Sample records for computer networks fall

  1. A collaborative computing framework of cloud network and WBSN applied to fall detection and 3-D motion reconstruction.

    PubMed

    Lai, Chin-Feng; Chen, Min; Pan, Jeng-Shyang; Youn, Chan-Hyun; Chao, Han-Chieh

    2014-03-01

    As cloud computing and wireless body sensor network technologies become gradually developed, ubiquitous healthcare services prevent accidents instantly and effectively, as well as provides relevant information to reduce related processing time and cost. This study proposes a co-processing intermediary framework integrated cloud and wireless body sensor networks, which is mainly applied to fall detection and 3-D motion reconstruction. In this study, the main focuses includes distributed computing and resource allocation of processing sensing data over the computing architecture, network conditions and performance evaluation. Through this framework, the transmissions and computing time of sensing data are reduced to enhance overall performance for the services of fall events detection and 3-D motion reconstruction.

  2. North American Perspective: Computing and Networks in Canada and the United States. Proceedings of the EDUCOM Fall Conference, October 16-18, 1974, Toronto, Ontario.

    ERIC Educational Resources Information Center

    Interuniversity Communications Council (EDUCOM), Princeton, NJ.

    Further developing a theme that has characterized several recent EDUCOM conferences, the 1974 EDUCOM Fall Conference focused on "Computing and Networks in Higher Education." Included in the conference program were papers and discussions on approaches to solving the organizational and financial problems of networking used in both the…

  3. The Reality of National Computer Networking for Higher Education. Proceedings of the 1978 EDUCOM Fall Conference. EDUCOM Series in Computing and Telecommunications in Higher Education 3.

    ERIC Educational Resources Information Center

    Emery, James C., Ed.

    A comprehensive review of the current status, prospects, and problems of computer networking in higher education is presented from the perspectives of both computer users and network suppliers. Several areas of computer use are considered including applications for instruction, research, and administration in colleges and universities. In the…

  4. Networking and Microcomputers. ERIC Digest.

    ERIC Educational Resources Information Center

    Klausmeier, Jane

    Computer networks can fall into three broad categories--local area networks (LAN), microcomputer based messaging systems (this includes computer bulletin board systems), or commercial information systems. Many of the same types of activities take place within the three categories. The major differences are the types of information available and…

  5. The Impact of the Network Topology on the Viral Prevalence: A Node-Based Approach

    PubMed Central

    Yang, Lu-Xing; Draief, Moez; Yang, Xiaofan

    2015-01-01

    This paper addresses the impact of the structure of the viral propagation network on the viral prevalence. For that purpose, a new epidemic model of computer virus, known as the node-based SLBS model, is proposed. Our analysis shows that the maximum eigenvalue of the underlying network is a key factor determining the viral prevalence. Specifically, the value range of the maximum eigenvalue is partitioned into three subintervals: viruses tend to extinction very quickly or approach extinction or persist depending on into which subinterval the maximum eigenvalue of the propagation network falls. Consequently, computer virus can be contained by adjusting the propagation network so that its maximum eigenvalue falls into the desired subinterval. PMID:26222539

  6. Adaptiveness in monotone pseudo-Boolean optimization and stochastic neural computation.

    PubMed

    Grossi, Giuliano

    2009-08-01

    Hopfield neural network (HNN) is a nonlinear computational model successfully applied in finding near-optimal solutions of several difficult combinatorial problems. In many cases, the network energy function is obtained through a learning procedure so that its minima are states falling into a proper subspace (feasible region) of the search space. However, because of the network nonlinearity, a number of undesirable local energy minima emerge from the learning procedure, significantly effecting the network performance. In the neural model analyzed here, we combine both a penalty and a stochastic process in order to enhance the performance of a binary HNN. The penalty strategy allows us to gradually lead the search towards states representing feasible solutions, so avoiding oscillatory behaviors or asymptotically instable convergence. Presence of stochastic dynamics potentially prevents the network to fall into shallow local minima of the energy function, i.e., quite far from global optimum. Hence, for a given fixed network topology, the desired final distribution on the states can be reached by carefully modulating such process. The model uses pseudo-Boolean functions both to express problem constraints and cost function; a combination of these two functions is then interpreted as energy of the neural network. A wide variety of NP-hard problems fall in the class of problems that can be solved by the model at hand, particularly those having a monotonic quadratic pseudo-Boolean function as constraint function. That is, functions easily derived by closed algebraic expressions representing the constraint structure and easy (polynomial time) to maximize. We show the asymptotic convergence properties of this model characterizing its state space distribution at thermal equilibrium in terms of Markov chain and give evidence of its ability to find high quality solutions on benchmarks and randomly generated instances of two specific problems taken from the computational graph theory.

  7. Fall Detection Using Smartphone Audio Features.

    PubMed

    Cheffena, Michael

    2016-07-01

    An automated fall detection system based on smartphone audio features is developed. The spectrogram, mel frequency cepstral coefficents (MFCCs), linear predictive coding (LPC), and matching pursuit (MP) features of different fall and no-fall sound events are extracted from experimental data. Based on the extracted audio features, four different machine learning classifiers: k-nearest neighbor classifier (k-NN), support vector machine (SVM), least squares method (LSM), and artificial neural network (ANN) are investigated for distinguishing between fall and no-fall events. For each audio feature, the performance of each classifier in terms of sensitivity, specificity, accuracy, and computational complexity is evaluated. The best performance is achieved using spectrogram features with ANN classifier with sensitivity, specificity, and accuracy all above 98%. The classifier also has acceptable computational requirement for training and testing. The system is applicable in home environments where the phone is placed in the vicinity of the user.

  8. Human Resources and the Internet.

    ERIC Educational Resources Information Center

    Cohen, Suzanne; Joseph, Deborah

    Concerned about falling behind the technology curve, organizations are using the Internet or intranets to provide and communicate information to their employees and create more efficient workplaces. The Internet is not just a "network of computer networks," but a medium conveying a vast, diverse amount of information. This publication is…

  9. Simplicity and efficiency of integrate-and-fire neuron models.

    PubMed

    Plesser, Hans E; Diesmann, Markus

    2009-02-01

    Lovelace and Cios (2008) recently proposed a very simple spiking neuron (VSSN) model for simulations of large neuronal networks as an efficient replacement for the integrate-and-fire neuron model. We argue that the VSSN model falls behind key advances in neuronal network modeling over the past 20 years, in particular, techniques that permit simulators to compute the state of the neuron without repeated summation over the history of input spikes and to integrate the subthreshold dynamics exactly. State-of-the-art solvers for networks of integrate-and-fire model neurons are substantially more efficient than the VSSN simulator and allow routine simulations of networks of some 10(5) neurons and 10(9) connections on moderate computer clusters.

  10. Improving Fall Detection Using an On-Wrist Wearable Accelerometer

    PubMed Central

    Chira, Camelia; González, Víctor M.; de la Cal, Enrique

    2018-01-01

    Fall detection is a very important challenge that affects both elderly people and the carers. Improvements in fall detection would reduce the aid response time. This research focuses on a method for fall detection with a sensor placed on the wrist. Falls are detected using a published threshold-based solution, although a study on threshold tuning has been carried out. The feature extraction is extended in order to balance the dataset for the minority class. Alternative models have been analyzed to reduce the computational constraints so the solution can be embedded in smart-phones or smart wristbands. Several published datasets have been used in the Materials and Methods section. Although these datasets do not include data from real falls of elderly people, a complete comparison study of fall-related datasets shows statistical differences between the simulated falls and real falls from participants suffering from impairment diseases. Given the obtained results, the rule-based systems represent a promising research line as they perform similarly to neural networks, but with a reduced computational cost. Furthermore, support vector machines performed with a high specificity. However, further research to validate the proposal in real on-line scenarios is needed. Furthermore, a slight improvement should be made to reduce the number of false alarms. PMID:29701721

  11. A Bibliography of Packet Radio Literature.

    DTIC Science & Technology

    1984-03-01

    r r* C.C.4. W . . . . . . . . .. . . . Gafni, E. and D. Bertsekas, "Distributed Algorithms for Generating Loop-Free Routes in Networks with Frequently...December 1980). Leiner, B., K. Klemba, and J. Tornow , "Packet Radio Networking," Computer World, pp. 26-37, 30, (September 27, 1982). Liu, J...34Distributed Routing and Relay Management in Mobile Packet Radio Networks," Proceedings IEEE COMPCON Fall 󈨔, p. 235-243 (1980). MacGregor, W ., J. Westcott, and

  12. Function Prediction Using Recurrent Neural Networks

    DTIC Science & Technology

    1991-12-01

    of Neurodynamics : Perceptrons and the Theory of Brain Mechanisms. Washington: Spartan Books, 1959. 16. Ruck, Dennis W. Characterization of Multilayer...Computing, 2(2) (Fall 1990). 18. Rumelhart, David E., et al. Parallel Distributed Processing: Explorations in the Microstructure of Cognition , Volume 1

  13. Detecting falls with wearable sensors using machine learning techniques.

    PubMed

    Özdemir, Ahmet Turan; Barshan, Billur

    2014-06-18

    Falls are a serious public health problem and possibly life threatening for people in fall risk groups. We develop an automated fall detection system with wearable motion sensor units fitted to the subjects' body at six different positions. Each unit comprises three tri-axial devices (accelerometer, gyroscope, and magnetometer/compass). Fourteen volunteers perform a standardized set of movements including 20 voluntary falls and 16 activities of daily living (ADLs), resulting in a large dataset with 2520 trials. To reduce the computational complexity of training and testing the classifiers, we focus on the raw data for each sensor in a 4 s time window around the point of peak total acceleration of the waist sensor, and then perform feature extraction and reduction. Most earlier studies on fall detection employ rule-based approaches that rely on simple thresholding of the sensor outputs. We successfully distinguish falls from ADLs using six machine learning techniques (classifiers): the k-nearest neighbor (k-NN) classifier, least squares method (LSM), support vector machines (SVM), Bayesian decision making (BDM), dynamic time warping (DTW), and artificial neural networks (ANNs). We compare the performance and the computational complexity of the classifiers and achieve the best results with the k-NN classifier and LSM, with sensitivity, specificity, and accuracy all above 99%. These classifiers also have acceptable computational requirements for training and testing. Our approach would be applicable in real-world scenarios where data records of indeterminate length, containing multiple activities in sequence, are recorded.

  14. Deep learning for computational chemistry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goh, Garrett B.; Hodas, Nathan O.; Vishnu, Abhinav

    The rise and fall of artificial neural networks is well documented in the scientific literature of both the fields of computer science and computational chemistry. Yet almost two decades later, we are now seeing a resurgence of interest in deep learning, a machine learning algorithm based on “deep” neural networks. Within the last few years, we have seen the transformative impact of deep learning the computer science domain, notably in speech recognition and computer vision, to the extent that the majority of practitioners in those field are now regularly eschewing prior established models in favor of deep learning models. Inmore » this review, we provide an introductory overview into the theory of deep neural networks and their unique properties as compared to traditional machine learning algorithms used in cheminformatics. By providing an overview of the variety of emerging applications of deep neural networks, we highlight its ubiquity and broad applicability to a wide range of challenges in the field, including QSAR, virtual screening, protein structure modeling, QM calculations, materials synthesis and property prediction. In reviewing the performance of deep neural networks, we observed a consistent outperformance against non neural networks state-of-the-art models across disparate research topics, and deep neural network based models often exceeded the “glass ceiling” expectations of their respective tasks. Coupled with the maturity of GPU-accelerated computing for training deep neural networks and the exponential growth of chemical data on which to train these networks on, we anticipate that deep learning algorithms will be a useful tool and may grow into a pivotal role for various challenges in the computational chemistry field.« less

  15. Applications of personal computers in geophysics

    NASA Astrophysics Data System (ADS)

    Lee, W. H. K.; Lahr, J. C.; Habermann, R. E.

    Since 1981, the use of personal computers (PCs) to increase productivity has become widespread. At present, more than 5 million personal computers are in operation for business, education, engineering, and scientific purposes. Activities within AGU reflect this trend: KOSMOS, the AGU electronic network, was introduced this year, and the AGU Committee on Personal Computers, chaired by W.H K. Lee (U.S. Geological Survey, Menlo Park, Calif.), was recently formed. In addition, in conjunction with the 1986 AGU Fall Meeting, this committee is organizing a personal computer session and hands-on demonstrations to promote applications of personal computers in geophysics.

  16. Deep learning for computational chemistry.

    PubMed

    Goh, Garrett B; Hodas, Nathan O; Vishnu, Abhinav

    2017-06-15

    The rise and fall of artificial neural networks is well documented in the scientific literature of both computer science and computational chemistry. Yet almost two decades later, we are now seeing a resurgence of interest in deep learning, a machine learning algorithm based on multilayer neural networks. Within the last few years, we have seen the transformative impact of deep learning in many domains, particularly in speech recognition and computer vision, to the extent that the majority of expert practitioners in those field are now regularly eschewing prior established models in favor of deep learning models. In this review, we provide an introductory overview into the theory of deep neural networks and their unique properties that distinguish them from traditional machine learning algorithms used in cheminformatics. By providing an overview of the variety of emerging applications of deep neural networks, we highlight its ubiquity and broad applicability to a wide range of challenges in the field, including quantitative structure activity relationship, virtual screening, protein structure prediction, quantum chemistry, materials design, and property prediction. In reviewing the performance of deep neural networks, we observed a consistent outperformance against non-neural networks state-of-the-art models across disparate research topics, and deep neural network-based models often exceeded the "glass ceiling" expectations of their respective tasks. Coupled with the maturity of GPU-accelerated computing for training deep neural networks and the exponential growth of chemical data on which to train these networks on, we anticipate that deep learning algorithms will be a valuable tool for computational chemistry. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  17. Information Extraction from Large-Multi-Layer Social Networks

    DTIC Science & Technology

    2015-08-06

    mization [4]. Methods that fall into this category include spec- tral algorithms, modularity methods, and methods that rely on statistical inference...Snijders and Chris Baerveldt, “A multilevel network study of the effects of delinquent behavior on friendship evolution,” Journal of mathematical sociol- ogy...1970. [10] Ulrike Luxburg, “A tutorial on spectral clustering,” Statistics and Computing, vol. 17, no. 4, pp. 395–416, Dec. 2007. [11] R. A. Fisher, “On

  18. FIRST Quantum-(1980)-Computing DISCOVERY in Siegel-Rosen-Feynman-...A.-I. Neural-Networks: Artificial(ANN)/Biological(BNN) and Siegel FIRST Semantic-Web and Siegel FIRST ``Page''-``Brin'' ``PageRank'' PRE-Google Search-Engines!!!

    NASA Astrophysics Data System (ADS)

    Rosen, Charles; Siegel, Edward Carl-Ludwig; Feynman, Richard; Wunderman, Irwin; Smith, Adolph; Marinov, Vesco; Goldman, Jacob; Brine, Sergey; Poge, Larry; Schmidt, Erich; Young, Frederic; Goates-Bulmer, William-Steven; Lewis-Tsurakov-Altshuler, Thomas-Valerie-Genot; Ibm/Exxon Collaboration; Google/Uw Collaboration; Microsoft/Amazon Collaboration; Oracle/Sun Collaboration; Ostp/Dod/Dia/Nsa/W.-F./Boa/Ubs/Ub Collaboration

    2013-03-01

    Belew[Finding Out About, Cambridge(2000)] and separately full-decade pre-Page/Brin/Google FIRST Siegel-Rosen(Machine-Intelligence/Atherton)-Feynman-Smith-Marinov(Guzik Enterprises/Exxon-Enterprises/A.-I./Santa Clara)-Wunderman(H.-P.) [IBM Conf. on Computers and Mathematics, Stanford(1986); APS Mtgs.(1980s): Palo Alto/Santa Clara/San Francisco/...(1980s) MRS Spring-Mtgs.(1980s): Palo Alto/San Jose/San Francisco/...(1980-1992) FIRST quantum-computing via Bose-Einstein quantum-statistics(BEQS) Bose-Einstein CONDENSATION (BEC) in artificial-intelligence(A-I) artificial neural-networks(A-N-N) and biological neural-networks(B-N-N) and Siegel[J. Noncrystalline-Solids 40, 453(1980); Symp. on Fractals..., MRS Fall-Mtg., Boston(1989)-5-papers; Symp. on Scaling..., (1990); Symp. on Transport in Geometric-Constraint (1990)

  19. Computer Security Products Technology Overview

    DTIC Science & Technology

    1988-10-01

    13 3. DATABASE MANAGEMENT SYSTEMS ................................... 15 Definition...this paper addresses fall into the areas of multi-user hosts, database management systems (DBMS), workstations, networks, guards and gateways, and...provide a portion of that protection, for example, a password scheme, a file protection mechanism, a secure database management system, or even a

  20. On the Computational Power of Spiking Neural P Systems with Self-Organization.

    PubMed

    Wang, Xun; Song, Tao; Gong, Faming; Zheng, Pan

    2016-06-10

    Neural-like computing models are versatile computing mechanisms in the field of artificial intelligence. Spiking neural P systems (SN P systems for short) are one of the recently developed spiking neural network models inspired by the way neurons communicate. The communications among neurons are essentially achieved by spikes, i. e. short electrical pulses. In terms of motivation, SN P systems fall into the third generation of neural network models. In this study, a novel variant of SN P systems, namely SN P systems with self-organization, is introduced, and the computational power of the system is investigated and evaluated. It is proved that SN P systems with self-organization are capable of computing and accept the family of sets of Turing computable natural numbers. Moreover, with 87 neurons the system can compute any Turing computable recursive function, thus achieves Turing universality. These results demonstrate promising initiatives to solve an open problem arisen by Gh Păun.

  1. On the Computational Power of Spiking Neural P Systems with Self-Organization

    PubMed Central

    Wang, Xun; Song, Tao; Gong, Faming; Zheng, Pan

    2016-01-01

    Neural-like computing models are versatile computing mechanisms in the field of artificial intelligence. Spiking neural P systems (SN P systems for short) are one of the recently developed spiking neural network models inspired by the way neurons communicate. The communications among neurons are essentially achieved by spikes, i. e. short electrical pulses. In terms of motivation, SN P systems fall into the third generation of neural network models. In this study, a novel variant of SN P systems, namely SN P systems with self-organization, is introduced, and the computational power of the system is investigated and evaluated. It is proved that SN P systems with self-organization are capable of computing and accept the family of sets of Turing computable natural numbers. Moreover, with 87 neurons the system can compute any Turing computable recursive function, thus achieves Turing universality. These results demonstrate promising initiatives to solve an open problem arisen by Gh Păun. PMID:27283843

  2. On the Computational Power of Spiking Neural P Systems with Self-Organization

    NASA Astrophysics Data System (ADS)

    Wang, Xun; Song, Tao; Gong, Faming; Zheng, Pan

    2016-06-01

    Neural-like computing models are versatile computing mechanisms in the field of artificial intelligence. Spiking neural P systems (SN P systems for short) are one of the recently developed spiking neural network models inspired by the way neurons communicate. The communications among neurons are essentially achieved by spikes, i. e. short electrical pulses. In terms of motivation, SN P systems fall into the third generation of neural network models. In this study, a novel variant of SN P systems, namely SN P systems with self-organization, is introduced, and the computational power of the system is investigated and evaluated. It is proved that SN P systems with self-organization are capable of computing and accept the family of sets of Turing computable natural numbers. Moreover, with 87 neurons the system can compute any Turing computable recursive function, thus achieves Turing universality. These results demonstrate promising initiatives to solve an open problem arisen by Gh Păun.

  3. The modeling and simulation of visuospatial working memory

    PubMed Central

    Liang, Lina; Zhang, Zhikang

    2010-01-01

    Camperi and Wang (Comput Neurosci 5:383–405, 1998) presented a network model for working memory that combines intrinsic cellular bistability with the recurrent network architecture of the neocortex. While Fall and Rinzel (Comput Neurosci 20:97–107, 2006) replaced this intrinsic bistability with a biological mechanism-Ca2+ release subsystem. In this study, we aim to further expand the above work. We integrate the traditional firing-rate network with Ca2+ subsystem-induced bistability, amend the synaptic weights and suggest that Ca2+ concentration only increase the efficacy of synaptic input but has nothing to do with the external input for the transient cue. We found that our network model maintained the persistent activity in response to a brief transient stimulus like that of the previous two models and the working memory performance was resistant to noise and distraction stimulus if Ca2+ subsystem was tuned to be bistable. PMID:22132045

  4. Computational complexity of Boolean functions

    NASA Astrophysics Data System (ADS)

    Korshunov, Aleksei D.

    2012-02-01

    Boolean functions are among the fundamental objects of discrete mathematics, especially in those of its subdisciplines which fall under mathematical logic and mathematical cybernetics. The language of Boolean functions is convenient for describing the operation of many discrete systems such as contact networks, Boolean circuits, branching programs, and some others. An important parameter of discrete systems of this kind is their complexity. This characteristic has been actively investigated starting from Shannon's works. There is a large body of scientific literature presenting many fundamental results. The purpose of this survey is to give an account of the main results over the last sixty years related to the complexity of computation (realization) of Boolean functions by contact networks, Boolean circuits, and Boolean circuits without branching. Bibliography: 165 titles.

  5. Prevention of Falls Network Europe: a thematic network aimed at introducing good practice in effective falls prevention across Europe.

    PubMed

    Skelton, D A; Becker, C; Lamb, S E; Close, J C T; Zijlstra, W; Yardley, L; Todd, C J

    2004-12-01

    The Prevention of Falls Network Europe (ProFaNE) aims to improve quality of life of the ageing population by focussing on a major cause of disability and distress: falls. The thematic network is funded by the European Commission and brings together scientists, clinicians and other health professionals from around Europe to focus on four main themes: taxonomy and coordination of trials, clinical assessment and management of falls, assessment of balance function, and psychological aspects of falling. There are 24 members across Europe as well as network associates who contribute expertise at workshops and meetings. ProFaNE, a 4-year project which started in January 2003, aims to improve and standardise health care processes, introducing and promoting good practice widely across Europe. ProFaNE undertakes workshops that bring together experts and observers around specific topics to exchange knowledge, expertise and resources on interventions that reduce falls. A key document for policy makers around Europe, written by ProFaNE members, was published by the World Health Organisation in March 2004. ProFaNE's website has both public and private areas with resources (web links to falls prevention, useful documents for policy makers, researchers and practitioners) and a discussion board to encourage informal networking between members and the public. The ultimate aim of ProFaNE is to submit a collaborative bid to undertake a multi-centre, randomised controlled trial of a multi-factorial fall prevention intervention with peripheral fracture as the primary outcome. The success of the networking and relationship building in the first year and a half of ProFaNE's work makes this an achievable goal.

  6. A smart phone-based pocket fall accident detection, positioning, and rescue system.

    PubMed

    Kau, Lih-Jen; Chen, Chih-Sheng

    2015-01-01

    We propose in this paper a novel algorithm as well as architecture for the fall accident detection and corresponding wide area rescue system based on a smart phone and the third generation (3G) networks. To realize the fall detection algorithm, the angles acquired by the electronic compass (ecompass) and the waveform sequence of the triaxial accelerometer on the smart phone are used as the system inputs. The acquired signals are then used to generate an ordered feature sequence and then examined in a sequential manner by the proposed cascade classifier for recognition purpose. Once the corresponding feature is verified by the classifier at current state, it can proceed to next state; otherwise, the system will reset to the initial state and wait for the appearance of another feature sequence. Once a fall accident event is detected, the user's position can be acquired by the global positioning system (GPS) or the assisted GPS, and sent to the rescue center via the 3G communication network so that the user can get medical help immediately. With the proposed cascaded classification architecture, the computational burden and power consumption issue on the smart phone system can be alleviated. Moreover, as we will see in the experiment that a distinguished fall accident detection accuracy up to 92% on the sensitivity and 99.75% on the specificity can be obtained when a set of 450 test actions in nine different kinds of activities are estimated by using the proposed cascaded classifier, which justifies the superiority of the proposed algorithm.

  7. Vigie-Ciel : a french citizen network to study meteors and meteorites

    NASA Astrophysics Data System (ADS)

    Bouley, S.; Zanda, B.; Colas, F.; Vaubaillon, J.; Marmo, C.; Vernazza, P.; Gattacceca, J.

    2013-12-01

    Vigie Ciel is a french citizen network supported by the Muséum National d'Histoire Naturelle (MNHN) and the Université Paris-Sud (UPsud). It is based on the scientific FRIPON program developed by Paris Observatory (Fireball Recovery and Planetary Inter Observation Network) which has for main goal to (i) determine the source region(s) of the various meteorite classes, (ii) collect both fresh and rare meteorite types and (iii) perform scientific outreach. This will be achieved by building the densest camera network in the world, based on state of the art technologies and associated with a participative network for meteorite recovery. We propose to install a network of 100 digital cameras covering the entire French territory to compute impact locations with accuracy of the order of one kilometer. Considering that there are 5 to 25 falls over France per year (~15 on average), during the same time, we will observe ~50 falls out of which we realistically expect to find 10 meteorites. Our project is original in several ways. (i) It is inter-disciplinary, involving experts in meteoritics, asteroidal science as well as fireball observation and dynamics. It will thus create new synergies between prominent institutions and/or laboratories, namely between MNHN, Paris Observatory and Université Paris-Sud in the Parisian region; and between CEREGE and LAM in the Provence region. Overall, scientists from over 25 laboratories will be involved, covering a mix of scientific disciplines and all the regions of France. (ii) It will generate a large body of data, feeding databases of interest to several disciplines (e.g. bird migration, variations of the luminosity of the brightest stars, observation of space debris, meteorology...). (iii) It will for the first time involve the general public (including schools) in the search for the meteorite falls, thus boosting the interest in meteorite and asteroid related science.

  8. DoD Computer Network Operations: Time to Hit the Send Button

    DTIC Science & Technology

    2008-03-10

    Civil Authorities ( MACA ) Employment of military forces within the borders of the United States under the heading of civil support typically falls...under the broad mission of MACA which includes three main areas—military support to civil authorities (MSCA), military support to civilian law...providing military assistance to civil authorities.90 The Directive defines MACA as “[t]hose DoD activities and measures covered under MSCA plus DoD

  9. Older people and falls: health status, quality of life, lifestyle, care networks, prevention and views on service use following a recent fall.

    PubMed

    Roe, Brenda; Howell, Fiona; Riniotis, Konstantinos; Beech, Roger; Crome, Peter; Ong, Bie Nio

    2009-08-01

    This study has investigated older people's experiences of a recent fall, its impact on their health, lifestyle, quality of life, care networks, prevention and their views on service use. Falls are common in older people and prevalence increases with age. Falls prevention is a major policy and service initiative. An exploratory, qualitative design involving two time points. A convenience sample of 27 older people from two primary care trusts who had a recent fall. Taped semi structured qualitative interviews were conducted and repeated at follow up to detect change over time and repeat falls. Data were collected on their experience of falls, health, activities of living, lifestyle, quality of life, use of services, prevention of falls, informal care and social networks. Content analysis of transcribed interviews identified key themes. The majority of people fell indoors (n = 23), were repeat fallers (n = 22) with more than half alone when they fell (n = 15). For five people it was their first ever fall. Participants in primary care trust 1 had a higher mean age than those in primary care trust 2 and had more injurious falls (n = 12, mean age 87 years vs. n = 15, mean age 81 years). The majority of non-injurious falls went unreported to formal services. Falls can result in a decline in health status, ability to undertake activities of living, lifestyle and quality of life. Local informal care and support networks are as important as formal care for older people at risk of falls or who have fallen. Access to falls prevention programmes and services is limited for people living in more rural communities. Falls prevention initiatives and services should work with local communities, agencies and informal carers to ensure equitable access and provision of information, resources and care to meet the needs of older people at risk or who have fallen.

  10. Army Communicator. Volume 37, Number 3, Fall 2012

    DTIC Science & Technology

    2012-01-01

    can our cyber defense experts be expected to stop every attack? Think of it like this: do you expect even the best goalie to stop every shot...responsibili- ties of network/system administrators and users. We are pulling Soldiers with IA skills because they understand what is happening in computer net...September 2010. This became a very unique situation in which we were not allowed to bring our CPN with us because of the GRF mission. We pulled all

  11. A random spatial network model based on elementary postulates

    USGS Publications Warehouse

    Karlinger, Michael R.; Troutman, Brent M.

    1989-01-01

    A model for generating random spatial networks that is based on elementary postulates comparable to those of the random topology model is proposed. In contrast to the random topology model, this model ascribes a unique spatial specification to generated drainage networks, a distinguishing property of some network growth models. The simplicity of the postulates creates an opportunity for potential analytic investigations of the probabilistic structure of the drainage networks, while the spatial specification enables analyses of spatially dependent network properties. In the random topology model all drainage networks, conditioned on magnitude (number of first-order streams), are equally likely, whereas in this model all spanning trees of a grid, conditioned on area and drainage density, are equally likely. As a result, link lengths in the generated networks are not independent, as usually assumed in the random topology model. For a preliminary model evaluation, scale-dependent network characteristics, such as geometric diameter and link length properties, and topologic characteristics, such as bifurcation ratio, are computed for sets of drainage networks generated on square and rectangular grids. Statistics of the bifurcation and length ratios fall within the range of values reported for natural drainage networks, but geometric diameters tend to be relatively longer than those for natural networks.

  12. The design of the m-health service application using a Nintendo DS game console.

    PubMed

    Lee, Sangjoon; Kim, Jungkuk; Lee, Myoungho

    2011-03-01

    In this article, we developed an m-health monitoring system using a Nintendo DS game console to demonstrate its utility. The proposed system consists of a biosignal acquisition device, wireless sensor network, base-station for signal reception from the sensor network and signal conversion according to Internet protocol, personal computer display program, and the Nintendo DS game console. The system collects three-channel electrocardiogram (ECG) signals for cardiac abnormality detection and three-axis accelerometer signals for fall detection of a person. The collected signals are then transmitted to the base-station through the wireless sensor network, where they are transformed according to the transmission control protocol/Internet protocol (TCP/IP) and sent to the destination IP through Internet network. To test the developed system, the collected signals were displayed on a computer located in different building through wired Internet network and also simultaneously displayed on the Nintendo DS game console connected to Internet network wirelessly. The system was able to collect and transmit signals for more than 24 h without any interruptions or malfunctions, showing the possibility of integrating healthcare monitoring functions into a small handheld-type electronic device developed for different purposes without significant complications. It is expected that the system can be used in an ambulance, nursing home, or general hospital where efficient patient monitoring from long distance is necessary.

  13. Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework

    DTIC Science & Technology

    1999-06-01

    U.S. and its allies on the battlefield, but a credible threat to employ chemical or biological weapons in pursuit of national objectives would give...injury. 18 Instrumentalities that produce them are weapons. There is little debate about whether the use of chemicals or biologicals falls...282. 50 For an interesting projection of factors likely to affect the use of force in the future, see Anthony D’Amato, Megatrends in the Use of

  14. Agricultural trade networks and patterns of economic development.

    PubMed

    Shutters, Shade T; Muneepeerakul, Rachata

    2012-01-01

    International trade networks are manifestations of a complex combination of diverse underlying factors, both natural and social. Here we apply social network analytics to the international trade network of agricultural products to better understand the nature of this network and its relation to patterns of international development. Using a network tool known as triadic analysis we develop triad significance profiles for a series of agricultural commodities traded among countries. Results reveal a novel network "superfamily" combining properties of biological information processing networks and human social networks. To better understand this unique network signature, we examine in more detail the degree and triadic distributions within the trade network by country and commodity. Our results show that countries fall into two very distinct classes based on their triadic frequencies. Roughly 165 countries fall into one class while 18, all highly isolated with respect to international agricultural trade, fall into the other. Only Vietnam stands out as a unique case. Finally, we show that as a country becomes less isolated with respect to number of trading partners, the country's triadic signature follows a predictable trajectory that may correspond to a trajectory of development.

