to take advantage of such high end calculations in their research and educational activities. Our system can be used to promote an efficient and effective modeling environment to help scientists as well as educators in their daily activities and speed up the scientific discovery process.

  5. Cloud Computing. Technology Briefing. Number 1

    ERIC Educational Resources Information Center

    Alberta Education, 2013

    2013-01-01

    Cloud computing is Internet-based computing in which shared resources, software and information are delivered as a service that computers or mobile devices can access on demand. Cloud computing is already used extensively in education. Free or low-cost cloud-based services are used daily by learners and educators to support learning, social…

  6. A Study of the Correlation between Computer Games and Adolescent Behavioral Problems

    PubMed Central

    Shokouhi-Moqhaddam, Solmaz; Khezri-Moghadam, Noshiravan; Javanmard, Zeinab; Sarmadi-Ansar, Hassan; Aminaee, Mehran; Shokouhi-Moqhaddam, Majid; Zivari-Rahman, Mahmoud

    2013-01-01

    Background Today, due to developing communicative technologies, computer games and other audio-visual media as social phenomena, are very attractive and have a great effect on children and adolescents. The increasing popularity of these games among children and adolescents results in the public uncertainties about plausible harmful effects of these games. This study aimed to investigate the correlation between computer games and behavioral problems on male guidance school students. Methods This was a descriptive-correlative study on 384 randomly chosen male guidance school students. They were asked to answer the researcher's questionnaire about computer games and Achenbach’s Youth Self-Report (YSR). Findings The Results of this study indicated that there was about 95% direct significant correlation between the amount of playing games among adolescents and anxiety/depression, withdrawn/depression, rule-breaking behaviors, aggression, and social problems. However, there was no statistically significant correlation between the amount of computer game usage and physical complaints, thinking problems, and attention problems. In addition, there was a significant correlation between the students’ place of living and their parents’ job, and using computer games. Conclusion Computer games lead to anxiety, depression, withdrawal, rule-breaking behavior, aggression, and social problems in adolescents. PMID:24494157

  7. A Study of the Correlation between Computer Games and Adolescent Behavioral Problems.

    PubMed

    Shokouhi-Moqhaddam, Solmaz; Khezri-Moghadam, Noshiravan; Javanmard, Zeinab; Sarmadi-Ansar, Hassan; Aminaee, Mehran; Shokouhi-Moqhaddam, Majid; Zivari-Rahman, Mahmoud

    2013-01-01

    Today, due to developing communicative technologies, computer games and other audio-visual media as social phenomena, are very attractive and have a great effect on children and adolescents. The increasing popularity of these games among children and adolescents results in the public uncertainties about plausible harmful effects of these games. This study aimed to investigate the correlation between computer games and behavioral problems on male guidance school students. This was a descriptive-correlative study on 384 randomly chosen male guidance school students. They were asked to answer the researcher's questionnaire about computer games and Achenbach's Youth Self-Report (YSR). The Results of this study indicated that there was about 95% direct significant correlation between the amount of playing games among adolescents and anxiety/depression, withdrawn/depression, rule-breaking behaviors, aggression, and social problems. However, there was no statistically significant correlation between the amount of computer game usage and physical complaints, thinking problems, and attention problems. In addition, there was a significant correlation between the students' place of living and their parents' job, and using computer games. Computer games lead to anxiety, depression, withdrawal, rule-breaking behavior, aggression, and social problems in adolescents.

  8. Library Computing.

    ERIC Educational Resources Information Center

    Library Journal, 1985

    1985-01-01

    This special supplement to "Library Journal" and "School Library Journal" includes articles on technological dependency, promise of computers for reluctant readers, copyright and database downloading, access to neighborhood of Mister Rogers, library acquisitions, circulating personal computers, "microcomputeritis,"…

  9. Spin-transfer torque magnetoresistive random-access memory technologies for normally off computing (invited)

    NASA Astrophysics Data System (ADS)

    Ando, K.; Fujita, S.; Ito, J.; Yuasa, S.; Suzuki, Y.; Nakatani, Y.; Miyazaki, T.; Yoda, H.

    2014-05-01

    Most parts of present computer systems are made of volatile devices, and the power to supply them to avoid information loss causes huge energy losses. We can eliminate this meaningless energy loss by utilizing the non-volatile function of advanced spin-transfer torque magnetoresistive random-access memory (STT-MRAM) technology and create a new type of computer, i.e., normally off computers. Critical tasks to achieve normally off computers are implementations of STT-MRAM technologies in the main memory and low-level cache memories. STT-MRAM technology for applications to the main memory has been successfully developed by using perpendicular STT-MRAMs, and faster STT-MRAM technologies for applications to the cache memory are now being developed. The present status of STT-MRAMs and challenges that remain for normally off computers are discussed.

  10. Spreadsheet log analysis in subsurface geology

    USGS Publications Warehouse

    Doveton, J.H.

    2000-01-01

    Most of the direct knowledge of the geology of the subsurface is gained from the examination of core and drill-cuttings recovered from boreholes drilled by the petroleum and water industries. Wireline logs run in these same boreholes generally have been restricted to tasks of lithostratigraphic correlation and thee location of hydrocarbon pay zones. However, the range of petrophysical measurements has expanded markedly in recent years, so that log traces now can be transformed to estimates of rock composition. Increasingly, logs are available in a digital format that can be read easily by a desktop computer and processed by simple spreadsheet software methods. Taken together, these developments offer accessible tools for new insights into subsurface geology that complement the traditional, but limited, sources of core and cutting observations.

  11. Joint Refugee Information Clearing Office (JRICO)

    DTIC Science & Technology

    1976-03-02

    A. JRICO Documentation 42 B. DA Documentation 62 C. DOD Documentation 75 D. IATF Documentation 83 E. Operating Procedures 103 F. Data...Indochina ( IATF ) and maintain access to the IATF computer data files on refugees, as well as coordinating with OSD, refugee resettlement centers...providing facilities and administrative support as requir- ed and negotiating with IATF for on-line computer access to the refugee records in the

  12. High Speed Oblivious Random Access Memory (HS-ORAM)

    DTIC Science & Technology

    2015-09-01

    Bryan Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers”, 30th International Cryptology Conference, pp. 465...holder or any other person or corporation; or convey any rights or permission to manufacture , use, or sell any patented invention that may relate to...secure outsourced data access protocols. HS-ORAM deploys a number of server- side software components running inside tamper-proof secure coprocessors

  13. Zap 'Em with Assistive Technology: Notetaking, Modified Materials, Assistive Writing Tools, References, Organizational Tools, Cognitive Assistance, Adapted Access.

    ERIC Educational Resources Information Center

    Lahm, Elizabeth A.; Morrissette, Sandra K.

    This collection of materials describes different types of computer applications and software that can help students with disabilities. It contains information on: (1) Easy Access, a feature of the systems software on every Macintosh computer that allows use of the keypad instead of the mouse, options for slow keys, and options for sticky keys; (2)…

  14. The Influence of High Computer Access on Schoolwork and Student Empowerment: An Exploratory Study of the Nashville ACOT Site.

    ERIC Educational Resources Information Center

    Fisher, Charles W.

    This study examines the relationship between high computer access and "student empowerment" at the Nashville, Tennessee, site of the Apple Classroom of Tomorrow (ACOT) project. The study rests on the premise that school learning is a function of the work carried out by students in school, and that schoolwork is experienced by students as…

  15. Internet Access as a Structural Factor in Career Choice: A Comparison between Computing and Non-Computing Major Students

    ERIC Educational Resources Information Center

    Lotriet, Hugo; Matthee, Machdel; Alexander, Patricia

    2011-01-01

    The career choice model of Adya and Kaiser posits the availability of technology resources as a structural element impacting on career choice. The model distinguishes between accessibility at school and at home. Based on this theoretical point of departure and by arguing a link between choice of major and choice of field of career, this paper…

  16. How amide hydrogens exchange in native proteins.

    PubMed

    Persson, Filip; Halle, Bertil

    2015-08-18

    Amide hydrogen exchange (HX) is widely used in protein biophysics even though our ignorance about the HX mechanism makes data interpretation imprecise. Notably, the open exchange-competent conformational state has not been identified. Based on analysis of an ultralong molecular dynamics trajectory of the protein BPTI, we propose that the open (O) states for amides that exchange by subglobal fluctuations are locally distorted conformations with two water molecules directly coordinated to the N-H group. The HX protection factors computed from the relative O-state populations agree well with experiment. The O states of different amides show little or no temporal correlation, even if adjacent residues unfold cooperatively. The mean residence time of the O state is ∼100 ps for all examined amides, so the large variation in measured HX rate must be attributed to the opening frequency. A few amides gain solvent access via tunnels or pores penetrated by water chains including native internal water molecules, but most amides access solvent by more local structural distortions. In either case, we argue that an overcoordinated N-H group is necessary for efficient proton transfer by Grotthuss-type structural diffusion.

  17. How amide hydrogens exchange in native proteins

    PubMed Central

    Persson, Filip; Halle, Bertil

    2015-01-01

    Amide hydrogen exchange (HX) is widely used in protein biophysics even though our ignorance about the HX mechanism makes data interpretation imprecise. Notably, the open exchange-competent conformational state has not been identified. Based on analysis of an ultralong molecular dynamics trajectory of the protein BPTI, we propose that the open (O) states for amides that exchange by subglobal fluctuations are locally distorted conformations with two water molecules directly coordinated to the N–H group. The HX protection factors computed from the relative O-state populations agree well with experiment. The O states of different amides show little or no temporal correlation, even if adjacent residues unfold cooperatively. The mean residence time of the O state is ∼100 ps for all examined amides, so the large variation in measured HX rate must be attributed to the opening frequency. A few amides gain solvent access via tunnels or pores penetrated by water chains including native internal water molecules, but most amides access solvent by more local structural distortions. In either case, we argue that an overcoordinated N–H group is necessary for efficient proton transfer by Grotthuss-type structural diffusion. PMID:26195754

  18. Computer Education for Engineers, Part III.

    ERIC Educational Resources Information Center

    McCullough, Earl S.; Lofy, Frank J.

    1989-01-01

    Reports the results of the third survey of computer use in engineering education conducted in the fall of 1987 in comparing with 1981 and 1984 results. Summarizes survey data on computer course credits, languages, equipment use, CAD/CAM instruction, faculty access, and computer graphics. (YP)

  19. Cloud-based Web Services for Near-Real-Time Web access to NPP Satellite Imagery and other Data

    NASA Astrophysics Data System (ADS)

    Evans, J. D.; Valente, E. G.

    2010-12-01

    We are building a scalable, cloud computing-based infrastructure for Web access to near-real-time data products synthesized from the U.S. National Polar-Orbiting Environmental Satellite System (NPOESS) Preparatory Project (NPP) and other geospatial and meteorological data. Given recent and ongoing changes in the the NPP and NPOESS programs (now Joint Polar Satellite System), the need for timely delivery of NPP data is urgent. We propose an alternative to a traditional, centralized ground segment, using distributed Direct Broadcast facilities linked to industry-standard Web services by a streamlined processing chain running in a scalable cloud computing environment. Our processing chain, currently implemented on Amazon.com's Elastic Compute Cloud (EC2), retrieves raw data from NASA's Moderate Resolution Imaging Spectroradiometer (MODIS) and synthesizes data products such as Sea-Surface Temperature, Vegetation Indices, etc. The cloud computing approach lets us grow and shrink computing resources to meet large and rapid fluctuations (twice daily) in both end-user demand and data availability from polar-orbiting sensors. Early prototypes have delivered various data products to end-users with latencies between 6 and 32 minutes. We have begun to replicate machine instances in the cloud, so as to reduce latency and maintain near-real time data access regardless of increased data input rates or user demand -- all at quite moderate monthly costs. Our service-based approach (in which users invoke software processes on a Web-accessible server) facilitates access into datasets of arbitrary size and resolution, and allows users to request and receive tailored and composite (e.g., false-color multiband) products on demand. To facilitate broad impact and adoption of our technology, we have emphasized open, industry-standard software interfaces and open source software. Through our work, we envision the widespread establishment of similar, derived, or interoperable systems for processing and serving near-real-time data from NPP and other sensors. A scalable architecture based on cloud computing ensures cost-effective, real-time processing and delivery of NPP and other data. Access via standard Web services maximizes its interoperability and usefulness.

  20. Guidelines for Outsourcing Remote Access.

    ERIC Educational Resources Information Center

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  1. Evaluation of computer usage in healthcare among private practitioners of NCT Delhi.