  15. Autonomous Environment-Monitoring Networks

    NASA Technical Reports Server (NTRS)

    Hand, Charles

    2004-01-01

    Autonomous environment-monitoring networks (AEMNs) are artificial neural networks that are specialized for recognizing familiarity and, conversely, novelty. Like a biological neural network, an AEMN receives a constant stream of inputs. For purposes of computational implementation, the inputs are vector representations of the information of interest. As long as the most recent input vector is similar to the previous input vectors, no action is taken. Action is taken only when a novel vector is encountered. Whether a given input vector is regarded as novel depends on the previous vectors; hence, the same input vector could be regarded as familiar or novel, depending on the context of previous input vectors. AEMNs have been proposed as means to enable exploratory robots on remote planets to recognize novel features that could merit closer scientific attention. AEMNs could also be useful for processing data from medical instrumentation for automated monitoring or diagnosis. The primary substructure of an AEMN is called a spindle. In its simplest form, a spindle consists of a central vector (C), a scalar (r), and algorithms for changing C and r. The vector C is constructed from all the vectors in a given continuous stream of inputs, such that it is minimally distant from those vectors. The scalar r is the distance between C and the most remote vector in the same set. The construction of a spindle involves four vital parameters: setup size, spindle-population size, and the radii of two novelty boundaries. The setup size is the number of vectors that are taken into account before computing C. The spindle-population size is the total number of input vectors used in constructing the spindle counting both those that arrive before and those that arrive after the computation of C. The novelty-boundary radii are distances from C that partition the neighborhood around C into three concentric regions (see Figure 1). During construction of the spindle, the changing spindle radius is denoted by h. It is the final value of h, reached before beginning construction on the next spindle, that is denoted by r. During construction of a spindle, if a new vector falls between C and the inner boundary, the vector is regarded as completely familiar and no action is taken. If the new vector falls into the region between the inner and outer boundaries, it is considered unusual enough to warrant the adjustment of C and r by use of the aforementioned algorithms, but not unusual enough to be considered novel. If a vector falls outside the outer boundary, it is considered novel, in which case one of several appropriate responses could be initiation of construction of a new spindle.

  16. Agricultural Trade Networks and Patterns of Economic Development

    PubMed Central

    Shutters, Shade T.; Muneepeerakul, Rachata

    2012-01-01

    International trade networks are manifestations of a complex combination of diverse underlying factors, both natural and social. Here we apply social network analytics to the international trade network of agricultural products to better understand the nature of this network and its relation to patterns of international development. Using a network tool known as triadic analysis we develop triad significance profiles for a series of agricultural commodities traded among countries. Results reveal a novel network “superfamily” combining properties of biological information processing networks and human social networks. To better understand this unique network signature, we examine in more detail the degree and triadic distributions within the trade network by country and commodity. Our results show that countries fall into two very distinct classes based on their triadic frequencies. Roughly 165 countries fall into one class while 18, all highly isolated with respect to international agricultural trade, fall into the other. Only Vietnam stands out as a unique case. Finally, we show that as a country becomes less isolated with respect to number of trading partners, the country's triadic signature follows a predictable trajectory that may correspond to a trajectory of development. PMID:22768310

  17. Environmental Assessment: Construction and Operation of Fire Training Tower and Car Wash at Niagara Falls Air Reserve Station, New York

    DTIC Science & Technology

    2006-02-01

    separated by a switch that is maintained by Niagara Mohawk on the same circuit (NFARS 1998). Transportation Network . Vehicular access to Niagara Falls...from the City of Niagara Falls would be adequate to handle the additional used water ( Nerone 2005). Implementation might have minor, adverse effects...Action. Transportation Network . Potehtial impacts on transportation and circulation are evaluated for disruption or improvement of current

  18. The signaling petri net-based simulator: a non-parametric strategy for characterizing the dynamics of cell-specific signaling networks.

    PubMed

    Ruths, Derek; Muller, Melissa; Tseng, Jen-Te; Nakhleh, Luay; Ram, Prahlad T

    2008-02-29

    Reconstructing cellular signaling networks and understanding how they work are major endeavors in cell biology. The scale and complexity of these networks, however, render their analysis using experimental biology approaches alone very challenging. As a result, computational methods have been developed and combined with experimental biology approaches, producing powerful tools for the analysis of these networks. These computational methods mostly fall on either end of a spectrum of model parameterization. On one end is a class of structural network analysis methods; these typically use the network connectivity alone to generate hypotheses about global properties. On the other end is a class of dynamic network analysis methods; these use, in addition to the connectivity, kinetic parameters of the biochemical reactions to predict the network's dynamic behavior. These predictions provide detailed insights into the properties that determine aspects of the network's structure and behavior. However, the difficulty of obtaining numerical values of kinetic parameters is widely recognized to limit the applicability of this latter class of methods. Several researchers have observed that the connectivity of a network alone can provide significant insights into its dynamics. Motivated by this fundamental observation, we present the signaling Petri net, a non-parametric model of cellular signaling networks, and the signaling Petri net-based simulator, a Petri net execution strategy for characterizing the dynamics of signal flow through a signaling network using token distribution and sampling. The result is a very fast method, which can analyze large-scale networks, and provide insights into the trends of molecules' activity-levels in response to an external stimulus, based solely on the network's connectivity. We have implemented the signaling Petri net-based simulator in the PathwayOracle toolkit, which is publicly available at http://bioinfo.cs.rice.edu/pathwayoracle. Using this method, we studied a MAPK1,2 and AKT signaling network downstream from EGFR in two breast tumor cell lines. We analyzed, both experimentally and computationally, the activity level of several molecules in response to a targeted manipulation of TSC2 and mTOR-Raptor. The results from our method agreed with experimental results in greater than 90% of the cases considered, and in those where they did not agree, our approach provided valuable insights into discrepancies between known network connectivities and experimental observations.

  19. The Signaling Petri Net-Based Simulator: A Non-Parametric Strategy for Characterizing the Dynamics of Cell-Specific Signaling Networks

    PubMed Central

    Ruths, Derek; Muller, Melissa; Tseng, Jen-Te; Nakhleh, Luay; Ram, Prahlad T.

    2008-01-01

    Reconstructing cellular signaling networks and understanding how they work are major endeavors in cell biology. The scale and complexity of these networks, however, render their analysis using experimental biology approaches alone very challenging. As a result, computational methods have been developed and combined with experimental biology approaches, producing powerful tools for the analysis of these networks. These computational methods mostly fall on either end of a spectrum of model parameterization. On one end is a class of structural network analysis methods; these typically use the network connectivity alone to generate hypotheses about global properties. On the other end is a class of dynamic network analysis methods; these use, in addition to the connectivity, kinetic parameters of the biochemical reactions to predict the network's dynamic behavior. These predictions provide detailed insights into the properties that determine aspects of the network's structure and behavior. However, the difficulty of obtaining numerical values of kinetic parameters is widely recognized to limit the applicability of this latter class of methods. Several researchers have observed that the connectivity of a network alone can provide significant insights into its dynamics. Motivated by this fundamental observation, we present the signaling Petri net, a non-parametric model of cellular signaling networks, and the signaling Petri net-based simulator, a Petri net execution strategy for characterizing the dynamics of signal flow through a signaling network using token distribution and sampling. The result is a very fast method, which can analyze large-scale networks, and provide insights into the trends of molecules' activity-levels in response to an external stimulus, based solely on the network's connectivity. We have implemented the signaling Petri net-based simulator in the PathwayOracle toolkit, which is publicly available at http://bioinfo.cs.rice.edu/pathwayoracle. Using this method, we studied a MAPK1,2 and AKT signaling network downstream from EGFR in two breast tumor cell lines. We analyzed, both experimentally and computationally, the activity level of several molecules in response to a targeted manipulation of TSC2 and mTOR-Raptor. The results from our method agreed with experimental results in greater than 90% of the cases considered, and in those where they did not agree, our approach provided valuable insights into discrepancies between known network connectivities and experimental observations. PMID:18463702

  20. Analysis of repeated network-level testing by the falling weight deflectometer on I-81 in the Virginia Department of Transportation's Bristol District.

    DOT National Transportation Integrated Search

    2016-11-01

    This study was undertaken in an effort to determine the required time between subsequent rounds of network-level pavement deflection testing using a falling weight deflectometer (FWD) on the Virginia Department of Transportations (VDOTs) inters...

  1. An Unobtrusive Fall Detection and Alerting System Based on Kalman Filter and Bayes Network Classifier.

    PubMed

    He, Jian; Bai, Shuang; Wang, Xiaoyi

    2017-06-16

    Falls are one of the main health risks among the elderly. A fall detection system based on inertial sensors can automatically detect fall event and alert a caregiver for immediate assistance, so as to reduce injuries causing by falls. Nevertheless, most inertial sensor-based fall detection technologies have focused on the accuracy of detection while neglecting quantization noise caused by inertial sensor. In this paper, an activity model based on tri-axial acceleration and gyroscope is proposed, and the difference between activities of daily living (ADLs) and falls is analyzed. Meanwhile, a Kalman filter is proposed to preprocess the raw data so as to reduce noise. A sliding window and Bayes network classifier are introduced to develop a wearable fall detection system, which is composed of a wearable motion sensor and a smart phone. The experiment shows that the proposed system distinguishes simulated falls from ADLs with a high accuracy of 95.67%, while sensitivity and specificity are 99.0% and 95.0%, respectively. Furthermore, the smart phone can issue an alarm to caregivers so as to provide timely and accurate help for the elderly, as soon as the system detects a fall.

  2. Target Identification Using Harmonic Wavelet Based ISAR Imaging

    NASA Astrophysics Data System (ADS)

    Shreyamsha Kumar, B. K.; Prabhakar, B.; Suryanarayana, K.; Thilagavathi, V.; Rajagopal, R.

    2006-12-01

    A new approach has been proposed to reduce the computations involved in the ISAR imaging, which uses harmonic wavelet-(HW) based time-frequency representation (TFR). Since the HW-based TFR falls into a category of nonparametric time-frequency (T-F) analysis tool, it is computationally efficient compared to parametric T-F analysis tools such as adaptive joint time-frequency transform (AJTFT), adaptive wavelet transform (AWT), and evolutionary AWT (EAWT). Further, the performance of the proposed method of ISAR imaging is compared with the ISAR imaging by other nonparametric T-F analysis tools such as short-time Fourier transform (STFT) and Choi-Williams distribution (CWD). In the ISAR imaging, the use of HW-based TFR provides similar/better results with significant (92%) computational advantage compared to that obtained by CWD. The ISAR images thus obtained are identified using a neural network-based classification scheme with feature set invariant to translation, rotation, and scaling.

  3. Fall Detection System for the Elderly Based on the Classification of Shimmer Sensor Prototype Data

    PubMed Central

    Ahmed, Moiz; Mehmood, Nadeem; Mehmood, Amir; Rizwan, Kashif

    2017-01-01

    Objectives Falling in the elderly is considered a major cause of death. In recent years, ambient and wireless sensor platforms have been extensively used in developed countries for the detection of falls in the elderly. However, we believe extra efforts are required to address this issue in developing countries, such as Pakistan, where most deaths due to falls are not even reported. Considering this, in this paper, we propose a fall detection system prototype that s based on the classification on real time shimmer sensor data. Methods We first developed a data set, ‘SMotion’ of certain postures that could lead to falls in the elderly by using a body area network of Shimmer sensors and categorized the items in this data set into age and weight groups. We developed a feature selection and classification system using three classifiers, namely, support vector machine (SVM), K-nearest neighbor (KNN), and neural network (NN). Finally, a prototype was fabricated to generate alerts to caregivers, health experts, or emergency services in case of fall. Results To evaluate the proposed system, SVM, KNN, and NN were used. The results of this study identified KNN as the most accurate classifier with maximum accuracy of 96% for age groups and 93% for weight groups. Conclusions In this paper, a classification-based fall detection system is proposed. For this purpose, the SMotion data set was developed and categorized into two groups (age and weight groups). The proposed fall detection system for the elderly is implemented through a body area sensor network using third-generation sensors. The evaluation results demonstrate the reasonable performance of the proposed fall detection prototype system in the tested scenarios. PMID:28875049

  4. Wearable-Sensor-Based Classification Models of Faller Status in Older Adults.

    PubMed

    Howcroft, Jennifer; Lemaire, Edward D; Kofman, Jonathan

    2016-01-01

    Wearable sensors have potential for quantitative, gait-based, point-of-care fall risk assessment that can be easily and quickly implemented in clinical-care and older-adult living environments. This investigation generated models for wearable-sensor based fall-risk classification in older adults and identified the optimal sensor type, location, combination, and modelling method; for walking with and without a cognitive load task. A convenience sample of 100 older individuals (75.5 ± 6.7 years; 76 non-fallers, 24 fallers based on 6 month retrospective fall occurrence) walked 7.62 m under single-task and dual-task conditions while wearing pressure-sensing insoles and tri-axial accelerometers at the head, pelvis, and left and right shanks. Participants also completed the Activities-specific Balance Confidence scale, Community Health Activities Model Program for Seniors questionnaire, six minute walk test, and ranked their fear of falling. Fall risk classification models were assessed for all sensor combinations and three model types: multi-layer perceptron neural network, naïve Bayesian, and support vector machine. The best performing model was a multi-layer perceptron neural network with input parameters from pressure-sensing insoles and head, pelvis, and left shank accelerometers (accuracy = 84%, F1 score = 0.600, MCC score = 0.521). Head sensor-based models had the best performance of the single-sensor models for single-task gait assessment. Single-task gait assessment models outperformed models based on dual-task walking or clinical assessment data. Support vector machines and neural networks were the best modelling technique for fall risk classification. Fall risk classification models developed for point-of-care environments should be developed using support vector machines and neural networks, with a multi-sensor single-task gait assessment.

  5. Meteorite Fall Detection and Analysis via Weather Radar: Worldwide Potential for Citizen Science

    NASA Astrophysics Data System (ADS)

    Fries, M.; Bresky, C.; Laird, C.; Reddy, V.; Hankey, M.

    2017-12-01

    Meteorite falls can be detected using weather radars, facilitating rapid recovery of meteorites to minimize terrestrial alteration. Imagery from the US NEXRAD radar network reveals over two dozen meteorite falls where meteorites have been recovered, and about another dozen that remain unrecovered. Discovery of new meteorite falls is well suited to "citizen science" and similar outreach activities, as well as automation of computational components into internet-based search tools. Also, there are many more weather radars employed worldwide than those in the US NEXRAD system. Utilization of weather radars worldwide for meteorite recovery can not only expand citizen science opportunities but can also lead to significant improvement in the number of freshly-fallen meteorites available for research. We will discuss the methodologies behind locating and analyzing meteorite falls using weather radar, and how to make them available for citizen science efforts. An important example is the Aquarius Project, a Chicago-area consortium recently formed with the goal of recovering meteorites from Lake Michigan. This project has extensive student involvement geared toward development of actual hardware for recovering meteorites from the lake floor. Those meteorites were identified in weather radar imagery as they fell into the lake from a large meteor on 06 Feb 2017. Another example of public interaction is the meteor detection systems operated by the American Meteor Society (AMS). The AMS website has been developed to allow public reporting of meteors, effectively enabling citizen science to locate and describe significant meteor events worldwide.

  6. Computer simulation of stair falls to investigate scenarios in child abuse.

    PubMed

    Bertocci, G E; Pierce, M C; Deemer, E; Aguel, F

    2001-09-01

    To demonstrate the usefulness of computer simulation techniques in the investigation of pediatric stair falls. Since stair falls are a common falsely reported injury scenario in child abuse, our specific aim was to investigate the influence of stair characteristics on injury biomechanics of pediatric stair falls by using a computer simulation model. Our long-term goal is to use knowledge of biomechanics to aid in distinguishing between accidents and abuse. A computer simulation model of a 3-year-old child falling down stairs was developed using commercially available simulation software. This model was used to investigate the influence that stair characteristics have on biomechanical measures associated with injury risk. Since femur fractures occur in unintentional and abuse scenarios, biomechanical measures were focused on the lower extremities. The number and slope of steps and stair surface friction and elasticity were found to affect biomechanical measures associated with injury risk. Computer simulation techniques are useful for investigating the biomechanics of stair falls. Using our simulation model, we determined that stair characteristics have an effect on potential for lower extremity injuries. Although absolute values of biomechanical measures should not be relied on in an unvalidated model such as this, relationships between accident-environment factors and biomechanical measures can be studied through simulation. Future efforts will focus on model validation.

  7. Efficient generation of connectivity in neuronal networks from simulator-independent descriptions

    PubMed Central

    Djurfeldt, Mikael; Davison, Andrew P.; Eppler, Jochen M.

    2014-01-01

    Simulator-independent descriptions of connectivity in neuronal networks promise greater ease of model sharing, improved reproducibility of simulation results, and reduced programming effort for computational neuroscientists. However, until now, enabling the use of such descriptions in a given simulator in a computationally efficient way has entailed considerable work for simulator developers, which must be repeated for each new connectivity-generating library that is developed. We have developed a generic connection generator interface that provides a standard way to connect a connectivity-generating library to a simulator, such that one library can easily be replaced by another, according to the modeler's needs. We have used the connection generator interface to connect C++ and Python implementations of the previously described connection-set algebra to the NEST simulator. We also demonstrate how the simulator-independent modeling framework PyNN can transparently take advantage of this, passing a connection description through to the simulator layer for rapid processing in C++ where a simulator supports the connection generator interface and falling-back to slower iteration in Python otherwise. A set of benchmarks demonstrates the good performance of the interface. PMID:24795620

  8. Elderly fall risk prediction based on a physiological profile approach using artificial neural networks.

    PubMed

    Razmara, Jafar; Zaboli, Mohammad Hassan; Hassankhani, Hadi

    2016-11-01

    Falls play a critical role in older people's life as it is an important source of morbidity and mortality in elders. In this article, elders fall risk is predicted based on a physiological profile approach using a multilayer neural network with back-propagation learning algorithm. The personal physiological profile of 200 elders was collected through a questionnaire and used as the experimental data for learning and testing the neural network. The profile contains a series of simple factors putting elders at risk for falls such as vision abilities, muscle forces, and some other daily activities and grouped into two sets: psychological factors and public factors. The experimental data were investigated to select factors with high impact using principal component analysis. The experimental results show an accuracy of ≈90 percent and ≈87.5 percent for fall prediction among the psychological and public factors, respectively. Furthermore, combining these two datasets yield an accuracy of ≈91 percent that is better than the accuracy of single datasets. The proposed method suggests a set of valid and reliable measurements that can be employed in a range of health care systems and physical therapy to distinguish people who are at risk for falls.

  9. Efficacy of falls prevention interventions: protocol for a systematic review and network meta-analysis

    PubMed Central

    2013-01-01

    Background Falls are a leading cause of morbidity and mortality in older adults. Although numerous trials of falls prevention interventions have been completed, there is extensive variation in their intervention components and clinical context, such that the key elements of an effective falls prevention program remain unclear to patients, clinicians, and policy-makers. Our objective is to identify the most effective interventions and combinations of interventions that prevent falls though a systematic review and meta-analysis, including a network meta-analysis. Methods/Design We will search for published (e.g., MEDLINE, EMBASE, Cochrane Central Register of Controlled Trials, Ageline) and unpublished (e.g., trial registries, dissertations) randomised clinical trials (RCTs) in all languages examining interventions to prevent falls compared to usual care or other falls prevention interventions among adults aged ≥65 years from all settings (e.g., community, acute care, long-term care, and rehabilitation). The primary outcomes are number of injurious falls and number of hospitalizations due to falls. Secondary outcomes include falls rate, number of fallers, number of emergency room visits due to falls, number of physician visits due to falls, number of fractures, costs, and number of intervention-related harms (e.g., muscle soreness related to exercise). We will calibrate our eligibility criteria amongst the team and two independent team members will screen the literature search results in duplicate. Conflicts will be resolved through team discussion. A similar process will be used for data abstraction and quality appraisal with the Cochrane risk of bias tool. Our results will be synthesized descriptively and a random effects meta-analysis will be conducted if the studies are deemed methodologically, clinically, and statistically (e.g., I2<60%) similar. If appropriate, a network meta-analysis will be conducted, which will allow the comparison of interventions that have not been compared in head-to-head RCTs, as well as the effectiveness of interventions. Discussion We will identify the most effective interventions and combinations of interventions that prevent falls in older people. Our results will be used to optimize falls prevention strategies, and our goal is to ultimately improve the health of seniors internationally. Trial registration PROSPERO registry number: CRD42013004151 PMID:23738619

  10. Can Computational Sediment Transport Models Reproduce the Observed Variability of Channel Networks in Modern Deltas?

    NASA Astrophysics Data System (ADS)

    Nesvold, E.; Mukerji, T.

    2017-12-01

    River deltas display complex channel networks that can be characterized through the framework of graph theory, as shown by Tejedor et al. (2015). Deltaic patterns may also be useful in a Bayesian approach to uncertainty quantification of the subsurface, but this requires a prior distribution of the networks of ancient deltas. By considering subaerial deltas, one can at least obtain a snapshot in time of the channel network spectrum across deltas. In this study, the directed graph structure is semi-automatically extracted from satellite imagery using techniques from statistical processing and machine learning. Once the network is labeled with vertices and edges, spatial trends and width and sinuosity distributions can also be found easily. Since imagery is inherently 2D, computational sediment transport models can serve as a link between 2D network structure and 3D depositional elements; the numerous empirical rules and parameters built into such models makes it necessary to validate the output with field data. For this purpose we have used a set of 110 modern deltas, with average water discharge ranging from 10 - 200,000 m3/s, as a benchmark for natural variability. Both graph theoretic and more general distributions are established. A key question is whether it is possible to reproduce this deltaic network spectrum with computational models. Delft3D was used to solve the shallow water equations coupled with sediment transport. The experimental setup was relatively simple; incoming channelized flow onto a tilted plane, with varying wave and tidal energy, sediment types and grain size distributions, river discharge and a few other input parameters. Each realization was run until a delta had fully developed: between 50 and 500 years (with a morphology acceleration factor). It is shown that input parameters should not be sampled independently from the natural ranges, since this may result in deltaic output that falls well outside the natural spectrum. Since we are interested in studying the patterns occurring in nature, ideas are proposed for how to sample computer realizations that match this distribution. By establishing a link between surface based patterns from the field with the associated subsurface structure from physics-based models, this is a step towards a fully Bayesian workflow in subsurface simulation.

  11. A user exposure based approach for non-structural road network vulnerability analysis

    PubMed Central

    Jin, Lei; Wang, Haizhong; Yu, Le; Liu, Lin

    2017-01-01

    Aiming at the dense urban road network vulnerability without structural negative consequences, this paper proposes a novel non-structural road network vulnerability analysis framework. Three aspects of the framework are mainly described: (i) the rationality of non-structural road network vulnerability, (ii) the metrics for negative consequences accounting for variant road conditions, and (iii) the introduction of a new vulnerability index based on user exposure. Based on the proposed methodology, a case study in the Sioux Falls network which was usually threatened by regular heavy snow during wintertime is detailedly discussed. The vulnerability ranking of links of Sioux Falls network with respect to heavy snow scenario is identified. As a result of non-structural consequences accompanied by conceivable degeneration of network, there are significant increases in generalized travel time costs which are measurements for “emotionally hurt” of topological road network. PMID:29176832

  12. Catapults fall short

    NASA Astrophysics Data System (ADS)

    Gibson, Marcus

    2018-01-01

    In reply to the news story "UK Catapults fall short, claims review of technology centres", which describes an independent review that criticized the management of the UK's network of technology innovation centres.

  13. Integration of Fall Prevention into State Policy in Connecticut

    ERIC Educational Resources Information Center

    Murphy, Terrence E.; Baker, Dorothy I.; Leo-Summers, Linda S.; Bianco, Luann; Gottschalk, Margaret; Acampora, Denise; King, Mary B.

    2013-01-01

    Purpose of Study: To describe the ongoing efforts of the Connecticut Collaboration for Fall Prevention (CCFP) to move evidence regarding fall prevention into clinical practice and state policy. Methods: A university-based team developed methods of networking with existing statewide organizations to influence clinical practice and state policy.…

  14. A Simulation Study Comparing Epidemic Dynamics on Exponential Random Graph and Edge-Triangle Configuration Type Contact Network Models

    PubMed Central

    Rolls, David A.; Wang, Peng; McBryde, Emma; Pattison, Philippa; Robins, Garry

    2015-01-01

    We compare two broad types of empirically grounded random network models in terms of their abilities to capture both network features and simulated Susceptible-Infected-Recovered (SIR) epidemic dynamics. The types of network models are exponential random graph models (ERGMs) and extensions of the configuration model. We use three kinds of empirical contact networks, chosen to provide both variety and realistic patterns of human contact: a highly clustered network, a bipartite network and a snowball sampled network of a “hidden population”. In the case of the snowball sampled network we present a novel method for fitting an edge-triangle model. In our results, ERGMs consistently capture clustering as well or better than configuration-type models, but the latter models better capture the node degree distribution. Despite the additional computational requirements to fit ERGMs to empirical networks, the use of ERGMs provides only a slight improvement in the ability of the models to recreate epidemic features of the empirical network in simulated SIR epidemics. Generally, SIR epidemic results from using configuration-type models fall between those from a random network model (i.e., an Erdős-Rényi model) and an ERGM. The addition of subgraphs of size four to edge-triangle type models does improve agreement with the empirical network for smaller densities in clustered networks. Additional subgraphs do not make a noticeable difference in our example, although we would expect the ability to model cliques to be helpful for contact networks exhibiting household structure. PMID:26555701

  15. Limitations of demand- and pressure-driven modeling for large deficient networks

    NASA Astrophysics Data System (ADS)

    Braun, Mathias; Piller, Olivier; Deuerlein, Jochen; Mortazavi, Iraj

    2017-10-01

    The calculation of hydraulic state variables for a network is an important task in managing the distribution of potable water. Over the years the mathematical modeling process has been improved by numerous researchers for utilization in new computer applications and the more realistic modeling of water distribution networks. But, in spite of these continuous advances, there are still a number of physical phenomena that may not be tackled correctly by current models. This paper will take a closer look at the two modeling paradigms given by demand- and pressure-driven modeling. The basic equations are introduced and parallels are drawn with the optimization formulations from electrical engineering. These formulations guarantee the existence and uniqueness of the solution. One of the central questions of the French and German research project ResiWater is the investigation of the network resilience in the case of extreme events or disasters. Under such extraordinary conditions where models are pushed beyond their limits, we talk about deficient network models. Examples of deficient networks are given by highly regulated flow, leakage or pipe bursts and cases where pressure falls below the vapor pressure of water. These examples will be presented and analyzed on the solvability and physical correctness of the solution with respect to demand- and pressure-driven models.

  16. An automatic fall detection framework using data fusion of Doppler radar and motion sensor network.

    PubMed

    Liu, Liang; Popescu, Mihail; Skubic, Marjorie; Rantz, Marilyn

    2014-01-01

    This paper describes the ongoing work of detecting falls in independent living senior apartments. We have developed a fall detection system with Doppler radar sensor and implemented ceiling radar in real senior apartments. However, the detection accuracy on real world data is affected by false alarms inherent in the real living environment, such as motions from visitors. To solve this issue, this paper proposes an improved framework by fusing the Doppler radar sensor result with a motion sensor network. As a result, performance is significantly improved after the data fusion by discarding the false alarms generated by visitors. The improvement of this new method is tested on one week of continuous data from an actual elderly person who frequently falls while living in her senior home.

  17. Older people's perception of and coping with falling, and their motivation for fall-prevention programmes.

    PubMed

    Høst, Dorte; Hendriksen, Carsten; Borup, Ina

    2011-11-01

    This study aims to investigate older people's perceptions of and coping with falls, and what motivates them to join such programmes. We used semi-structured interviews to collect data on 14 individuals (65 years +) who contacted an emergency department because they had fallen. Data were analyzed using a phenomenographic approach that traces older people's perception of the phenomenon of ''falling''. Five categories and 15 subcategories emerged from the interviews. The five main categories were: emotional perceptions of falling; falling has consequences; coping with the situation; support from the social network; motivation and demotivation. To fall was shameful and embarrassing and could be explained by old age. To some, ''fear of falling'' was the dominant feeling. These people did not see falls as a risk factor they ought to care about. Instead, to prevent future falls, they restricted their activities or stopped certain activities altogether. If demands exceeded their resources, they asked their relatives or their general practitioner for help. Elderly people were motivated by autonomy, competence, and relatedness and preferred activities that spread happiness and joy, preferably in a social atmosphere, but they encountered elements in their surroundings that curbed their motivation. Future fall-prevention programmes must target older people's needs and acknowledge that there are many ways of perceiving falling. Moreover, elderly individuals' coping strategies are not necessarily productive. Social networks and general practitioners can actively encourage older people to participate in fall-prevention programmes. Such programmes must support older people's need for autonomy, competence and social relations.

  18. An Optimal Schedule for Urban Road Network Repair Based on the Greedy Algorithm

    PubMed Central

    Lu, Guangquan; Xiong, Ying; Wang, Yunpeng

    2016-01-01

    The schedule of urban road network recovery caused by rainstorms, snow, and other bad weather conditions, traffic incidents, and other daily events is essential. However, limited studies have been conducted to investigate this problem. We fill this research gap by proposing an optimal schedule for urban road network repair with limited repair resources based on the greedy algorithm. Critical links will be given priority in repair according to the basic concept of the greedy algorithm. In this study, the link whose restoration produces the ratio of the system-wide travel time of the current network to the worst network is the minimum. We define such a link as the critical link for the current network. We will re-evaluate the importance of damaged links after each repair process is completed. That is, the critical link ranking will be changed along with the repair process because of the interaction among links. We repair the most critical link for the specific network state based on the greedy algorithm to obtain the optimal schedule. The algorithm can still quickly obtain an optimal schedule even if the scale of the road network is large because the greedy algorithm can reduce computational complexity. We prove that the problem can obtain the optimal solution using the greedy algorithm in theory. The algorithm is also demonstrated in the Sioux Falls network. The problem discussed in this paper is highly significant in dealing with urban road network restoration. PMID:27768732

  19. Effective Prediction of Errors by Non-native Speakers Using Decision Tree for Speech Recognition-Based CALL System

    NASA Astrophysics Data System (ADS)

    Wang, Hongcui; Kawahara, Tatsuya

    CALL (Computer Assisted Language Learning) systems using ASR (Automatic Speech Recognition) for second language learning have received increasing interest recently. However, it still remains a challenge to achieve high speech recognition performance, including accurate detection of erroneous utterances by non-native speakers. Conventionally, possible error patterns, based on linguistic knowledge, are added to the lexicon and language model, or the ASR grammar network. However, this approach easily falls in the trade-off of coverage of errors and the increase of perplexity. To solve the problem, we propose a method based on a decision tree to learn effective prediction of errors made by non-native speakers. An experimental evaluation with a number of foreign students learning Japanese shows that the proposed method can effectively generate an ASR grammar network, given a target sentence, to achieve both better coverage of errors and smaller perplexity, resulting in significant improvement in ASR accuracy.

  20. The Education and Public Engagement (EPE) Component of the Ocean Observatories Initiative (OOI): Enabling Near Real-Time Data Use in Undergraduate Classrooms

    NASA Astrophysics Data System (ADS)

    Glenn, S. M.; Companion, C.; Crowley, M.; deCharon, A.; Fundis, A. T.; Kilb, D. L.; Levenson, S.; Lichtenwalner, C. S.; McCurdy, A.; McDonnell, J. D.; Overoye, D.; Risien, C. M.; Rude, A.; Wieclawek, J., III

    2011-12-01

    The National Science Foundation's Ocean Observatories Initiative (OOI) is constructing observational and computer infrastructure that will provide sustained ocean measurements to study climate variability, ocean circulation, ecosystem dynamics, air-sea exchange, seafloor processes, and plate-scale geodynamics over the next ~25-30 years. To accomplish this, the Consortium for Ocean Leadership established four Implementing Organizations: (1) Regional Scale Nodes; (2) Coastal and Global Scale Nodes; (3) Cyberinfrastructure (CI); and (4) Education and Public Engagement (EPE). The EPE, which we represent, was just recently established to provide a new layer of cyber-interactivity for educators to bring near real-time data, images and videos of our Earth's oceans into their learning environments. Our focus over the next four years is engaging educators of undergraduates and free-choice learners. Demonstration projects of the OOI capabilities will use an Integrated Education Toolkit to access OOI data through the Cyberinfrastructure's On Demand Measurement Processing capability. We will present our plans to develop six education infrastructure software modules: Education Web Services (middleware), Visualization Tools, Concept Map and Lab/Lesson Builders, Collaboration Tools, and an Education Resources Database. The software release of these tools is staggered to coincide with other major OOI releases. The first release will include stand-alone versions of the first four EPE modules (Fall 2012). Next, all six EPE modules will be integrated within the OOI cyber-framework (Fall 2013). The last release will include advanced capabilities for all six modules within a collaborative network that leverages the CI's Integrated Observatory Network (Fall 2014). We are looking for undergraduate and informal science educators to provide feedback and guidance on the project, please contact us if you are interested in partnering with us.

  1. Developing a pheromone monitoring network in Africa for fall armyworm

    USDA-ARS?s Scientific Manuscript database

    The fall armyworm, Spodoptera frugiperda, was discovered infesting maize in São Tomé and Principe and Nigeria in early 2016. The pest species has since been discovered in almost every country in sub-Saharan Africa. Fall armyworm is migratory in North America, moving in the spring from southern ove...

  2. An Integrated Approach to Engineering Education in a Minority Community

    NASA Technical Reports Server (NTRS)

    Taylor, Bill

    1998-01-01

    Northeastern New Mexico epitomizes regions which are economically depressed, rural, and predominantly Hispanic. New Mexico Highlands University (NMHU), with a small student population of approximately 2800, offers a familiar environment attracting students who might otherwise not attend college. An outreach computer network of minority schools was created in northeastern New Mexico with NASA funding. Rural and urban minority schools gained electronic access to each other, to computer resources, to technical help at New Mexico Highlands University and gained access to the world via the Internet. This outreach program was initiated in the fall of 1992 in an effort to attract and to involve minority students in Engineering and the Mathematical Sciences. We installed 56 Kbs Internet connections to eight elementary schools, two middle schools, two high schools, a public library (servicing the home schooling community) and an International Baccalaureate school. For another fourteen rural schools, we provided computers and free dial-up service to servers on the New Mexico Highlands University campus.

  3. FRAT-up, a Web-based fall-risk assessment tool for elderly people living in the community.

    PubMed

    Cattelani, Luca; Palumbo, Pierpaolo; Palmerini, Luca; Bandinelli, Stefania; Becker, Clemens; Chesani, Federico; Chiari, Lorenzo

    2015-02-18

    About 30% of people over 65 are subject to at least one unintentional fall a year. Fall prevention protocols and interventions can decrease the number of falls. To be effective, a prevention strategy requires a prior step to evaluate the fall risk of the subjects. Despite extensive research, existing assessment tools for fall risk have been insufficient for predicting falls. The goal of this study is to present a novel web-based fall-risk assessment tool (FRAT-up) and to evaluate its accuracy in predicting falls, within a context of community-dwelling persons aged 65 and up. FRAT-up is based on the assumption that a subject's fall risk is given by the contribution of their exposure to each of the known fall-risk factors. Many scientific studies have investigated the relationship between falls and risk factors. The majority of these studies adopted statistical approaches, usually providing quantitative information such as odds ratios. FRAT-up exploits these numerical results to compute how each single factor contributes to the overall fall risk. FRAT-up is based on a formal ontology that enlists a number of known risk factors, together with quantitative findings in terms of odds ratios. From such information, an automatic algorithm generates a rule-based probabilistic logic program, that is, a set of rules for each risk factor. The rule-based program takes the health profile of the subject (in terms of exposure to the risk factors) and computes the fall risk. A Web-based interface allows users to input health profiles and to visualize the risk assessment for the given subject. FRAT-up has been evaluated on the InCHIANTI Study dataset, a representative population-based study of older persons living in the Chianti area (Tuscany, Italy). We compared reported falls with predicted ones and computed performance indicators. The obtained area under curve of the receiver operating characteristic was 0.642 (95% CI 0.614-0.669), while the Brier score was 0.174. The Hosmer-Lemeshow test indicated statistical significance of miscalibration. FRAT-up is a web-based tool for evaluating the fall risk of people aged 65 or up living in the community. Validation results of fall risks computed by FRAT-up show that its performance is comparable to externally validated state-of-the-art tools. A prototype is freely available through a web-based interface. ClinicalTrials.gov NCT01331512 (The InChianti Follow-Up Study); http://clinicaltrials.gov/show/NCT01331512 (Archived by WebCite at http://www.webcitation.org/6UDrrRuaR).

  4. Integration of the Chinese HPC Grid in ATLAS Distributed Computing

    NASA Astrophysics Data System (ADS)

    Filipčič, A.; ATLAS Collaboration

    2017-10-01

    Fifteen Chinese High-Performance Computing sites, many of them on the TOP500 list of most powerful supercomputers, are integrated into a common infrastructure providing coherent access to a user through an interface based on a RESTful interface called SCEAPI. These resources have been integrated into the ATLAS Grid production system using a bridge between ATLAS and SCEAPI which translates the authorization and job submission protocols between the two environments. The ARC Computing Element (ARC-CE) forms the bridge using an extended batch system interface to allow job submission to SCEAPI. The ARC-CE was setup at the Institute for High Energy Physics, Beijing, in order to be as close as possible to the SCEAPI front-end interface at the Computing Network Information Center, also in Beijing. This paper describes the technical details of the integration between ARC-CE and SCEAPI and presents results so far with two supercomputer centers, Tianhe-IA and ERA. These two centers have been the pilots for ATLAS Monte Carlo Simulation in SCEAPI and have been providing CPU power since fall 2015.

  5. Convolutional Neural Network-Based Robot Navigation Using Uncalibrated Spherical Images †

    PubMed Central

    Ran, Lingyan; Zhang, Yanning; Zhang, Qilin; Yang, Tao

    2017-01-01

    Vision-based mobile robot navigation is a vibrant area of research with numerous algorithms having been developed, the vast majority of which either belong to the scene-oriented simultaneous localization and mapping (SLAM) or fall into the category of robot-oriented lane-detection/trajectory tracking. These methods suffer from high computational cost and require stringent labelling and calibration efforts. To address these challenges, this paper proposes a lightweight robot navigation framework based purely on uncalibrated spherical images. To simplify the orientation estimation, path prediction and improve computational efficiency, the navigation problem is decomposed into a series of classification tasks. To mitigate the adverse effects of insufficient negative samples in the “navigation via classification” task, we introduce the spherical camera for scene capturing, which enables 360° fisheye panorama as training samples and generation of sufficient positive and negative heading directions. The classification is implemented as an end-to-end Convolutional Neural Network (CNN), trained on our proposed Spherical-Navi image dataset, whose category labels can be efficiently collected. This CNN is capable of predicting potential path directions with high confidence levels based on a single, uncalibrated spherical image. Experimental results demonstrate that the proposed framework outperforms competing ones in realistic applications. PMID:28604624

  6. Convolutional Neural Network-Based Robot Navigation Using Uncalibrated Spherical Images.

    PubMed

    Ran, Lingyan; Zhang, Yanning; Zhang, Qilin; Yang, Tao

    2017-06-12

    Vision-based mobile robot navigation is a vibrant area of research with numerous algorithms having been developed, the vast majority of which either belong to the scene-oriented simultaneous localization and mapping (SLAM) or fall into the category of robot-oriented lane-detection/trajectory tracking. These methods suffer from high computational cost and require stringent labelling and calibration efforts. To address these challenges, this paper proposes a lightweight robot navigation framework based purely on uncalibrated spherical images. To simplify the orientation estimation, path prediction and improve computational efficiency, the navigation problem is decomposed into a series of classification tasks. To mitigate the adverse effects of insufficient negative samples in the "navigation via classification" task, we introduce the spherical camera for scene capturing, which enables 360° fisheye panorama as training samples and generation of sufficient positive and negative heading directions. The classification is implemented as an end-to-end Convolutional Neural Network (CNN), trained on our proposed Spherical-Navi image dataset, whose category labels can be efficiently collected. This CNN is capable of predicting potential path directions with high confidence levels based on a single, uncalibrated spherical image. Experimental results demonstrate that the proposed framework outperforms competing ones in realistic applications.

  7. Fertility, kinship and the evolution of mass ideologies.

    PubMed

    David-Barrett, Tamas; Dunbar, Robin I M

    2017-03-21

    Traditional human societies are organised around kinship, and use kinship networks to generate large scale community projects. This is made possible by a combination of linguistic kin recognition, a uniquely human trait, which is mediated by the reliability of kin as collaborators. When effective fertility falls, this results in two simultaneous effects on social networks: there are fewer kin that can be relied on, and the limiting effect of the local kin-clustering becomes stronger. To capture this phenomenon, we used a model of kinship lineages to build populations with a range of fertility levels combined with a behavioural synchrony model to measure the efficiency of collective action generated on kin networks within populations. Our findings suggest that, whenever effective cooperation depends on kinship, falling fertility creates a crisis when it results in too few kin to join the community project. We conclude that, when societies transition to small effective kin networks, due to falling fertility, increased relative distance to kin due to urbanisation or high mortality due to war or epidemics, they will be able to remain socially cohesive only if they replace disappearing kin networks with quasi-kin alternatives based on membership of guilds or clubs. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Need for specific sugar-sweetened beverage lessons for fourth- and fifth-graders.

    PubMed

    Bea, Jennifer W; Jacobs, Laurel; Waits, Juanita; Hartz, Vern; Martinez, Stephanie H; Standfast, Rebecca D; Farrell, Vanessa A; Bawden, Margine; Whitmer, Evelyn; Misner, Scottie

    2015-01-01

    Consumption of sugar-sweetened beverages (SSB) is linked to obesity. The authors hypothesized that school-based nutrition education would decrease SSB consumption. Self-selected interventional cohort with random selection for pre and post measurements. Arizona Supplemental Nutrition Assistance Program-Education Program-eligible schools. Randomly selected (9%) fourth- and fifth-grade classroom students. The University of Arizona Nutrition Network provided general nutrition education training and materials to teachers, to be delivered to their students. The University of Arizona Nutrition Network administered behavioral questionnaires to students in both fall and spring. Change in SSB consumption. Descriptive statistics were computed for student demographics and beverage consumption on the day before testing. Paired t tests evaluated change in classroom averages. Linear regression assessed potential correlates of SSB consumption. Fall mean SSB consumption was 1.1 (± 0.2) times; mean milk and water intake were 1.6 (± 0.2) and 5.2 (± 0.7) times, respectively. Beverage consumption increased (3.2%) in springtime, with increased SSBs (14.4%) accounting for the majority (P = .006). Change in SSB consumption was negatively associated with baseline SSB and water consumption but positively associated with baseline milk fat (P ≤ .05). The results suggest the need for beverage-specific education to encourage children to consume more healthful beverages in warmer weather. Copyright © 2015 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  9. Evaluating the Efficacy of the Cloud for Cluster Computation

    NASA Technical Reports Server (NTRS)

    Knight, David; Shams, Khawaja; Chang, George; Soderstrom, Tom

    2012-01-01

    Computing requirements vary by industry, and it follows that NASA and other research organizations have computing demands that fall outside the mainstream. While cloud computing made rapid inroads for tasks such as powering web applications, performance issues on highly distributed tasks hindered early adoption for scientific computation. One venture to address this problem is Nebula, NASA's homegrown cloud project tasked with delivering science-quality cloud computing resources. However, another industry development is Amazon's high-performance computing (HPC) instances on Elastic Cloud Compute (EC2) that promises improved performance for cluster computation. This paper presents results from a series of benchmarks run on Amazon EC2 and discusses the efficacy of current commercial cloud technology for running scientific applications across a cluster. In particular, a 240-core cluster of cloud instances achieved 2 TFLOPS on High-Performance Linpack (HPL) at 70% of theoretical computational performance. The cluster's local network also demonstrated sub-100 ?s inter-process latency with sustained inter-node throughput in excess of 8 Gbps. Beyond HPL, a real-world Hadoop image processing task from NASA's Lunar Mapping and Modeling Project (LMMP) was run on a 29 instance cluster to process lunar and Martian surface images with sizes on the order of tens of gigapixels. These results demonstrate that while not a rival of dedicated supercomputing clusters, commercial cloud technology is now a feasible option for moderately demanding scientific workloads.

  10. New insights into olivo-cerebellar circuits for learning from a small training sample.

    PubMed

    Tokuda, Isao T; Hoang, Huu; Kawato, Mitsuo

    2017-10-01

    Artificial intelligence such as deep neural networks exhibited remarkable performance in simulated video games and 'Go'. In contrast, most humanoid robots in the DARPA Robotics Challenge fell down to ground. The dramatic contrast in performance is mainly due to differences in the amount of training data, which is huge and small, respectively. Animals are not allowed with millions of the failed trials, which lead to injury and death. Humans fall only several thousand times before they balance and walk. We hypothesize that a unique closed-loop neural circuit formed by the Purkinje cells, the cerebellar deep nucleus and the inferior olive in and around the cerebellum and the highest density of gap junctions, which regulate synchronous activities of the inferior olive nucleus, are computational machinery for learning from a small sample. We discuss recent experimental and computational advances associated with this hypothesis. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Optimality in Microwave-Assisted Drying of Aloe Vera ( Aloe barbadensis Miller) Gel using Response Surface Methodology and Artificial Neural Network Modeling

    NASA Astrophysics Data System (ADS)

    Das, Chandan; Das, Arijit; Kumar Golder, Animes

    2016-10-01

    The present work illustrates the Microwave-Assisted Drying (MWAD) characteristic of aloe vera gel combined with process optimization and artificial neural network modeling. The influence of microwave power (160-480 W), gel quantity (4-8 g) and drying time (1-9 min) on the moisture ratio was investigated. The drying of aloe gel exhibited typical diffusion-controlled characteristics with a predominant interaction between input power and drying time. Falling rate period was observed for the entire MWAD of aloe gel. Face-centered Central Composite Design (FCCD) developed a regression model to evaluate their effects on moisture ratio. The optimal MWAD conditions were established as microwave power of 227.9 W, sample amount of 4.47 g and 5.78 min drying time corresponding to the moisture ratio of 0.15. A computer-stimulated Artificial Neural Network (ANN) model was generated for mapping between process variables and the desired response. `Levenberg-Marquardt Back Propagation' algorithm with 3-5-1 architect gave the best prediction, and it showed a clear superiority over FCCD.

  12. Nursing Unit Design, Nursing Staff Communication Networks, and Patient Falls: Are They Related?

    PubMed

    Brewer, Barbara B; Carley, Kathleen M; Benham-Hutchins, Marge; Effken, Judith A; Reminga, Jeffrey

    2018-01-01

    The purpose of this research is to (1) investigate the impact of nursing unit design on nursing staff communication patterns and, ultimately, on patient falls in acute care nursing units; and (2) evaluate whether differences in fall rates, if found, were associated with the nursing unit physical structure (shape) or size. Nursing staff communication and nursing unit design are frequently linked to patient safety outcomes, yet little is known about the impact of specific nursing unit designs on nursing communication patterns that might affect patient falls. An exploratory longitudinal correlational design was used to measure nursing unit communication structures using social network analysis techniques. Data were collected 4 times over a 7-month period. Floor plans were used to determine nursing unit design. Fall rates were provided by hospital coordinators. An analysis of covariance controlling for hospitals resulted in a statistically significant interaction of unit shape and size (number of beds). The interaction occurred when medium- and large-sized racetrack-shaped units intersected with medium- and large-sized cross-shaped units. The results suggest that nursing unit design shape impacts nursing communication patterns, and the interaction of shape and size may impact patient falls. How those communication patterns affect patient falls should be considered when planning hospital construction of nursing care units.

  13. Bayesian networks: a new method for the modeling of bibliographic knowledge: application to fall risk assessment in geriatric patients.

    PubMed

    Lalande, Laure; Bourguignon, Laurent; Carlier, Chloé; Ducher, Michel

    2013-06-01

    Falls in geriatry are associated with important morbidity, mortality and high healthcare costs. Because of the large number of variables related to the risk of falling, determining patients at risk is a difficult challenge. The aim of this work was to validate a tool to detect patients with high risk of fall using only bibliographic knowledge. Thirty articles corresponding to 160 studies were used to modelize fall risk. A retrospective case-control cohort including 288 patients (88 ± 7 years) and a prospective cohort including 106 patients (89 ± 6 years) from two geriatric hospitals were used to validate the performances of our model. We identified 26 variables associated with an increased risk of fall. These variables were split into illnesses, medications, and environment. The combination of the three associated scores gives a global fall score. The sensitivity and the specificity were 31.4, 81.6, 38.5, and 90 %, respectively, for the retrospective and the prospective cohort. The performances of the model are similar to results observed with already existing prediction tools using model adjustment to data from numerous cohort studies. This work demonstrates that knowledge from the literature can be synthesized with Bayesian networks.

  14. Quantum-Limited Image Recognition

    DTIC Science & Technology

    1989-12-01

    J. S. Bomba ,’Alpha-numeric character recognition using local operations,’ Fall Joint Comput. Conf., 218-224 (1959). 53. D. Barnea and H. Silverman...for Chapter 6 1. J. S. Bomba ,’Alpha-numeric character recognition using local operations,’ Fall Joint Comput. Conf., 218-224 (1959). 2. D. Bamea and H

  15. FRAT-up, a Web-based Fall-Risk Assessment Tool for Elderly People Living in the Community

    PubMed Central

    Cattelani, Luca; Palumbo, Pierpaolo; Palmerini, Luca; Bandinelli, Stefania; Becker, Clemens; Chiari, Lorenzo

    2015-01-01

    Background About 30% of people over 65 are subject to at least one unintentional fall a year. Fall prevention protocols and interventions can decrease the number of falls. To be effective, a prevention strategy requires a prior step to evaluate the fall risk of the subjects. Despite extensive research, existing assessment tools for fall risk have been insufficient for predicting falls. Objective The goal of this study is to present a novel web-based fall-risk assessment tool (FRAT-up) and to evaluate its accuracy in predicting falls, within a context of community-dwelling persons aged 65 and up. Methods FRAT-up is based on the assumption that a subject’s fall risk is given by the contribution of their exposure to each of the known fall-risk factors. Many scientific studies have investigated the relationship between falls and risk factors. The majority of these studies adopted statistical approaches, usually providing quantitative information such as odds ratios. FRAT-up exploits these numerical results to compute how each single factor contributes to the overall fall risk. FRAT-up is based on a formal ontology that enlists a number of known risk factors, together with quantitative findings in terms of odds ratios. From such information, an automatic algorithm generates a rule-based probabilistic logic program, that is, a set of rules for each risk factor. The rule-based program takes the health profile of the subject (in terms of exposure to the risk factors) and computes the fall risk. A Web-based interface allows users to input health profiles and to visualize the risk assessment for the given subject. FRAT-up has been evaluated on the InCHIANTI Study dataset, a representative population-based study of older persons living in the Chianti area (Tuscany, Italy). We compared reported falls with predicted ones and computed performance indicators. Results The obtained area under curve of the receiver operating characteristic was 0.642 (95% CI 0.614-0.669), while the Brier score was 0.174. The Hosmer-Lemeshow test indicated statistical significance of miscalibration. Conclusions FRAT-up is a web-based tool for evaluating the fall risk of people aged 65 or up living in the community. Validation results of fall risks computed by FRAT-up show that its performance is comparable to externally validated state-of-the-art tools. A prototype is freely available through a web-based interface. Trial Registration ClinicalTrials.gov NCT01331512 (The InChianti Follow-Up Study); http://clinicaltrials.gov/show/NCT01331512 (Archived by WebCite at http://www.webcitation.org/6UDrrRuaR). PMID:25693419

  16. Implementation of accelerometer sensor module and fall detection monitoring system based on wireless sensor network.

    PubMed

    Lee, Youngbum; Kim, Jinkwon; Son, Muntak; Lee, Myoungho

    2007-01-01

    This research implements wireless accelerometer sensor module and algorithm to determine wearer's posture, activity and fall. Wireless accelerometer sensor module uses ADXL202, 2-axis accelerometer sensor (Analog Device). And using wireless RF module, this module measures accelerometer signal and shows the signal at ;Acceloger' viewer program in PC. ADL algorithm determines posture, activity and fall that activity is determined by AC component of accelerometer signal and posture is determined by DC component of accelerometer signal. Those activity and posture include standing, sitting, lying, walking, running, etc. By the experiment for 30 subjects, the performance of implemented algorithm was assessed, and detection rate for postures, motions and subjects was calculated. Lastly, using wireless sensor network in experimental space, subject's postures, motions and fall monitoring system was implemented. By the simulation experiment for 30 subjects, 4 kinds of activity, 3 times, fall detection rate was calculated. In conclusion, this system can be application to patients and elders for activity monitoring and fall detection and also sports athletes' exercise measurement and pattern analysis. And it can be expected to common person's exercise training and just plaything for entertainment.

  17. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  18. RadNet Air Data From Idaho Falls, ID

    EPA Pesticide Factsheets

    This page presents radiation air monitoring and air filter analysis data for Idaho Falls, ID from EPA's RadNet system. RadNet is a nationwide network of monitoring stations that measure radiation in air, drinking water and precipitation.

  19. General view looking eastnortheast at western end of array ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    General view looking east-northeast at western end of array - Over-the-Horizon Backscatter Radar Network, Columbia Falls Radar Site Receive Sector Three Antenna Array, At the end of Shadagee Ridge Road, Columbia Falls, Washington County, ME

  20. Whom to Target for Falls-Prevention Trials

    PubMed Central

    Coote, Susan; Sosnoff, Jacob J.

    2014-01-01

    Effective falls-prevention approaches for people with multiple sclerosis (MS) are needed. A significant challenge in studying falls-prevention programs for people with MS is deciding whom to include in trials. This article presents and discusses potential criteria for selecting participants for trials of falls-prevention interventions in MS. This narrative review reports on the inaugural meeting of the International MS Falls Prevention Research Network (IMSFPRN), which was held in March 2014 in Kingston, Ontario, Canada. Criteria considered were age, assistive device use, cognition, and fall history. The IMSFPRN reached consensus agreement to recommend that participants of all ages with varying levels of cognitive ability who are able to ambulate with or without assistance and who have a history of falling should be included in their future falls-prevention trials. PMID:25694780

  1. Fall and Recovery of the Murrili Meteorite, and an Update on the Desert Fireball Network

    NASA Astrophysics Data System (ADS)

    Bland, P. A.; Towner, M. C.; Sansom, E. K.; Devillepoix, H.; Howie, R. M.; Paxman, J. P.; Cupak, M.; Benedix, G. K.; Cox, M. A.; Jansen-Sturgeon, T.; Stuart, D.; Strangway, D.

    2016-08-01

    The Murrili meteorite was recovered from Lake Eyre, South Australia, on 31 December 2015. It is the third meteorite recovered by the Desert Fireball Network, and the first since the network was upgraded and expanded.

  2. Rockfall hazard and risk assessment in the Yosemite Valley, California, USA

    USGS Publications Warehouse

    Guzzetti, F.; Reichenbach, P.; Wieczorek, G.F.

    2003-01-01

    Rock slides and rock falls are the most frequent types of slope movements in Yosemite National Park, California. In historical time (1857-2002) 392 rock falls and rock slides have been documented in the valley, and some of them have been mapped in detail. We present the results of an attempt to assess rock fall hazards in the Yosemite Valley. Spatial and temporal aspects of rock falls hazard are considered. A detailed inventory of slope movements covering the 145-year period from 1857 to 2002 is used to determine the frequency-volume statistics of rock falls and to estimate the annual frequency of rock falls, providing the temporal component of rock fall hazard. The extent of the areas potentially subject to rock fall hazards in the Yosemite Valley were obtained using STONE, a physically-based rock fall simulation computer program. The software computes 3-dimensional rock fall trajectories starting from a digital elevation model (DEM), the location of rock fall release points, and maps of the dynamic rolling friction coefficient and of the coefficients of normal and tangential energy restitution. For each DEM cell the software calculates the number of rock falls passing through the cell, the maximum rock fall velocity and the maximum flying height. For the Yosemite Valley, a DEM with a ground resolution of 10 ?? 10 m was prepared using topographic contour lines from the U.S. Geological Survey 1:24 000-scale maps. Rock fall release points were identified as DEM cells having a slope steeper than 60??, an assumption based on the location of historical rock falls. Maps of the normal and tangential energy restitution coefficients and of the rolling friction coefficient were produced from a surficial geologic map. The availability of historical rock falls mapped in detail allowed us to check the computer program performance and to calibrate the model parameters. Visual and statistical comparison of the model results with the mapped rock falls confirmed the accuracy of the model. The model results are compared with a previous map of rockfall talus and with a geomorphic assessment of rock fall hazard based on potential energy referred to as a shadow angle approach, recently completed for the Yosemite Valley. The model results are then used to identify the roads and trails more subject to rock fall hazard. Of the 166.5 km of roads and trails in the Yosemite Valley 31.2% were found to be potentially subject to rock fall hazard, of which 14% are subject to very high hazard. ?? European Geosciences Union 2003.

  3. If it walks like a duck: nanosensor threat assessment

    NASA Astrophysics Data System (ADS)

    Chachis, George C.

    2003-09-01

    A convergence of technologies is making deployment of unattended ground nanosensors operationally feasible in terms of energy, communications for both arbitrated and self-organizing distributed, collective behaviors. A number of nano communications technologies are already making network-centric systems possible for MicroElectrical Mechanical (MEM) sensor devices today. Similar technologies may make NanoElectrical Mechanical (NEM) sensor devices operationally feasible a few years from now. Just as organizational behaviors of large numbers of nanodevices can derive strategies from social insects and other group-oriented animals, bio-inspired heuristics for threat assessment provide a conceptual approach for successful integration of nanosensors into unattended smart sensor networks. Biological models such as the organization of social insects or the dynamics of immune systems show promise as biologically-inspired paradigms for protecting nanosensor networks for security scene analysis and battlespace awareness. The paradox of nanosensors is that the smaller the device is the more useful it is but the smaller it is the more vulnerable it is to a variety of threats. In other words simpler means networked nanosensors are more likely to fall prey to a wide-range of attacks including jamming, spoofing, Janisserian recruitment, Pied-Piper distraction, as well as typical attacks computer network security. Thus, unattended sensor technologies call for network architectures that include security and countermeasures to provide reliable scene analysis or battlespace awareness information. Such network centric architectures may well draw upon a variety of bio-inspired approaches to safeguard, validate and make sense of large quantities of information.

  4. PF120916 Piecki fireball and Reszel meteorite fall

    NASA Astrophysics Data System (ADS)

    Olech, A.; Żołądek, P.; Tymiński, Z.; Stolarz, M.; Wiśniewski, M.; Bęben, M.; Lewandowski, T.; Polak, K.; Raj, A.; Zaręba, P.

    2017-06-01

    On September 12, 2016, at 21:44:07 UT, a -9.2±0.5 mag fireball appeared over northeastern Poland. The precise orbit and atmospheric trajectory of the event are presented, based on the data collected by six video stations of the Polish Fireball Network (PFN). The PF120916 Piecki fireball entered the Earth's atmosphere with the velocity of 16.7±0.3 km/s and started to shine at a height of 81.9 ± 0.3 km. Clear deceleration started after first three seconds of the flight, and the terminal velocity of the meteor was only 5.0±0.3 km/s at a height of 26.0 ± 0.2 km. Such a low value of the terminal velocity indicates that fragments with the total mass of around 10-15 kg could survive the atmospheric passage and cause fall of the meteorites. The predicted area of possible meteorite impact is computed and it is located south of Reszel city at the Warmian-Masurian region. The impact area was extensively searched by experienced groups of meteorite hunters, but without any success.

  5. An overview of natural hazard impacts to railways and urban transportation systems

    NASA Astrophysics Data System (ADS)

    Bíl, Michal; Nezval, Vojtěch; Bílová, Martina; Andrášik, Richard; Kubeček, Jan

    2017-04-01

    We present an overview and two case studies of natural hazard impacts on rail transportation systems in the Czech Republic. Flooding, landsliding, heavy snowfall, windstorms and glaze (black ice) are the most common natural processes which occur in this region. Whereas flooding and landsliding usually cause direct damage to the transportation infrastructure, other hazards predominantly cause indirect losses. Railway and urban tramline networks are almost fully dependent on electricity which is provided by a system of overhead lines (electric lines above the tracks). These lines are extremely susceptible to formation of glaze which blocks conduction of electric current. A December 2014 glaze event caused significant indirect losses in the largest Czech cities and railways due to the above-mentioned process. Details of this event will be provided during the presentation. Windstorms usually cause tree falls which can affect overhead lines and physically block railway tracks. Approximately 30 % of the Czech railway network is closer than 50 m from the nearest forest. This presents significant potential for transport interruption due to falling trees. Complicated legal relations among the owners of the plots of land along railways, the environment (full-grown trees and related habitat), and the railway administrator are behind many traffic interruptions due to falling trees. We have registered 2040 tree falls between 2012 and 2015 on the railway network. A model of the fallen tree hazard was created for the entire Czech railway network. Both above-mentioned case studies provide illustrative examples of the increased fragility of the modern transportation systems which fully rely on electricity. Natural processes with a low destructive power are thereby able to cause network wide service cut-offs.

  6. A system for ubiquitous fall monitoring at home via a wireless sensor network.

    PubMed

    Fernandez-Luque, Francisco J; Zapata, Juan; Ruiz, Ramon

    2010-01-01

    Accidental falls of our elderly, and physical injuries resulting, represent a major health and economic. Falls are the most common causes of serious injuries and a major health threats in the stratum of older population. Early detection of a fall is a key factor when trying to provide adequate care to the elderly person who has suffered an accident at home. In this paper, we present a support system for detecting falls of an elder person by a static wireless nonintrusive sensorial infrastructure based on heterogenous sensor nodes. This previous infrastructure, named AID (Alarm Intelligent Device), is an AAL (Ambient Assisted Living) system that allows to infer a potential fall. We have developed, different to other contributions, a specific low-power multi-hop network consists of nodes (Motes) that wirelessly communicate to each other and are capable of hopping radio messages to a base station where they are passed to a PC (or other possible client). The goal of this project is 1) to provide alerts to caregivers in the event of an accident, acute illness or strange (possibly dangerous) activities, and 2) to enable that authorized and authenticated caregivers by means of a itinerant wearable mote can be inserted into mesh and interact with it. In this paper, we describe an ubiquitous assistential monitoring system at home.

  7. Cascades in multiplex financial networks with debts of different seniority

    NASA Astrophysics Data System (ADS)

    Brummitt, Charles D.; Kobayashi, Teruyoshi

    2015-06-01

    The seniority of debt, which determines the order in which a bankrupt institution repays its debts, is an important and sometimes contentious feature of financial crises, yet its impact on systemwide stability is not well understood. We capture seniority of debt in a multiplex network, a graph of nodes connected by multiple types of edges. Here an edge between banks denotes a debt contract of a certain level of seniority. Next we study cascading default. There exist multiple kinds of bankruptcy, indexed by the highest level of seniority at which a bank cannot repay all its debts. Self-interested banks would prefer that all their loans be made at the most senior level. However, mixing debts of different seniority levels makes the system more stable in that it shrinks the set of network densities for which bankruptcies spread widely. We compute the optimal ratio of senior to junior debts, which we call the optimal seniority ratio, for two uncorrelated Erdős-Rényi networks. If institutions erode their buffer against insolvency, then this optimal seniority ratio rises; in other words, if default thresholds fall, then more loans should be senior. We generalize the analytical results to arbitrarily many levels of seniority and to heavy-tailed degree distributions.