    PubMed

    Ganeshkumar, P; Arun Kumar, Sharma; Rajoura, O P

    2011-01-01

    1. To evaluate the usage and the knowledge of computers and Information and Communication Technology in health care delivery by private practitioners. 2. To understand the determinants of computer usage by them. A cross sectional study was conducted among the private practitioners practising in three districts of NCT of Delhi between November 2007 and December 2008 by stratified random sampling method, where knowledge and usage of computers in health care and determinants of usage of computer was evaluated in them by a pre-coded semi open ended questionnaire. About 77% of the practitioners reported to have a computer and had the accessibility to internet. Computer availability and internet accessibility was highest among super speciality practitioners. Practitioners who attended a computer course were 13.8 times [OR: 13.8 (7.3 - 25.8)] more likely to have installed an EHR in the clinic. Technical related issues were the major perceived barrier in installing a computer in the clinic. Practice speciality, previous attendance of a computer course, age of started using a computer influenced the knowledge about computers. Speciality of the practice, presence of a computer professional and gender were the determinants of usage of computer.

  2. Dispel4py: An Open-Source Python library for Data-Intensive Seismology

    NASA Astrophysics Data System (ADS)

    Filgueira, Rosa; Krause, Amrey; Spinuso, Alessandro; Klampanos, Iraklis; Danecek, Peter; Atkinson, Malcolm

    2015-04-01

    Scientific workflows are a necessary tool for many scientific communities as they enable easy composition and execution of applications on computing resources while scientists can focus on their research without being distracted by the computation management. Nowadays, scientific communities (e.g. Seismology) have access to a large variety of computing resources and their computational problems are best addressed using parallel computing technology. However, successful use of these technologies requires a lot of additional machinery whose use is not straightforward for non-experts: different parallel frameworks (MPI, Storm, multiprocessing, etc.) must be used depending on the computing resources (local machines, grids, clouds, clusters) where applications are run. This implies that for achieving the best applications' performance, users usually have to change their codes depending on the features of the platform selected for running them. This work presents dispel4py, a new open-source Python library for describing abstract stream-based workflows for distributed data-intensive applications. Special care has been taken to provide dispel4py with the ability to map abstract workflows to different platforms dynamically at run-time. Currently dispel4py has four mappings: Apache Storm, MPI, multi-threading and sequential. The main goal of dispel4py is to provide an easy-to-use tool to develop and test workflows in local resources by using the sequential mode with a small dataset. Later, once a workflow is ready for long runs, it can be automatically executed on different parallel resources. dispel4py takes care of the underlying mappings by performing an efficient parallelisation. Processing Elements (PE) represent the basic computational activities of any dispel4Py workflow, which can be a seismologic algorithm, or a data transformation process. For creating a dispel4py workflow, users only have to write very few lines of code to describe their PEs and how they are connected by using Python, which is widely supported on many platforms and is popular in many scientific domains, such as in geosciences. Once, a dispel4py workflow is written, a user only has to select which mapping they would like to use, and everything else (parallelisation, distribution of data) is carried on by dispel4py without any cost to the user. Among all dispel4py features we would like to highlight the following: * The PEs are connected by streams and not by writing to and reading from intermediate files, avoiding many IO operations. * The PEs can be stored into a registry. Therefore, different users can recombine PEs in many different workflows. * dispel4py has been enriched with a provenance mechanism to support runtime provenance analysis. We have adopted the W3C-PROV data model, which is accessible via a prototypal browser-based user interface and a web API. It supports the users with the visualisation of graphical products and offers combined operations to access and download the data, which may be selectively stored at runtime, into dedicated data archives. dispel4py has been already used by seismologists in the VERCE project to develop different seismic workflows. One of them is the Seismic Ambient Noise Cross-Correlation workflow, which preprocesses and cross-correlates traces from several stations. First, this workflow was tested on a local machine by using a small number of stations as input data. Later, it was executed on different parallel platforms (SuperMUC cluster, and Terracorrelator machine), automatically scaling up by using MPI and multiprocessing mappings and up to 1000 stations as input data. The results show that the dispel4py achieves scalable performance in both mappings tested on different parallel platforms.

  3. Report: EPA Could Improve Physical Access and Service Continuity/Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus

    EPA Pesticide Factsheets

    Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.

  4. Computer Technology/Special Education/Rehabilitation: Proceedings of the Conference (2nd, Northridge, California, October 16-18, 1986).

    ERIC Educational Resources Information Center

    Murphy, Harry J., Ed.

    The following 25 papers (with their authors) are presented from a conference on computer technology in special education and rehabilitation: "Computers for Business--Computers for Life" (I. Keith Austin); "Rehabilitation and the Computer: How to Find What You Need" (Thomas Backer); "Computer Access Alternatives for Visually Impaired People in…

  5. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  6. Measurement-induced-nonlocality for Dirac particles in Garfinkle-Horowitz-Strominger dilation space-time

    NASA Astrophysics Data System (ADS)

    He, Juan; Xu, Shuai; Ye, Liu

    2016-05-01

    We investigate the quantum correlation via measurement-induced-nonlocality (MIN) for Dirac particles in Garfinkle-Horowitz-Strominger (GHS) dilation space-time. It is shown that the physical accessible quantum correlation decreases as the dilation parameter increases monotonically. Unlike the case of scalar fields, the physical accessible correlation is not zero when the Hawking temperature is infinite owing to the Pauli exclusion principle and the differences between Fermi-Dirac and Bose-Einstein statistics. Meanwhile, the boundary of MIN related to Bell-violation is derived, which indicates that MIN is more general than quantum nonlocality captured by the violation of Bell-inequality. As a by-product, a tenable quantitative relation about MIN redistribution is obtained whatever the dilation parameter is. In addition, it is worth emphasizing that the underlying reason why the physical accessible correlation and mutual information decrease is that they are redistributed to the physical inaccessible regions.

  7. Empowering Middle School Teachers with Portable Computers.

    ERIC Educational Resources Information Center

    Weast, Jerry D.; And Others

    1993-01-01

    A Sioux Falls (South Dakota) project that supplied middle school teachers with Macintosh computers and training to use them showed gratifying results. Easy access to portable notebook computers made teachers more active computer users, increased teacher interaction and collaboration, enhanced teacher productivity regarding management tasks and…

  8. Miscellaneous Topics in Computer-Aided Drug Design: Synthetic Accessibility and GPU Computing, and Other Topics.

    PubMed

    Fukunishi, Yoshifumi; Mashimo, Tadaaki; Misoo, Kiyotaka; Wakabayashi, Yoshinori; Miyaki, Toshiaki; Ohta, Seiji; Nakamura, Mayu; Ikeda, Kazuyoshi

    2016-01-01

    Computer-aided drug design is still a state-of-the-art process in medicinal chemistry, and the main topics in this field have been extensively studied and well reviewed. These topics include compound databases, ligand-binding pocket prediction, protein-compound docking, virtual screening, target/off-target prediction, physical property prediction, molecular simulation and pharmacokinetics/pharmacodynamics (PK/PD) prediction. Message and Conclusion: However, there are also a number of secondary or miscellaneous topics that have been less well covered. For example, methods for synthesizing and predicting the synthetic accessibility (SA) of designed compounds are important in practical drug development, and hardware/software resources for performing the computations in computer-aided drug design are crucial. Cloud computing and general purpose graphics processing unit (GPGPU) computing have been used in virtual screening and molecular dynamics simulations. Not surprisingly, there is a growing demand for computer systems which combine these resources. In the present review, we summarize and discuss these various topics of drug design.

  9. Miscellaneous Topics in Computer-Aided Drug Design: Synthetic Accessibility and GPU Computing, and Other Topics

    PubMed Central

    Fukunishi, Yoshifumi; Mashimo, Tadaaki; Misoo, Kiyotaka; Wakabayashi, Yoshinori; Miyaki, Toshiaki; Ohta, Seiji; Nakamura, Mayu; Ikeda, Kazuyoshi

    2016-01-01

    Abstract: Background Computer-aided drug design is still a state-of-the-art process in medicinal chemistry, and the main topics in this field have been extensively studied and well reviewed. These topics include compound databases, ligand-binding pocket prediction, protein-compound docking, virtual screening, target/off-target prediction, physical property prediction, molecular simulation and pharmacokinetics/pharmacodynamics (PK/PD) prediction. Message and Conclusion: However, there are also a number of secondary or miscellaneous topics that have been less well covered. For example, methods for synthesizing and predicting the synthetic accessibility (SA) of designed compounds are important in practical drug development, and hardware/software resources for performing the computations in computer-aided drug design are crucial. Cloud computing and general purpose graphics processing unit (GPGPU) computing have been used in virtual screening and molecular dynamics simulations. Not surprisingly, there is a growing demand for computer systems which combine these resources. In the present review, we summarize and discuss these various topics of drug design. PMID:27075578

  10. Project Integration Architecture (PIA) and Computational Analysis Programming Interface (CAPRI) for Accessing Geometry Data from CAD Files

    NASA Technical Reports Server (NTRS)

    Benyo, Theresa L.

    2002-01-01

    Integration of a supersonic inlet simulation with a computer aided design (CAD) system is demonstrated. The integration is performed using the Project Integration Architecture (PIA). PIA provides a common environment for wrapping many types of applications. Accessing geometry data from CAD files is accomplished by incorporating appropriate function calls from the Computational Analysis Programming Interface (CAPRI). CAPRI is a CAD vendor neutral programming interface that aids in acquiring geometry data directly from CAD files. The benefits of wrapping a supersonic inlet simulation into PIA using CAPRI are; direct access of geometry data, accurate capture of geometry data, automatic conversion of data units, CAD vendor neutral operation, and on-line interactive history capture. This paper describes the PIA and the CAPRI wrapper and details the supersonic inlet simulation demonstration.

  11. Simple trigonometry on computed tomography helps in planning renal access.

    PubMed

    Bilen, Cenk Yücel; Koçak, Burak; Kitirci, Gürcan; Danaci, Murat; Sarikaya, Saban

    2007-08-01

    To retrospectively assess the usefulness of the measurements on preoperative computed tomography (CT) of patients with urinary stone disease for planning the access site using vertical angulation of the C-arm. Of the patients who underwent percutaneous nephrolithotomy from November 2001 to October 2006, 41 patients with superior calix access had undergone preoperative CT. The depth of the target stone (y) and the vertical distance from that point to the first rib free slice (x) were measured on CT. The limit of the ratio of x over y was accepted as 0.58, with ratios below that indicating that infracostal access could be achieved by vertical angulation of the C-arm. We achieved an approach to the superior calix through an infracostal access in 28 patients. The preoperative trigonometric study on CT predicted 24 of them. The stone-free rate was 92.6%, and no chest-related complications developed. Simple trigonometry on CT of the patients with complex stones could help endourologists in planning renal access.

  12. Socio-Economic Background and Access to Internet as Correlates of Students' Achievement in Agricultural Science

    ERIC Educational Resources Information Center

    Adegoke, Sunday Paul; Osokoya, Modupe M.