  8. Cascades in multiplex financial networks with debts of different seniority.

    PubMed

    Brummitt, Charles D; Kobayashi, Teruyoshi

    2015-06-01

    The seniority of debt, which determines the order in which a bankrupt institution repays its debts, is an important and sometimes contentious feature of financial crises, yet its impact on systemwide stability is not well understood. We capture seniority of debt in a multiplex network, a graph of nodes connected by multiple types of edges. Here an edge between banks denotes a debt contract of a certain level of seniority. Next we study cascading default. There exist multiple kinds of bankruptcy, indexed by the highest level of seniority at which a bank cannot repay all its debts. Self-interested banks would prefer that all their loans be made at the most senior level. However, mixing debts of different seniority levels makes the system more stable in that it shrinks the set of network densities for which bankruptcies spread widely. We compute the optimal ratio of senior to junior debts, which we call the optimal seniority ratio, for two uncorrelated Erdős-Rényi networks. If institutions erode their buffer against insolvency, then this optimal seniority ratio rises; in other words, if default thresholds fall, then more loans should be senior. We generalize the analytical results to arbitrarily many levels of seniority and to heavy-tailed degree distributions.

  9. Probing embryonic tissue mechanics with laser hole drilling

    NASA Astrophysics Data System (ADS)

    Ma, Xiaoyan; Lynch, Holley E.; Scully, Peter C.; Hutson, M. Shane

    2009-09-01

    We use laser hole drilling to assess the mechanics of an embryonic epithelium during development—in vivo and with subcellular resolution. We ablate a subcellular cylindrical hole clean through the epithelium and track the subsequent recoil of adjacent cells (on ms time scales). We investigate dorsal closure in the fruit fly with emphasis on apical constriction of amnioserosa cells. The mechanical behavior of this epithelium falls between that of a continuous sheet and a 2D cellular foam (a network of tensile interfaces). Tensile stress is carried both by cell-cell interfaces and by the cells' apical actin networks. Our results show that stress is slightly concentrated along interfaces (1.6-fold), but only in early closure. Furthermore, closure is marked by a decrease in the recoil power-law exponent, implying a transition to a more solid-like tissue. We use the site and stage dependence of the recoil kinetics to constrain how the cellular mechanics change during closure. We apply these results to test extant computational models.

  10. Experiments Using Cell Phones in Physics Classroom Education: The Computer-Aided "g" Determination

    ERIC Educational Resources Information Center

    Vogt, Patrik; Kuhn, Jochen; Muller, Sebastian

    2011-01-01

    This paper continues the collection of experiments that describe the use of cell phones as experimental tools in physics classroom education. We describe a computer-aided determination of the free-fall acceleration "g" using the acoustical Doppler effect. The Doppler shift is a function of the speed of the source. Since a free-falling objects…

  11. The Fall River Long-Term Site Productivity study in coastal Washington: site characteristics, methods, and biomass and carbon and nitrogen stores before and after harvest.

    Treesearch

    Adrian Ares; Thomas A. Terry; Kathryn B. Piatek; Robert B. Harrison; Richard E. Miller; Barry L. Flaming; ChristopherW Licata; Brian D. Strahm; Constance A. Harrington; Rodney Meade; Harry W. Anderson; Leslie C. Brodie; Joseph M. Kraft

    2007-01-01

    The Fall River research site in coastal Washington is an affiliate installation of the North American Long-Term Soil Productivity (LTSP) network, which constitutes one of the world’s largest coordinated research programs addressing forest management impacts on sustained productivity. Overall goals of the Fall River study are to assess effects of biomass removals, soil...

  12. Things fall apart: biological species form unconnected parsimony networks.

    PubMed

    Hart, Michael W; Sunday, Jennifer

    2007-10-22

    The generality of operational species definitions is limited by problematic definitions of between-species divergence. A recent phylogenetic species concept based on a simple objective measure of statistically significant genetic differentiation uses between-species application of statistical parsimony networks that are typically used for population genetic analysis within species. Here we review recent phylogeographic studies and reanalyse several mtDNA barcoding studies using this method. We found that (i) alignments of DNA sequences typically fall apart into a separate subnetwork for each Linnean species (but with a higher rate of true positives for mtDNA data) and (ii) DNA sequences from single species typically stick together in a single haplotype network. Departures from these patterns are usually consistent with hybridization or cryptic species diversity.

  13. Irrigation-water quality during 1976 irrigation season in the Sulphur Creek basin, Yakima and Benton counties, Washington

    USGS Publications Warehouse

    Boucher, P.R.; Fretwell, M.O.

    1982-01-01

    A water-quality-sampling network was designed for the Sulphur Creek basin to observe the effects of farming practices on irrigation. Sediment and nutrient yield, discharge, and water temperature data were collected during the 1976 irrigation season and the following fall and winter. The suspended-sediment yield of the basin during this period was 2.0 tons per acre of irrigated cropland. Only about 3% of the net outflow of sediment occurred during the nonirrigation season. The yield computed by subbasin ranged from 0.7 to 7 tons per acre, depending mainly on land slope, but a high percentage of orchard land in the subbasins was probably also significant in reducing loads. Nutrient outflows during the study period were 1,180,000 pounds of nitrogen and 120,000 pounds of phosphorous. Nitrate-plus-nitrite represent 70% of the nitrogen outflow in the irrigation season and 84% in the nonirrigation season. The monitoring network was discontinued at the end of the study period, due largely to insufficient farmer participation. Network sensitivity in the control subbasins was inadequate to detect the effects of a planned demonstration program of best management practices. (USGS)

  14. Scada Malware, a Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such complex critical systems. Of particular interest are the set of vulnerabilities related to the class of communication protocols normally known as “SCADA” protocols, under which fall all the communication protocols used to remotely control the RTU devices of an industrial system. In this paper we present a proof of concept of the potential effects of a set of computer malware specifically designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.

  15. Falls Risk Prediction for Older Inpatients in Acute Care Medical Wards: Is There an Interest to Combine an Early Nurse Assessment and the Artificial Neural Network Analysis?

    PubMed

    Beauchet, O; Noublanche, F; Simon, R; Sekhon, H; Chabot, J; Levinoff, E J; Kabeshova, A; Launay, C P

    2018-01-01

    Identification of the risk of falls is important among older inpatients. This study aims to examine performance criteria (i.e.; sensitivity, specificity, positive predictive value, negative predictive value and accuracy) for fall prediction resulting from a nurse assessment and an artificial neural networks (ANNs) analysis in older inpatients hospitalized in acute care medical wards. A total of 848 older inpatients (mean age, 83.0±7.2 years; 41.8% female) admitted to acute care medical wards in Angers University hospital (France) were included in this study using an observational prospective cohort design. Within 24 hours after admission of older inpatients, nurses performed a bedside clinical assessment. Participants were separated into non-fallers and fallers (i.e.; ≥1 fall during hospitalization stay). The analysis was conducted using three feed forward ANNs (multilayer perceptron [MLP], averaged neural network, and neuroevolution of augmenting topologies [NEAT]). Seventy-three (8.6%) participants fell at least once during their hospital stay. ANNs showed a high specificity, regardless of which ANN was used, and the highest value reported was with MLP (99.8%). In contrast, sensitivity was lower, with values ranging between 98.4 to 14.8%. MLP had the highest accuracy (99.7). Performance criteria for fall prediction resulting from a bedside nursing assessment and an ANNs analysis was associated with a high specificity but a low sensitivity, suggesting that this combined approach should be used more as a diagnostic test than a screening test when considering older inpatients in acute care medical ward.

  16. Survey on fall detection and fall prevention using wearable and external sensors.

    PubMed

    Delahoz, Yueng Santiago; Labrador, Miguel Angel

    2014-10-22

    According to nihseniorhealth.gov (a website for older adults), falling represents a great threat as people get older, and providing mechanisms to detect and prevent falls is critical to improve people's lives. Over 1.6 million U.S. adults are treated for fall-related injuries in emergency rooms every year suffering fractures, loss of independence, and even death. It is clear then, that this problem must be addressed in a prompt manner, and the use of pervasive computing plays a key role to achieve this. Fall detection (FD) and fall prevention (FP) are research areas that have been active for over a decade, and they both strive for improving people's lives through the use of pervasive computing. This paper surveys the state of the art in FD and FP systems, including qualitative comparisons among various studies. It aims to serve as a point of reference for future research on the mentioned systems. A general description of FD and FP systems is provided, including the different types of sensors used in both approaches. Challenges and current solutions are presented and described in great detail. A 3-level taxonomy associated with the risk factors of a fall is proposed. Finally, cutting edge FD and FP systems are thoroughly reviewed and qualitatively compared, in terms of design issues and other parameters.

  17. Analysis of Android Device-Based Solutions for Fall Detection

    PubMed Central

    Casilari, Eduardo; Luque, Rafael; Morón, María-José

    2015-01-01

    Falls are a major cause of health and psychological problems as well as hospitalization costs among older adults. Thus, the investigation on automatic Fall Detection Systems (FDSs) has received special attention from the research community during the last decade. In this area, the widespread popularity, decreasing price, computing capabilities, built-in sensors and multiplicity of wireless interfaces of Android-based devices (especially smartphones) have fostered the adoption of this technology to deploy wearable and inexpensive architectures for fall detection. This paper presents a critical and thorough analysis of those existing fall detection systems that are based on Android devices. The review systematically classifies and compares the proposals of the literature taking into account different criteria such as the system architecture, the employed sensors, the detection algorithm or the response in case of a fall alarms. The study emphasizes the analysis of the evaluation methods that are employed to assess the effectiveness of the detection process. The review reveals the complete lack of a reference framework to validate and compare the proposals. In addition, the study also shows that most research works do not evaluate the actual applicability of the Android devices (with limited battery and computing resources) to fall detection solutions. PMID:26213928

  18. Analysis of Android Device-Based Solutions for Fall Detection.

    PubMed

    Casilari, Eduardo; Luque, Rafael; Morón, María-José

    2015-07-23

    Falls are a major cause of health and psychological problems as well as hospitalization costs among older adults. Thus, the investigation on automatic Fall Detection Systems (FDSs) has received special attention from the research community during the last decade. In this area, the widespread popularity, decreasing price, computing capabilities, built-in sensors and multiplicity of wireless interfaces of Android-based devices (especially smartphones) have fostered the adoption of this technology to deploy wearable and inexpensive architectures for fall detection. This paper presents a critical and thorough analysis of those existing fall detection systems that are based on Android devices. The review systematically classifies and compares the proposals of the literature taking into account different criteria such as the system architecture, the employed sensors, the detection algorithm or the response in case of a fall alarms. The study emphasizes the analysis of the evaluation methods that are employed to assess the effectiveness of the detection process. The review reveals the complete lack of a reference framework to validate and compare the proposals. In addition, the study also shows that most research works do not evaluate the actual applicability of the Android devices (with limited battery and computing resources) to fall detection solutions.

  19. Information-Theoretic Performance Analysis of Sensor Networks via Markov Modeling of Time Series Data.

    PubMed

    Li, Yue; Jha, Devesh K; Ray, Asok; Wettergren, Thomas A; Yue Li; Jha, Devesh K; Ray, Asok; Wettergren, Thomas A; Wettergren, Thomas A; Li, Yue; Ray, Asok; Jha, Devesh K

    2018-06-01

    This paper presents information-theoretic performance analysis of passive sensor networks for detection of moving targets. The proposed method falls largely under the category of data-level information fusion in sensor networks. To this end, a measure of information contribution for sensors is formulated in a symbolic dynamics framework. The network information state is approximately represented as the largest principal component of the time series collected across the network. To quantify each sensor's contribution for generation of the information content, Markov machine models as well as x-Markov (pronounced as cross-Markov) machine models, conditioned on the network information state, are constructed; the difference between the conditional entropies of these machines is then treated as an approximate measure of information contribution by the respective sensors. The x-Markov models represent the conditional temporal statistics given the network information state. The proposed method has been validated on experimental data collected from a local area network of passive sensors for target detection, where the statistical characteristics of environmental disturbances are similar to those of the target signal in the sense of time scale and texture. A distinctive feature of the proposed algorithm is that the network decisions are independent of the behavior and identity of the individual sensors, which is desirable from computational perspectives. Results are presented to demonstrate the proposed method's efficacy to correctly identify the presence of a target with very low false-alarm rates. The performance of the underlying algorithm is compared with that of a recent data-driven, feature-level information fusion algorithm. It is shown that the proposed algorithm outperforms the other algorithm.

  20. Classroom Peer Relationships and Behavioral Engagement in Elementary School: The Role of Social Network Equity

    PubMed Central

    Cappella, Elise; Kim, Ha Yeon; Neal, Jennifer W.; Jackson, Daisy R.

    2014-01-01

    Applying social capital and systems theories of social processes, we examine the role of the classroom peer context in the behavioral engagement of low-income students (N = 80) in urban elementary school classrooms (N = 22). Systematic child observations were conducted to assess behavioral engagement among second to fifth graders in the fall and spring of the same school year. Classroom observations, teacher and child questionnaires, and social network data were collected in the fall. Confirming prior research, results from multilevel models indicate that students with more behavioral difficulties or less academic motivation in the fall were less behaviorally engaged in the spring. Extending prior research, classrooms with more equitably distributed and interconnected social ties—social network equity—had more behaviorally engaged students in the spring, especially in classrooms with higher levels of observed organization (i.e., effective management of behavior, time, and attention). Moreover, social network equity attenuated the negative relation between student behavioral difficulties and behavioral engagement, suggesting that students with behavioral difficulties were less disengaged in classrooms with more equitably distributed and interconnected social ties. Findings illuminate the need to consider classroom peer contexts in future research and intervention focused on the behavioral engagement of students in urban elementary schools. PMID:24081319

  1. Bayesian analysis of stage-fall-discharge rating curves and their uncertainties

    NASA Astrophysics Data System (ADS)

    Mansanarez, V.; Le Coz, J.; Renard, B.; Lang, M.; Pierrefeu, G.; Vauchel, P.

    2016-09-01

    Stage-fall-discharge (SFD) rating curves are traditionally used to compute streamflow records at sites where the energy slope of the flow is variable due to variable backwater effects. We introduce a model with hydraulically interpretable parameters for estimating SFD rating curves and their uncertainties. Conventional power functions for channel and section controls are used. The transition to a backwater-affected channel control is computed based on a continuity condition, solved either analytically or numerically. The practical use of the method is demonstrated with two real twin-gauge stations, the Rhône River at Valence, France, and the Guthusbekken stream at station 0003ṡ0033, Norway. Those stations are typical of a channel control and a section control, respectively, when backwater-unaffected conditions apply. The performance of the method is investigated through sensitivity analysis to prior information on controls and to observations (i.e., available gaugings) for the station of Valence. These analyses suggest that precisely identifying SFD rating curves requires adapted gauging strategy and/or informative priors. The Madeira River, one of the largest tributaries of the Amazon, provides a challenging case typical of large, flat, tropical river networks where bed roughness can also be variable in addition to slope. In this case, the difference in staff gauge reference levels must be estimated as another uncertain parameter of the SFD model. The proposed Bayesian method is a valuable alternative solution to the graphical and empirical techniques still proposed in hydrometry guidance and standards.

  2. Class Size, School Size and the Size of the School Network

    ERIC Educational Resources Information Center

    Coupé, Tom; Olefir, Anna; Alonso, Juan Diego

    2016-01-01

    In many transition countries, including Ukraine, decreases in population and fertility have led to substantial falls in the number of school-aged children. As a consequence, these countries now have school networks that consist of many small schools, leading many countries to consider reorganizing their networks by closing smaller schools and…

  3. Massively Open Online Course for Educators (MOOC-Ed) Network Dataset

    ERIC Educational Resources Information Center

    Kellogg, Shaun; Edelmann, Achim

    2015-01-01

    This paper presents the Massively Open Online Course for Educators (MOOC-Ed) network dataset. It entails information on two online communication networks resulting from two consecutive offerings of the MOOC called "The Digital Learning Transition in K-12 Schools" in spring and fall 2013. The courses were offered to educators from the USA…

  4. Can we make a carpet smart enough to detect falls?

    PubMed

    Muheidat, Fadi; Tyrer, Harry W

    2016-08-01

    In this paper, we have enhanced smart carpet, which is a floor based personnel detector system, to detect falls using a faster but low cost processor. Our hardware front end reads 128 sensors, with sensors output a voltage due to a person walking or falling on the carpet. The processor is Jetson TK1, which provides more computing power than before. We generated a dataset with volunteers who walked and fell to test our algorithms. Data obtained allowed examining data frames (a frame is a single scan of the carpet sensors) read from the data acquisition system. We used different algorithms and techniques, and varied the windows size of number of frames (WS ≥ 1) and threshold (TH) to build our data set, which later used machine learning to help decide a fall or no fall. We then used the dataset obtained from applying a set of fall detection algorithms and the video recorded for the fall pattern experiments to train a set of classifiers using multiple test options using the Weka framework. We measured the sensitivity and specificity of the system and other metrics for intelligent detection of falls. Results showed that Computational Intelligence techniques detect falls with 96.2% accuracy and 81% sensitivity and 97.8% specificity. In addition to fall detection, we developed a database system and web applications to retain these data for years. We can display this data in realtime and for all activities in the carpet for extensive data analysis any time in the future.

  5. Providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOEpatents

    Archer, Charles J; Faraj, Ahmad A; Inglett, Todd A; Ratterman, Joseph D

    2013-04-16

    Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selected link to the adjacent compute node connected to the compute node through the selected link.

  6. Evaluating the effectiveness of a home-based exercise programme delivered through a tablet computer for preventing falls in older community-dwelling people over 2 years: study protocol for the Standing Tall randomised controlled trial

    PubMed Central

    Delbaere, K; Valenzuela, T; Woodbury, A; Davies, T; Yeong, J; Steffens, D; Miles, L; Pickett, L; Zijlstra, G A R; Clemson, L; Close, J C T; Howard, K; Lord, S R

    2015-01-01

    Introduction In order to prevent falls, older people should exercise for at least 2 h per week for 6 months, with a strong focus on balance exercises. This article describes the design of a randomised controlled trial to evaluate the effectiveness of a home-based exercise programme delivered through a tablet computer to prevent falls in older people. Methods and analysis Participants aged 70 years or older, living in the community in Sydney will be recruited and randomly allocated to an intervention or control group. The intervention consists of a tailored, home-based balance training delivered through a tablet computer. Intervention participants will be asked to complete 2 h of exercises per week for 2 years. Both groups will receive an education programme focused on health-related information relevant to older adults, delivered through the tablet computer via weekly fact sheets. Primary outcome measures include number of fallers and falls rate recorded in weekly fall diaries at 12 months. A sample size of 500 will be necessary to see an effect on falls rate. Secondary outcome measures include concern about falling, depressive symptoms, health-related quality of life and physical activity levels (in all 500 participants); and physiological fall risk, balance, functional mobility, gait, stepping and cognitive performance (in a subsample of 200 participants). Adherence, acceptability, usability and enjoyment will be recorded in intervention group participants over 2 years. Data will be analysed using the intention-to-treat principle. Secondary analyses are planned in people with greater adherence. Economic analyses will be assessed from a health and community care provider perspective. Ethics and dissemination Ethical approval was obtained from UNSW Ethics Committee in December 2014 (ref number HC#14/266). Outcomes will be disseminated through publication in peer-reviewed journals and presentations at international conferences. Trial registration number Australian New Zealand Clinical Trials Registry (ACTRN)12615000138583. PMID:26493461

  7. Evaluating the effectiveness of a home-based exercise programme delivered through a tablet computer for preventing falls in older community-dwelling people over 2 years: study protocol for the Standing Tall randomised controlled trial.

    PubMed

    Delbaere, K; Valenzuela, T; Woodbury, A; Davies, T; Yeong, J; Steffens, D; Miles, L; Pickett, L; Zijlstra, G A R; Clemson, L; Close, J C T; Howard, K; Lord, S R

    2015-10-22

    In order to prevent falls, older people should exercise for at least 2 h per week for 6 months, with a strong focus on balance exercises. This article describes the design of a randomised controlled trial to evaluate the effectiveness of a home-based exercise programme delivered through a tablet computer to prevent falls in older people. Participants aged 70 years or older, living in the community in Sydney will be recruited and randomly allocated to an intervention or control group. The intervention consists of a tailored, home-based balance training delivered through a tablet computer. Intervention participants will be asked to complete 2 h of exercises per week for 2 years. Both groups will receive an education programme focused on health-related information relevant to older adults, delivered through the tablet computer via weekly fact sheets. Primary outcome measures include number of fallers and falls rate recorded in weekly fall diaries at 12 months. A sample size of 500 will be necessary to see an effect on falls rate. Secondary outcome measures include concern about falling, depressive symptoms, health-related quality of life and physical activity levels (in all 500 participants); and physiological fall risk, balance, functional mobility, gait, stepping and cognitive performance (in a subsample of 200 participants). Adherence, acceptability, usability and enjoyment will be recorded in intervention group participants over 2 years. Data will be analysed using the intention-to-treat principle. Secondary analyses are planned in people with greater adherence. Economic analyses will be assessed from a health and community care provider perspective. Ethical approval was obtained from UNSW Ethics Committee in December 2014 (ref number HC#14/266). Outcomes will be disseminated through publication in peer-reviewed journals and presentations at international conferences. Australian New Zealand Clinical Trials Registry (ACTRN)12615000138583. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  8. VLSI synthesis of digital application specific neural networks

    NASA Technical Reports Server (NTRS)

    Beagles, Grant; Winters, Kel

    1991-01-01

    Neural networks tend to fall into two general categories: (1) software simulations, or (2) custom hardware that must be trained. The scope of this project is the merger of these two classifications into a system whereby a software model of a network is trained to perform a specific task and the results used to synthesize a standard cell realization of the network using automated tools.

  9. Providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Archer, Charles J.; Faraj, Daniel A.; Inglett, Todd A.

    Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selectedmore » link to the adjacent compute node connected to the compute node through the selected link.« less

  10. General view to northnortheast, troposhperic scatter communications antennas to left, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    General view to north-northeast, troposhperic scatter communications antennas to left, receiver building and garage in center, antenna array to right, helipad in foreground. - Over-the-Horizon Backscatter Radar Network, Columbia Falls Radar Site Receive Sector One Communications Antennas, At the end of Shadagee Ridge Road, Columbia Falls, Washington County, ME

  11. Folksong in the Classroom: Volume X. Fall 1989-Spring 1990.

    ERIC Educational Resources Information Center

    Scott, John W., Ed.; Laurence I., Ed.

    1990-01-01

    Volume 10 of "Folksong in the Classroom," the newsletter of a network of teachers of history, literature, music, and the humanities, is presented. Issue 1 from Fall 1989 is devoted to "How to Get Your Students Singing." Issue 2 from Winter 1990 features "People with Special Needs--Especially the Need for Song." Issue…

  12. Unsupervised machine-learning method for improving the performance of ambulatory fall-detection systems

    PubMed Central

    2012-01-01

    Background Falls can cause trauma, disability and death among older people. Ambulatory accelerometer devices are currently capable of detecting falls in a controlled environment. However, research suggests that most current approaches can tend to have insufficient sensitivity and specificity in non-laboratory environments, in part because impacts can be experienced as part of ordinary daily living activities. Method We used a waist-worn wireless tri-axial accelerometer combined with digital signal processing, clustering and neural network classifiers. The method includes the application of Discrete Wavelet Transform, Regrouping Particle Swarm Optimization, Gaussian Distribution of Clustered Knowledge and an ensemble of classifiers including a multilayer perceptron and Augmented Radial Basis Function (ARBF) neural networks. Results Preliminary testing with 8 healthy individuals in a home environment yields 98.6% sensitivity to falls and 99.6% specificity for routine Activities of Daily Living (ADL) data. Single ARB and MLP classifiers were compared with a combined classifier. The combined classifier offers the greatest sensitivity, with a slight reduction in specificity for routine ADL and an increased specificity for exercise activities. In preliminary tests, the approach achieves 100% sensitivity on in-group falls, 97.65% on out-group falls, 99.33% specificity on routine ADL, and 96.59% specificity on exercise ADL. Conclusion The pre-processing and feature-extraction steps appear to simplify the signal while successfully extracting the essential features that are required to characterize a fall. The results suggest this combination of classifiers can perform better than MLP alone. Preliminary testing suggests these methods may be useful for researchers who are attempting to improve the performance of ambulatory fall-detection systems. PMID:22336100

  13. An Event-Triggered Machine Learning Approach for Accelerometer-Based Fall Detection.

    PubMed

    Putra, I Putu Edy Suardiyana; Brusey, James; Gaura, Elena; Vesilo, Rein

    2017-12-22

    The fixed-size non-overlapping sliding window (FNSW) and fixed-size overlapping sliding window (FOSW) approaches are the most commonly used data-segmentation techniques in machine learning-based fall detection using accelerometer sensors. However, these techniques do not segment by fall stages (pre-impact, impact, and post-impact) and thus useful information is lost, which may reduce the detection rate of the classifier. Aligning the segment with the fall stage is difficult, as the segment size varies. We propose an event-triggered machine learning (EvenT-ML) approach that aligns each fall stage so that the characteristic features of the fall stages are more easily recognized. To evaluate our approach, two publicly accessible datasets were used. Classification and regression tree (CART), k -nearest neighbor ( k -NN), logistic regression (LR), and the support vector machine (SVM) were used to train the classifiers. EvenT-ML gives classifier F-scores of 98% for a chest-worn sensor and 92% for a waist-worn sensor, and significantly reduces the computational cost compared with the FNSW- and FOSW-based approaches, with reductions of up to 8-fold and 78-fold, respectively. EvenT-ML achieves a significantly better F-score than existing fall detection approaches. These results indicate that aligning feature segments with fall stages significantly increases the detection rate and reduces the computational cost.

  14. Survey on Fall Detection and Fall Prevention Using Wearable and External Sensors

    PubMed Central

    Delahoz, Yueng Santiago; Labrador, Miguel Angel

    2014-01-01

    According to nihseniorhealth.gov (a website for older adults), falling represents a great threat as people get older, and providing mechanisms to detect and prevent falls is critical to improve people's lives. Over 1.6 million U.S. adults are treated for fall-related injuries in emergency rooms every year suffering fractures, loss of independence, and even death. It is clear then, that this problem must be addressed in a prompt manner, and the use of pervasive computing plays a key role to achieve this. Fall detection (FD) and fall prevention (FP) are research areas that have been active for over a decade, and they both strive for improving people's lives through the use of pervasive computing. This paper surveys the state of the art in FD and FP systems, including qualitative comparisons among various studies. It aims to serve as a point of reference for future research on the mentioned systems. A general description of FD and FP systems is provided, including the different types of sensors used in both approaches. Challenges and current solutions are presented and described in great detail. A 3-level taxonomy associated with the risk factors of a fall is proposed. Finally, cutting edge FD and FP systems are thoroughly reviewed and qualitatively compared, in terms of design issues and other parameters. PMID:25340452

  15. Does smart home technology prevent falls in community-dwelling older adults: a literature review.

    PubMed

    Pietrzak, Eva; Cotea, Cristina; Pullman, Stephen

    2014-01-01

    Falls in older Australians are an increasingly costly public health issue, driving the development of novel modes of intervention, especially those that rely on computer-driven technologies. The aim of this paper was to gain an understanding of the state of the art of research on smart homes and computer-based monitoring technologies to prevent and detect falls in the community-dwelling elderly. Cochrane, Medline, Embase and Google databases were searched for articles on fall prevention in the elderly using pre-specified search terms. Additional papers were searched for in the reference lists of relevant reviews and by the process of 'snowballing'. Only studies that investigated outcomes related to falling such as fall prevention and detection, change in participants' fear of falling and attitudes towards monitoring technology were included. Nine papers fulfilled the inclusion criteria. The following outcomes were observed: (1) older adults' attitudes towards fall detectors and smart home technology are generally positive; (2) privacy concerns and intrusiveness of technology were perceived as less important to participants than their perception of health needs and (3) unfriendly and age-inappropriate design of the interface may be one of the deciding factors in not using the technology. So far, there is little evidence that using smart home technology may assist in fall prevention or detection, but there are some indications that it may increase older adults' confidence and sense of security, thus possibly enabling aging in place.

  16. Accelerometer and Camera-Based Strategy for Improved Human Fall Detection.

    PubMed

    Zerrouki, Nabil; Harrou, Fouzi; Sun, Ying; Houacine, Amrane

    2016-12-01

    In this paper, we address the problem of detecting human falls using anomaly detection. Detection and classification of falls are based on accelerometric data and variations in human silhouette shape. First, we use the exponentially weighted moving average (EWMA) monitoring scheme to detect a potential fall in the accelerometric data. We used an EWMA to identify features that correspond with a particular type of fall allowing us to classify falls. Only features corresponding with detected falls were used in the classification phase. A benefit of using a subset of the original data to design classification models minimizes training time and simplifies models. Based on features corresponding to detected falls, we used the support vector machine (SVM) algorithm to distinguish between true falls and fall-like events. We apply this strategy to the publicly available fall detection databases from the university of Rzeszow's. Results indicated that our strategy accurately detected and classified fall events, suggesting its potential application to early alert mechanisms in the event of fall situations and its capability for classification of detected falls. Comparison of the classification results using the EWMA-based SVM classifier method with those achieved using three commonly used machine learning classifiers, neural network, K-nearest neighbor and naïve Bayes, proved our model superior.

  17. Students fall for Fall Meeting

    NASA Astrophysics Data System (ADS)

    Smedley, Kara

    2012-02-01

    From Boston to Beijing, thousands of students traveled to San Francisco for the 2011 AGU Fall Meeting. Of those who participated, 183 students were able to attend thanks to AGU's student travel grant program, which assists students with travel costs and seeks to enrich the meeting through ethnic and gender diversity. Students at Fall Meeting enjoyed a variety of programs and activities designed to help them better network with their peers, learn about new fields, and disseminate their research to the interested public. More than 800 students attended AGU's first annual student mixer, sharing drinks and ideas with fellow student members and future colleagues as well as forging new friendships and intellectual relationships.

  18. Non-harmful insertion of data mimicking computer network attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  19. Transient PVT measurements and model predictions for vessel heat transfer. Part II.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Felver, Todd G.; Paradiso, Nicholas Joseph; Winters, William S., Jr.