    2015-01-01

    This study investigated access to internet and socio-economic background as correlates of students' achievement in Agricultural Science among selected Senior Secondary Schools Two Students in Ogbomoso South and North Local Government Areas. The study adopted multi-stage sampling technique. Simple random sampling was used to select 30 students from…

  13. Factors Influencing the Adoption of Cloud Computing by Decision Making Managers

    ERIC Educational Resources Information Center

    Ross, Virginia Watson

    2010-01-01

    Cloud computing is a growing field, addressing the market need for access to computing resources to meet organizational computing requirements. The purpose of this research is to evaluate the factors that influence an organization in their decision whether to adopt cloud computing as a part of their strategic information technology planning.…

  14. Changes in Student Attitudes and Student Computer Use in a Computer-Enriched Environment.

    ERIC Educational Resources Information Center

    Mitra, Ananda; Steffensmeier, Timothy

    2000-01-01

    Examines the pedagogic usefulness of the computer by focusing on changes in student attitudes and use of computers in a computer-enriched environment using data from a longitudinal study at Wake Forest University. Results indicate that a networked institution where students have easy access can foster positive attitudes. (Author/LRW)

  15. Estimation of brachial artery volume flow by duplex ultrasound imaging predicts dialysis access maturation.

    PubMed

    Ko, Sae Hee; Bandyk, Dennis F; Hodgkiss-Harlow, Kelley D; Barleben, Andrew; Lane, John

    2015-06-01

    This study validated duplex ultrasound measurement of brachial artery volume flow (VF) as predictor of dialysis access flow maturation and successful hemodialysis. Duplex ultrasound was used to image upper extremity dialysis access anatomy and estimate access VF within 1 to 2 weeks of the procedure. Correlation of brachial artery VF with dialysis access conduit VF was performed using a standardized duplex testing protocol in 75 patients. The hemodynamic data were used to develop brachial artery flow velocity criteria (peak systolic velocity and end-diastolic velocity) predictive of three VF categories: low (<600 mL/min), acceptable (600-800 mL/min), or high (>800 mL/min). Brachial artery VF was then measured in 148 patients after a primary (n = 86) or revised (n = 62) upper extremity dialysis access procedure, and the VF category correlated with access maturation or need for revision before hemodialysis usage. Access maturation was conferred when brachial artery VF was >600 mL/min and conduit imaging indicated successful cannulation based on anatomic criteria of conduit diameter >5 mm and skin depth <6 mm. Measurements of VF from the brachial artery and access conduit demonstrated a high degree of correlation (R(2) = 0.805) for autogenous vein (n = 45; R(2) = 0.87) and bridge graft (n = 30; R(2) = 0.78) dialysis accesses. Access VF of >800 mL/min was predicted when the brachial artery lumen diameter was >4.5 mm, peak systolic velocity was >150 cm/s, and the diastolic-to-systolic velocity ratio was >0.4. Brachial artery velocity spectra indicating VF <800 mL/min was associated (P < .0001) with failure of access maturation. Revision was required in 15 of 21 (71%) accesses with a VF of <600 mL/min, 4 of 40 accesses (10%) with aVF of 600 to 800 mL/min, and 2 of 87 accesses (2.3%) with an initial VF of >800 mL/min. Duplex testing to estimate brachial artery VF and assess the conduit for ease of cannulation can be performed in 5 minutes during the initial postoperative vascular clinic evaluation. Estimation of brachial artery VF using the duplex ultrasound, termed the "Fast, 5-min Dialysis Duplex Scan," facilitates patient evaluation after new or revised upper extremity dialysis access procedures. Brachial artery VF correlates with access VF measurements and has the advantage of being easier to perform and applicable for forearm and also arm dialysis access. When brachial artery velocity spectra criteria confirm a VF >800 mL/min, flow maturation and successful hemodialysis are predicted if anatomic criteria for conduit cannulation are also present. Copyright © 2015 Society for Vascular Surgery. Published by Elsevier Inc. All rights reserved.

  16. Approaches in highly parameterized inversion-PESTCommander, a graphical user interface for file and run management across networks

    USGS Publications Warehouse

    Karanovic, Marinko; Muffels, Christopher T.; Tonkin, Matthew J.; Hunt, Randall J.

    2012-01-01

    Models of environmental systems have become increasingly complex, incorporating increasingly large numbers of parameters in an effort to represent physical processes on a scale approaching that at which they occur in nature. Consequently, the inverse problem of parameter estimation (specifically, model calibration) and subsequent uncertainty analysis have become increasingly computation-intensive endeavors. Fortunately, advances in computing have made computational power equivalent to that of dozens to hundreds of desktop computers accessible through a variety of alternate means: modelers have various possibilities, ranging from traditional Local Area Networks (LANs) to cloud computing. Commonly used parameter estimation software is well suited to take advantage of the availability of such increased computing power. Unfortunately, logistical issues become increasingly important as an increasing number and variety of computers are brought to bear on the inverse problem. To facilitate efficient access to disparate computer resources, the PESTCommander program documented herein has been developed to provide a Graphical User Interface (GUI) that facilitates the management of model files ("file management") and remote launching and termination of "slave" computers across a distributed network of computers ("run management"). In version 1.0 described here, PESTCommander can access and ascertain resources across traditional Windows LANs: however, the architecture of PESTCommander has been developed with the intent that future releases will be able to access computing resources (1) via trusted domains established in Wide Area Networks (WANs) in multiple remote locations and (2) via heterogeneous networks of Windows- and Unix-based operating systems. The design of PESTCommander also makes it suitable for extension to other computational resources, such as those that are available via cloud computing. Version 1.0 of PESTCommander was developed primarily to work with the parameter estimation software PEST; the discussion presented in this report focuses on the use of the PESTCommander together with Parallel PEST. However, PESTCommander can be used with a wide variety of programs and models that require management, distribution, and cleanup of files before or after model execution. In addition to its use with the Parallel PEST program suite, discussion is also included in this report regarding the use of PESTCommander with the Global Run Manager GENIE, which was developed simultaneously with PESTCommander.

  17. A Faster Parallel Algorithm and Efficient Multithreaded Implementations for Evaluating Betweenness Centrality on Massive Datasets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Madduri, Kamesh; Ediger, David; Jiang, Karl

    2009-02-15

    We present a new lock-free parallel algorithm for computing betweenness centralityof massive small-world networks. With minor changes to the data structures, ouralgorithm also achieves better spatial cache locality compared to previous approaches. Betweenness centrality is a key algorithm kernel in HPCS SSCA#2, a benchmark extensively used to evaluate the performance of emerging high-performance computing architectures for graph-theoretic computations. We design optimized implementations of betweenness centrality and the SSCA#2 benchmark for two hardware multithreaded systems: a Cray XMT system with the Threadstorm processor, and a single-socket Sun multicore server with the UltraSPARC T2 processor. For a small-world network of 134 millionmore » vertices and 1.073 billion edges, the 16-processor XMT system and the 8-core Sun Fire T5120 server achieve TEPS scores (an algorithmic performance count for the SSCA#2 benchmark) of 160 million and 90 million respectively, which corresponds to more than a 2X performance improvement over the previous parallel implementations. To better characterize the performance of these multithreaded systems, we correlate the SSCA#2 performance results with data from the memory-intensive STREAM and RandomAccess benchmarks. Finally, we demonstrate the applicability of our implementation to analyze massive real-world datasets by computing approximate betweenness centrality for a large-scale IMDb movie-actor network.« less

  18. A Faster Parallel Algorithm and Efficient Multithreaded Implementations for Evaluating Betweenness Centrality on Massive Datasets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Madduri, Kamesh; Ediger, David; Jiang, Karl

    2009-05-29

    We present a new lock-free parallel algorithm for computing betweenness centrality of massive small-world networks. With minor changes to the data structures, our algorithm also achieves better spatial cache locality compared to previous approaches. Betweenness centrality is a key algorithm kernel in the HPCS SSCA#2 Graph Analysis benchmark, which has been extensively used to evaluate the performance of emerging high-performance computing architectures for graph-theoretic computations. We design optimized implementations of betweenness centrality and the SSCA#2 benchmark for two hardware multithreaded systems: a Cray XMT system with the ThreadStorm processor, and a single-socket Sun multicore server with the UltraSparc T2 processor.more » For a small-world network of 134 million vertices and 1.073 billion edges, the 16-processor XMT system and the 8-core Sun Fire T5120 server achieve TEPS scores (an algorithmic performance count for the SSCA#2 benchmark) of 160 million and 90 million respectively, which corresponds to more than a 2X performance improvement over the previous parallel implementations. To better characterize the performance of these multithreaded systems, we correlate the SSCA#2 performance results with data from the memory-intensive STREAM and RandomAccess benchmarks. Finally, we demonstrate the applicability of our implementation to analyze massive real-world datasets by computing approximate betweenness centrality for a large-scale IMDb movie-actor network.« less

  19. Monte Carlo based investigation of berry phase for depth resolved characterization of biomedical scattering samples

    NASA Astrophysics Data System (ADS)

    Baba, J. S.; Koju, V.; John, D.

    2015-03-01

    The propagation of light in turbid media is an active area of research with relevance to numerous investigational fields, e.g., biomedical diagnostics and therapeutics. The statistical random-walk nature of photon propagation through turbid media is ideal for computational based modeling and simulation. Ready access to super computing resources provide a means for attaining brute force solutions to stochastic light-matter interactions entailing scattering by facilitating timely propagation of sufficient (>107) photons while tracking characteristic parameters based on the incorporated physics of the problem. One such model that works well for isotropic but fails for anisotropic scatter, which is the case for many biomedical sample scattering problems, is the diffusion approximation. In this report, we address this by utilizing Berry phase (BP) evolution as a means for capturing anisotropic scattering characteristics of samples in the preceding depth where the diffusion approximation fails. We extend the polarization sensitive Monte Carlo method of Ramella-Roman, et al., to include the computationally intensive tracking of photon trajectory in addition to polarization state at every scattering event. To speed-up the computations, which entail the appropriate rotations of reference frames, the code was parallelized using OpenMP. The results presented reveal that BP is strongly correlated to the photon penetration depth, thus potentiating the possibility of polarimetric depth resolved characterization of highly scattering samples, e.g., biological tissues.

  20. Monte Carlo based investigation of Berry phase for depth resolved characterization of biomedical scattering samples

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baba, Justin S; John, Dwayne O; Koju, Vijay

    The propagation of light in turbid media is an active area of research with relevance to numerous investigational fields, e.g., biomedical diagnostics and therapeutics. The statistical random-walk nature of photon propagation through turbid media is ideal for computational based modeling and simulation. Ready access to super computing resources provide a means for attaining brute force solutions to stochastic light-matter interactions entailing scattering by facilitating timely propagation of sufficient (>10million) photons while tracking characteristic parameters based on the incorporated physics of the problem. One such model that works well for isotropic but fails for anisotropic scatter, which is the case formore » many biomedical sample scattering problems, is the diffusion approximation. In this report, we address this by utilizing Berry phase (BP) evolution as a means for capturing anisotropic scattering characteristics of samples in the preceding depth where the diffusion approximation fails. We extend the polarization sensitive Monte Carlo method of Ramella-Roman, et al.,1 to include the computationally intensive tracking of photon trajectory in addition to polarization state at every scattering event. To speed-up the computations, which entail the appropriate rotations of reference frames, the code was parallelized using OpenMP. The results presented reveal that BP is strongly correlated to the photon penetration depth, thus potentiating the possibility of polarimetric depth resolved characterization of highly scattering samples, e.g., biological tissues.« less

  1. ATLAS Distributed Computing Monitoring tools during the LHC Run I

    NASA Astrophysics Data System (ADS)

    Schovancová, J.; Campana, S.; Di Girolamo, A.; Jézéquel, S.; Ueda, I.; Wenaus, T.; Atlas Collaboration

    2014-06-01

    This contribution summarizes evolution of the ATLAS Distributed Computing (ADC) Monitoring project during the LHC Run I. The ADC Monitoring targets at the three groups of customers: ADC Operations team to early identify malfunctions and escalate issues to an activity or a service expert, ATLAS national contacts and sites for the real-time monitoring and long-term measurement of the performance of the provided computing resources, and the ATLAS Management for long-term trends and accounting information about the ATLAS Distributed Computing resources. During the LHC Run I a significant development effort has been invested in standardization of the monitoring and accounting applications in order to provide extensive monitoring and accounting suite. ADC Monitoring applications separate the data layer and the visualization layer. The data layer exposes data in a predefined format. The visualization layer is designed bearing in mind visual identity of the provided graphical elements, and re-usability of the visualization bits across the different tools. A rich family of various filtering and searching options enhancing available user interfaces comes naturally with the data and visualization layer separation. With a variety of reliable monitoring data accessible through standardized interfaces, the possibility of automating actions under well defined conditions correlating multiple data sources has become feasible. In this contribution we discuss also about the automated exclusion of degraded resources and their automated recovery in various activities.

  2. Seismic waveform modeling over cloud

    NASA Astrophysics Data System (ADS)

    Luo, Cong; Friederich, Wolfgang

    2016-04-01

    With the fast growing computational technologies, numerical simulation of seismic wave propagation achieved huge successes. Obtaining the synthetic waveforms through numerical simulation receives an increasing amount of attention from seismologists. However, computational seismology is a data-intensive research field, and the numerical packages usually come with a steep learning curve. Users are expected to master considerable amount of computer knowledge and data processing skills. Training users to use the numerical packages, correctly access and utilize the computational resources is a troubled task. In addition to that, accessing to HPC is also a common difficulty for many users. To solve these problems, a cloud based solution dedicated on shallow seismic waveform modeling has been developed with the state-of-the-art web technologies. It is a web platform integrating both software and hardware with multilayer architecture: a well designed SQL database serves as the data layer, HPC and dedicated pipeline for it is the business layer. Through this platform, users will no longer need to compile and manipulate various packages on the local machine within local network to perform a simulation. By providing users professional access to the computational code through its interfaces and delivering our computational resources to the users over cloud, users can customize the simulation at expert-level, submit and run the job through it.