    2010-07-01

    Part I of this report focused on the acquisition and presentation of transient PVT data sets that can be used to validate gas transfer models. Here in Part II we focus primarily on describing models and validating these models using the data sets. Our models are intended to describe the high speed transport of compressible gases in arbitrary arrangements of vessels, tubing, valving and flow branches. Our models fall into three categories: (1) network flow models in which flow paths are modeled as one-dimensional flow and vessels are modeled as single control volumes, (2) CFD (Computational Fluid Dynamics) models inmore » which flow in and between vessels is modeled in three dimensions and (3) coupled network/CFD models in which vessels are modeled using CFD and flows between vessels are modeled using a network flow code. In our work we utilized NETFLOW as our network flow code and FUEGO for our CFD code. Since network flow models lack three-dimensional resolution, correlations for heat transfer and tube frictional pressure drop are required to resolve important physics not being captured by the model. Here we describe how vessel heat transfer correlations were improved using the data and present direct model-data comparisons for all tests documented in Part I. Our results show that our network flow models have been substantially improved. The CFD modeling presented here describes the complex nature of vessel heat transfer and for the first time demonstrates that flow and heat transfer in vessels can be modeled directly without the need for correlations.« less

  20. Solving optimization problems on computational grids.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wright, S. J.; Mathematics and Computer Science

    2001-05-01

    Multiprocessor computing platforms, which have become more and more widely available since the mid-1980s, are now heavily used by organizations that need to solve very demanding computational problems. Parallel computing is now central to the culture of many research communities. Novel parallel approaches were developed for global optimization, network optimization, and direct-search methods for nonlinear optimization. Activity was particularly widespread in parallel branch-and-bound approaches for various problems in combinatorial and network optimization. As the cost of personal computers and low-end workstations has continued to fall, while the speed and capacity of processors and networks have increased dramatically, 'cluster' platforms havemore » become popular in many settings. A somewhat different type of parallel computing platform know as a computational grid (alternatively, metacomputer) has arisen in comparatively recent times. Broadly speaking, this term refers not to a multiprocessor with identical processing nodes but rather to a heterogeneous collection of devices that are widely distributed, possibly around the globe. The advantage of such platforms is obvious: they have the potential to deliver enormous computing power. Just as obviously, however, the complexity of grids makes them very difficult to use. The Condor team, headed by Miron Livny at the University of Wisconsin, were among the pioneers in providing infrastructure for grid computations. More recently, the Globus project has developed technologies to support computations on geographically distributed platforms consisting of high-end computers, storage and visualization devices, and other scientific instruments. In 1997, we started the metaneos project as a collaborative effort between optimization specialists and the Condor and Globus groups. Our aim was to address complex, difficult optimization problems in several areas, designing and implementing the algorithms and the software infrastructure need to solve these problems on computational grids. This article describes some of the results we have obtained during the first three years of the metaneos project. Our efforts have led to development of the runtime support library MW for implementing algorithms with master-worker control structure on Condor platforms. This work is discussed here, along with work on algorithms and codes for integer linear programming, the quadratic assignment problem, and stochastic linear programmming. Our experiences in the metaneos project have shown that cheap, powerful computational grids can be used to tackle large optimization problems of various types. In an industrial or commercial setting, the results demonstrate that one may not have to buy powerful computational servers to solve many of the large problems arising in areas such as scheduling, portfolio optimization, or logistics; the idle time on employee workstations (or, at worst, an investment in a modest cluster of PCs) may do the job. For the optimization research community, our results motivate further work on parallel, grid-enabled algorithms for solving very large problems of other types. The fact that very large problems can be solved cheaply allows researchers to better understand issues of 'practical' complexity and of the role of heuristics.« less

  1. Organization of the secure distributed computing based on multi-agent system

    NASA Astrophysics Data System (ADS)

    Khovanskov, Sergey; Rumyantsev, Konstantin; Khovanskova, Vera

    2018-04-01

    Nowadays developing methods for distributed computing is received much attention. One of the methods of distributed computing is using of multi-agent systems. The organization of distributed computing based on the conventional network computers can experience security threats performed by computational processes. Authors have developed the unified agent algorithm of control system of computing network nodes operation. Network PCs is used as computing nodes. The proposed multi-agent control system for the implementation of distributed computing allows in a short time to organize using of the processing power of computers any existing network to solve large-task by creating a distributed computing. Agents based on a computer network can: configure a distributed computing system; to distribute the computational load among computers operated agents; perform optimization distributed computing system according to the computing power of computers on the network. The number of computers connected to the network can be increased by connecting computers to the new computer system, which leads to an increase in overall processing power. Adding multi-agent system in the central agent increases the security of distributed computing. This organization of the distributed computing system reduces the problem solving time and increase fault tolerance (vitality) of computing processes in a changing computing environment (dynamic change of the number of computers on the network). Developed a multi-agent system detects cases of falsification of the results of a distributed system, which may lead to wrong decisions. In addition, the system checks and corrects wrong results.

  2. A study of using smartphone to detect and identify construction workers' near-miss falls based on ANN

    NASA Astrophysics Data System (ADS)

    Zhang, Mingyuan; Cao, Tianzhuo; Zhao, Xuefeng

    2018-03-01

    As an effective fall accident preventive method, insight into near-miss falls provides an efficient solution to find out the causes of fall accidents, classify the type of near-miss falls and control the potential hazards. In this context, the paper proposes a method to detect and identify near-miss falls that occur when a worker walks in a workplace based on artificial neural network (ANN). The energy variation generated by workers who meet with near-miss falls is measured by sensors embedded in smart phone. Two experiments were designed to train the algorithm to identify various types of near-miss falls and test the recognition accuracy, respectively. At last, a test was conducted by workers wearing smart phones as they walked around a simulated construction workplace. The motion data was collected, processed and inputted to the trained ANN to detect and identify near-miss falls. Thresholds were obtained to measure the relationship between near-miss falls and fall accidents in a quantitate way. This approach, which integrates smart phone and ANN, will help detect near-miss fall events, identify hazardous elements and vulnerable workers, providing opportunities to eliminate dangerous conditions in a construction site or to alert possible victims that need to change their behavior before the occurrence of a fall accident.

  3. Developing Computer-Assisted Instruction Multimedia For Educational Technology Course of Coastal Area Students

    NASA Astrophysics Data System (ADS)

    Idris, Husni; Nurhayati, Nurhayati; Satriani, Satriani

    2018-05-01

    This research aims to a) identify instructional software (interactive multimedia CDs) by developing Computer-Assisted Instruction (CAI) multimedia that is eligible to be used in the instruction of the Educational Technology course; b) analysis the role of instructional software (interactive multimedia CDs) on the Educational Technology course through the development of Computer-Assisted Instruction (CAI) multimedia to improve the quality of education and instructional activities. This is Research and Development (R&D). It employed the descriptive procedural model of development, which outlines the steps to be taken to develop a product, which is instructional multimedia. The number of subjects of the research trial or respondents for each stage was 20 people. To maintain development quality, an expert in materials outside the materials under study, an expert in materials who is also a Educational Technology lecturer, a small groupof 3 students, a medium-sized group of 10 students, and 20 students to participate in the field testing took part in this research. Then, data collection instruments were developed in two stages, namely: a) developing the instruments; and b) trying out instruments. Data on students’ responses were collected using questionnaires and analyzed using descriptive statistics with percentage and categorization techniques. Based on data analysis results, it is revealed that the Computer-Assisted Instruction (CAI) multimedia developed and tried out among students during the preliminary field testing falls into the “Good” category, with the aspects of instruction, materials, and media falling into the “Good” category. Subsequently, results of the main field testing among students also suggest that it falls into the “Good” category, with the aspects of instruction, materials, and media falling into the “Good” category. Similarly, results of the operational field testing among students also suggest that it falls into the “Good” category. Thus, it can be concluded that quality of the Computer-Assisted Instruction (CAI) multimedia developed in this research falls into the “Good” category viewed from the aspects of instruction, materials, and media. In other words, overall, the quality of this multimedia belongs to the “Good” category.

  4. Integrated solutions for sustainable fall prevention in primary care, the iSOLVE project: a type 2 hybrid effectiveness-implementation design.

    PubMed

    Clemson, Lindy; Mackenzie, Lynette; Roberts, Chris; Poulos, Roslyn; Tan, Amy; Lovarini, Meryl; Sherrington, Cathie; Simpson, Judy M; Willis, Karen; Lam, Mary; Tiedemann, Anne; Pond, Dimity; Peiris, David; Hilmer, Sarah; Pit, Sabrina Winona; Howard, Kirsten; Lovitt, Lorraine; White, Fiona

    2017-02-07

    Despite strong evidence giving guidance for effective fall prevention interventions in community-residing older people, there is currently no clear model for engaging general medical practitioners in fall prevention and routine use of allied health professionals in fall prevention has been slow, limiting widespread dissemination. This protocol paper outlines an implementation-effectiveness study of the Integrated Solutions for Sustainable Fall Prevention (iSOLVE) intervention which has developed integrated processes and pathways to identify older people at risk of falls and engage a whole of primary care approach to fall prevention. This protocol paper presents the iSOLVE implementation processes and change strategies and outlines the study design of a blended type 2 hybrid design. The study consists of a two-arm cluster randomized controlled trial in 28 general practices and recruiting 560 patients in Sydney, Australia, to evaluate effectiveness of the iSOLVE intervention in changing general practitioner fall management practices and reducing patient falls and the cost effectiveness from a healthcare funder perspective. Secondary outcomes include change in medications known to increase fall risk. We will simultaneously conduct a multi-methodology evaluation to investigate the workability and utility of the implementation intervention. The implementation evaluation includes in-depth interviews and surveys with general practitioners and allied health professionals to explore acceptability and uptake of the intervention, the coherence of the proposed changes for those in the work setting, and how to facilitate the collective action needed to implement changes in practice; social network mapping will explore professional relationships and influences on referral patterns; and, a survey of GPs in the geographical intervention zone will test diffusion of evidence-based fall prevention practices. The project works in partnership with a primary care health network, state fall prevention leaders, and a community of practice of fall prevention advocates. The design is aimed at providing clear direction for sustainability and informing decisions about generalization of the iSOLVE intervention processes and change strategies. While challenges exist in hybrid designs, there is a potential for significant outcomes as the iSOLVE pathways project brings together practice and research to collectively solve a major national problem with implications for policy service delivery. Australian New Zealand Clinial Trials Registry ACTRN12615000401550.

  5. Strategic Studies Quarterly. Volume 6, Number 3. Fall 2012

    DTIC Science & Technology

    2012-01-01

    a particular TOR site, the number of Iranian users on the network drops precipitously. It picks up again after TOR developers announce a workaround...benefit, hence value of the network , is then proportional to the area under the curve or natural log of N (lnN). The increase (decrease) in network ...necessary sensors and automation to strengthen and de­ fend network operations at the scale required for a global industry or military operations

  6. Synaptic connectivity and spatial memory: a topological approach

    NASA Astrophysics Data System (ADS)

    Milton, Russell; Babichev, Andrey; Dabaghian, Yuri

    2015-03-01

    In the hippocampus, a network of place cells generates a cognitive map of space, in which each cell is responsive to a particular area of the environment - its place field. The peak response of each cell and the size of each place field have considerable variability. Experimental evidence suggests that place cells encode a topological map of space that serves as a basis of spatial memory and spatial awareness. Using a computational model based on Persistent Homology Theory we demonstrate that if the parameters of the place cells spiking activity fall inside of the physiological range, the network correctly encodes the topological features of the environment. We next introduce parameters of synaptic connectivity into the model and demonstrate that failures in synapses that detect coincident neuronal activity lead to spatial learning deficiencies similar to the ones that are observed in rodent models of neurodegenerative diseases. Moreover, we show that these learning deficiencies may be mitigated by increasing the number of active cells and/or by increasing their firing rate, suggesting the existence of a compensatory mechanism inherent to the cognitive map.

  7. Line-plane broadcasting in a data communications network of a parallel computer

    DOEpatents

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-06-08

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  8. Line-plane broadcasting in a data communications network of a parallel computer

    DOEpatents

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-11-23

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  9. Computer Education for Engineers, Part III.

    ERIC Educational Resources Information Center

    McCullough, Earl S.; Lofy, Frank J.

    1989-01-01

    Reports the results of the third survey of computer use in engineering education conducted in the fall of 1987 in comparing with 1981 and 1984 results. Summarizes survey data on computer course credits, languages, equipment use, CAD/CAM instruction, faculty access, and computer graphics. (YP)

  10. Remote sensing-based detection and quantification of roadway debris following natural disasters

    NASA Astrophysics Data System (ADS)

    Axel, Colin; van Aardt, Jan A. N.; Aros-Vera, Felipe; Holguín-Veras, José

    2016-05-01

    Rapid knowledge of road network conditions is vital to formulate an efficient emergency response plan following any major disaster. Fallen buildings, immobile vehicles, and other forms of debris often render roads impassable to responders. The status of roadways is generally determined through time and resource heavy methods, such as field surveys and manual interpretation of remotely sensed imagery. Airborne lidar systems provide an alternative, cost-effective option for performing network assessments. The 3D data can be collected quickly over a wide area and provide valuable insight about the geometry and structure of the scene. This paper presents a method for automatically detecting and characterizing debris in roadways using airborne lidar data. Points falling within the road extent are extracted from the point cloud and clustered into individual objects using region growing. Objects are classified as debris or non-debris using surface properties and contextual cues. Debris piles are reconstructed as surfaces using alpha shapes, from which an estimate of debris volume can be computed. Results using real lidar data collected after a natural disaster are presented. Initial results indicate that accurate debris maps can be automatically generated using the proposed method. These debris maps would be an invaluable asset to disaster management and emergency response teams attempting to reach survivors despite a crippled transportation network.

  11. Association of fall history with the Timed Up and Go test score and the dual task cost: A cross-sectional study among independent community-dwelling older adults.

    PubMed

    Asai, Tsuyoshi; Oshima, Kensuke; Fukumoto, Yoshihiro; Yonezawa, Yuri; Matsuo, Asuka; Misu, Shogo

    2018-05-21

    To investigate the associations between fall history and the Timed Up and Go (TUG) test (single-TUG test), TUG test while counting aloud backwards from 100 (dual-TUG test) and the dual-task cost (DTC) among independent community-dwelling older adults. This cross-sectional study included 537 older adults who lived independently in the community. Data on fall history in the previous year were obtained by self-administrated questionnaire. The single- and dual-TUG tests were carried out, and the DTC value was computed from these results. Associations between fall history and these TUG-related values were analyzed using multivariate logistic regression models. The participants were divided into fall risk groups using the cut-off values of those significantly associated with falling, and the odds ratios (OR) were computed. Slower single-TUG test scores and lower DTC values were significantly associated with fall history after adjusting for potential confounders (single-TUG test score: OR 1.133, 95% CI 1.029-1.249; DTC value: OR 0.984, 95% CI 0.968-0.998). Older adults with slower single-TUG test scores and lower DTC values reported a fall history more often than those in other categories (OR compared with the lower-risk single-TUG and lower-risk DTC groups: 3.474, 95% CI 1.881-6.570). Slower single-TUG test scores and lower DTC values are associated with fall history among independent community-dwelling older adults. To some extent, dual task performance might provide added value for fall assessment, compared with administering the TUG test alone. Geriatr Gerontol Int 2018; ••: ••-••. © 2018 Japan Geriatrics Society.

  12. Factors associated with falls among older adults living in institutions

    PubMed Central

    2013-01-01

    Background Falls have enormous impact in older adults. Yet, there is insufficient evidence regarding the effectiveness of preventive interventions in this setting. The objectives were to measure the frequency of falls and associated factors among older people living institutions. Methods Data were obtained from a survey on a probabilistic sample of residents aged ≥65 years, drawn in 1998-99 from institutions of Madrid (Spain). Residents, their caregivers, and facility physicians were interviewed. Fall rates were computed based on the number of physician-reported falls in the preceding 30 days. Adjusted rate ratios were computed using negative binomial regression models, including age, sex, cognitive status, functional dependence, number of diseases, and polypharmacy. Results The final sample comprised 733 residents. The fall rate was 2.4 falls per person-year (95% confidence interval [CI], 2.04-2.82). The strongest risk factor was number of diseases, with an adjusted rate ratio (RR) of 1.32 (95% CI, 1.17-1.50) for each additional diagnosis. Other variables associated with falls were: urinary incontinence (RR = 2.56 [95% CI, 1.32-4.94]); antidepressant use (RR = 2.32 [95% CI, 1.22-4.40]); arrhythmias (RR = 2.00 [95% CI, 1.05-3.81]); and polypharmacy (RR = 1.07 [95% CI, 0.95-1.21], for each additional medication). The attributable fraction for number of diseases (with reference to those with ≤ 1 condition) was 84% (95% CI, 45-95%). Conclusions Number of diseases was the main risk factor for falls in this population of institutionalized older adults. Other variables associated with falls, probably more amenable to preventive action, were urinary incontinence, antidepressants, arrhythmias, and polypharmacy. Virtual slides The virtual slide(s) for this article can be found here: http://www.diagnosticpathology.diagnomx.eu/vs/3916151157277337 PMID:23320746

  13. Integration of fall prevention into state policy in Connecticut.

    PubMed

    Murphy, Terrence E; Baker, Dorothy I; Leo-Summers, Linda S; Bianco, Luann; Gottschalk, Margaret; Acampora, Denise; King, Mary B

    2013-06-01

    To describe the ongoing efforts of the Connecticut Collaboration for Fall Prevention (CCFP) to move evidence regarding fall prevention into clinical practice and state policy. A university-based team developed methods of networking with existing statewide organizations to influence clinical practice and state policy. We describe steps taken that led to funding and legislation of fall prevention efforts in the state of Connecticut. We summarize CCFP's direct outreach by tabulating the educational sessions delivered and the numbers and types of clinical care providers that were trained. Community organizations that had sustained clinical practices incorporating evidence-based fall prevention were subsequently funded through mini-grants to develop innovative interventional activities. These mini-grants targeted specific subpopulations of older persons at high risk for falls. Building collaborative relationships with existing stakeholders and care providers throughout the state, CCFP continues to facilitate the integration of evidence-based fall prevention into clinical practice and state-funded policy using strategies that may be useful to others.

  14. Classification of older adults with/without a fall history using machine learning methods.

    PubMed

    Lin Zhang; Ou Ma; Fabre, Jennifer M; Wood, Robert H; Garcia, Stephanie U; Ivey, Kayla M; McCann, Evan D

    2015-01-01

    Falling is a serious problem in an aged society such that assessment of the risk of falls for individuals is imperative for the research and practice of falls prevention. This paper introduces an application of several machine learning methods for training a classifier which is capable of classifying individual older adults into a high risk group and a low risk group (distinguished by whether or not the members of the group have a recent history of falls). Using a 3D motion capture system, significant gait features related to falls risk are extracted. By training these features, classification hypotheses are obtained based on machine learning techniques (K Nearest-neighbour, Naive Bayes, Logistic Regression, Neural Network, and Support Vector Machine). Training and test accuracies with sensitivity and specificity of each of these techniques are assessed. The feature adjustment and tuning of the machine learning algorithms are discussed. The outcome of the study will benefit the prediction and prevention of falls.

  15. Empowering Middle School Teachers with Portable Computers.

    ERIC Educational Resources Information Center

    Weast, Jerry D.; And Others

    1993-01-01

    A Sioux Falls (South Dakota) project that supplied middle school teachers with Macintosh computers and training to use them showed gratifying results. Easy access to portable notebook computers made teachers more active computer users, increased teacher interaction and collaboration, enhanced teacher productivity regarding management tasks and…

  16. Fault tolerant hypercube computer system architecture

    NASA Technical Reports Server (NTRS)

    Madan, Herb S. (Inventor); Chow, Edward (Inventor)

    1989-01-01

    A fault-tolerant multiprocessor computer system of the hypercube type comprising a hierarchy of computers of like kind which can be functionally substituted for one another as necessary is disclosed. Communication between the working nodes is via one communications network while communications between the working nodes and watch dog nodes and load balancing nodes higher in the structure is via another communications network separate from the first. A typical branch of the hierarchy reporting to a master node or host computer comprises, a plurality of first computing nodes; a first network of message conducting paths for interconnecting the first computing nodes as a hypercube. The first network provides a path for message transfer between the first computing nodes; a first watch dog node; and a second network of message connecting paths for connecting the first computing nodes to the first watch dog node independent from the first network, the second network provides an independent path for test message and reconfiguration affecting transfers between the first computing nodes and the first switch watch dog node. There is additionally, a plurality of second computing nodes; a third network of message conducting paths for interconnecting the second computing nodes as a hypercube. The third network provides a path for message transfer between the second computing nodes; a fourth network of message conducting paths for connecting the second computing nodes to the first watch dog node independent from the third network. The fourth network provides an independent path for test message and reconfiguration affecting transfers between the second computing nodes and the first watch dog node; and a first multiplexer disposed between the first watch dog node and the second and fourth networks for allowing the first watch dog node to selectively communicate with individual ones of the computing nodes through the second and fourth networks; as well as, a second watch dog node operably connected to the first multiplexer whereby the second watch dog node can selectively communicate with individual ones of the computing nodes through the second and fourth networks. The branch is completed by a first load balancing node; and a second multiplexer connected between the first load balancing node and the first and second watch dog nodes, allowing the first load balancing node to selectively communicate with the first and second watch dog nodes.

  17. Network Views

    ERIC Educational Resources Information Center

    Alexander, Louis

    2010-01-01

    The world changed in 2008. The financial crisis brought with it a deepening sense of insecurity, and the desire to be connected to a network increased. Throughout the summer and fall of 2008, events were unfolding with alarming rapidity. The Massachusetts Institute of Technology (MIT) Alumni Association wanted to respond to this change in the…

  18. Falls Risk and Simulated Driving Performance in Older Adults

    PubMed Central

    Gaspar, John G.; Neider, Mark B.; Kramer, Arthur F.

    2013-01-01

    Declines in executive function and dual-task performance have been related to falls in older adults, and recent research suggests that older adults at risk for falls also show impairments on real-world tasks, such as crossing a street. The present study examined whether falls risk was associated with driving performance in a high-fidelity simulator. Participants were classified as high or low falls risk using the Physiological Profile Assessment and completed a number of challenging simulated driving assessments in which they responded quickly to unexpected events. High falls risk drivers had slower response times (~2.1 seconds) to unexpected events compared to low falls risk drivers (~1.7 seconds). Furthermore, when asked to perform a concurrent cognitive task while driving, high falls risk drivers showed greater costs to secondary task performance than did low falls risk drivers, and low falls risk older adults also outperformed high falls risk older adults on a computer-based measure of dual-task performance. Our results suggest that attentional differences between high and low falls risk older adults extend to simulated driving performance. PMID:23509627

  19. Noise-tolerant inverse analysis models for nondestructive evaluation of transportation infrastructure systems using neural networks

    NASA Astrophysics Data System (ADS)

    Ceylan, Halil; Gopalakrishnan, Kasthurirangan; Birkan Bayrak, Mustafa; Guclu, Alper

    2013-09-01

    The need to rapidly and cost-effectively evaluate the present condition of pavement infrastructure is a critical issue concerning the deterioration of ageing transportation infrastructure all around the world. Nondestructive testing (NDT) and evaluation methods are well-suited for characterising materials and determining structural integrity of pavement systems. The falling weight deflectometer (FWD) is a NDT equipment used to assess the structural condition of highway and airfield pavement systems and to determine the moduli of pavement layers. This involves static or dynamic inverse analysis (referred to as backcalculation) of FWD deflection profiles in the pavement surface under a simulated truck load. The main objective of this study was to employ biologically inspired computational systems to develop robust pavement layer moduli backcalculation algorithms that can tolerate noise or inaccuracies in the FWD deflection data collected in the field. Artificial neural systems, also known as artificial neural networks (ANNs), are valuable computational intelligence tools that are increasingly being used to solve resource-intensive complex engineering problems. Unlike the linear elastic layered theory commonly used in pavement layer backcalculation, non-linear unbound aggregate base and subgrade soil response models were used in an axisymmetric finite element structural analysis programme to generate synthetic database for training and testing the ANN models. In order to develop more robust networks that can tolerate the noisy or inaccurate pavement deflection patterns in the NDT data, several network architectures were trained with varying levels of noise in them. The trained ANN models were capable of rapidly predicting the pavement layer moduli and critical pavement responses (tensile strains at the bottom of the asphalt concrete layer, compressive strains on top of the subgrade layer and the deviator stresses on top of the subgrade layer), and also pavement surface deflections with very low average errors comparable with those obtained directly from the finite element analyses.

  20. Deep Space Networking Experiments on the EPOXI Spacecraft

    NASA Technical Reports Server (NTRS)

    Jones, Ross M.

    2011-01-01

    NASA's Space Communications & Navigation Program within the Space Operations Directorate is operating a program to develop and deploy Disruption Tolerant Networking [DTN] technology for a wide variety of mission types by the end of 2011. DTN is an enabling element of the Interplanetary Internet where terrestrial networking protocols are generally unsuitable because they rely on timely and continuous end-to-end delivery of data and acknowledgments. In fall of 2008 and 2009 and 2011 the Jet Propulsion Laboratory installed and tested essential elements of DTN technology on the Deep Impact spacecraft. These experiments, called Deep Impact Network Experiment (DINET 1) were performed in close cooperation with the EPOXI project which has responsibility for the spacecraft. The DINET 1 software was installed on the backup software partition on the backup flight computer for DINET 1. For DINET 1, the spacecraft was at a distance of about 15 million miles (24 million kilometers) from Earth. During DINET 1 300 images were transmitted from the JPL nodes to the spacecraft. Then, they were automatically forwarded from the spacecraft back to the JPL nodes, exercising DTN's bundle origination, transmission, acquisition, dynamic route computation, congestion control, prioritization, custody transfer, and automatic retransmission procedures, both on the spacecraft and on the ground, over a period of 27 days. The first DINET 1 experiment successfully validated many of the essential elements of the DTN protocols. DINET 2 demonstrated: 1) additional DTN functionality, 2) automated certain tasks which were manually implemented in DINET 1 and 3) installed the ION SW on nodes outside of JPL. DINET 3 plans to: 1) upgrade the LTP convergence-layer adapter to conform to the international LTP CL specification, 2) add convergence-layer "stewardship" procedures and 3) add the BSP security elements [PIB & PCB]. This paper describes the planning and execution of the flight experiment and the validation results.

  1. Investigating Impact Metrics for Performance for the US EPA National Center for Computational Toxicology (ACS Fall meeting)

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) Computational Toxicology Program integrates advances in biology, chemistry, and computer science to help prioritize chemicals for further research based on potential human health risks. This work involves computational and data drive...

  2. Entity Modeling and Immersive Decision Environments

    DTIC Science & Technology

    2011-09-01

    Simulation Technologies (REST) Lerman, D. J. (2010). Correct Weather Modeling of non-Standard Days (10F- SIW -004). In Proceedings of 2010 Fall Simulation...Interoperability Workshop (Fall SIW ) SISO. Orlando, FL: SISO. Most flight simulators compute and fly in a weather environment that matches a

  3. Quantum Computing: Selected Internet Resources for Librarians, Researchers, and the Casually Curious

    ERIC Educational Resources Information Center

    Cirasella, Jill

    2009-01-01

    This article presents an annotated selection of the most important and informative Internet resources for learning about quantum computing, finding quantum computing literature, and tracking quantum computing news. All of the quantum computing resources described in this article are freely available, English-language web sites that fall into one…

  4. The research of computer network security and protection strategy

    NASA Astrophysics Data System (ADS)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  5. Computer hardware fault administration

    DOEpatents

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-09-14

    Computer hardware fault administration carried out in a parallel computer, where the parallel computer includes a plurality of compute nodes. The compute nodes are coupled for data communications by at least two independent data communications networks, where each data communications network includes data communications links connected to the compute nodes. Typical embodiments carry out hardware fault administration by identifying a location of a defective link in the first data communications network of the parallel computer and routing communications data around the defective link through the second data communications network of the parallel computer.

  6. Software For Monitoring A Computer Network

    NASA Technical Reports Server (NTRS)

    Lee, Young H.

    1992-01-01

    SNMAT is rule-based expert-system computer program designed to assist personnel in monitoring status of computer network and identifying defective computers, workstations, and other components of network. Also assists in training network operators. Network for SNMAT located at Space Flight Operations Center (SFOC) at NASA's Jet Propulsion Laboratory. Intended to serve as data-reduction system providing windows, menus, and graphs, enabling users to focus on relevant information. SNMAT expected to be adaptable to other computer networks; for example in management of repair, maintenance, and security, or in administration of planning systems, billing systems, or archives.

  7. Hacking Social Networks: Examining the Viability of Using Computer Network Attack Against Social Networks

    DTIC Science & Technology

    2007-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited. HACKING SOCIAL NETWORKS : EXAMINING THE...VIABILITY OF USING COMPUTER NETWORK ATTACK AGAINST SOCIAL NETWORKS by Russell G. Schuhart II March 2007 Thesis Advisor: David Tucker Second Reader...Master’s Thesis 4. TITLE AND SUBTITLE: Hacking Social Networks : Examining the Viability of Using Computer Network Attack Against Social Networks 6. AUTHOR

  8. Who's calling? Social networks and mobile phone use among motorcyclists.

    PubMed

    De Gruyter, Chris; Truong, Long T; Nguyen, Hang T T

    2017-06-01

    Mobile phone use while riding a motorcycle poses a key safety risk, particularly among younger people who have been found to be more susceptible to distracted driving. While previous research has examined the influence of social networks on mobile phone use while driving a car, no research has explored this association in the context of motorcycle use. Using a survey of university students in Vietnam, this research explores the association between social networks and mobile phone use among motorcyclists and the links this has to reported crashes/falls. Results show that the majority of students are most likely to use a mobile phone to communicate with a friend while riding, either through talking (56.5%) or text messaging (62.0%). However, respondents who frequently talk to a girlfriend/boyfriend or spouse while riding were more likely to experience a crash/fall than those who frequently talk with others while riding (e.g. parent, brother/sister). In addition, those who frequently text message a friend while riding were more likely to experience a crash/fall than those who frequently text message others while riding. The results highlight a clear association between social networks and mobile phone use while riding a motorcycle. Developing a culture of societal norms, where mobile phone use while riding a motorcycle is considered socially unacceptable, will help to reduce the prevalence and ultimate crash risk associated with mobile phone use while riding. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Constructing Precisely Computing Networks with Biophysical Spiking Neurons.

    PubMed

    Schwemmer, Michael A; Fairhall, Adrienne L; Denéve, Sophie; Shea-Brown, Eric T

    2015-07-15

    While spike timing has been shown to carry detailed stimulus information at the sensory periphery, its possible role in network computation is less clear. Most models of computation by neural networks are based on population firing rates. In equivalent spiking implementations, firing is assumed to be random such that averaging across populations of neurons recovers the rate-based approach. Recently, however, Denéve and colleagues have suggested that the spiking behavior of neurons may be fundamental to how neuronal networks compute, with precise spike timing determined by each neuron's contribution to producing the desired output (Boerlin and Denéve, 2011; Boerlin et al., 2013). By postulating that each neuron fires to reduce the error in the network's output, it was demonstrated that linear computations can be performed by networks of integrate-and-fire neurons that communicate through instantaneous synapses. This left open, however, the possibility that realistic networks, with conductance-based neurons with subthreshold nonlinearity and the slower timescales of biophysical synapses, may not fit into this framework. Here, we show how the spike-based approach can be extended to biophysically plausible networks. We then show that our network reproduces a number of key features of cortical networks including irregular and Poisson-like spike times and a tight balance between excitation and inhibition. Lastly, we discuss how the behavior of our model scales with network size or with the number of neurons "recorded" from a larger computing network. These results significantly increase the biological plausibility of the spike-based approach to network computation. We derive a network of neurons with standard spike-generating currents and synapses with realistic timescales that computes based upon the principle that the precise timing of each spike is important for the computation. We then show that our network reproduces a number of key features of cortical networks including irregular, Poisson-like spike times, and a tight balance between excitation and inhibition. These results significantly increase the biological plausibility of the spike-based approach to network computation, and uncover how several components of biological networks may work together to efficiently carry out computation. Copyright © 2015 the authors 0270-6474/15/3510112-23$15.00/0.

  10. Short and long periodic atmospheric variations between 25 and 200 km

    NASA Technical Reports Server (NTRS)

    Justus, C. G.; Woodrum, A.

    1973-01-01

    Previously collected data on atmospheric pressure, density, temperature and winds between 25 and 200 km from sources including Meteorological Rocket Network data, ROBIN falling sphere data, grenade release and pitot tube data, meteor winds, chemical release winds, satellite data, and others were analyzed by a daily difference method and results on the distribution statistics, magnitude, and spatial structure of gravity wave and planetary wave atmospheric variations are presented. Time structure of the gravity wave variations were determined by the analysis of residuals from harmonic analysis of time series data. Planetary wave contributions in the 25-85 km range were discovered and found to have significant height and latitudinal variation. Long period planetary waves, and seasonal variations were also computed by harmonic analysis. Revised height variations of the gravity wave contributions in the 25 to 85 km height range were computed. An engineering method and design values for gravity wave magnitudes and wave lengths are given to be used for such tasks as evaluating the effects on the dynamical heating, stability and control of spacecraft such as the space shuttle vehicle in launch or reentry trajectories.

  11. Computer Networks as a New Data Base.

    ERIC Educational Resources Information Center

    Beals, Diane E.

    1992-01-01

    Discusses the use of communication on computer networks as a data source for psychological, social, and linguistic research. Differences between computer-mediated communication and face-to-face communication are described, the Beginning Teacher Computer Network is discussed, and examples of network conversations are appended. (28 references) (LRW)

  12. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  13. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  14. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  15. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  16. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  17. Metagenomic systems biology of the human gut microbiome reveals topological shifts associated with obesity and inflammatory bowel disease.