  3. Schedulers with load-store queue awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Tong; Eichenberger, Alexandre E.; Jacob, Arpith C.

    2017-02-07

    In one embodiment, a computer-implemented method includes tracking a size of a load-store queue (LSQ) during compile time of a program. The size of the LSQ is time-varying and indicates how many memory access instructions of the program are on the LSQ. The method further includes scheduling, by a computer processor, a plurality of memory access instructions of the program based on the size of the LSQ.

  4. Schedulers with load-store queue awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Tong; Eichenberger, Alexandre E.; Jacob, Arpith C.

    2017-01-24

    In one embodiment, a computer-implemented method includes tracking a size of a load-store queue (LSQ) during compile time of a program. The size of the LSQ is time-varying and indicates how many memory access instructions of the program are on the LSQ. The method further includes scheduling, by a computer processor, a plurality of memory access instructions of the program based on the size of the LSQ.

  5. Guidelines and Options for Computer Access from a Reclined Position.

    PubMed

    Grott, Ray

    2015-01-01

    Many people can benefit from working in a reclined position when accessing a computer. This can be due to disabilities involving musculoskeletal weakness, or the need to offload pressure on the spine or elevate the legs. Although there are "reclining workstations" on the market that work for some people, potentially better solutions tailored to individual needs can be configured at modest cost by following some basic principles.

  6. A Cross-Sectional Analysis of Use of Information Technology by Selected Students of Health Colleges of a Saudi University.

    PubMed

    Mahmood, Shahid; Al Jeaidi, Zaid; Al-Onazi, Mashari; Al-Shehri, Ahmed; Al-Harbi, Ahmed

    2016-06-01

    To determine the use of information technology (IT) among students of Medicine, Dentistry, and Pharmacy in Prince Sattam Bin AbdulAziz University, Al-Khraj, Saudi Arabia (PSAU). Across-sectional survey. From September 2014 to January, 2015. Aclose-ended questionnaire consisting of 30 multiple choice questions (MCQs) was distributed to the students. The questions were related to their access to computers, skills and training, computer activities, and internet access. Data analyses and descriptive analyses for various variables were performed using SPSS version 17.0. An overall response rate of 84.9% (488 out of 575) was obtained. All of the students (100%) had an access to the computers. Most of the students (61.9%) used computers for academic purposes. Amajority of the students (74.4%) preferred the use of powerpoint presentations aided by marker-and-board method for teaching. For communication from the colleges, 62.9% of the respondents preferred it through the email; 100% of the students had an email account. All of the students (100%) used internet; 83.1% considered the information as accurate. The internet was used by 47.6% of the students for seeking the medical information. All of the students had an access to ITand used it for their educational purposes.

  7. Extended outlook: description, utilization, and daily applications of cloud technology in radiology.

    PubMed

    Gerard, Perry; Kapadia, Neil; Chang, Patricia T; Acharya, Jay; Seiler, Michael; Lefkovitz, Zvi

    2013-12-01

    The purpose of this article is to discuss the concept of cloud technology, its role in medical applications and radiology, the role of the radiologist in using and accessing these vast resources of information, and privacy concerns and HIPAA compliance strategies. Cloud computing is the delivery of shared resources, software, and information to computers and other devices as a metered service. This technology has a promising role in the sharing of patient medical information and appears to be particularly suited for application in radiology, given the field's inherent need for storage and access to large amounts of data. The radiology cloud has significant strengths, such as providing centralized storage and access, reducing unnecessary repeat radiologic studies, and potentially allowing radiologic second opinions more easily. There are significant cost advantages to cloud computing because of a decreased need for infrastructure and equipment by the institution. Private clouds may be used to ensure secure storage of data and compliance with HIPAA. In choosing a cloud service, there are important aspects, such as disaster recovery plans, uptime, and security audits, that must be considered. Given that the field of radiology has become almost exclusively digital in recent years, the future of secure storage and easy access to imaging studies lies within cloud computing technology.

  8. Programmable DMA controller

    NASA Technical Reports Server (NTRS)

    Hendry, David F. (Inventor)

    1993-01-01

    In a data system having a memory, plural input/output (I/O) devices and a bus connecting each of the I/O devices to the memory, a direct memory access (DMA) controller regulating access of each of the I/O devices to the bus, including a priority register storing priorities of bus access requests from the I/O devices, an interrupt register storing bus access requests of the I/O devices, a resolver for selecting one of the I/O devices to have access to the bus, a pointer register storing addresses of locations in the memory for communication with the one I/O device via the bus, a sequence register storing an address of a location in the memory containing a channel program instruction which is to be executed next, an ALU for incrementing and decrementing addresses stored in the pointer register, computing the next address to be stored in the sequence register, computing an initial contents of each of the register. The memory contains a sequence of channel program instructions defining a set up operation wherein the contents of each of the registers in the channel register is initialized in accordance with the initial contents computed by the ALU and an access operation wherein data is transferred on the bus between a location in the memory whose address is currently stored in the pointer register and the one I/O device enabled by the resolver.

  9. Using Cloud Computing infrastructure with CloudBioLinux, CloudMan and Galaxy

    PubMed Central

    Afgan, Enis; Chapman, Brad; Jadan, Margita; Franke, Vedran; Taylor, James

    2012-01-01

    Cloud computing has revolutionized availability and access to computing and storage resources; making it possible to provision a large computational infrastructure with only a few clicks in a web browser. However, those resources are typically provided in the form of low-level infrastructure components that need to be procured and configured before use. In this protocol, we demonstrate how to utilize cloud computing resources to perform open-ended bioinformatics analyses, with fully automated management of the underlying cloud infrastructure. By combining three projects, CloudBioLinux, CloudMan, and Galaxy into a cohesive unit, we have enabled researchers to gain access to more than 100 preconfigured bioinformatics tools and gigabytes of reference genomes on top of the flexible cloud computing infrastructure. The protocol demonstrates how to setup the available infrastructure and how to use the tools via a graphical desktop interface, a parallel command line interface, and the web-based Galaxy interface. PMID:22700313

  10. Using cloud computing infrastructure with CloudBioLinux, CloudMan, and Galaxy.

    PubMed

    Afgan, Enis; Chapman, Brad; Jadan, Margita; Franke, Vedran; Taylor, James

    2012-06-01

    Cloud computing has revolutionized availability and access to computing and storage resources, making it possible to provision a large computational infrastructure with only a few clicks in a Web browser. However, those resources are typically provided in the form of low-level infrastructure components that need to be procured and configured before use. In this unit, we demonstrate how to utilize cloud computing resources to perform open-ended bioinformatic analyses, with fully automated management of the underlying cloud infrastructure. By combining three projects, CloudBioLinux, CloudMan, and Galaxy, into a cohesive unit, we have enabled researchers to gain access to more than 100 preconfigured bioinformatics tools and gigabytes of reference genomes on top of the flexible cloud computing infrastructure. The protocol demonstrates how to set up the available infrastructure and how to use the tools via a graphical desktop interface, a parallel command-line interface, and the Web-based Galaxy interface.

  11. Comfort with Computers in the Library.

    ERIC Educational Resources Information Center

    Agati, Joseph

    2002-01-01

    Sets forth a list of do's and don't's when integrating aesthetics, functionality, and technology into college library computer workstation furniture. The article discusses workstation access for both portable computer users and for staff, whose needs involve desktop computers that are possibly networked with printers and other peripherals. (GR)

  12. 32 CFR 34.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... procedures shall maintain the integrity, reliability, and security of the original computer data. Recipients... (such as documents related to computer usage chargeback rates), along with their supporting records... this section is maintained on a computer, recipients shall retain the computer data on a reliable...

  13. 32 CFR 34.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... procedures shall maintain the integrity, reliability, and security of the original computer data. Recipients... (such as documents related to computer usage chargeback rates), along with their supporting records... this section is maintained on a computer, recipients shall retain the computer data on a reliable...

  14. 32 CFR 34.42 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... procedures shall maintain the integrity, reliability, and security of the original computer data. Recipients... (such as documents related to computer usage chargeback rates), along with their supporting records... this section is maintained on a computer, recipients shall retain the computer data on a reliable...

  15. Lexical Access in Early Stages of Visual Word Processing: A Single-Trial Correlational MEG Study of Heteronym Recognition

    ERIC Educational Resources Information Center

    Solomyak, Olla; Marantz, Alec

    2009-01-01

    We present an MEG study of heteronym recognition, aiming to distinguish between two theories of lexical access: the "early access" theory, which entails that lexical access occurs at early (pre 200 ms) stages of processing, and the "late access" theory, which interprets this early activity as orthographic word-form identification rather than…

  16. ComputerTown: A Do-It-Yourself Community Computer Project. [Computer Town, USA and Other Microcomputer Based Alternatives to Traditional Learning Environments].

    ERIC Educational Resources Information Center

    Zamora, Ramon M.

    Alternative learning environments offering computer-related instruction are developing around the world. Storefront learning centers, museum-based computer facilities, and special theme parks are some of the new concepts. ComputerTown, USA! is a public access computer literacy project begun in 1979 to serve both adults and children in Menlo Park…

  17. Computer-based medical education in Benha University, Egypt: knowledge, attitude, limitations, and suggestions.

    PubMed

    Bayomy, Hanaa; El Awadi, Mona; El Araby, Eman; Abed, Hala A

    2016-12-01

    Computer-assisted medical education has been developed to enhance learning and enable high-quality medical care. This study aimed to assess computer knowledge and attitude toward the inclusion of computers in medical education among second-year medical students in Benha Faculty of Medicine, Egypt, to identify limitations, and obtain suggestions for successful computer-based learning. This was a one-group pre-post-test study, which was carried out on second-year students in Benha Faculty of Medicine. A structured self-administered questionnaire was used to compare students' knowledge, attitude, limitations, and suggestions toward computer usage in medical education before and after the computer course to evaluate the change in students' responses. The majority of students were familiar with use of the mouse and keyboard, basic word processing, internet and web searching, and e-mail both before and after the computer course. The proportion of students who were familiar with software programs other than the word processing and trouble-shoot software/hardware was significantly higher after the course (P<0.001). There was a significant increase in the proportion of students who agreed on owning a computer (P=0.008), the inclusion of computer skills course in medical education, downloading lecture handouts, and computer-based exams (P<0.001) after the course. After the course, there was a significant increase in the proportion of students who agreed that the lack of central computers limited the inclusion of computer in medical education (P<0.001). Although the lack of computer labs, lack of Information Technology staff mentoring, large number of students, unclear course outline, and lack of internet access were more frequently reported before the course (P<0.001), the majority of students suggested the provision of computer labs, inviting Information Technology staff to support computer teaching, and the availability of free Wi-Fi internet access covering several areas in the university campus; all would support computer-assisted medical education. Medical students in Benha University are computer literate, which allows for computer-based medical education. Staff training, provision of computer labs, and internet access are essential requirements for enhancing computer usage in medical education in the university.

  18. Teach-Discover-Treat (TDT): Collaborative Computational Drug Discovery for Neglected Diseases

    PubMed Central

    Jansen, Johanna M.; Cornell, Wendy; Tseng, Y. Jane; Amaro, Rommie E.

    2012-01-01

    Teach – Discover – Treat (TDT) is an initiative to promote the development and sharing of computational tools solicited through a competition with the aim to impact education and collaborative drug discovery for neglected diseases. Collaboration, multidisciplinary integration, and innovation are essential for successful drug discovery. This requires a workforce that is trained in state-of-the-art workflows and equipped with the ability to collaborate on platforms that are accessible and free. The TDT competition solicits high quality computational workflows for neglected disease targets, using freely available, open access tools. PMID:23085175

  19. Next-generation genotype imputation service and methods.

    PubMed

    Das, Sayantan; Forer, Lukas; Schönherr, Sebastian; Sidore, Carlo; Locke, Adam E; Kwong, Alan; Vrieze, Scott I; Chew, Emily Y; Levy, Shawn; McGue, Matt; Schlessinger, David; Stambolian, Dwight; Loh, Po-Ru; Iacono, William G; Swaroop, Anand; Scott, Laura J; Cucca, Francesco; Kronenberg, Florian; Boehnke, Michael; Abecasis, Gonçalo R; Fuchsberger, Christian

    2016-10-01

    Genotype imputation is a key component of genetic association studies, where it increases power, facilitates meta-analysis, and aids interpretation of signals. Genotype imputation is computationally demanding and, with current tools, typically requires access to a high-performance computing cluster and to a reference panel of sequenced genomes. Here we describe improvements to imputation machinery that reduce computational requirements by more than an order of magnitude with no loss of accuracy in comparison to standard imputation tools. We also describe a new web-based service for imputation that facilitates access to new reference panels and greatly improves user experience and productivity.