    PubMed

    Greenblum, Sharon; Turnbaugh, Peter J; Borenstein, Elhanan

    2012-01-10

    The human microbiome plays a key role in a wide range of host-related processes and has a profound effect on human health. Comparative analyses of the human microbiome have revealed substantial variation in species and gene composition associated with a variety of disease states but may fall short of providing a comprehensive understanding of the impact of this variation on the community and on the host. Here, we introduce a metagenomic systems biology computational framework, integrating metagenomic data with an in silico systems-level analysis of metabolic networks. Focusing on the gut microbiome, we analyze fecal metagenomic data from 124 unrelated individuals, as well as six monozygotic twin pairs and their mothers, and generate community-level metabolic networks of the microbiome. Placing variations in gene abundance in the context of these networks, we identify both gene-level and network-level topological differences associated with obesity and inflammatory bowel disease (IBD). We show that genes associated with either of these host states tend to be located at the periphery of the metabolic network and are enriched for topologically derived metabolic "inputs." These findings may indicate that lean and obese microbiomes differ primarily in their interface with the host and in the way they interact with host metabolism. We further demonstrate that obese microbiomes are less modular, a hallmark of adaptation to low-diversity environments. We additionally link these topological variations to community species composition. The system-level approach presented here lays the foundation for a unique framework for studying the human microbiome, its organization, and its impact on human health.

  18. Resting State Default Mode Network Connectivity, Dual Task Performance, Gait Speed, and Postural Sway in Older Adults with Mild Cognitive Impairment

    PubMed Central

    Crockett, Rachel A.; Hsu, Chun Liang; Best, John R.; Liu-Ambrose, Teresa

    2017-01-01

    Aging is associated with an increased risk of falling. In particular, older adults with mild cognitive impairment (MCI) are more vulnerable to falling compared with their healthy counterparts. Major contributors to this increased falls risk include a decline in dual task performance, gait speed, and postural sway. Recent evidence highlights the potential influence of the default mode network (DMN), the frontoparietal network (FPN), and the supplementary motor area (SMA) on dual task performance, gait speed, and postural sway. The DMN is active during rest and deactivates during task-oriented processes, to maintain attention and stay on task. The FPN and SMA are involved in top-down attentional control, motor planning, and motor execution. The DMN shows less deactivation during task in older adults with MCI. This lack of deactivation is theorized to increase competition for resources between the DMN and task-related brain regions (e.g., the FPN and SMA), increasing distraction from the task and reducing task performance. However, no study has yet investigated the relationship between the between-network connectivity of the DMN with these regions and dual task walking, gait speed or postural sway. We hypothesized that greater functional connectivity both within the DMN and between DMN–FPN and DMN–SMA, will be associated with poorer performance during dual task walking, slower gait speed, and greater postural sway in older adults with MCI. Forty older adults with MCI were measured on a dual task-walking paradigm, gait speed over a 4-m walk, and postural sway using a sway-meter. Greater within-DMN connectivity was significantly correlated with poorer dual task performance. Furthermore, greater inter-network connectivity between the DMN and SMA was significantly correlated with slower gait speed and greater postural sway on the eyes open floor sway task. Thus, greater resting state DMN functional connectivity may be an underlying neural mechanism for reduced dual task ability, slower gait speed, and greater postural sway, resulting in the increased risk of mobility disability and falling in older adults with MCI. PMID:29311906

  19. Resting State Default Mode Network Connectivity, Dual Task Performance, Gait Speed, and Postural Sway in Older Adults with Mild Cognitive Impairment.

    PubMed

    Crockett, Rachel A; Hsu, Chun Liang; Best, John R; Liu-Ambrose, Teresa

    2017-01-01

    Aging is associated with an increased risk of falling. In particular, older adults with mild cognitive impairment (MCI) are more vulnerable to falling compared with their healthy counterparts. Major contributors to this increased falls risk include a decline in dual task performance, gait speed, and postural sway. Recent evidence highlights the potential influence of the default mode network (DMN), the frontoparietal network (FPN), and the supplementary motor area (SMA) on dual task performance, gait speed, and postural sway. The DMN is active during rest and deactivates during task-oriented processes, to maintain attention and stay on task. The FPN and SMA are involved in top-down attentional control, motor planning, and motor execution. The DMN shows less deactivation during task in older adults with MCI. This lack of deactivation is theorized to increase competition for resources between the DMN and task-related brain regions (e.g., the FPN and SMA), increasing distraction from the task and reducing task performance. However, no study has yet investigated the relationship between the between-network connectivity of the DMN with these regions and dual task walking, gait speed or postural sway. We hypothesized that greater functional connectivity both within the DMN and between DMN-FPN and DMN-SMA, will be associated with poorer performance during dual task walking, slower gait speed, and greater postural sway in older adults with MCI. Forty older adults with MCI were measured on a dual task-walking paradigm, gait speed over a 4-m walk, and postural sway using a sway-meter. Greater within-DMN connectivity was significantly correlated with poorer dual task performance. Furthermore, greater inter-network connectivity between the DMN and SMA was significantly correlated with slower gait speed and greater postural sway on the eyes open floor sway task. Thus, greater resting state DMN functional connectivity may be an underlying neural mechanism for reduced dual task ability, slower gait speed, and greater postural sway, resulting in the increased risk of mobility disability and falling in older adults with MCI.

  20. An outer approximation method for the road network design problem

    PubMed Central

    2018-01-01

    Best investment in the road infrastructure or the network design is perceived as a fundamental and benchmark problem in transportation. Given a set of candidate road projects with associated costs, finding the best subset with respect to a limited budget is known as a bilevel Discrete Network Design Problem (DNDP) of NP-hard computationally complexity. We engage with the complexity with a hybrid exact-heuristic methodology based on a two-stage relaxation as follows: (i) the bilevel feature is relaxed to a single-level problem by taking the network performance function of the upper level into the user equilibrium traffic assignment problem (UE-TAP) in the lower level as a constraint. It results in a mixed-integer nonlinear programming (MINLP) problem which is then solved using the Outer Approximation (OA) algorithm (ii) we further relax the multi-commodity UE-TAP to a single-commodity MILP problem, that is, the multiple OD pairs are aggregated to a single OD pair. This methodology has two main advantages: (i) the method is proven to be highly efficient to solve the DNDP for a large-sized network of Winnipeg, Canada. The results suggest that within a limited number of iterations (as termination criterion), global optimum solutions are quickly reached in most of the cases; otherwise, good solutions (close to global optimum solutions) are found in early iterations. Comparative analysis of the networks of Gao and Sioux-Falls shows that for such a non-exact method the global optimum solutions are found in fewer iterations than those found in some analytically exact algorithms in the literature. (ii) Integration of the objective function among the constraints provides a commensurate capability to tackle the multi-objective (or multi-criteria) DNDP as well. PMID:29590111

  1. An outer approximation method for the road network design problem.

    PubMed

    Asadi Bagloee, Saeed; Sarvi, Majid

    2018-01-01

    Best investment in the road infrastructure or the network design is perceived as a fundamental and benchmark problem in transportation. Given a set of candidate road projects with associated costs, finding the best subset with respect to a limited budget is known as a bilevel Discrete Network Design Problem (DNDP) of NP-hard computationally complexity. We engage with the complexity with a hybrid exact-heuristic methodology based on a two-stage relaxation as follows: (i) the bilevel feature is relaxed to a single-level problem by taking the network performance function of the upper level into the user equilibrium traffic assignment problem (UE-TAP) in the lower level as a constraint. It results in a mixed-integer nonlinear programming (MINLP) problem which is then solved using the Outer Approximation (OA) algorithm (ii) we further relax the multi-commodity UE-TAP to a single-commodity MILP problem, that is, the multiple OD pairs are aggregated to a single OD pair. This methodology has two main advantages: (i) the method is proven to be highly efficient to solve the DNDP for a large-sized network of Winnipeg, Canada. The results suggest that within a limited number of iterations (as termination criterion), global optimum solutions are quickly reached in most of the cases; otherwise, good solutions (close to global optimum solutions) are found in early iterations. Comparative analysis of the networks of Gao and Sioux-Falls shows that for such a non-exact method the global optimum solutions are found in fewer iterations than those found in some analytically exact algorithms in the literature. (ii) Integration of the objective function among the constraints provides a commensurate capability to tackle the multi-objective (or multi-criteria) DNDP as well.

  2. 76 FR 49753 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... Defense. DHA 14 System name: Computer/Electronics Accommodations Program for People with Disabilities... with ``Computer/Electronic Accommodations Program.'' System location: Delete entry and replace with ``Computer/Electronic Accommodations Program, Skyline 5, Suite 302, 5111 Leesburg Pike, Falls Church, VA...

  3. Get the Whole Story before You Plug into a Computer Network.

    ERIC Educational Resources Information Center

    Vernot, David

    1989-01-01

    Explains the myths and marvels of computer networks; cites how several schools are utilizing networking; and summarizes where the major computer companies stand today when it comes to networking. (MLF)

  4. Network Coding for Function Computation

    ERIC Educational Resources Information Center

    Appuswamy, Rathinakumar

    2011-01-01

    In this dissertation, the following "network computing problem" is considered. Source nodes in a directed acyclic network generate independent messages and a single receiver node computes a target function f of the messages. The objective is to maximize the average number of times f can be computed per network usage, i.e., the "computing…

  5. Comparisons of Interventions for Preventing Falls in Older Adults: A Systematic Review and Meta-analysis.

    PubMed

    Tricco, Andrea C; Thomas, Sonia M; Veroniki, Areti Angeliki; Hamid, Jemila S; Cogo, Elise; Strifler, Lisa; Khan, Paul A; Robson, Reid; Sibley, Kathryn M; MacDonald, Heather; Riva, John J; Thavorn, Kednapa; Wilson, Charlotte; Holroyd-Leduc, Jayna; Kerr, Gillian D; Feldman, Fabio; Majumdar, Sumit R; Jaglal, Susan B; Hui, Wing; Straus, Sharon E

    2017-11-07

    Falls result in substantial burden for patients and health care systems, and given the aging of the population worldwide, the incidence of falls continues to rise. To assess the potential effectiveness of interventions for preventing falls. MEDLINE, Embase, Cochrane Central Register of Controlled Trials, and Ageline databases from inception until April 2017. Reference lists of included studies were scanned. Randomized clinical trials (RCTs) of fall-prevention interventions for participants aged 65 years and older. Pairs of reviewers independently screened the studies, abstracted data, and appraised risk of bias. Pairwise meta-analysis and network meta-analysis were conducted. Injurious falls and fall-related hospitalizations. A total of 283 RCTs (159 910 participants; mean age, 78.1 years; 74% women) were included after screening of 10 650 titles and abstracts and 1210 full-text articles. Network meta-analysis (including 54 RCTs, 41 596 participants, 39 interventions plus usual care) suggested that the following interventions, when compared with usual care, were associated with reductions in injurious falls: exercise (odds ratio [OR], 0.51 [95% CI, 0.33 to 0.79]; absolute risk difference [ARD], -0.67 [95% CI, -1.10 to -0.24]); combined exercise and vision assessment and treatment (OR, 0.17 [95% CI, 0.07 to 0.38]; ARD, -1.79 [95% CI, -2.63 to -0.96]); combined exercise, vision assessment and treatment, and environmental assessment and modification (OR, 0.30 [95% CI, 0.13 to 0.70]; ARD, -1.19 [95% CI, -2.04 to -0.35]); and combined clinic-level quality improvement strategies (eg, case management), multifactorial assessment and treatment (eg, comprehensive geriatric assessment), calcium supplementation, and vitamin D supplementation (OR, 0.12 [95% CI, 0.03 to 0.55]; ARD, -2.08 [95% CI, -3.56 to -0.60]). Pairwise meta-analyses for fall-related hospitalizations (2 RCTs; 516 participants) showed no significant association between combined clinic- and patient-level quality improvement strategies and multifactorial assessment and treatment relative to usual care (OR, 0.78 [95% CI, 0.33 to 1.81]). Exercise alone and various combinations of interventions were associated with lower risk of injurious falls compared with usual care. Choice of fall-prevention intervention may depend on patient and caregiver values and preferences.

  6. Worldwide Weather Radar Imagery May Allow Substantial Increase in Meteorite Fall Recovery

    NASA Technical Reports Server (NTRS)

    Fries, Marc; Matson, Robert; Schaefer, Jacob; Fries, Jeffery; Hankey, Mike; Anderson, Lindsay

    2014-01-01

    Weather radar imagery is a valuable new technique for the rapid recovery of meteorite falls, to include falls which would not otherwise be recovered (e.g. Battle Mountain). Weather radar imagery reveals about one new meteorite fall per year (18 falls since 1998), using weather radars in the United States alone. However, an additional 75 other nations operate weather radar networks according to the UN World Meteorological Organization (WMO). If the imagery of those radars were analyzed, the current rate of meteorite falls could be improved considerably, to as much as 3.6 times the current recovery rate based on comparison of total radar areal coverage. Recently, the addition of weather radar imagery, seismometry and internet-based aggregation of eyewitness reports has improved the speed and accuracy of fresh meteorite fall recovery [e.g. 1,2]. This was demonstrated recently with the radar-enabled recovery of the Sutter's Mill fall [3]. Arguably, the meteorites recovered via these methods are of special scientific value as they are relatively unweathered, fresh falls. To illustrate this, a recent SAO/NASA ADS search using the keyword "meteorite" shows that all 50 of the top search results included at least one named meteorite recovered from a meteorite fall. This is true even though only 1260 named meteorite falls are recorded among the >49,000 individual falls recorded in the Meteoritical Society online database. The US NEXRAD system used thus far to locate meteorite falls covers most of the United States' surface area. Using a WMO map of the world's weather radars, we estimate that the total coverage of the other 75 national weather radar networks equals about 3.6x NEXRAD's coverage area. There are two findings to draw from this calculation: 1) For the past 16 years during which 18 falls are seen in US radar data, there should be an additional 65 meteorite falls recorded in worldwide radar imagery. Also: 2) if all of the world's radar data could be analyzed, the rate of recovery of fresh meteorite falls can increase by as much as 3.6x the current rate. The authors' experience to date indicates that the most effective course of action would be to have local meteorite research groups (outside of the US) form research consortia and develop a working relationship with their nation's weather bureau for access to data. These research consortia could utilize the same, proven methods used for US NEXRAD imagery, internet eyewitness report aggregation, seismometry analysis, etc. to locate meteorite falls. The consortia could then recover and analyze meteorite falls and enrich their own research efforts. It would be beneficial to conduct a global program to coordinate the development of methods and data tools, as well as to coordinate meteorite sample sharing and research. Perhaps an institution such as the Meteoritical Society could lead such an effort.

  7. Detection of a meteorite 'stream' - Observations of a second meteorite fall from the orbit of the Innisfree chondrite

    NASA Astrophysics Data System (ADS)

    Halliday, I.

    1987-03-01

    The first observational evidence of multiple meteorite falls from the same orbit is adduced from the February 6, 1980 fall of a meteorite precisely 3 yr after the fall of the Innisfree meteorite. Due consideration of the detection probability for two related objects with the meteorite camera network in western Canada suggests that the Innisfree brecciated LL chondrite was a near-surface fragment from a parent object whose radius was of the order of several tens of meters. A meteorite mass of 1.8 kg is predicted for the new object, whose recovery in the vicinity of Ridgedale, Saskatchewan, is now sought for the sake of comparison with the Innisfree chondrite.

  8. LaRC local area networks to support distributed computing

    NASA Technical Reports Server (NTRS)

    Riddle, E. P.

    1984-01-01

    The Langley Research Center's (LaRC) Local Area Network (LAN) effort is discussed. LaRC initiated the development of a LAN to support a growing distributed computing environment at the Center. The purpose of the network is to provide an improved capability (over inteactive and RJE terminal access) for sharing multivendor computer resources. Specifically, the network will provide a data highway for the transfer of files between mainframe computers, minicomputers, work stations, and personal computers. An important influence on the overall network design was the vital need of LaRC researchers to efficiently utilize the large CDC mainframe computers in the central scientific computing facility. Although there was a steady migration from a centralized to a distributed computing environment at LaRC in recent years, the work load on the central resources increased. Major emphasis in the network design was on communication with the central resources within the distributed environment. The network to be implemented will allow researchers to utilize the central resources, distributed minicomputers, work stations, and personal computers to obtain the proper level of computing power to efficiently perform their jobs.

  9. Short-term memory in networks of dissociated cortical neurons.

    PubMed

    Dranias, Mark R; Ju, Han; Rajaram, Ezhilarasan; VanDongen, Antonius M J

    2013-01-30

    Short-term memory refers to the ability to store small amounts of stimulus-specific information for a short period of time. It is supported by both fading and hidden memory processes. Fading memory relies on recurrent activity patterns in a neuronal network, whereas hidden memory is encoded using synaptic mechanisms, such as facilitation, which persist even when neurons fall silent. We have used a novel computational and optogenetic approach to investigate whether these same memory processes hypothesized to support pattern recognition and short-term memory in vivo, exist in vitro. Electrophysiological activity was recorded from primary cultures of dissociated rat cortical neurons plated on multielectrode arrays. Cultures were transfected with ChannelRhodopsin-2 and optically stimulated using random dot stimuli. The pattern of neuronal activity resulting from this stimulation was analyzed using classification algorithms that enabled the identification of stimulus-specific memories. Fading memories for different stimuli, encoded in ongoing neural activity, persisted and could be distinguished from each other for as long as 1 s after stimulation was terminated. Hidden memories were detected by altered responses of neurons to additional stimulation, and this effect persisted longer than 1 s. Interestingly, network bursts seem to eliminate hidden memories. These results are similar to those that have been reported from similar experiments in vivo and demonstrate that mechanisms of information processing and short-term memory can be studied using cultured neuronal networks, thereby setting the stage for therapeutic applications using this platform.

  10. Cyber-Ed.

    ERIC Educational Resources Information Center

    Ruben, Barbara

    1994-01-01

    Reviews a number of interactive environmental computer education networks and software packages. Computer networks include National Geographic Kids Network, Global Lab, and Global Rivers Environmental Education Network. Computer software involve environmental decision making, simulation games, tropical rainforests, the ocean, the greenhouse…

  11. Terminal-oriented computer-communication networks.

    NASA Technical Reports Server (NTRS)

    Schwartz, M.; Boorstyn, R. R.; Pickholtz, R. L.

    1972-01-01

    Four examples of currently operating computer-communication networks are described in this tutorial paper. They include the TYMNET network, the GE Information Services network, the NASDAQ over-the-counter stock-quotation system, and the Computer Sciences Infonet. These networks all use programmable concentrators for combining a multiplicity of terminals. Included in the discussion for each network is a description of the overall network structure, the handling and transmission of messages, communication requirements, routing and reliability consideration where applicable, operating data and design specifications where available, and unique design features in the area of computer communications.

  12. Experiments Using Cell Phones in Physics Classroom Education: The Computer-Aided g Determination

    NASA Astrophysics Data System (ADS)

    Vogt, Patrik; Kuhn, Jochen; Müller, Sebastian

    2011-09-01

    This paper continues the collection of experiments that describe the use of cell phones as experimental tools in physics classroom education.1-4 We describe a computer-aided determination of the free-fall acceleration g using the acoustical Doppler effect. The Doppler shift is a function of the speed of the source. Since a free-falling objects speed is changing linearly with time, the Doppler shift is also changing with time. It is possible to measure this shift using software that is both easy to use and readily available. Students will use the time-dependency of the Doppler shift to experimentally determine the acceleration due to gravity by using a cell phone as a freely falling object emitting a sound with constant frequency.

  13. Using satellite communications for a mobile computer network

    NASA Technical Reports Server (NTRS)

    Wyman, Douglas J.

    1993-01-01

    The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.

  14. Do You Lock Your Network Doors? Some Network Management Precautions.

    ERIC Educational Resources Information Center

    Neray, Phil

    1997-01-01

    Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…

  15. Home-Based Risk of Falling Assessment Test Using a Closed-Loop Balance Model.

    PubMed

    Ayena, Johannes C; Zaibi, Helmi; Otis, Martin J-D; Menelas, Bob-Antoine J

    2016-12-01

    The aim of this study is to improve and facilitate the methods used to assess risk of falling at home among older people through the computation of a risk of falling in real time in daily activities. In order to increase a real time computation of the risk of falling, a closed-loop balance model is proposed and compared with One-Leg Standing Test (OLST). This balance model allows studying the postural response of a person having an unpredictable perturbation. Twenty-nine volunteers participated in this study for evaluating the effectiveness of the proposed system which includes seventeen elder participants: ten healthy elderly ( 68.4 ±5.5 years), seven Parkinson's disease (PD) subjects ( 66.28 ±8.9 years), and twelve healthy young adults ( 28.27 ±3.74 years). Our work suggests that there is a relationship between OLST score and the risk of falling based on center of pressure measurement with four low cost force sensors located inside an instrumented insole, which could be predicted using our suggested closed-loop balance model. For long term monitoring at home, this system could be included in a medical electronic record and could be useful as a diagnostic aid tool.

  16. Recommending Peers for Learning: Matching on Dissimilarity in Interpretations to Provoke Breakdown

    ERIC Educational Resources Information Center

    Rajagopal, Kamakshi; van Bruggen, Jan M.; Sloep, Peter B.

    2017-01-01

    People recommenders are a widespread feature of social networking sites and educational social learning platforms alike. However, when these systems are used to extend learners' Personal Learning Networks, they often fall short of providing recommendations of learning value to their users. This paper proposes a design of a people recommender based…

  17. From Personal to Social: Learning Environments that Work

    ERIC Educational Resources Information Center

    Camacho, Mar; Guilana, Sonia

    2011-01-01

    VLE (Virtual Learning Environments) are rapidly falling short to meet the demands of a networked society. Web 2.0 and social networks are proving to offer a more personalized, open environment for students to learn formally as they are already doing informally. With the irruption of social media into society, and therefore, education, many voices…

  18. Reading wild minds: A computational assay of Theory of Mind sophistication across seven primate species

    PubMed Central

    Devaine, Marie; San-Galli, Aurore; Trapanese, Cinzia; Bardino, Giulia; Hano, Christelle; Saint Jalme, Michel; Bouret, Sebastien

    2017-01-01

    Theory of Mind (ToM), i.e. the ability to understand others' mental states, endows humans with highly adaptive social skills such as teaching or deceiving. Candidate evolutionary explanations have been proposed for the unique sophistication of human ToM among primates. For example, the Machiavellian intelligence hypothesis states that the increasing complexity of social networks may have induced a demand for sophisticated ToM. This type of scenario ignores neurocognitive constraints that may eventually be crucial limiting factors for ToM evolution. In contradistinction, the cognitive scaffolding hypothesis asserts that a species' opportunity to develop sophisticated ToM is mostly determined by its general cognitive capacity (on which ToM is scaffolded). However, the actual relationships between ToM sophistication and either brain volume (a proxy for general cognitive capacity) or social group size (a proxy for social network complexity) are unclear. Here, we let 39 individuals sampled from seven non-human primate species (lemurs, macaques, mangabeys, orangutans, gorillas and chimpanzees) engage in simple dyadic games against artificial ToM players (via a familiar human caregiver). Using computational analyses of primates' choice sequences, we found that the probability of exhibiting a ToM-compatible learning style is mainly driven by species' brain volume (rather than by social group size). Moreover, primates' social cognitive sophistication culminates in a precursor form of ToM, which still falls short of human fully-developed ToM abilities. PMID:29112973

  19. Reading wild minds: A computational assay of Theory of Mind sophistication across seven primate species.

    PubMed

    Devaine, Marie; San-Galli, Aurore; Trapanese, Cinzia; Bardino, Giulia; Hano, Christelle; Saint Jalme, Michel; Bouret, Sebastien; Masi, Shelly; Daunizeau, Jean

    2017-11-01

    Theory of Mind (ToM), i.e. the ability to understand others' mental states, endows humans with highly adaptive social skills such as teaching or deceiving. Candidate evolutionary explanations have been proposed for the unique sophistication of human ToM among primates. For example, the Machiavellian intelligence hypothesis states that the increasing complexity of social networks may have induced a demand for sophisticated ToM. This type of scenario ignores neurocognitive constraints that may eventually be crucial limiting factors for ToM evolution. In contradistinction, the cognitive scaffolding hypothesis asserts that a species' opportunity to develop sophisticated ToM is mostly determined by its general cognitive capacity (on which ToM is scaffolded). However, the actual relationships between ToM sophistication and either brain volume (a proxy for general cognitive capacity) or social group size (a proxy for social network complexity) are unclear. Here, we let 39 individuals sampled from seven non-human primate species (lemurs, macaques, mangabeys, orangutans, gorillas and chimpanzees) engage in simple dyadic games against artificial ToM players (via a familiar human caregiver). Using computational analyses of primates' choice sequences, we found that the probability of exhibiting a ToM-compatible learning style is mainly driven by species' brain volume (rather than by social group size). Moreover, primates' social cognitive sophistication culminates in a precursor form of ToM, which still falls short of human fully-developed ToM abilities.

  20. Short-Term Memory for Space and Time Flexibly Recruit Complementary Sensory-Biased Frontal Lobe Attention Networks.

    PubMed

    Michalka, Samantha W; Kong, Lingqiang; Rosen, Maya L; Shinn-Cunningham, Barbara G; Somers, David C

    2015-08-19

    The frontal lobes control wide-ranging cognitive functions; however, functional subdivisions of human frontal cortex are only coarsely mapped. Here, functional magnetic resonance imaging reveals two distinct visual-biased attention regions in lateral frontal cortex, superior precentral sulcus (sPCS) and inferior precentral sulcus (iPCS), anatomically interdigitated with two auditory-biased attention regions, transverse gyrus intersecting precentral sulcus (tgPCS) and caudal inferior frontal sulcus (cIFS). Intrinsic functional connectivity analysis demonstrates that sPCS and iPCS fall within a broad visual-attention network, while tgPCS and cIFS fall within a broad auditory-attention network. Interestingly, we observe that spatial and temporal short-term memory (STM), respectively, recruit visual and auditory attention networks in the frontal lobe, independent of sensory modality. These findings not only demonstrate that both sensory modality and information domain influence frontal lobe functional organization, they also demonstrate that spatial processing co-localizes with visual processing and that temporal processing co-localizes with auditory processing in lateral frontal cortex. Copyright © 2015 Elsevier Inc. All rights reserved.

  1. 47 CFR 32.2000 - Instructions for telecommunications plant accounts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...

  2. 47 CFR 32.2000 - Instructions for telecommunications plant accounts.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...

  3. 47 CFR 32.2000 - Instructions for telecommunications plant accounts.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...

  4. 47 CFR 32.2000 - Instructions for telecommunications plant accounts.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... equipment; 2122, Furniture; 2123, Office equipment; 2124, General purpose computers, costing $2,000 or less... for personal computers falling within Account 2124. Personal computers classifiable to Account 2124..., power, construction quarters, office space and equipment directly related to the construction project...

  5. Network Computer Technology. Phase I: Viability and Promise within NASA's Desktop Computing Environment

    NASA Technical Reports Server (NTRS)

    Paluzzi, Peter; Miller, Rosalind; Kurihara, West; Eskey, Megan

    1998-01-01

    Over the past several months, major industry vendors have made a business case for the network computer as a win-win solution toward lowering total cost of ownership. This report provides results from Phase I of the Ames Research Center network computer evaluation project. It identifies factors to be considered for determining cost of ownership; further, it examines where, when, and how network computer technology might fit in NASA's desktop computing architecture.

  6. Directly executable formal models of middleware for MANET and Cloud Networking and Computing

    NASA Astrophysics Data System (ADS)

    Pashchenko, D. V.; Sadeq Jaafar, Mustafa; Zinkin, S. A.; Trokoz, D. A.; Pashchenko, T. U.; Sinev, M. P.

    2016-04-01

    The article considers some “directly executable” formal models that are suitable for the specification of computing and networking in the cloud environment and other networks which are similar to wireless networks MANET. These models can be easily programmed and implemented on computer networks.

  7. Meteorite falls in Africa

    NASA Astrophysics Data System (ADS)

    Khiri, Fouad; Ibhi, Abderrahmane; Saint-Gerant, Thierry; Medjkane, Mohand; Ouknine, Lahcen

    2017-10-01

    The study of meteorites provides insight into the earliest history of our solar system. From 1800, about the year meteorites were first recognized as objects falling from the sky, until December 2014, 158 observed meteorite falls were recorded in Africa. Their collected mass ranges from 1.4 g to 175 kg with the 1-10 kg cases predominant. The average rate of African falls is low with only one fall recovery per 1.35-year time interval (or 0.023 per year per million km2). This African collection is dominated by ordinary chondrites (78%) just like in the worldwide falls. The seventeen achondrites include three Martian meteorite falls (Nakhla of Egypt, Tissint of Morocco and Zagami of Nigeria). Observed Iron meteorite falls are relatively rare and represent only 5%. The falls' rate in Africa is variable in time and in space. The number of falls continues to grow since 1860, 80% of which were recovered during the period between 1910 and 2014. Most of these documented meteorite falls have been recovered from North-Western Africa, Eastern Africa and Southern Africa. They are concentrated in countries which have a large surface area and a large population with a uniform distribution. Other factors are also favorable for observing and collecting meteorite falls across the African territory, such as: a genuine meteorite education, a semi-arid to arid climate (clear sky throughout the year most of the time), croplands or sparse grasslands and possible access to the fall location with a low percentage of forest cover and dense road network.

  8. Older people's experience of falls: understanding, interpretation and autonomy.

    PubMed

    Roe, Brenda; Howell, Fiona; Riniotis, Konstantinos; Beech, Roger; Crome, Peter; Ong, Bie Nio

    2008-09-01

    This paper is a report of a study to explore the experiences of older people who suffered a recent fall and identify possible factors that could contribute to service development. Falls in older people are prevalent and are associated with morbidity, hospitalization and mortality, personal costs to individuals and financial costs to health services. A convenience sample of 27 older people (mean age 84 years; range 65-98) participated in semi-structured taped interviews. Follow-up interviews during 2003-2004 were undertaken to detect changes over time. Data were collected about experience of the fall, use of services, health and well-being, activities of daily living, informal care, support networks and prevention. Thematic content analysis was undertaken. Twenty-seven initial interviews and 18 follow-up interviews were conducted. The majority of people fell indoors (n = 23) and were alone (n = 15). The majority of falls were repeat falls (n = 22) and five were a first-ever fall. People who reflected on their fall and sought to understand why and how it occurred developed strategies to prevent future falls, face their fear, maintain control and choice and continue with activities of daily living. Those who did not reflect on their fall and did not know why it occurred restricted their activities and environments and remained in fear of falling. Assisting people to reflect on their falls and to understand why they happened could help with preventing future falls, allay fear, boost confidence and aid rehabilitation relating to their activities of daily living.

  9. Advantages of Parallel Processing and the Effects of Communications Time

    NASA Technical Reports Server (NTRS)

    Eddy, Wesley M.; Allman, Mark

    2000-01-01

    Many computing tasks involve heavy mathematical calculations, or analyzing large amounts of data. These operations can take a long time to complete using only one computer. Networks such as the Internet provide many computers with the ability to communicate with each other. Parallel or distributed computing takes advantage of these networked computers by arranging them to work together on a problem, thereby reducing the time needed to obtain the solution. The drawback to using a network of computers to solve a problem is the time wasted in communicating between the various hosts. The application of distributed computing techniques to a space environment or to use over a satellite network would therefore be limited by the amount of time needed to send data across the network, which would typically take much longer than on a terrestrial network. This experiment shows how much faster a large job can be performed by adding more computers to the task, what role communications time plays in the total execution time, and the impact a long-delay network has on a distributed computing system.

  10. A Decade of Mobile Computing for Students

    ERIC Educational Resources Information Center

    Jenny, Frederick J.