  20. Use of information and communication technology among dental students at the University of Jordan.

    PubMed

    Rajab, Lamis D; Baqain, Zaid H

    2005-03-01

    The aim of this study was to investigate the current knowledge, skills, and opinions of undergraduate dental students at the University of Jordan with respect to information communication technology (ICT). Dental students from the second, third, fourth, and fifth years were asked to complete a questionnaire presented in a lecture at the end of the second semester in the 2002-03 academic year. The response rate was 81 percent. Besides free and unlimited access to computers at the school of dentistry, 74 percent of the students had access to computers at home. However, 44 percent did not use a computer regularly. Male students were more regular and longer users of computers than females (p<0.001). A significant number of students (70 percent) judged themselves competent in information technology (IT) skills. More males felt competent in basic IT skills than did females (p<0.05). More than two-thirds acquired their computer skills through sources other than at the university. The main educational use of computers was accessing the Internet, word processing, multimedia, presentations, Medline search, and data management. More clinical students felt competent in word-processing skills (p<0.05) and many more used word processing for their studies (p<0.001) than did preclinical students. More males used word processing for their studies than females (p<0.001). Students used computers for personal activities more frequently than for academic reasons. More males used computers for both academic (p<0.01) and personal activities (p<0.001) than did females. All students had access to the Internet at the university, and 54 percent had access at home. A high percentage of students (94 percent) indicated they were comfortable using the Internet, 75 percent said they were confident in the accuracy, and 80 percent said they were confident in the relevance of information obtained from the Internet. Most students (90 percent) used email. Most students (83 percent) supported the idea of placing lectures on the web, and 61.2 percent indicated that this would not influence lecture attendance. Students used the Internet more for personal reasons than for the study of dentistry. More clinical students used the Internet for dentistry than preclinical students (p<0.001). More males than females used the Internet for dentistry (p<0.01) as well as for pleasure (p<0.01). Time and availability were the main obstacles to Internet use. Dental students at the University of Jordan have access to substantial IT resources and demonstrated attitudes toward the computer and Internet technology and use that were similar to other students in other nations. However, the educational use of ICT among Jordanian students remains low.

  1. A Case-Series Test of the Interactive Two-Step Model of Lexical Access: Predicting Word Repetition from Picture Naming

    ERIC Educational Resources Information Center

    Dell, Gary S.; Martin, Nadine; Schwartz, Myrna F.

    2007-01-01

    Lexical access in language production, and particularly pathologies of lexical access, are often investigated by examining errors in picture naming and word repetition. In this article, we test a computational approach to lexical access, the two-step interactive model, by examining whether the model can quantitatively predict the repetition-error…

  2. Access to ICT for Teaching and Learning: From Single Artefact to Interrelated Resources

    ERIC Educational Resources Information Center

    Czerniewicz, Laura; Brown, Cheryl

    2005-01-01

    In the past few years, concepts of the digital divide and theories of access to ICT have evolved beyond a focus on the separation of the "haves" and the "have nots" to include more than just physical access to computers. Researchers have started considering the conditions or criteria for access and broadened the concept by…

  3. Enhancing access to health information in Africa: a librarian's perspective.

    PubMed

    Gathoni, Nasra

    2012-01-01

    In recent years, tremendous progress has been made toward providing health information in Africa, in part because of technological advancements. Nevertheless, ensuring that information is accessible, comprehensible, and usable remains problematic, and there remain needs in many settings to address issues such as computer skills, literacy, and the infrastructure to access information. To determine how librarians might play a more strategic role in meeting information needs of health professionals in Africa, the author reviewed key components of information systems pertinent to knowledge management for the health sector, including access to global online resources, capacity to use computer technology for information retrieval, information literacy, and the potential for professional networks to play a role in improving access to and use of information. The author concluded that, in regions that lack adequate information systems, librarians could apply their knowledge and skills to facilitate access and use by information seekers. Ensuring access to and use of health information can also be achieved by engaging organizations and associations working to enhance access to health information, such as the Association for Health Information and Libraries in Africa. These groups can provide assistance through training, dissemination, information repackaging, and other approaches known to improve information literacy.

  4. Gender Issues in Technology Use: Perceived Social Support, Computer Self-Efficacy and Value Beliefs, and Computer Use beyond School

    ERIC Educational Resources Information Center

    Vekiri, Ioanna; Chronaki, Anna

    2008-01-01

    In this study, we examined relations between outside school computer experiences, perceived social support for using computers, and self-efficacy and value beliefs about computer learning for 340 Greek elementary school boys and girls. Participants responded to a questionnaire about their access to computer use outside school (e.g. frequency of…

  5. Computational neuroanatomy: ontology-based representation of neural components and connectivity

    PubMed Central

    Rubin, Daniel L; Talos, Ion-Florin; Halle, Michael; Musen, Mark A; Kikinis, Ron

    2009-01-01

    Background A critical challenge in neuroscience is organizing, managing, and accessing the explosion in neuroscientific knowledge, particularly anatomic knowledge. We believe that explicit knowledge-based approaches to make neuroscientific knowledge computationally accessible will be helpful in tackling this challenge and will enable a variety of applications exploiting this knowledge, such as surgical planning. Results We developed ontology-based models of neuroanatomy to enable symbolic lookup, logical inference and mathematical modeling of neural systems. We built a prototype model of the motor system that integrates descriptive anatomic and qualitative functional neuroanatomical knowledge. In addition to modeling normal neuroanatomy, our approach provides an explicit representation of abnormal neural connectivity in disease states, such as common movement disorders. The ontology-based representation encodes both structural and functional aspects of neuroanatomy. The ontology-based models can be evaluated computationally, enabling development of automated computer reasoning applications. Conclusion Neuroanatomical knowledge can be represented in machine-accessible format using ontologies. Computational neuroanatomical approaches such as described in this work could become a key tool in translational informatics, leading to decision support applications that inform and guide surgical planning and personalized care for neurological disease in the future. PMID:19208191

  6. Computer network access to scientific information systems for minority universities

    NASA Astrophysics Data System (ADS)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  7. Coarse-Grained Theory of Biological Charge Transfer with Spatially and Temporally Correlated Noise.

    PubMed

    Liu, Chaoren; Beratan, David N; Zhang, Peng

    2016-04-21

    System-environment interactions are essential in determining charge-transfer (CT) rates and mechanisms. We developed a computationally accessible method, suitable to simulate CT in flexible molecules (i.e., DNA) with hundreds of sites, where the system-environment interactions are explicitly treated with numerical noise modeling of time-dependent site energies and couplings. The properties of the noise are tunable, providing us a flexible tool to investigate the detailed effects of correlated thermal fluctuations on CT mechanisms. The noise is parametrizable by molecular simulation and quantum calculation results of specific molecular systems, giving us better molecular resolution in simulating the system-environment interactions than sampling fluctuations from generic spectral density functions. The spatially correlated thermal fluctuations among different sites are naturally built-in in our method but are not readily incorporated using approximate spectral densities. Our method has quantitative accuracy in systems with small redox potential differences (

  8. Access to augmentative and alternative communication: new technologies and clinical decision-making.

    PubMed

    Fager, Susan; Bardach, Lisa; Russell, Susanne; Higginbotham, Jeff

    2012-01-01

    Children with severe physical impairments require a variety of access options to augmentative and alternative communication (AAC) and computer technology. Access technologies have continued to develop, allowing children with severe motor control impairments greater independence and access to communication. This article will highlight new advances in access technology, including eye and head tracking, scanning, and access to mainstream technology, as well as discuss future advances. Considerations for clinical decision-making and implementation of these technologies will be presented along with case illustrations.

  9. High temporal resolution mapping of seismic noise sources using heterogeneous supercomputers

    NASA Astrophysics Data System (ADS)

    Gokhberg, Alexey; Ermert, Laura; Paitz, Patrick; Fichtner, Andreas

    2017-04-01

    Time- and space-dependent distribution of seismic noise sources is becoming a key ingredient of modern real-time monitoring of various geo-systems. Significant interest in seismic noise source maps with high temporal resolution (days) is expected to come from a number of domains, including natural resources exploration, analysis of active earthquake fault zones and volcanoes, as well as geothermal and hydrocarbon reservoir monitoring. Currently, knowledge of noise sources is insufficient for high-resolution subsurface monitoring applications. Near-real-time seismic data, as well as advanced imaging methods to constrain seismic noise sources have recently become available. These methods are based on the massive cross-correlation of seismic noise records from all available seismic stations in the region of interest and are therefore very computationally intensive. Heterogeneous massively parallel supercomputing systems introduced in the recent years combine conventional multi-core CPU with GPU accelerators and provide an opportunity for manifold increase and computing performance. Therefore, these systems represent an efficient platform for implementation of a noise source mapping solution. We present the first results of an ongoing research project conducted in collaboration with the Swiss National Supercomputing Centre (CSCS). The project aims at building a service that provides seismic noise source maps for Central Europe with high temporal resolution (days to few weeks depending on frequency and data availability). The service is hosted on the CSCS computing infrastructure; all computationally intensive processing is performed on the massively parallel heterogeneous supercomputer "Piz Daint". The solution architecture is based on the Application-as-a-Service concept in order to provide the interested external researchers the regular access to the noise source maps. The solution architecture includes the following sub-systems: (1) data acquisition responsible for collecting, on a periodic basis, raw seismic records from the European seismic networks, (2) high-performance noise source mapping application responsible for generation of source maps using cross-correlation of seismic records, (3) back-end infrastructure for the coordination of various tasks and computations, (4) front-end Web interface providing the service to the end-users and (5) data repository. The noise mapping application is composed of four principal modules: (1) pre-processing of raw data, (2) massive cross-correlation, (3) post-processing of correlation data based on computation of logarithmic energy ratio and (4) generation of source maps from post-processed data. Implementation of the solution posed various challenges, in particular, selection of data sources and transfer protocols, automation and monitoring of daily data downloads, ensuring the required data processing performance, design of a general service oriented architecture for coordination of various sub-systems, and engineering an appropriate data storage solution. The present pilot version of the service implements noise source maps for Switzerland. Extension of the solution to Central Europe is planned for the next project phase.

  10. A Computing Infrastructure for Supporting Climate Studies

    NASA Astrophysics Data System (ADS)

    Yang, C.; Bambacus, M.; Freeman, S. M.; Huang, Q.; Li, J.; Sun, M.; Xu, C.; Wojcik, G. S.; Cahalan, R. F.; NASA Climate @ Home Project Team

    2011-12-01

    Climate change is one of the major challenges facing us on the Earth planet in the 21st century. Scientists build many models to simulate the past and predict the climate change for the next decades or century. Most of the models are at a low resolution with some targeting high resolution in linkage to practical climate change preparedness. To calibrate and validate the models, millions of model runs are needed to find the best simulation and configuration. This paper introduces the NASA effort on Climate@Home project to build a supercomputer based-on advanced computing technologies, such as cloud computing, grid computing, and others. Climate@Home computing infrastructure includes several aspects: 1) a cloud computing platform is utilized to manage the potential spike access to the centralized components, such as grid computing server for dispatching and collecting models runs results; 2) a grid computing engine is developed based on MapReduce to dispatch models, model configuration, and collect simulation results and contributing statistics; 3) a portal serves as the entry point for the project to provide the management, sharing, and data exploration for end users; 4) scientists can access customized tools to configure model runs and visualize model results; 5) the public can access twitter and facebook to get the latest about the project. This paper will introduce the latest progress of the project and demonstrate the operational system during the AGU fall meeting. It will also discuss how this technology can become a trailblazer for other climate studies and relevant sciences. It will share how the challenges in computation and software integration were solved.