    2005-01-01

    This paper describes the mobile computing at Grove City College, a small, private, liberal arts institution in Western Pennsylvania. They have entered their second decade of mobile computing for students in the school of about 2200. Each incoming freshman receives a laptop computing and inkjet printer during the fall orientation, all a benefit of…

  11. Near real-time traffic routing

    NASA Technical Reports Server (NTRS)

    Yang, Chaowei (Inventor); Xie, Jibo (Inventor); Zhou, Bin (Inventor); Cao, Ying (Inventor)

    2012-01-01

    A near real-time physical transportation network routing system comprising: a traffic simulation computing grid and a dynamic traffic routing service computing grid. The traffic simulator produces traffic network travel time predictions for a physical transportation network using a traffic simulation model and common input data. The physical transportation network is divided into a multiple sections. Each section has a primary zone and a buffer zone. The traffic simulation computing grid includes multiple of traffic simulation computing nodes. The common input data includes static network characteristics, an origin-destination data table, dynamic traffic information data and historical traffic data. The dynamic traffic routing service computing grid includes multiple dynamic traffic routing computing nodes and generates traffic route(s) using the traffic network travel time predictions.

  12. Discussion on the Technology and Method of Computer Network Security Management

    NASA Astrophysics Data System (ADS)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  13. Seismic Signatures of Brine Release at Blood Falls, Taylor Glacier, Antarctica

    NASA Astrophysics Data System (ADS)

    Carr, C. G.; Pettit, E. C.; Carmichael, J.

    2017-12-01

    Blood Falls is created by the release of subglacially-sourced, iron-rich brine at the surface of Taylor Glacier, McMurdo Dry Valleys, Antarctica. The supraglacial portion of this hydrological feature is episodically active. Englacial liquid brine flow occurs despite ice temperatures of -17°C and we document supraglacial liquid brine release despite ambient air temperatures average -20°C. In this study, we use data from a seismic network, time-lapse cameras, and publicly available weather station data to address the questions: what are the characteristics of seismic events that occur during Blood Falls brine release and how do these compare with seismic events that occur during times of Blood Falls quiescence? How are different processes observable in the time-lapse imagery represented in the seismic record? Time-lapse photography constrains the timing of brine release events during the austral winter of 2014. We use a noise-adaptive digital power detector to identify seismic events and cluster analysis to identify repeating events based on waveform similarity across the network. During the 2014 wintertime brine release, high-energy repeated seismic events occurred proximal to Blood Falls. We investigate the ground motions associated with these clustered events, as well as their spatial distribution. We see evidence of possible tremor during the brine release periods, an indicator of fluid movement. If distinctive seismic signatures are associated with Blood Falls brine release they could be identified based solely on seismic data without any aid from time-lapse cameras. Passive seismologic monitoring has the benefit of continuity during the polar night and other poor visibility conditions, which make time-lapse imagery unusable.

  14. NASA/DOD Aerospace Knowledge Diffusion Research Project. Paper 47: The value of computer networks in aerospace

    NASA Technical Reports Server (NTRS)

    Bishop, Ann Peterson; Pinelli, Thomas E.

    1995-01-01

    This paper presents data on the value of computer networks that were obtained from a national survey of 2000 aerospace engineers that was conducted in 1993. Survey respondents reported the extent to which they used computer networks in their work and communication and offered their assessments of the value of various network types and applications. They also provided information about the positive impacts of networks on their work, which presents another perspective on value. Finally, aerospace engineers' recommendations on network implementation present suggestions for increasing the value of computer networks within aerospace organizations.

  15. Graduate Statistics: Student Attitudes

    ERIC Educational Resources Information Center

    Kennedy, Robert L.; Broadston, Pamela M.

    2004-01-01

    This study investigated the attitudes toward statistics of graduate students who used a computer program as part of the instruction, which allowed for an individualized, self-paced, student-centered, activity-based course. The twelve sections involved in this study were offered in the spring and fall 2001, spring and fall 2002, spring and fall…

  16. Community College Users' Report, Fall 1975.

    ERIC Educational Resources Information Center

    Zimmer, A. L., Ed.

    This report was compiled from information supplied by instructors participating in the National Science Foundation's community college field test of PLATO IV--a computer-based system developed at the University of Illinois--during the fall semester of 1975. Represented here are the responses of instructors at five Illinois community colleges to…

  17. DECUS Proceedings; Fall 1971, Papers and Presentations.

    ERIC Educational Resources Information Center

    1971

    Papers and presentations at the 1971 symposium of the Digital Equipment Computer Users Society (DECUS) are presented. The papers deal with medical and physiological applications, computer graphics, simulation education, small computer executive systems, management information tools, data acquisition systems, and high level languages. Although many…

  18. Providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOEpatents

    Archer, Charles J.; Faraj, Ahmad A.; Inglett, Todd A.; Ratterman, Joseph D.

    2012-10-23

    Methods, apparatus, and products are disclosed for providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: identifying each link in the global combining network for each compute node of the operational group; designating one of a plurality of point-to-point class routing identifiers for each link such that no compute node in the operational group is connected to two adjacent compute nodes in the operational group with links designated for the same class routing identifiers; and configuring each compute node of the operational group for point-to-point communications with each adjacent compute node in the global combining network through the link between that compute node and that adjacent compute node using that link's designated class routing identifier.

  19. A Low Cost Micro-Computer Based Local Area Network for Medical Office and Medical Center Automation

    PubMed Central

    Epstein, Mel H.; Epstein, Lynn H.; Emerson, Ron G.

    1984-01-01

    A Low Cost Micro-computer based Local Area Network for medical office automation is described which makes use of an array of multiple and different personal computers interconnected by a local area network. Each computer on the network functions as fully potent workstations for data entry and report generation. The network allows each workstation complete access to the entire database. Additionally, designated computers may serve as access ports for remote terminals. Through “Gateways” the network may serve as a front end for a large mainframe, or may interface with another network. The system provides for the medical office environment the expandability and flexibility of a multi-terminal mainframe system at a far lower cost without sacrifice of performance.

  20. Class network routing

    DOEpatents

    Bhanot, Gyan [Princeton, NJ; Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Steinmacher-Burow, Burkhard D [Mount Kisco, NY; Takken, Todd E [Mount Kisco, NY; Vranas, Pavlos M [Bedford Hills, NY

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  1. A reliable transmission protocol for ZigBee-based wireless patient monitoring.

    PubMed

    Chen, Shyr-Kuen; Kao, Tsair; Chan, Chia-Tai; Huang, Chih-Ning; Chiang, Chih-Yen; Lai, Chin-Yu; Tung, Tse-Hua; Wang, Pi-Chung

    2012-01-01

    Patient monitoring systems are gaining their importance as the fast-growing global elderly population increases demands for caretaking. These systems use wireless technologies to transmit vital signs for medical evaluation. In a multihop ZigBee network, the existing systems usually use broadcast or multicast schemes to increase the reliability of signals transmission; however, both the schemes lead to significantly higher network traffic and end-to-end transmission delay. In this paper, we present a reliable transmission protocol based on anycast routing for wireless patient monitoring. Our scheme automatically selects the closest data receiver in an anycast group as a destination to reduce the transmission latency as well as the control overhead. The new protocol also shortens the latency of path recovery by initiating route recovery from the intermediate routers of the original path. On the basis of a reliable transmission scheme, we implement a ZigBee device for fall monitoring, which integrates fall detection, indoor positioning, and ECG monitoring. When the triaxial accelerometer of the device detects a fall, the current position of the patient is transmitted to an emergency center through a ZigBee network. In order to clarify the situation of the fallen patient, 4-s ECG signals are also transmitted. Our transmission scheme ensures the successful transmission of these critical messages. The experimental results show that our scheme is fast and reliable. We also demonstrate that our devices can seamlessly integrate with the next generation technology of wireless wide area network, worldwide interoperability for microwave access, to achieve real-time patient monitoring.

  2. Using commercial video games for falls prevention in older adults: the way for the future?

    PubMed

    Pietrzak, Eva; Cotea, Cristina; Pullman, Stephen

    2014-01-01

    Falls in older adults are an increasingly costly public health issue. There are many fall prevention strategies that are effective. However, with an increasing population of older people and ever-decreasing availability of health practitioners and health funding, novel modes of intervention are being developed, including those relying on computer technologies.The aim of this article was to review the literature on the use of exergaming to prevent falls in older adult persons living in the community. The Cochrane, Medline, and Embase databases were searched using prespecified search terms. To be included, studies had to investigate the effect of using commercially available consoles and video games on outcome measures such as a decrease in falls, improvements in balance control or gait parameters, decreased fear of falling, and attitude to exercise in older adult persons living in the community. All study designs with the exception of single-person case studies were included. Articles had to be published in peer-reviewed journals in the English language. Nineteen studies fulfilled the inclusion criteria. The following outcomes were observed: (1) using computer-based virtual reality gaming for balance training in older adults was feasible; (2) the majority of studies showed a positive effect of exergaming on balance control; (3) some studies showed a positive effect on balance confidence and gait parameters; (4) the effect was seen across the age and sex spectrum of older adults, including those with and without balance impairment. There is as yet no evidence that using virtual reality games will prevent falls, but there is an indication that their use in balance training may improve balance control, which in turn may lead to falls prevention.

  3. Computer network security for the radiology enterprise.

    PubMed

    Eng, J

    2001-08-01

    As computer networks become an integral part of the radiology practice, it is appropriate to raise concerns regarding their security. The purpose of this article is to present an overview of computer network security risks and preventive strategies as they pertain to the radiology enterprise. A number of technologies are available that provide strong deterrence against attacks on networks and networked computer systems in the radiology enterprise. While effective, these technologies must be supplemented with vigilant user and system management.

  4. Efficiently modeling neural networks on massively parallel computers

    NASA Technical Reports Server (NTRS)

    Farber, Robert M.

    1993-01-01

    Neural networks are a very useful tool for analyzing and modeling complex real world systems. Applying neural network simulations to real world problems generally involves large amounts of data and massive amounts of computation. To efficiently handle the computational requirements of large problems, we have implemented at Los Alamos a highly efficient neural network compiler for serial computers, vector computers, vector parallel computers, and fine grain SIMD computers such as the CM-2 connection machine. This paper describes the mapping used by the compiler to implement feed-forward backpropagation neural networks for a SIMD (Single Instruction Multiple Data) architecture parallel computer. Thinking Machines Corporation has benchmarked our code at 1.3 billion interconnects per second (approximately 3 gigaflops) on a 64,000 processor CM-2 connection machine (Singer 1990). This mapping is applicable to other SIMD computers and can be implemented on MIMD computers such as the CM-5 connection machine. Our mapping has virtually no communications overhead with the exception of the communications required for a global summation across the processors (which has a sub-linear runtime growth on the order of O(log(number of processors)). We can efficiently model very large neural networks which have many neurons and interconnects and our mapping can extend to arbitrarily large networks (within memory limitations) by merging the memory space of separate processors with fast adjacent processor interprocessor communications. This paper will consider the simulation of only feed forward neural network although this method is extendable to recurrent networks.

  5. Fragmentation alters stream fish community structure in dendritic ecological networks.

    PubMed

    Perkin, Joshuah S; Gido, Keith B

    2012-12-01

    Effects of fragmentation on the ecology of organisms occupying dendritic ecological networks (DENs) have recently been described through both conceptual and mathematical models, but few hypotheses have been tested in complex, real-world ecosystems. Stream fishes provide a model system for assessing effects of fragmentation on the structure of communities occurring within DENs, including how fragmentation alters metacommunity dynamics and biodiversity. A recently developed habitat-availability measure, the "dendritic connectivity index" (DCI), allows for assigning quantitative measures of connectivity in DENs regardless of network extent or complexity, and might be used to predict fish community response to fragmentation. We characterized stream fish community structure in 12 DENs in the Great Plains, USA, during periods of dynamic (summer) and muted (fall) discharge regimes to test the DCI as a predictive model of fish community response to fragmentation imposed by road crossings. Results indicated that fish communities in stream segments isolated by road crossings had reduced species richness (alpha diversity) relative to communities that maintained connectivity with the surrounding DEN during summer and fall. Furthermore, isolated communities had greater dissimilarity (beta diversity) to downstream sites notisolated by road crossings during summer and fall. Finally, dissimilarity among communities within DENs decreased as a function of increased habitat connectivity (measured using the DCI) for summer and fall, suggesting that communities within highly connected DENs tend to be more homogeneous. Our results indicate that the DCI is sensitive to community effects of fragmentation in riverscapes and might be used by managers to predict ecological responses to changes in habitat connectivity. Moreover, our findings illustrate that relating structural connectivity of riverscapes to functional connectivity among communities might aid in maintaining metacommunity dynamics and biodiversity in complex dendritic ecosystems.

  6. Hyperswitch Communication Network Computer

    NASA Technical Reports Server (NTRS)

    Peterson, John C.; Chow, Edward T.; Priel, Moshe; Upchurch, Edwin T.

    1993-01-01

    Hyperswitch Communications Network (HCN) computer is prototype multiple-processor computer being developed. Incorporates improved version of hyperswitch communication network described in "Hyperswitch Network For Hypercube Computer" (NPO-16905). Designed to support high-level software and expansion of itself. HCN computer is message-passing, multiple-instruction/multiple-data computer offering significant advantages over older single-processor and bus-based multiple-processor computers, with respect to price/performance ratio, reliability, availability, and manufacturing. Design of HCN operating-system software provides flexible computing environment accommodating both parallel and distributed processing. Also achieves balance among following competing factors; performance in processing and communications, ease of use, and tolerance of (and recovery from) faults.

  7. Whole Language as an Ecological Phenomenon: On Sustaining the Agonies of Innovative Language Arts Practices.

    ERIC Educational Resources Information Center

    Field, James C.; Jardine, David W.

    In the area of language instruction, a network of ecological relationships exists among the teacher, the child, and the text--the sustaining and nurturing of these relationships is at the heart of whole language instruction. Moreover, this network of relationships falls prey to neither of the unsustainable extremities of "gericentrism"…

  8. Middle College. National Dropout Prevention Center/Network Newsletter. Volume 17, Number 4, Fall 2005

    ERIC Educational Resources Information Center

    Duckenfield, Marty, Ed.

    2005-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) College As A Bridge to High School Graduation (Terry Cash); (2) 2005 NDPN Crystal Star Awards of Excellence; (3) Mott Middle College (Chery S. Wagonlander); (4) Gateway to…

  9. Valley segments, stream reaches, and channel units [Chapter 2

    Treesearch

    Peter A. Bisson; David R. Montgomery; John M. Buffington

    2006-01-01

    Valley segments, stream reaches, and channel units are three hierarchically nested subdivisions of the drainage network (Frissell et al. 1986), falling in size between landscapes and watersheds (see Chapter 1) and individual point measurements made along the stream network (Table 2.1; also see Chapters 3 and 4). These three subdivisions compose the habitat for large,...

  10. Network Patch Cables Demystified: A Super Activity for Computer Networking Technology

    ERIC Educational Resources Information Center

    Brown, Douglas L.

    2004-01-01

    This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the…

  11. An advanced modelling tool for simulating complex river systems.

    PubMed

    Trancoso, Ana Rosa; Braunschweig, Frank; Chambel Leitão, Pedro; Obermann, Matthias; Neves, Ramiro

    2009-04-01

    The present paper describes MOHID River Network (MRN), a 1D hydrodynamic model for river networks as part of MOHID Water Modelling System, which is a modular system for the simulation of water bodies (hydrodynamics and water constituents). MRN is capable of simulating water quality in the aquatic and benthic phase and its development was especially focused on the reproduction of processes occurring in temporary river networks (flush events, pools formation, and transmission losses). Further, unlike many other models, it allows the quantification of settled materials at the channel bed also over periods when the river falls dry. These features are very important to secure mass conservation in highly varying flows of temporary rivers. The water quality models existing in MOHID are base on well-known ecological models, such as WASP and ERSEM, the latter allowing explicit parameterization of C, N, P, Si, and O cycles. MRN can be coupled to the basin model, MOHID Land, with computes runoff and porous media transport, allowing for the dynamic exchange of water and materials between the river and surroundings, or it can be used as a standalone model, receiving discharges at any specified nodes (ASCII files of time series with arbitrary time step). These features account for spatial gradients in precipitation which can be significant in Mediterranean-like basins. An interface has been already developed for SWAT basin model.

  12. Chinese Herbal Medicine Meets Biological Networks of Complex Diseases: A Computational Perspective

    PubMed Central

    Gu, Shuo

    2017-01-01

    With the rapid development of cheminformatics, computational biology, and systems biology, great progress has been made recently in the computational research of Chinese herbal medicine with in-depth understanding towards pharmacognosy. This paper summarized these studies in the aspects of computational methods, traditional Chinese medicine (TCM) compound databases, and TCM network pharmacology. Furthermore, we chose arachidonic acid metabolic network as a case study to demonstrate the regulatory function of herbal medicine in the treatment of inflammation at network level. Finally, a computational workflow for the network-based TCM study, derived from our previous successful applications, was proposed. PMID:28690664

  13. Chinese Herbal Medicine Meets Biological Networks of Complex Diseases: A Computational Perspective.

    PubMed

    Gu, Shuo; Pei, Jianfeng

    2017-01-01

    With the rapid development of cheminformatics, computational biology, and systems biology, great progress has been made recently in the computational research of Chinese herbal medicine with in-depth understanding towards pharmacognosy. This paper summarized these studies in the aspects of computational methods, traditional Chinese medicine (TCM) compound databases, and TCM network pharmacology. Furthermore, we chose arachidonic acid metabolic network as a case study to demonstrate the regulatory function of herbal medicine in the treatment of inflammation at network level. Finally, a computational workflow for the network-based TCM study, derived from our previous successful applications, was proposed.

  14. HeNCE: A Heterogeneous Network Computing Environment

    DOE PAGES

    Beguelin, Adam; Dongarra, Jack J.; Geist, George Al; ...

    1994-01-01

    Network computing seeks to utilize the aggregate resources of many networked computers to solve a single problem. In so doing it is often possible to obtain supercomputer performance from an inexpensive local area network. The drawback is that network computing is complicated and error prone when done by hand, especially if the computers have different operating systems and data formats and are thus heterogeneous. The heterogeneous network computing environment (HeNCE) is an integrated graphical environment for creating and running parallel programs over a heterogeneous collection of computers. It is built on a lower level package called parallel virtual machine (PVM).more » The HeNCE philosophy of parallel programming is to have the programmer graphically specify the parallelism of a computation and to automate, as much as possible, the tasks of writing, compiling, executing, debugging, and tracing the network computation. Key to HeNCE is a graphical language based on directed graphs that describe the parallelism and data dependencies of an application. Nodes in the graphs represent conventional Fortran or C subroutines and the arcs represent data and control flow. This article describes the present state of HeNCE, its capabilities, limitations, and areas of future research.« less

  15. Special Report: Computational Science — Behind Innovation and Discovery: More, faster, better, moving computational sciences forward—an interview with PNNL's George Michaels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Teske, Lisa J.; Michaels, George S.

    2005-10-25

    The fall issue of Breakthroughs will have a special section on CISD. This article falls in that section as the introduction piece for the directorate. I conducted an in-depth interview with George and came away with a lot of notes. Knowing that other articles in the special section are covering the specifics of the various initiatives within the directorate, this is a high-level view from George's perspective. The idea is the help readers (government supporters and funders and potential industry clients) understand the capability and level of service the lab can offer having a research directorate focused on computational andmore » informational sciences.« less

  16. Computer Programs for Library Operations; Results of a Survey Conducted Between Fall 1971 and Spring 1972.

    ERIC Educational Resources Information Center

    Liberman, Eva; And Others

    Many library operations involving large data banks lend themselves readily to computer operation. In setting up library computer programs, in changing or expanding programs, cost in programming and time delays could be substantially reduced if the programmers had access to library computer programs being used by other libraries, providing similar…

  17. Towards a light-weight query engine for accessing health sensor data in a fall prevention system.

    PubMed

    Kreiner, Karl; Gossy, Christian; Drobics, Mario

    2014-01-01

    Connecting various sensors in sensor networks has become popular during the last decade. An important aspect next to storing and creating data is information access by domain experts, such as researchers, caretakers and physicians. In this work we present the design and prototypic implementation of a light-weight query engine using natural language processing for accessing health-related sensor data in a fall prevention system.

  18. Odontoid fracture following a fall in an elderly man.

    PubMed

    Pagnez, Maria Alice Mainenti; Elliott, James M

    2011-12-01

    The patient was a 79-year-old man with a chief complaint of neck pain after a fall. Three days following the fall, the patient was seen in the emergency department, where computed tomography imaging of the head and radiographs of the cervical spine were completed. The patient was subsequently referred to a physical therapist. Due to concern for a possible undetected cervical spine fracture, the patient was immediately referred to his physician. Magnetic resonance imaging demonstrated a type II fracture of the odontoid.

  19. Analysis of Computer Network Information Based on "Big Data"

    NASA Astrophysics Data System (ADS)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  20. Pacific Educational Computer Network Study. Final Report.

    ERIC Educational Resources Information Center

    Hawaii Univ., Honolulu. ALOHA System.

    The Pacific Educational Computer Network Feasibility Study examined technical and non-technical aspects of the formation of an international Pacific Area computer network for higher education. The technical study covered the assessment of the feasibility of a packet-switched satellite and radio ground distribution network for data transmission…

  1. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    ERIC Educational Resources Information Center

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  2. Equivalent Fall Risk in Elderly Patients on Hemodialysis and Peritoneal Dialysis.

    PubMed

    Farragher, Janine; Rajan, Tasleem; Chiu, Ernest; Ulutas, Ozkan; Tomlinson, George; Cook, Wendy L; Jassal, Sarbjit V

    2016-01-01

    ♦ Accidental falls are common in the hemodialysis (HD) population. The high fall rate has been attributed to a combination of aging, kidney disease-related morbidity, and HD treatment-related hazards. We hypothesized that patients maintained on peritoneal dialysis (PD) would have fewer falls than those on chronic HD. The objective of this study was to compare the falls risk between cohorts of elderly patients maintained on HD and PD, using prospective data from a large academic dialysis facility. ♦ Patients aged 65 years or over on chronic in-hospital HD and PD at the University Health Network were recruited. Patients were followed biweekly, and falls occurring within the first year recorded. Fall risk between the 2 groups was compared using both crude and adjusted Poisson lognormal random effects modeling. ♦ Out of 258 potential patients, 236 were recruited, assessed at baseline, and followed biweekly for falls. Of 74 PD patients, 40 (54%) experienced 86 falls while 76 out of 162 (47%) HD patients experienced a total of 305 falls (crude fall rate 1.25 vs 1.60 respectively, odds ratio [OR] falls in PD patients 0.78, 95% confidence interval [CI] 0.61 - 0.92, p = 0.04). After adjustment for differences in comorbidity, number of medications, and other demographic differences, PD patients were no less likely to experience accidental falls than HD patients (OR 1.63, 95% CI 0.88 - 3.04, p = 0.1). ♦ We conclude that accidental falls are equally common in the PD population and the HD population. These data argue against post-HD hypotension as the sole contributor to the high fall risk in the dialysis population. Copyright © 2016 International Society for Peritoneal Dialysis.

  3. A Teaching--Learning Sequence on Free Fall Motion

    ERIC Educational Resources Information Center

    Borghi, L.; De Ambrosis, A.; Lamberti, N.; Mascheretti, P.

    2005-01-01

    A teaching--learning sequence is presented that is designed to help high school pupils gain awareness about the independence of the vertical and horizontal components of free fall motion. The approach we propose is based on the use of experimental activities and computer simulations designed specifically to help pupils reflect on the experiments…

  4. Manoa's Community College Transfers, Fall 1970-Fall 1974.

    ERIC Educational Resources Information Center

    Hawaii Univ., Honolulu. Community Coll. System.

    This document presents a series of tables providing information regarding community college transfers to the Manoa and Hilo campuses of the University of Hawaii. Data was obtained from several campus computer reports and the community college graduate lists submitted to the Office of the Vice President for Community Colleges. The following tables…

  5. EXercising with Computers in Later Life (EXCELL) - pilot and feasibility study of the acceptability of the Nintendo® WiiFit in community-dwelling fallers.

    PubMed

    Williams, Marie A; Soiza, Roy L; Jenkinson, Alison McE; Stewart, Alison

    2010-09-13

    Falls management programmes have been instituted to attempt to reduce falls. This pilot study was undertaken to determine whether the Nintendo® WiiFit was a feasible and acceptable intervention in community-dwelling older fallers. Community-dwelling fallers over 70 years were recruited and attended for computer-based exercises (n = 15) or standard care (n = 6). Balance and fear of falling were assessed at weeks 0, 4 and 12. Participants were interviewed on completion of the study to determine whether the intervention was acceptable.Eighty percent of participants attended 75% or more of the exercise sessions. An improvement in Berg Score was seen at four weeks (p = 0.02) and in Wii Age at 12 weeks (p = 0.03) in the intervention group. There was no improvement in balance scores in the standard care group. WiiFit exercise is acceptable in self-referred older people with a history of falls. The WiiFit has the potential to improve balance but further work is required. ClinicalTrials.gov - NCT01082042.

  6. Delivering The Benefits of Chemical-Biological Integration in Computational Toxicology at the EPA (ACS Fall meeting)

    EPA Science Inventory

    Abstract: Researchers at the EPA’s National Center for Computational Toxicology integrate advances in biology, chemistry, and computer science to examine the toxicity of chemicals and help prioritize chemicals for further research based on potential human health risks. The intent...

  7. Comptox Chemistry Dashboard: Web-Based Data Integration Hub for Environmental Chemistry and Toxicology Data (ACS Fall meeting 4 of 12)

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) Computational Toxicology Program integrate advances in biology, chemistry, exposure and computer science to help prioritize chemicals for further research based on potential human health risks. This work involves computational and da...

  8. Modeling resting-state functional networks when the cortex falls asleep: local and global changes.

    PubMed

    Deco, Gustavo; Hagmann, Patric; Hudetz, Anthony G; Tononi, Giulio

    2014-12-01

    The transition from wakefulness to sleep represents the most conspicuous change in behavior and the level of consciousness occurring in the healthy brain. It is accompanied by similarly conspicuous changes in neural dynamics, traditionally exemplified by the change from "desynchronized" electroencephalogram activity in wake to globally synchronized slow wave activity of early sleep. However, unit and local field recordings indicate that the transition is more gradual than it might appear: On one hand, local slow waves already appear during wake; on the other hand, slow sleep waves are only rarely global. Studies with functional magnetic resonance imaging also reveal changes in resting-state functional connectivity (FC) between wake and slow wave sleep. However, it remains unclear how resting-state networks may change during this transition period. Here, we employ large-scale modeling of the human cortico-cortical anatomical connectivity to evaluate changes in resting-state FC when the model "falls asleep" due to the progressive decrease in arousal-promoting neuromodulation. When cholinergic neuromodulation is parametrically decreased, local slow waves appear, while the overall organization of resting-state networks does not change. Furthermore, we show that these local slow waves are structured macroscopically in networks that resemble the resting-state networks. In contrast, when the neuromodulator decrease further to very low levels, slow waves become global and resting-state networks merge into a single undifferentiated, broadly synchronized network. © The Author 2013. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  9. Distributed Computer Networks in Support of Complex Group Practices

    PubMed Central

    Wess, Bernard P.

    1978-01-01

    The economics of medical computer networks are presented in context with the patient care and administrative goals of medical networks. Design alternatives and network topologies are discussed with an emphasis on medical network design requirements in distributed data base design, telecommunications, satellite systems, and software engineering. The success of the medical computer networking technology is predicated on the ability of medical and data processing professionals to design comprehensive, efficient, and virtually impenetrable security systems to protect data bases, network access and services, and patient confidentiality.

  10. Military clouds: utilization of cloud computing systems at the battlefield

    NASA Astrophysics Data System (ADS)

    Süleyman, Sarıkürk; Volkan, Karaca; İbrahim, Kocaman; Ahmet, Şirzai

    2012-05-01

    Cloud computing is known as a novel information technology (IT) concept, which involves facilitated and rapid access to networks, servers, data saving media, applications and services via Internet with minimum hardware requirements. Use of information systems and technologies at the battlefield is not new. Information superiority is a force multiplier and is crucial to mission success. Recent advances in information systems and technologies provide new means to decision makers and users in order to gain information superiority. These developments in information technologies lead to a new term, which is known as network centric capability. Similar to network centric capable systems, cloud computing systems are operational today. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to network centric applications will increase the flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities. In this paper, cloud computing and network centric capability concepts are defined. Some commercial cloud computing products and applications are mentioned. Network centric capable applications are covered. Cloud computing supported battlefield applications are analyzed. The effects of cloud computing systems on network centric capability and on the information domain in future warfare are discussed. Battlefield opportunities and novelties which might be introduced to network centric capability by cloud computing systems are researched. The role of military clouds in future warfare is proposed in this paper. It was concluded that military clouds will be indispensible components of the future battlefield. Military clouds have the potential of improving network centric capabilities, increasing situational awareness at the battlefield and facilitating the settlement of information superiority.

  11. The numerical modelling of falling film thickness flow on horizontal tubes

    NASA Astrophysics Data System (ADS)

    Hassan, I. A.; Sadikin, A.; Isa, N. Mat

    2017-04-01

    This paper presents a computational modelling of water falling film flowing over horizontal tubes. The objective of this study is to use numerical predictions for comparing the film thickness along circumferential direction of tube on 2-D CFD models. The results are then validated with a theoretical result in previous literatures. A comprehensive design of 2-D models have been developed according to the real application and actual configuration of the falling film evaporator as well as previous experimental parameters. A computational modelling of the water falling film is presented with the aid of Ansys Fluent software. The Volume of Fluid (VOF) technique is adapted in this analysis since its capabilities of determining the film thickness on tubes surface is highly reliable. The numerical analysis is carried out under influence of ambient pressures at temperature of 27 °C. Three types of CFD numerical models were analyzed in this simulation with inter tube spacing of 30 mm, 20 mm and 10 mm respectively. The use of a numerical simulation tool on water falling film has resulted in a detailed investigation of film thickness. Based on the numerical simulated results, it is found that the average values of water film thickness for each model are 0.53 mm, 0.58 mm, and 0.63 mm.

  12. Comparisons of Interventions for Preventing Falls in Older Adults

    PubMed Central

    Tricco, Andrea C.; Thomas, Sonia M.; Veroniki, Areti Angeliki; Hamid, Jemila S.; Cogo, Elise; Strifler, Lisa; Khan, Paul A.; Robson, Reid; Sibley, Kathryn M.; MacDonald, Heather; Riva, John J.; Thavorn, Kednapa; Wilson, Charlotte; Holroyd-Leduc, Jayna; Kerr, Gillian D.; Feldman, Fabio; Majumdar, Sumit R.; Jaglal, Susan B.; Hui, Wing

    2017-01-01

    Importance Falls result in substantial burden for patients and health care systems, and given the aging of the population worldwide, the incidence of falls continues to rise. Objective To assess the potential effectiveness of interventions for preventing falls. Data Sources MEDLINE, Embase, Cochrane Central Register of Controlled Trials, and Ageline databases from inception until April 2017. Reference lists of included studies were scanned. Study Selection Randomized clinical trials (RCTs) of fall-prevention interventions for participants aged 65 years and older. Data Extraction and Synthesis Pairs of reviewers independently screened the studies, abstracted data, and appraised risk of bias. Pairwise meta-analysis and network meta-analysis were conducted. Main Outcomes and Measures Injurious falls and fall-related hospitalizations. Results A total of 283 RCTs (159 910 participants; mean age, 78.1 years; 74% women) were included after screening of 10 650 titles and abstracts and 1210 full-text articles. Network meta-analysis (including 54 RCTs, 41 596 participants, 39 interventions plus usual care) suggested that the following interventions, when compared with usual care, were associated with reductions in injurious falls: exercise (odds ratio [OR], 0.51 [95% CI, 0.33 to 0.79]; absolute risk difference [ARD], −0.67 [95% CI, −1.10 to −0.24]); combined exercise and vision assessment and treatment (OR, 0.17 [95% CI, 0.07 to 0.38]; ARD, −1.79 [95% CI, −2.63 to −0.96]); combined exercise, vision assessment and treatment, and environmental assessment and modification (OR, 0.30 [95% CI, 0.13 to 0.70]; ARD, −1.19 [95% CI, −2.04 to −0.35]); and combined clinic-level quality improvement strategies (eg, case management), multifactorial assessment and treatment (eg, comprehensive geriatric assessment), calcium supplementation, and vitamin D supplementation (OR, 0.12 [95% CI, 0.03 to 0.55]; ARD, −2.08 [95% CI, −3.56 to −0.60]). Pairwise meta-analyses for fall-related hospitalizations (2 RCTs; 516 participants) showed no significant association between combined clinic- and patient-level quality improvement strategies and multifactorial assessment and treatment relative to usual care (OR, 0.78 [95% CI, 0.33 to 1.81]). Conclusions and Relevance Exercise alone and various combinations of interventions were associated with lower risk of injurious falls compared with usual care. Choice of fall-prevention intervention may depend on patient and caregiver values and preferences. PMID:29114830

  13. Configuring compute nodes of a parallel computer in an operational group into a plurality of independent non-overlapping collective networks

    DOEpatents

    Archer, Charles J.; Inglett, Todd A.; Ratterman, Joseph D.; Smith, Brian E.