  11. Computer interfaces for the visually impaired

    NASA Technical Reports Server (NTRS)

    Higgins, Gerry

    1991-01-01

    Information access via computer terminals extends to blind and low vision persons employed in many technical and nontechnical disciplines. Two aspects are detailed of providing computer technology for persons with a vision related handicap. First, research into the most effective means of integrating existing adaptive technologies into information systems was made. This was conducted to integrate off the shelf products with adaptive equipment for cohesive integrated information processing systems. Details are included that describe the type of functionality required in software to facilitate its incorporation into a speech and/or braille system. The second aspect is research into providing audible and tactile interfaces to graphics based interfaces. Parameters are included for the design and development of the Mercator Project. The project will develop a prototype system for audible access to graphics based interfaces. The system is being built within the public domain architecture of X windows to show that it is possible to provide access to text based applications within a graphical environment. This information will be valuable to suppliers to ADP equipment since new legislation requires manufacturers to provide electronic access to the visually impaired.

  12. Clinical laboratory investigation of the Sanofi ACCESS CK-MB procedure and comparison to electrophoresis and Abbott IMx.

    PubMed

    Mao, G D; Adeli, K; Eisenbrey, A B; Artiss, J D

    1996-07-01

    This evaluation was undertaken to verify the application protocol for the CK-MB assay on the ACCESS Immunoassay Analyzer (Sanofi Diagnostics Pasteur, Chaska, MN). The results show that the ACCESS CK-MB assay total imprecision was 6.8% to 9.1%. Analytical linearity of the ACCESS CK-MB assay was excellent in the range of < 1-214 micrograms/L. A comparison of the ACCESS CK-MB assay with the IMx (Abbott Laboratories, Abbott Park, IL) method shows good correlation r = 0.990 (n = 108). Linear regression analysis yielded Y = 1.36X-0.3, Sx/y = 7.2. ACCESS CK-MB values also correlated well with CK-MB by electrophoresis with r = 0.968 (n = 132). The linear regression equation for this comparison was Y = 1.08X + 1.4, Sx/y = 14.1. The expected non-myocardial infarction range of CK-MB determined by the ACCESS system was 1.3-9.4 micrograms/L (mean = 4.0, n = 58). The ACCESS CK-MB assay would appear to be rapid, precise and clinically useful.

  13. Code of Ethical Conduct for Computer-Using Educators: An ICCE Policy Statement.

    ERIC Educational Resources Information Center

    Computing Teacher, 1987

    1987-01-01

    Prepared by the International Council for Computers in Education's Ethics and Equity Committee, this code of ethics for educators using computers covers nine main areas: curriculum issues, issues relating to computer access, privacy/confidentiality issues, teacher-related issues, student issues, the community, school organizational issues,…

  14. Apocalypse Soon? The Bug.

    ERIC Educational Resources Information Center

    Clyde, Anne

    1999-01-01

    Discussion of the Year 2000 (Y2K) problem, the computer-code problem that affects computer programs or computer chips, focuses on the impact on teacher-librarians. Topics include automated library systems, access to online information services, library computers and software, and other electronic equipment such as photocopiers and fax machines.…

  15. 24 CFR 14.100 - Time computation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Time computation. 14.100 Section 14... IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN ADMINISTRATIVE PROCEEDINGS General Provisions § 14.100 Time computation. Time periods stated in this part shall be computed in accordance with the Department's rules with...

  16. 24 CFR 14.100 - Time computation.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Time computation. 14.100 Section 14... IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN ADMINISTRATIVE PROCEEDINGS General Provisions § 14.100 Time computation. Time periods stated in this part shall be computed in accordance with the Department's rules with...

  17. 24 CFR 14.100 - Time computation.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Time computation. 14.100 Section 14... IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN ADMINISTRATIVE PROCEEDINGS General Provisions § 14.100 Time computation. Time periods stated in this part shall be computed in accordance with the Department's rules with...

  18. 24 CFR 14.100 - Time computation.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Time computation. 14.100 Section 14... IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN ADMINISTRATIVE PROCEEDINGS General Provisions § 14.100 Time computation. Time periods stated in this part shall be computed in accordance with the Department's rules with...

  19. 24 CFR 14.100 - Time computation.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Time computation. 14.100 Section 14... IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN ADMINISTRATIVE PROCEEDINGS General Provisions § 14.100 Time computation. Time periods stated in this part shall be computed in accordance with the Department's rules with...

  20. Making Advanced Computer Science Topics More Accessible through Interactive Technologies

    ERIC Educational Resources Information Center

    Shao, Kun; Maher, Peter

    2012-01-01

    Purpose: Teaching advanced technical concepts in a computer science program to students of different technical backgrounds presents many challenges. The purpose of this paper is to present a detailed experimental pedagogy in teaching advanced computer science topics, such as computer networking, telecommunications and data structures using…

  1. 25 CFR 542.10 - What are the minimum internal control standards for keno?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... keno? (a) Computer applications. For any computer applications utilized, alternate documentation and/or... restricted transaction log or computer storage media concurrently with the generation of the ticket. (3) Keno personnel shall be precluded from having access to the restricted transaction log or computer storage media...

  2. 32 CFR 32.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., reliability, and security of the original computer data. Recipients shall also maintain an audit trail... group of costs is chargeable (such as computer usage chargeback rates or composite fringe benefit rates... maintained on a computer, recipients shall retain the computer data on a reliable medium for the time periods...

  3. 32 CFR 32.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., reliability, and security of the original computer data. Recipients shall also maintain an audit trail... group of costs is chargeable (such as computer usage chargeback rates or composite fringe benefit rates... maintained on a computer, recipients shall retain the computer data on a reliable medium for the time periods...

  4. 25 CFR 542.10 - What are the minimum internal control standards for keno?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... keno? (a) Computer applications. For any computer applications utilized, alternate documentation and/or... restricted transaction log or computer storage media concurrently with the generation of the ticket. (3) Keno personnel shall be precluded from having access to the restricted transaction log or computer storage media...

  5. 32 CFR 32.53 - Retention and access requirements for records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., reliability, and security of the original computer data. Recipients shall also maintain an audit trail... group of costs is chargeable (such as computer usage chargeback rates or composite fringe benefit rates... maintained on a computer, recipients shall retain the computer data on a reliable medium for the time periods...

  6. THE USE OF COMPUTER MODELING PACKAGES TO ILLUSTRATE UNCERTAINTY IN RISK ASSESSMENTS: AN EASE OF USE AND INTERPRETATION COMPARISON

    EPA Science Inventory

    Consistent improvements in processor speed and computer access have substantially increased the use of computer modeling by experts and non-experts alike. Several new computer modeling packages operating under graphical operating systems (i.e. Microsoft Windows or Macintosh) m...

  7. Use of cell phones and computers for health promotion and tobacco cessation by American Indian college students in Montana.

    PubMed

    Dotson, Jo Ann W; Nelson, Lonnie A; Young, Sara L; Buchwald, Dedra; Roll, John

    2017-01-01

    Cell phones and personal computers have become popular mechanisms for delivering and monitoring health information and education, including the delivery of tobacco cessation education and support. Tobacco smoking is prevalent among American Indians (AIs) and Alaska Natives (ANs), with 26% AI/AN adult men smoking compared to 19% of Caucasian adult males and 22% of African American adult males. Smoking is even more prevalent in Northern Plains AI populations, with 42% of men and women reporting current smoking. The literature on the availability and use of cell phones and computers, or the acceptability of use in health promotion among AIs and ANs, is scant. The authors report findings from a survey of AI students regarding their cell phone and computer access and use. The survey was conducted to inform the development and implementation of a text messaging smoking cessation intervention modeled on a program developed and used in Australia. A 22-item paper and pencil survey was administered to students at tribal colleges in rural Montana. The survey questions included cell phone ownership and access to service, use of cell phones and computers for health information, demographics, tobacco use habits, and interest in an intervention study. The study was reviewed and determined exempt by the institutional review boards at the tribal colleges and the lead research university. The study was conducted by researchers at the tribal colleges. Survey respondents received $10 when the survey was completed and returned. Data analysis was performed with the Statistical Package for the Social Sciences. Among 153 AI respondents, the mean age was 29 years, range was 18-64 years. Overall, 40% reported smoking cigarettes with a mean age of 16 years at initiation. A total of 131 participants (86%) had cell phones and, of those, 122 (93%) had unlimited text messaging. A total of 104 (68%) had smart phones (with internet access), although 40% of those with smart phones reported that internet access on their phone was very slow or location limited. A total of 146 (95%) participants reported having access to a computer, although 32% of those did not have daily access. Students aged less than 23 years were more likely to have cell phones with internet access. Cell phone ownership differed by site (93% vs 77%, p=0.007). About 60% of the respondents who smoked indicated interest in participating in the intervention study. This study revealed that AI tribal college students in the rural communities surveyed had less cell phone, smart phone, and computer and internet access than that reported for undergraduate college students elsewhere in the USA. Research efforts and public health interventions must be culturally appropriate and technologically viable, therefore access to and acceptability of mobile technology must be evaluated when planning and implementing interventions for rural and other marginalized populations. The findings from this study contribute to the literature regarding the access to and acceptability of mobile technology for health promotion among AI/AN college students in rural and remote areas, and helped introduce the proposed study to the community and solicited useful data regarding tobacco prevalence and interest in tobacco research in the target population.

  8. Monitoring the early signs of cognitive decline in elderly by computer games: an MRI study.

    PubMed

    Sirály, Enikő; Szabó, Ádám; Szita, Bernadett; Kovács, Vivienne; Fodor, Zsuzsanna; Marosi, Csilla; Salacz, Pál; Hidasi, Zoltán; Maros, Viktor; Hanák, Péter; Csibri, Éva; Csukly, Gábor

    2015-01-01

    It is anticipated that current and future preventive therapies will likely be more effective in the early stages of dementia, when everyday functioning is not affected. Accordingly the early identification of people at risk is particularly important. In most cases, when subjects visit an expert and are examined using neuropsychological tests, the disease has already been developed. Contrary to this cognitive games are played by healthy, well functioning elderly people, subjects who should be monitored for early signs. Further advantages of cognitive games are their accessibility and their cost-effectiveness. The aim of the investigation was to show that computer games can help to identify those who are at risk. In order to validate games analysis was completed which measured the correlations between results of the 'Find the Pairs' memory game and the volumes of the temporal brain regions previously found to be good predictors of later cognitive decline. 34 healthy elderly subjects were enrolled in the study. The volume of the cerebral structures was measured by MRI. Cortical reconstruction and volumetric segmentation were performed by Freesurfer. There was a correlation between the number of attempts and the time required to complete the memory game and the volume of the entorhinal cortex, the temporal pole, and the hippocampus. There was also a correlation between the results of the Paired Associates Learning (PAL) test and the memory game. The results gathered support the initial hypothesis that healthy elderly subjects achieving lower scores in the memory game have increased level of atrophy in the temporal brain structures and showed a decreased performance in the PAL test. Based on these results it can be concluded that memory games may be useful in early screening for cognitive decline.

  9. Elucidating quantitative stability/flexibility relationships within thioredoxin and its fragments using a distance constraint model.

    PubMed

    Jacobs, Donald J; Livesay, Dennis R; Hules, Jeremy; Tasayco, Maria Luisa

    2006-05-05

    Numerous quantitative stability/flexibility relationships, within Escherichia coli thioredoxin (Trx) and its fragments are determined using a minimal distance constraint model (DCM). A one-dimensional free energy landscape as a function of global flexibility reveals Trx to fold in a low-barrier two-state process, with a voluminous transition state. Near the folding transition temperature, the native free energy basin is markedly skewed to allow partial unfolded forms. Under native conditions the skewed shape is lost, and the protein forms a compact structure with some flexibility. Predictions on ten Trx fragments are generally consistent with experimental observations that they are disordered, and that complementary fragments reconstitute. A hierarchical unfolding pathway is uncovered using an exhaustive computational procedure of breaking interfacial cross-linking hydrogen bonds that span over a series of fragment dissociations. The unfolding pathway leads to a stable core structure (residues 22-90), predicted to act as a kinetic trap. Direct connection between degree of rigidity within molecular structure and non-additivity of free energy is demonstrated using a thermodynamic cycle involving fragments and their hierarchical unfolding pathway. Additionally, the model provides insight about molecular cooperativity within Trx in its native state, and about intermediate states populating the folding/unfolding pathways. Native state cooperativity correlation plots highlight several flexibly correlated regions, giving insight into the catalytic mechanism that facilitates access to the active site disulfide bond. Residual native cooperativity correlations are present in the core substructure, suggesting that Trx can function when it is partly unfolded. This natively disordered kinetic trap, interpreted as a molten globule, has a wide temperature range of metastability, and it is identified as the "slow intermediate state" observed in kinetic experiments. These computational results are found to be in overall agreement with a large array of experimental data.

  10. Flushing ports of totally implantable venous access devices, and impact of the Huber point needle bevel orientation: experimental tests and numerical computation.

    PubMed

    Guiffant, Gérard; Durussel, Jean Jacques; Flaud, Patrice; Vigier, Jean Pierre; Merckx, Jacques

    2012-01-01

    The use of totally implantable venous access devices developed as a medical device allowing mid- and long-term, frequent, repeated, or continuous injection of therapeutic products, by vascular, cavitary, or perineural access. The effective flushing of these devices is a central element to assure long-lasting use. Our experimental work demonstrates that directing the Huber point needle opening in the diametrically opposite direction of the implantable port exit channel increases the flushing efficiency. These results are consolidated by numerical computations, which support recommendations not only for their maintenance, but also for their use.

  11. Flushing ports of totally implantable venous access devices, and impact of the Huber point needle bevel orientation: experimental tests and numerical computation

    PubMed Central

    Guiffant, Gérard; Durussel, Jean Jacques; Flaud, Patrice; Vigier, Jean Pierre; Merckx, Jacques

    2012-01-01

    The use of totally implantable venous access devices developed as a medical device allowing mid- and long-term, frequent, repeated, or continuous injection of therapeutic products, by vascular, cavitary, or perineural access. The effective flushing of these devices is a central element to assure long-lasting use. Our experimental work demonstrates that directing the Huber point needle opening in the diametrically opposite direction of the implantable port exit channel increases the flushing efficiency. These results are consolidated by numerical computations, which support recommendations not only for their maintenance, but also for their use. PMID:23166455

  12. Assessment of drug information resource preferences of pharmacy students and faculty

    PubMed Central

    Hanrahan, Conor T.; Cole, Sabrina W.

    2014-01-01

    A 39-item survey instrument was distributed to faculty and students at Wingate University School of Pharmacy to assess student and faculty drug information (DI) resource use and access preferences. The response rate was 81% (n = 289). Faculty and professional year 2 to 4 students preferred access on laptop or desktop computers (67% and 75%, respectively), followed by smartphones (27% and 22%, respectively). Most faculty and students preferred using Lexicomp Online for drug information (53% and 74%, respectively). Results indicate that DI resources use is similar between students and faculty; laptop or desktop computers are the preferred platforms for accessing drug information. PMID:24860270

  13. Video Game Access, Parental Rules, and Problem Behavior: A Study of Boys with Autism Spectrum Disorder

    ERIC Educational Resources Information Center

    Engelhardt, Christopher R.; Mazurek, Micah O.

    2014-01-01

    Environmental correlates of problem behavior among individuals with autism spectrum disorder remain relatively understudied. The current study examined the contribution of in-room (i.e. bedroom) access to a video game console as one potential correlate of problem behavior among a sample of 169 boys with autism spectrum disorder (ranging from 8 to…

  14. Correlates of Availability and Accessibility of Fruits and Vegetables in Homes of Low-Income Hispanic Families

    ERIC Educational Resources Information Center

    Dave, Jayna M.; Evans, Alexandra E.; Pfeiffer, Karin A.; Watkins, Ken W.; Saunders, Ruth P.

    2010-01-01

    Availability and accessibility (AA) has been consistently shown across studies as the most important correlate of fruits and vegetables (FV) intake. However, there is little data on factors that influence AA of FV, especially in Hispanic families. The objective of this cross-sectional study was to examine the association between parental factors,…

  15. Physical Computing and Its Scope--Towards a Constructionist Computer Science Curriculum with Physical Computing

    ERIC Educational Resources Information Center

    Przybylla, Mareen; Romeike, Ralf

    2014-01-01

    Physical computing covers the design and realization of interactive objects and installations and allows students to develop concrete, tangible products of the real world, which arise from the learners' imagination. This can be used in computer science education to provide students with interesting and motivating access to the different topic…

  16. Applications of Out-of-Domain Knowledge in Students' Reasoning about Computer Program State

    ERIC Educational Resources Information Center

    Lewis, Colleen Marie

    2012-01-01

    To meet a growing demand and a projected deficit in the supply of computer professionals (NCWIT, 2009), it is of vital importance to expand students' access to computer science. However, many researchers in the computer science education community unproductively assume that some students lack an innate ability for computer science and…

  17. Setting Up a Grid-CERT: Experiences of an Academic CSIRT

    ERIC Educational Resources Information Center

    Moller, Klaus

    2007-01-01

    Purpose: Grid computing has often been heralded as the next logical step after the worldwide web. Users of grids can access dynamic resources such as computer storage and use the computing resources of computers under the umbrella of a virtual organisation. Although grid computing is often compared to the worldwide web, it is vastly more complex…

  18. The 512-channel correlator controller

    NASA Technical Reports Server (NTRS)

    Brokl, S. S.

    1976-01-01

    A high-speed correlator for radio and radar observations was developed and a controller was designed so that the correlator could run automatically without computer intervention. The correlator controller assumes the role of bus master and keeps track of data and properly interrupts the computer at the end of the observation.

  19. Improving Access to Data While Protecting Confidentiality: Prospects for the Future.

    ERIC Educational Resources Information Center

    Duncan, George T.; Pearson, Robert W.

    Providing researchers, especially those in the social sciences, with access to publicly collected microdata furthers research while advancing public policy goals in a democratic society. However, while technological improvements have eased remote access to these databases and enabled computer using researchers to perform sophisticated statistical…

  20. 75 FR 63170 - Access to Confidential Business Information by Avanti Corporation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-14

    ... control actions. They will also provide computer data base support related to providing information on...: Access to the confidential data will occur no sooner than October 21, 2010. FOR FURTHER INFORMATION... data, including CBI, will continue until October 31, 2015. If the contract is extended, this access...

  1. The Computer Catalog: A Democratic or Authoritarian Technology?

    ERIC Educational Resources Information Center

    Adams, Judith A.

    1988-01-01

    Discussion of consequences of library automation argues that technology should be used to augment access to information. Online public access catalogs are considered in this context, along with several related issues such as system incompatibility, invasion of privacy, barriers to database access and manipulation, and user fees, which contribute…

  2. Fast Legendre moment computation for template matching

    NASA Astrophysics Data System (ADS)

    Li, Bing C.

    2017-05-01

    Normalized cross correlation (NCC) based template matching is insensitive to intensity changes and it has many applications in image processing, object detection, video tracking and pattern recognition. However, normalized cross correlation implementation is computationally expensive since it involves both correlation computation and normalization implementation. In this paper, we propose Legendre moment approach for fast normalized cross correlation implementation and show that the computational cost of this proposed approach is independent of template mask sizes which is significantly faster than traditional mask size dependent approaches, especially for large mask templates. Legendre polynomials have been widely used in solving Laplace equation in electrodynamics in spherical coordinate systems, and solving Schrodinger equation in quantum mechanics. In this paper, we extend Legendre polynomials from physics to computer vision and pattern recognition fields, and demonstrate that Legendre polynomials can help to reduce the computational cost of NCC based template matching significantly.

  3. Evaluation of spatial accessibility to primary healthcare using GIS

    NASA Astrophysics Data System (ADS)

    Jamtsho, S.; Corner, R. J.

    2014-11-01

    Primary health care is considered to be one of the most important aspects of the health care system in any country, which directly helps in improving the health of the population. Potential spatial accessibility is a very important component of the primary health care system. One technique for studying spatial accessibility is by computing a gravity-based measure within a geographic information system (GIS) framework. In this study, straight-line distances between the associated population clusters and the health facilities and the provider-to-population ratio were used to compute the spatial accessibility of the population clusters for the whole country. Bhutan has been chosen as the case study area because it is quite easy to acquire and process data for the whole country due to its small size and population. The spatial accessibility measure of the 203 sub-districts shows noticeable disparities in health care accessibility in this country with about only 19 sub-districts achieving good health accessibility ranking. This study also examines a number of different health accessibility policy scenarios which can assist in identifying the most effective health policy from amongst many probable planning scenarios. Such a health accessibility measuring system can be incorporated into an existing spatial health system in developing countries to facilitate the proper planning and equitable distribution of health resources.

  4. A socioeconomic related 'digital divide' exists in how, not if, young people use computers.

    PubMed

    Harris, Courtenay; Straker, Leon; Pollock, Clare

    2017-01-01

    Government initiatives have tried to ensure uniform computer access for young people; however a divide related to socioeconomic status (SES) may still exist in the nature of information technology (IT) use. This study aimed to investigate this relationship in 1,351 Western Australian children between 6 and 17 years of age. All participants had computer access at school and 98.9% at home. Neighbourhood SES was related to computer use, IT activities, playing musical instruments, and participating in vigorous physical activity. Participants from higher SES neighbourhoods were more exposed to school computers, reading, playing musical instruments, and vigorous physical activity. Participants from lower SES neighbourhoods were more exposed to TV, electronic games, mobile phones, and non-academic computer activities at home. These patterns may impact future economic, academic, and health outcomes. Better insight into neighbourhood SES influences will assist in understanding and managing the impact of computer use on young people's health and development.

  5. A socioeconomic related 'digital divide' exists in how, not if, young people use computers

    PubMed Central

    2017-01-01

    Government initiatives have tried to ensure uniform computer access for young people; however a divide related to socioeconomic status (SES) may still exist in the nature of information technology (IT) use. This study aimed to investigate this relationship in 1,351 Western Australian children between 6 and 17 years of age. All participants had computer access at school and 98.9% at home. Neighbourhood SES was related to computer use, IT activities, playing musical instruments, and participating in vigorous physical activity. Participants from higher SES neighbourhoods were more exposed to school computers, reading, playing musical instruments, and vigorous physical activity. Participants from lower SES neighbourhoods were more exposed to TV, electronic games, mobile phones, and non-academic computer activities at home. These patterns may impact future economic, academic, and health outcomes. Better insight into neighbourhood SES influences will assist in understanding and managing the impact of computer use on young people’s health and development. PMID:28362868

  6. Modeling a Wireless Network for International Space Station

    NASA Technical Reports Server (NTRS)

    Alena, Richard; Yaprak, Ece; Lamouri, Saad

    2000-01-01

    This paper describes the application of wireless local area network (LAN) simulation modeling methods to the hybrid LAN architecture designed for supporting crew-computing tools aboard the International Space Station (ISS). These crew-computing tools, such as wearable computers and portable advisory systems, will provide crew members with real-time vehicle and payload status information and access to digital technical and scientific libraries, significantly enhancing human capabilities in space. A wireless network, therefore, will provide wearable computer and remote instruments with the high performance computational power needed by next-generation 'intelligent' software applications. Wireless network performance in such simulated environments is characterized by the sustainable throughput of data under different traffic conditions. This data will be used to help plan the addition of more access points supporting new modules and more nodes for increased network capacity as the ISS grows.

  7. Direct memory access transfer completion notification

    DOEpatents

    Chen, Dong; Giampapa, Mark E.; Heidelberger, Philip; Kumar, Sameer; Parker, Jeffrey J.; Steinmacher-Burow, Burkhard D.; Vranas, Pavlos

    2010-07-27

    Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

  8. The Correlation Between Poverty and Access to Essential Surgical Care in Ghana: A Geospatial Analysis

    PubMed Central

    Stewart, Barclay T.; Gyedu, Adam; Boakye, Godfred; Lewis, Daniel; Hoogerboord, Marius; Mock, Charles

    2017-01-01

    Background Surgical disease burden falls disproportionately on individuals in low- and middle-income countries. These populations are also the least likely to have access to surgical care. Understanding the barriers to access in these populations is therefore necessary to meet the global surgical need. Methods Using geospatial methods, this study explores the district-level variation of two access barriers in Ghana: poverty and spatial access to care. National survey data were used to estimate the average total household expenditure (THE) in each district. Estimates of the spatial access to essential surgical care were generated from a cost-distance model based on a recent surgical capacity assessment. Correlations were analyzed using regression and displayed cartographically. Results Both THE and spatial access to surgical care were found to have statistically significant regional variation in Ghana (p < 0.001). An inverse relationship was identified between THE and spatial access to essential surgical care (β −5.15 USD, p < 0.001). Poverty and poor spatial access to surgical care were found to co-localize in the northwest of the country. Conclusions Multiple barriers to accessing surgical care can coexist within populations. A careful understanding of all access barriers is necessary to identify and target strategies to address unmet surgical need within a given population. PMID:27766400

  9. Ames Research Center publications: A continuing bibliography, 1980

    NASA Technical Reports Server (NTRS)

    1981-01-01

    This bibliography lists formal NASA publications, journal articles, books, chapters of books, patents, contractor reports, and computer programs that were issued by Ames Research Center and indexed by Scientific and Technical Aerospace Reports, Limited Scientific and Technical Aerospace Reports, International Aerospace Abstracts, and Computer Program Abstracts in 1980. Citations are arranged by directorate, type of publication, and NASA accession numbers. Subject, personal author, corporate source, contract number, and report/accession number indexes are provided.

  10. Using speech recognition to enhance the Tongue Drive System functionality in computer access.

    PubMed

    Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless tongue operated assistive technology (AT), which can enable people with severe physical disabilities to access computers and drive powered wheelchairs using their volitional tongue movements. TDS offers six discrete commands, simultaneously available to the users, for pointing and typing as a substitute for mouse and keyboard in computer access, respectively. To enhance the TDS performance in typing, we have added a microphone, an audio codec, and a wireless audio link to its readily available 3-axial magnetic sensor array, and combined it with a commercially available speech recognition software, the Dragon Naturally Speaking, which is regarded as one of the most efficient ways for text entry. Our preliminary evaluations indicate that the combined TDS and speech recognition technologies can provide end users with significantly higher performance than using each technology alone, particularly in completing tasks that require both pointing and text entry, such as web surfing.

  11. A grid-enabled web service for low-resolution crystal structure refinement.

    PubMed

    O'Donovan, Daniel J; Stokes-Rees, Ian; Nam, Yunsun; Blacklow, Stephen C; Schröder, Gunnar F; Brunger, Axel T; Sliz, Piotr

    2012-03-01

    Deformable elastic network (DEN) restraints have proved to be a powerful tool for refining structures from low-resolution X-ray crystallographic data sets. Unfortunately, optimal refinement using DEN restraints requires extensive calculations and is often hindered by a lack of access to sufficient computational resources. The DEN web service presented here intends to provide structural biologists with access to resources for running computationally intensive DEN refinements in parallel on the Open Science Grid, the US cyberinfrastructure. Access to the grid is provided through a simple and intuitive web interface integrated into the SBGrid Science Portal. Using this portal, refinements combined with full parameter optimization that would take many thousands of hours on standard computational resources can now be completed in several hours. An example of the successful application of DEN restraints to the human Notch1 transcriptional complex using the grid resource, and summaries of all submitted refinements, are presented as justification.

  12. WE-B-BRD-01: Innovation in Radiation Therapy Planning II: Cloud Computing in RT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moore, K; Kagadis, G; Xing, L

    As defined by the National Institute of Standards and Technology, cloud computing is “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” Despite the omnipresent role of computers in radiotherapy, cloud computing has yet to achieve widespread adoption in clinical or research applications, though the transition to such “on-demand” access is underway. As this transition proceeds, new opportunities for aggregate studies and efficient use of computational resources are set againstmore » new challenges in patient privacy protection, data integrity, and management of clinical informatics systems. In this Session, current and future applications of cloud computing and distributed computational resources will be discussed in the context of medical imaging, radiotherapy research, and clinical radiation oncology applications. Learning Objectives: Understand basic concepts of cloud computing. Understand how cloud computing could be used for medical imaging applications. Understand how cloud computing could be employed for radiotherapy research.4. Understand how clinical radiotherapy software applications would function in the cloud.« less

  13. High-Performance Secure Database Access Technologies for HEP Grids

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysismore » capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems’ security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratory’s (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS project’s current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access.« less

  14. Discussing sexual and relationship health with young people in a children's hospital: evaluation of a computer-based resource.

    PubMed

    Bray, Lucy; Sanders, Caroline; McKenna, Jacqueline

    2013-12-01

    To investigate health professionals' evaluation of a computer-based resource designed to improve discussions about sexual and relationship health with young people. Evidence suggests that some health professionals can experience discomfort discussing sexual health and relationship issues with young people. Professionals within hospital settings should have the knowledge, competencies and skills to be able to ask young people sexual health questions and provide accurate sexual health education. Despite some educational material being available for community and adult services, there are no resources available, which are directly relevant to holding opportunistic discussions with young people within an acute children's hospital. A descriptive survey design. One hundred and fourteen health professionals from a children's hospital in the UK were involved in evaluating a computer-based resource. All completed an online questionnaire survey comprising of closed and open questions. The health professionals reported that the computer-based resource had a positive influence on their knowledge and clinical practice. The videos as well as the concise nature of the resource were evaluated highly. Learning was facilitated by professionals being able to control their learning through rerunning and accessing the resource on numerous occasions. An engaging, accessible computer-based resource has the capability to positively impact on health professionals' knowledge of, and skills in, starting and holding sexual health conversations with young people accessing a children's hospital. Health professionals working with children and young people value accessible, relevant and short computer-based training. This can facilitate knowledge and skill acquisition despite variation in working patterns. Improving the knowledge and skills of professionals working with young people to facilitate appropriate yet opportunistic sexual health discussions is important within the public health agenda. © 2013 John Wiley & Sons Ltd.

  15. Compressibility of the protein-water interface

    NASA Astrophysics Data System (ADS)

    Persson, Filip; Halle, Bertil

    2018-06-01

    The compressibility of a protein relates to its stability, flexibility, and hydrophobic interactions, but the measurement, interpretation, and computation of this important thermodynamic parameter present technical and conceptual challenges. Here, we present a theoretical analysis of protein compressibility and apply it to molecular dynamics simulations of four globular proteins. Using additively weighted Voronoi tessellation, we decompose the solution compressibility into contributions from the protein and its hydration shells. We find that positively cross-correlated protein-water volume fluctuations account for more than half of the protein compressibility that governs the protein's pressure response, while the self correlations correspond to small (˜0.7%) fluctuations of the protein volume. The self compressibility is nearly the same as for ice, whereas the total protein compressibility, including cross correlations, is ˜45% of the bulk-water value. Taking the inhomogeneous solvent density into account, we decompose the experimentally accessible protein partial compressibility into intrinsic, hydration, and molecular exchange contributions and show how they can be computed with good statistical accuracy despite the dominant bulk-water contribution. The exchange contribution describes how the protein solution responds to an applied pressure by redistributing water molecules from lower to higher density; it is negligibly small for native proteins, but potentially important for non-native states. Because the hydration shell is an open system, the conventional closed-system compressibility definitions yield a pseudo-compressibility. We define an intrinsic shell compressibility, unaffected by occupation number fluctuations, and show that it approaches the bulk-water value exponentially with a decay "length" of one shell, less than the bulk-water compressibility correlation length. In the first hydration shell, the intrinsic compressibility is 25%-30% lower than in bulk water, whereas its self part is 15%-20% lower. These large reductions are caused mainly by the proximity to the more rigid protein and are not a consequence of the perturbed water structure.

  16. Compressibility of the protein-water interface.

    PubMed

    Persson, Filip; Halle, Bertil

    2018-06-07

    The compressibility of a protein relates to its stability, flexibility, and hydrophobic interactions, but the measurement, interpretation, and computation of this important thermodynamic parameter present technical and conceptual challenges. Here, we present a theoretical analysis of protein compressibility and apply it to molecular dynamics simulations of four globular proteins. Using additively weighted Voronoi tessellation, we decompose the solution compressibility into contributions from the protein and its hydration shells. We find that positively cross-correlated protein-water volume fluctuations account for more than half of the protein compressibility that governs the protein's pressure response, while the self correlations correspond to small (∼0.7%) fluctuations of the protein volume. The self compressibility is nearly the same as for ice, whereas the total protein compressibility, including cross correlations, is ∼45% of the bulk-water value. Taking the inhomogeneous solvent density into account, we decompose the experimentally accessible protein partial compressibility into intrinsic, hydration, and molecular exchange contributions and show how they can be computed with good statistical accuracy despite the dominant bulk-water contribution. The exchange contribution describes how the protein solution responds to an applied pressure by redistributing water molecules from lower to higher density; it is negligibly small for native proteins, but potentially important for non-native states. Because the hydration shell is an open system, the conventional closed-system compressibility definitions yield a pseudo-compressibility. We define an intrinsic shell compressibility, unaffected by occupation number fluctuations, and show that it approaches the bulk-water value exponentially with a decay "length" of one shell, less than the bulk-water compressibility correlation length. In the first hydration shell, the intrinsic compressibility is 25%-30% lower than in bulk water, whereas its self part is 15%-20% lower. These large reductions are caused mainly by the proximity to the more rigid protein and are not a consequence of the perturbed water structure.

  17. 77 FR 22835 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-17

    ... Description of Projects Approved for Collection and Use: Install primary crash network. Security enhancements--access control 1. Acquire computer based interactive training system. Security enhancements--access...

  18. Sources of computer self-efficacy: The relationship to outcome expectations, computer anxiety, and intention to use computers

    NASA Astrophysics Data System (ADS)

    Antoine, Marilyn V.

    2011-12-01

    The purpose of this research was to extend earlier research on sources of selfefficacy (Lent, Lopez, & Biechke, 1991; Usher & Pajares, 2009) to the information technology domain. The principal investigator examined how Bandura's (1977) sources of self-efficacy information---mastery experience, vicarious experience, verbal persuasion, and physiological states---shape computer self-efficacy beliefs and influence the decision to use or not use computers. The study took place at a mid-sized Historically Black College or University in the South. A convenience sample of 105 undergraduates was drawn from students enrolled in multiple sections of two introductory computer courses. There were 67 females and 38 males. This research was a correlational study of the following variables: sources of computer self-efficacy, general computer self-efficacy, outcome expectations, computer anxiety, and intention to use computers. The principal investigator administered a survey questionnaire containing 52 Likert items to measure the major study variables. Additionally, the survey instrument collected demographic variables such as gender, age, race, intended major, classification, technology use, technology adoption category, and whether the student owns a computer. The results reveal the following: (1) Mastery experience and verbal persuasion had statistically significant relationships to general computer self-efficacy, while vicarious experience and physiological states had non-significant relationships. Mastery experience had the strongest correlation to general computer self-efficacy. (2) All of the sources of computer self-efficacy had statistically significant relationships to personal outcome expectations. Vicarious experience had the strongest correlation to personal outcome expectations. (3) All of the sources of self-efficacy had statistically significant relationships to performance outcome expectations. Vicarious experience had the strongest correlation to performance outcome expectations. (4) Mastery experience and physiological states had statistically significant relationships to computer anxiety, while vicarious experience and verbal persuasion had non-significant relationships. Physiological states had the strongest correlation to computer anxiety. (5) Mastery experience, vicarious experience, and physiological states had statistically significant relationships to intention to use computers, while verbal persuasion had a non-significant relationship. Mastery experience had the strongest correlation to intention to use computers. Gender-related findings indicate that females reported higher average mastery experience, vicarious experience, physiological states, and intention to use computers than males. Females reported lower average general computer self-efficacy, computer anxiety, verbal persuasion, personal outcome expectations, and performance outcome expectations than males. The results of this study can be used to develop strategies for increasing general computer self-efficacy, outcome expectations, and intention to use computers. The results can also be used to develop strategies for reducing computer anxiety.

  19. On the computation of molecular surface correlations for protein docking using fourier techniques.

    PubMed

    Sakk, Eric

    2007-08-01

    The computation of surface correlations using a variety of molecular models has been applied to the unbound protein docking problem. Because of the computational complexity involved in examining all possible molecular orientations, the fast Fourier transform (FFT) (a fast numerical implementation of the discrete Fourier transform (DFT)) is generally applied to minimize the number of calculations. This approach is rooted in the convolution theorem which allows one to inverse transform the product of two DFTs in order to perform the correlation calculation. However, such a DFT calculation results in a cyclic or "circular" correlation which, in general, does not lead to the same result as the linear correlation desired for the docking problem. In this work, we provide computational bounds for constructing molecular models used in the molecular surface correlation problem. The derived bounds are then shown to be consistent with various intuitive guidelines previously reported in the protein docking literature. Finally, these bounds are applied to different molecular models in order to investigate their effect on the correlation calculation.

  20. Information Security: Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing

    DTIC Science & Technology

    2010-07-01

    Cloud computing , an emerging form of computing in which users have access to scalable, on-demand capabilities that are provided through Internet... cloud computing , (2) the information security implications of using cloud computing services in the Federal Government, and (3) federal guidance and...efforts to address information security when using cloud computing . The complete report is titled Information Security: Federal Guidance Needed to

Top