    2010-03-02

    Methods, apparatus, and products are disclosed for configuring compute nodes of a parallel computer in an operational group into a plurality of independent non-overlapping collective networks, the compute nodes in the operational group connected together for data communications through a global combining network, that include: partitioning the compute nodes in the operational group into a plurality of non-overlapping subgroups; designating one compute node from each of the non-overlapping subgroups as a master node; and assigning, to the compute nodes in each of the non-overlapping subgroups, class routing instructions that organize the compute nodes in that non-overlapping subgroup as a collective network such that the master node is a physical root.

  14. Availability of Earth observations data from the U.S. Geological Survey's EROS data center

    USGS Publications Warehouse

    Holm, Thomas M.; Draeger, William C.; Risty, Ronald R.

    1993-01-01

    For decades federal and state agencies have been collecting regional, continental, and global Earth observations data acquired by satellites, aircraft, and other information-gathering systems. These data include photographic and digital remotely sensed images of the Earth's surface, as well as earth science, cartographic, and geographic data. Since 1973, the U.S. Geological Survey's Earth Resources Observation Systems (EROS) Data Center (EDC) in Sioux Falls, South Dakota, has been a data management, production, dissemination, and research center for these data. Currently, the Data Center holds over 10 million satellite images and aerial photographs, in photographic and digital formats. Users are able to place inquiries and orders for these holdings via a nationwide computer network. In addition to cataloging the data stored in its archives, the Data Center provides users with rapid access to information on many data collections held by other facilities.

  15. Turkish meteor surveillance systems and network: Impact craters and meteorites database

    NASA Astrophysics Data System (ADS)

    Unsalan, O.; Ozel, M. E.; Derman, I. E.; Terzioglu, Z.; Kaygisiz, E.; Temel, T.; Topoyan, D.; Solmaz, A.; Yilmaz Kocahan, O.; Esenoglu, H. H.; Emrahoglu, N.; Yilmaz, A.; Yalcinkaya, B. O.

    2014-07-01

    In our project, we aim toward constructing Turkish Meteor Surveillance Systems and Network in Turkey. For this goal, video observational systems from SonotaCo (Japan) were chosen. Meteors are going to be observed with the specific cameras, their orbits will be calculated by the software from SonotaCo, and the places where they will be falling / impacting will be examined by field trips. The collected meteorites will be investigated by IR-Raman Spectroscopic techniques and SEM-EDX analyses in order to setup a database. On the other hand, according to our Prime Ministry Ottoman Archives, there are huge amounts of reports of falls for the past centuries. In order to treat these data properly, it is obvious that processing systems should be constructed and developed.

  16. Optical Mass Displacement Tracking: A simplified field calibration method for the electro-mechanical seismometer.

    NASA Astrophysics Data System (ADS)

    Burk, D. R.; Mackey, K. G.; Hartse, H. E.

    2016-12-01

    We have developed a simplified field calibration method for use in seismic networks that still employ the classical electro-mechanical seismometer. Smaller networks may not always have the financial capability to purchase and operate modern, state of the art equipment. Therefore these networks generally operate a modern, low-cost digitizer that is paired to an existing electro-mechanical seismometer. These systems are typically poorly calibrated. Calibration of the station is difficult to estimate because coil loading, digitizer input impedance, and amplifier gain differences vary by station and digitizer model. Therefore, it is necessary to calibrate the station channel as a complete system to take into account all components from instrument, to amplifier, to even the digitizer. Routine calibrations at the smaller networks are not always consistent, because existing calibration techniques require either specialized equipment or significant technical expertise. To improve station data quality at the small network, we developed a calibration method that utilizes open source software and a commonly available laser position sensor. Using a signal generator and a small excitation coil, we force the mass of the instrument to oscillate at various frequencies across its operating range. We then compare the channel voltage output to the laser-measured mass displacement to determine the instrument voltage sensitivity at each frequency point. Using the standard equations of forced motion, a representation of the calibration curve as a function of voltage per unit of ground velocity is calculated. A computer algorithm optimizes the curve and then translates the instrument response into a Seismic Analysis Code (SAC) poles & zeros format. Results have been demonstrated to fall within a few percent of a standard laboratory calibration. This method is an effective and affordable option for networks that employ electro-mechanical seismometers, and it is currently being deployed in regional networks throughout Russia and in Central Asia.

  17. The Merit Computer Network

    ERIC Educational Resources Information Center

    Aupperle, Eric M.; Davis, Donna L.

    1978-01-01

    The successful Merit Computer Network is examined in terms of both technology and operational management. The network is fully operational and has a significant and rapidly increasing usage, with three major institutions currently sharing computer resources. (Author/CMV)

  18. Numerical Stability and Control Analysis Towards Falling-Leaf Prediction Capabilities of Splitflow for Two Generic High-Performance Aircraft Models

    NASA Technical Reports Server (NTRS)

    Charlton, Eric F.

    1998-01-01

    Aerodynamic analysis are performed using the Lockheed-Martin Tactical Aircraft Systems (LMTAS) Splitflow computational fluid dynamics code to investigate the computational prediction capabilities for vortex-dominated flow fields of two different tailless aircraft models at large angles of attack and sideslip. These computations are performed with the goal of providing useful stability and control data to designers of high performance aircraft. Appropriate metrics for accuracy, time, and ease of use are determined in consultations with both the LMTAS Advanced Design and Stability and Control groups. Results are obtained and compared to wind-tunnel data for all six components of forces and moments. Moment data is combined to form a "falling leaf" stability analysis. Finally, a handful of viscous simulations were also performed to further investigate nonlinearities and possible viscous effects in the differences between the accumulated inviscid computational and experimental data.

  19. A ZigBee-Based Location-Aware Fall Detection System for Improving Elderly Telecare

    PubMed Central

    Huang, Chih-Ning; Chan, Chia-Tai

    2014-01-01

    Falls are the primary cause of accidents among the elderly and frequently cause fatal and non-fatal injuries associated with a large amount of medical costs. Fall detection using wearable wireless sensor nodes has the potential of improving elderly telecare. This investigation proposes a ZigBee-based location-aware fall detection system for elderly telecare that provides an unobstructed communication between the elderly and caregivers when falls happen. The system is based on ZigBee-based sensor networks, and the sensor node consists of a motherboard with a tri-axial accelerometer and a ZigBee module. A wireless sensor node worn on the waist continuously detects fall events and starts an indoor positioning engine as soon as a fall happens. In the fall detection scheme, this study proposes a three-phase threshold-based fall detection algorithm to detect critical and normal falls. The fall alarm can be canceled by pressing and holding the emergency fall button only when a normal fall is detected. On the other hand, there are three phases in the indoor positioning engine: path loss survey phase, Received Signal Strength Indicator (RSSI) collection phase and location calculation phase. Finally, the location of the faller will be calculated by a k-nearest neighbor algorithm with weighted RSSI. The experimental results demonstrate that the fall detection algorithm achieves 95.63% sensitivity, 73.5% specificity, 88.62% accuracy and 88.6% precision. Furthermore, the average error distance for indoor positioning is 1.15 ± 0.54 m. The proposed system successfully delivers critical information to remote telecare providers who can then immediately help a fallen person. PMID:24743841

  20. Research and realization implementation of monitor technology on illegal external link of classified computer

    NASA Astrophysics Data System (ADS)

    Zhang, Hong

    2017-06-01

    In recent years, with the continuous development and application of network technology, network security has gradually entered people's field of vision. The host computer network external network of violations is an important reason for the threat of network security. At present, most of the work units have a certain degree of attention to network security, has taken a lot of means and methods to prevent network security problems such as the physical isolation of the internal network, install the firewall at the exit. However, these measures and methods to improve network security are often not comply with the safety rules of human behavior damage. For example, the host to wireless Internet access and dual-network card to access the Internet, inadvertently formed a two-way network of external networks and computer connections [1]. As a result, it is possible to cause some important documents and confidentiality leak even in the the circumstances of user unaware completely. Secrecy Computer Violation Out-of-band monitoring technology can largely prevent the violation by monitoring the behavior of the offending connection. In this paper, we mainly research and discuss the technology of secret computer monitoring.

  1. A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks

    NASA Technical Reports Server (NTRS)

    Cui, Zhenqian

    1999-01-01

    With the development of high-speed networking technology, computer networks, including local-area networks (LANs), wide-area networks (WANs) and the Internet, are extending their traditional roles of carrying computer data. They are being used for Internet telephony, multimedia applications such as conferencing and video on demand, distributed simulations, and other real-time applications. LANs are even used for distributed real-time process control and computing as a cost-effective approach. Differing from traditional data transfer, these new classes of high-speed network applications (video, audio, real-time process control, and others) are delay sensitive. The usefulness of data depends not only on the correctness of received data, but also the time that data are received. In other words, these new classes of applications require networks to provide guaranteed services or quality of service (QoS). Quality of service can be defined by a set of parameters and reflects a user's expectation about the underlying network's behavior. Traditionally, distinct services are provided by different kinds of networks. Voice services are provided by telephone networks, video services are provided by cable networks, and data transfer services are provided by computer networks. A single network providing different services is called an integrated-services network.

  2. The Košice meteorite fall: Atmospheric trajectory, fragmentation, and orbit

    NASA Astrophysics Data System (ADS)

    BorovičKa, Jiří; Tóth, Juraj; Igaz, Antal; Spurný, Pavel; Kalenda, Pavel; Haloda, Jakub; Svoreå, Ján; Kornoš, Leonard; Silber, Elizabeth; Brown, Peter; HusáRik, Marek

    2013-10-01

    The Košice meteorite fall occurred in eastern Slovakia on February 28, 2010, 22:25 UT. The very bright bolide was imaged by three security video cameras from Hungary. Detailed bolide light curves were obtained through clouds by radiometers on seven cameras of the European Fireball Network. Records of sonic waves were found on six seismic and four infrasonic stations. An atmospheric dust cloud was observed the next morning before sunrise. After careful calibration, the video records were used to compute the bolide trajectory and velocity. The meteoroid, of estimated mass of 3500 kg, entered the atmosphere with a velocity of 15 km s-1 on a trajectory with a slope of 60° to the horizontal. The largest fragment ceased to be visible at a height of 17 km, where it was decelerated to 4.5 km s-1. A maximum brightness of absolute stellar magnitude about -18 was reached at a height of 36 km. We developed a detailed model of meteoroid atmospheric fragmentation to fit the observed light curve and deceleration. We found that Košice was a weak meteoroid, which started to fragment under the dynamic pressure of only 0.1 MPa and fragmented heavily under 1 MPa. In total, 78 meteorites were recovered in the predicted fall area during official searches. Other meteorites were found by private collectors. Known meteorite masses ranged from 0.56 g to 2.37 kg. The meteorites were classified as ordinary chondrites of type H5 and shock stage S3. The heliocentric orbit had a relatively large semimajor axis of 2.7 AU and aphelion distance of 4.5 ± 0.5 AU. Backward numerical integration of the preimpact orbit indicates possible large variations of the orbital elements in the past due to resonances with Jupiter.

  3. Folksong in the Classroom. A Network of Teachers of History, Literature, Music, and the Humanities, A Newsletter. Volume XII, Fall-Spring 1992.

    ERIC Educational Resources Information Center

    Scott, John W., Ed.; Seidman, Laurence, Ed.

    1992-01-01

    "Folksong in the Classroom" is a newsletter of a network of teachers of history, literature, music, and the humanities. Each issue contains songs, background information, classroom activities, and ideas for teachers to use in integrating folksongs into their teaching. Three issues of "Folksong in the Classroom" are included in…

  4. Falling Behind: Lingering Costs of the High School Transition for Youth Friendships and Grades

    ERIC Educational Resources Information Center

    Felmlee, Diane; McMillan, Cassie; Inara Rodis, Paulina; Osgood, D. Wayne

    2018-01-01

    This study investigates the influence of structural transitions to high school on adolescents' friendship networks and academic grades from 6th through 12th grade, in a direct comparison of students who do and do not transition. We utilize data from 14,462 youth in 51 networks from 26 districts (Promoting School-Community Partnerships to Enhance…

  5. KIPP Leadership Practices through 2010-2011. Technical Report

    ERIC Educational Resources Information Center

    Furgeson, Joshua; Knechtel, Virginia; Sullivan, Margaret; Tuttle, Christina Clark; Akers, Lauren; Anderson, Mary Anne; Barna, Michael; Nichols-Barrer, Ira

    2014-01-01

    The Knowledge Is Power Program (KIPP) is the largest public charter school network in the United States, with 141 elementary, middle, and high schools in the 2013-2014 school year. The network has grown rapidly from KIPP's first fifth grade classes in 1994 and plans to add 23 more schools in fall 2014. KIPP schools and regions are often cited as…

  6. A Study of Complex Deep Learning Networks on High Performance, Neuromorphic, and Quantum Computers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Potok, Thomas E; Schuman, Catherine D; Young, Steven R

    Current Deep Learning models use highly optimized convolutional neural networks (CNN) trained on large graphical processing units (GPU)-based computers with a fairly simple layered network topology, i.e., highly connected layers, without intra-layer connections. Complex topologies have been proposed, but are intractable to train on current systems. Building the topologies of the deep learning network requires hand tuning, and implementing the network in hardware is expensive in both cost and power. In this paper, we evaluate deep learning models using three different computing architectures to address these problems: quantum computing to train complex topologies, high performance computing (HPC) to automatically determinemore » network topology, and neuromorphic computing for a low-power hardware implementation. Due to input size limitations of current quantum computers we use the MNIST dataset for our evaluation. The results show the possibility of using the three architectures in tandem to explore complex deep learning networks that are untrainable using a von Neumann architecture. We show that a quantum computer can find high quality values of intra-layer connections and weights, while yielding a tractable time result as the complexity of the network increases; a high performance computer can find optimal layer-based topologies; and a neuromorphic computer can represent the complex topology and weights derived from the other architectures in low power memristive hardware. This represents a new capability that is not feasible with current von Neumann architecture. It potentially enables the ability to solve very complicated problems unsolvable with current computing technologies.« less

  7. Computer Mediated Social Network Approach to Software Support and Maintenance

    DTIC Science & Technology

    2010-06-01

    Page 1        Computer Mediated  Social   Network  Approach to  Software Support and Maintenance     LTC J. Carlos Vega  *Student Paper*    Point...DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Computer Mediated Social Network Approach to Software Support and Maintenance...This research highlights the preliminary findings on the potential of computer mediated social networks . This research focused on social networks as

  8. Probabilistic Inference in General Graphical Models through Sampling in Stochastic Networks of Spiking Neurons

    PubMed Central

    Pecevski, Dejan; Buesing, Lars; Maass, Wolfgang

    2011-01-01

    An important open problem of computational neuroscience is the generic organization of computations in networks of neurons in the brain. We show here through rigorous theoretical analysis that inherent stochastic features of spiking neurons, in combination with simple nonlinear computational operations in specific network motifs and dendritic arbors, enable networks of spiking neurons to carry out probabilistic inference through sampling in general graphical models. In particular, it enables them to carry out probabilistic inference in Bayesian networks with converging arrows (“explaining away”) and with undirected loops, that occur in many real-world tasks. Ubiquitous stochastic features of networks of spiking neurons, such as trial-to-trial variability and spontaneous activity, are necessary ingredients of the underlying computational organization. We demonstrate through computer simulations that this approach can be scaled up to neural emulations of probabilistic inference in fairly large graphical models, yielding some of the most complex computations that have been carried out so far in networks of spiking neurons. PMID:22219717

  9. Spontaneous Ad Hoc Mobile Cloud Computing Network

    PubMed Central

    Lacuesta, Raquel; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  10. Spontaneous ad hoc mobile cloud computing network.

    PubMed

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  11. People at risk - nexus critical infrastructure and society

    NASA Astrophysics Data System (ADS)

    Heiser, Micha; Thaler, Thomas; Fuchs, Sven

    2016-04-01

    Strategic infrastructure networks include the highly complex and interconnected systems that are so vital to a city or state that any sudden disruption can result in debilitating impacts on human life, the economy and the society as a whole. Recently, various studies have applied complex network-based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards - a major part of them is, particularly after the 9/11 incident, related to terrorism attacks. Here, vulnerability is generally defined as the performance drop of an infrastructure system under a given disruptive event. The performance can be measured by different metrics, which correspond to various levels of resilience. In this paper, we will address vulnerability and exposure of critical infrastructure in the Eastern Alps. The Federal State Tyrol is an international transport route and an essential component of the north-south transport connectivity in Europe. Any interruption of the transport flow leads to incommensurable consequences in terms of indirect losses, since the system does not feature redundant elements at comparable economic efficiency. Natural hazard processes such as floods, debris flows, rock falls and avalanches, endanger this infrastructure line, such as large flood events in 2005 or 2012, rock falls 2014, which had strong impacts to the critical infrastructure, such as disruption of the railway lines (in 2005 and 2012), highways and motorways (in 2014). The aim of this paper is to present how critical infrastructures as well as communities and societies are vulnerable and can be resilient against natural hazard risks and the relative cascading effects to different compartments (industrial, infrastructural, societal, institutional, cultural, etc.), which is the dominant by the type of hazard (avalanches, torrential flooding, debris flow, rock falls). Specific themes will be addressed in various case studies to allow cross-learning and cross-comparison of, for example rural and urban areas, and different scales. Correspondingly, scale-specific resilience indicators and metrics will be developed to tailor methods to specific needs according to the scale of assessment (micro/local and macro/regional) and to the type of infrastructure. The traditional indicators normally used in structural analysis are not sufficient to understand how events happening on the networks can have cascading consequences. Moreover, effects have multidimensional (technical, economic, organizational and human), multiscale (micro and macro) and temporal characteristics (short- to long-term incidence). These considerations will guide to different activities: 1) computation of classic structural analysis indicators on the case studies in order to obtain an identity of the transport infrastructure and; 2) development of a set of new measures of resilience. To mitigate natural hazard risk a large amount of protection measures of different typology have been constructed following inhomogeneous reliability standards. The focus of this case study will be on resilience issues and decision making in the context of a large scale sectorial approach focused on transport infrastructure network.

  12. Getting Online: A Friendly Guide for Teachers, Students, and Parents.

    ERIC Educational Resources Information Center

    Educational Resources Information Center (ED), Washington, DC.

    This brochure provides teachers, students, and parents with information on how to connect to a computer network; describes some of the education offerings available to network users; and offers hints to help make exploration of computer networks easy and successful. The brochure explains the equipment needed to connect to a computer network; ways…

  13. Grid Computing in K-12 Schools. Soapbox Digest. Volume 3, Number 2, Fall 2004

    ERIC Educational Resources Information Center

    AEL, 2004

    2004-01-01

    Grid computing allows large groups of computers (either in a lab, or remote and connected only by the Internet) to extend extra processing power to each individual computer to work on components of a complex request. Grid middleware, recognizing priorities set by systems administrators, allows the grid to identify and use this power without…

  14. The J-Staff System, Network Synchronisation and Noise

    DTIC Science & Technology

    2014-06-01

    GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S... work . A key challenge of such structures is their tendency to fall into extreme dynamical modes. One is a ‘two-speed’ mode, where units interacting with...longer term planning, led by the J5 Planning Branch, fall into a slow cycle of work , while those entities interacting predominately with operations

  15. An Innovative Network to Improve Sea Ice Prediction in a Changing Arctic

    DTIC Science & Technology

    2015-09-30

    fall (July – Oct), the CFSv2 forecasts are too extensive (positive bias), while in the rest of the year they are not extensive enough (negative bias...the year (January to September), but a negative bias in the early fall (October to December), during the ice growing season. This illustrate the...Overland, and S. Yang, Polar-Low latitude linkages and their role in weather and climate prediction, 2015: Bull. Amer. Meteor . Soc. [in press]. HONORS

  16. Comparative Effectiveness of Published Interventions for Elderly Fall Prevention: A Systematic Review and Network Meta-Analysis.

    PubMed

    Cheng, Peixia; Tan, Liheng; Ning, Peishan; Li, Li; Gao, Yuyan; Wu, Yue; Schwebel, David C; Chu, Haitao; Yin, Huaiqiong; Hu, Guoqing

    2018-03-12

    Falls are a major threat to older adults worldwide. Although various effective interventions have been developed, their comparative effectiveness remains unreported. A systematic review and network meta-analysis was conducted to determine the most effective interventions to prevent falls in community-dwelling adults aged 60 and over. Combined odds ratio (OR) and 95% credible interval (95% CrI) were calculated. A total of 49 trials involving 27,740 participants and 9271 fallers were included. Compared to usual care, multifactorial interventions (MFI) demonstrated the greatest efficacy (OR: 0.64, 95% CrI: 0.53 to 0.77) followed by interventions combining education and exercise (EDU + EXC) (OR: 0.65, 95% CrI: 0.38 to 1.00) and interventions combining exercise and hazard assessment and modification (EXC + HAM) (OR: 0.66, 95% CrI: 0.40 to 1.04). The effect of medical care performed the worst (OR: 1.02, 95% CrI: 0.78 to 1.34). Model fit was good, inconsistency was low, and publication bias was considered absent. The overall quality of included trials was high. The pooled odds ratios and ranking probabilities remained relatively stable across all sensitivity analyses. MFI and exercise appear to be effective to reduce falls among older adults, and should be considered first as service delivery options. Further investigation is necessary to verify effectiveness and suitableness of the strategies to at-risk populations.

  17. Ku-band signal design study. [space shuttle orbiter data processing network

    NASA Technical Reports Server (NTRS)

    Rubin, I.

    1978-01-01

    Analytical tools, methods and techniques for assessing the design and performance of the space shuttle orbiter data processing system (DPS) are provided. The computer data processing network is evaluated in the key areas of queueing behavior synchronization and network reliability. The structure of the data processing network is described as well as the system operation principles and the network configuration. The characteristics of the computer systems are indicated. System reliability measures are defined and studied. System and network invulnerability measures are computed. Communication path and network failure analysis techniques are included.

  18. Older Persons’ Perception of Risk of Falling: Implications for Fall-Prevention Campaigns

    PubMed Central

    Hughes, Karen; van Beurden, Eric; Eakin, Elizabeth G.; Barnett, Lisa M.; Patterson, Elizabeth; Backhouse, Jan; Jones, Sue; Hauser, Darren; Beard, John R.; Newman, Beth

    2008-01-01

    Objectives. We examined older people’s attitudes about falls and implications for the design of fall-prevention awareness campaigns. Methods. We assessed data from (1) computer-assisted telephone surveys conducted in 2002 with Australians 60 years and older in Northern Rivers, New South Wales (site of a previous fall-prevention program; n=1601), and Wide Bay, Queensland (comparison community; n=1601), and (2) 8 focus groups (n=73). Results. Participants from the previous intervention site were less likely than were comparison participants to agree that falls are not preventable (odds ratio [OR]=0.76; 95% confidence interval [CI]=0.65, 0.90) and more likely to rate the prevention of falls a high priority (OR=1.31; 95% CI=1.09, 1.57). There was no difference between the groups for self-perceived risk of falls; more than 60% rated their risk as low. Those with a low perceived risk were more likely to be men, younger, partnered, and privately insured, and to report better health and no history of falls. Focus group data indicated that older people preferred messages that emphasized health and independence rather than falls. Conclusions. Although older people accepted traditional fall-prevention messages, most viewed them as not personally relevant. Messages that promote health and independence may be more effective. PMID:18172132

  19. 48 CFR 1523.7002 - Waivers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ENVIRONMENTAL, CONSERVATION, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Energy-Efficient Computer Equipment 1523.7002 Waivers. (a) There are several types of computer equipment which technically fall under the... types of equipment: (1) LAN servers, including file servers; application servers; communication servers...

  20. 48 CFR 1523.7002 - Waivers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ENVIRONMENTAL, CONSERVATION, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Energy-Efficient Computer Equipment 1523.7002 Waivers. (a) There are several types of computer equipment which technically fall under the... types of equipment: (1) LAN servers, including file servers; application servers; communication servers...

  1. 48 CFR 1523.7002 - Waivers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ENVIRONMENTAL, CONSERVATION, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Energy-Efficient Computer Equipment 1523.7002 Waivers. (a) There are several types of computer equipment which technically fall under the... types of equipment: (1) LAN servers, including file servers; application servers; communication servers...

  2. Computer-Aided College Algebra: Learning Components that Students Find Beneficial

    ERIC Educational Resources Information Center

    Aichele, Douglas B.; Francisco, Cynthia; Utley, Juliana; Wescoatt, Benjamin

    2011-01-01

    A mixed-method study was conducted during the Fall 2008 semester to better understand the experiences of students participating in computer-aided instruction of College Algebra using the software MyMathLab. The learning environment included a computer learning system for the majority of the instruction, a support system via focus groups (weekly…

  3. The Benefits of Making Data from the EPA National Center for Computational Toxicology available for reuse (ACS Fall meeting 3 of 12)

    EPA Science Inventory

    Researchers at EPA’s National Center for Computational Toxicology (NCCT) integrate advances in biology, chemistry, exposure and computer science to help prioritize chemicals for further research based on potential human health risks. The goal of this research is to quickly evalua...

  4. Relationships among Learning Styles and Motivation with Computer-Aided Instruction in an Agronomy Course

    ERIC Educational Resources Information Center

    McAndrews, Gina M.; Mullen, Russell E.; Chadwick, Scott A.

    2005-01-01

    Multi-media learning tools were developed to enhance student learning for an introductory agronomy course at Iowa State University. During fall 2002, the new interactive computer program, called Computer Interactive Multimedia Program for Learning Enhancement (CIMPLE) was incorporated into the teaching, learning, and assessment processes of the…

  5. Music and Computers: Symbiotic Learning.

    ERIC Educational Resources Information Center

    Crenshaw, John H.

    Many individuals in middle school, high school, and university settings have an interest in both music and computers. This paper seeks to direct that interest by presenting a series of computer programming projects. The 53 projects fall under two categories: musical scales and musical sound production. Each group of projects is preceded by a short…

  6. Long Range Planning for Computer Use--A Task Force Model.

    ERIC Educational Resources Information Center

    Raucher, S. M.; Koehler, T. J.

    A Management Operations Review and Evaluation (MORE) study of the Department of Management Information and Computer Services, which was completed in the fall of 1980, strongly recommended that the Montgomery County Public Schools (MCPS) develop a long-range plan to meet the computer needs of schools and central offices. In response to this…

  7. Seismic Monitoring of Rock Falls in Yosemite National Park

    NASA Astrophysics Data System (ADS)

    Zimmer, V. L.; Stock, G. M.; Sitar, N.

    2008-12-01

    Between 1857 and 2007, more than 600 landslide events have been documented in Yosemite National Park, with the vast majority of events occurring as rock falls in Yosemite Valley. The conditions leading to and triggering rock fall are understood in approximately 50 percent of cases, but in the other 50 percent, there were no apparent triggers. Occasionally, large rock falls have been preceded by smaller events that, in retrospect, may have been precursors. Close range seismic monitoring presents an opportunity to study the conditions leading up to rock fall, as well as the mechanics of the actual rock fall as recorded seismically. During the winter of 2007-08, we conducted a rock fall seismic monitoring feasibility study in Yosemite Valley. A station consisting of an 8 Hz geophone and an accelerometer was placed on a ledge 1000 feet above the valley floor, in a historically active rock fall area known as the Three Brothers. At least two rock falls in this area were recorded by the instrumentation and witnessed by visitors, representing the first time rock falls have been recorded with seismic instrumentation in Yosemite Valley. Significant energy was recorded in a wide frequency range, from a few Hz to approximately 150 Hz, limited by the geophone response and attenuation of the signal due to distance to the source (400 m). Furthermore, there exists a weak signal approximately 5-10 seconds before the obvious rock fall signature. We hypothesize that the weak signal represents rock fall initiation manifesting as the first blocks sliding down the cliff face, while the stronger impulses represent these blocks impacting ledges and the bottom talus field. This study demonstrated that rock fall monitoring is feasible with seismic instrumentation, and serves as the catalyst for future studies using a network of sensors for more advanced analysis.

  8. Toward the azimuthal characteristics of ionospheric and seismic effects of "Chelyabinsk" meteorite fall according to the data from coherent radar, GPS, and seismic networks

    NASA Astrophysics Data System (ADS)

    Berngardt, O. I.; Perevalova, N. P.; Dobrynina, A. A.; Kutelev, K. A.; Shestakov, N. V.; Bakhtiarov, V. F.; Kusonsky, O. A.; Zagretdinov, R. V.; Zherebtsov, G. A.

    2015-12-01

    We present the results of a study of the azimuthal characteristics of ionospheric and seismic effects of the meteorite `Chelyabinsk,' based on the data from the network of GPS receivers, coherent decameter radar EKB, and network of seismic stations, located near the meteorite fall trajectory. It is shown that 6-14 min after the bolide explosion, GPS network observed the cone-shaped wavefront of traveling ionospheric disturbances (TIDs) that is interpreted as a ballistic acoustic wave. The typical TIDs propagation velocity were observed 661 ± 256 m/s, which corresponds to the expected acoustic wave speed for 240 km height. Fourteen minutes after the bolide explosion, at distances of 200 km, we observed the emergence and propagation of a TID with annular wavefront that is interpreted as gravitational mode of internal atmospheric waves. The propagation velocity of this TID was 337 ± 89 m/s which corresponds to the propagation velocity of these waves in similar situations. At EKB radar, we observed TIDs in the sector of azimuthal angles close to the perpendicular to the meteorite trajectory. The observed TID velocity (400 m/s) and azimuthal properties correlate well with the model of ballistic wave propagating at 120-140 km altitude. It is shown that the azimuthal distribution of the amplitude of vertical seismic oscillations with periods 3-60 s can be described qualitatively by the model of vertical strike-slip rupture, propagating at 1 km/s along the meteorite fall trajectory to distance of about 40 km. These parameters correspond to the direction and velocity of propagation of the ballistic wave peak by the ground. It is shown that the model of ballistic wave caused by supersonic motion and burning of the meteorite in the upper atmosphere can satisfactorily explain the various azimuthal ionospheric effects, observed by the coherent decameter radar EKB, GPS receivers network, and the azimuthal characteristics of seismic waves at large distances.

  9. Teaching Advanced Concepts in Computer Networks: VNUML-UM Virtualization Tool

    ERIC Educational Resources Information Center

    Ruiz-Martinez, A.; Pereniguez-Garcia, F.; Marin-Lopez, R.; Ruiz-Martinez, P. M.; Skarmeta-Gomez, A. F.

    2013-01-01

    In the teaching of computer networks the main problem that arises is the high price and limited number of network devices the students can work with in the laboratories. Nowadays, with virtualization we can overcome this limitation. In this paper, we present a methodology that allows students to learn advanced computer network concepts through…

  10. UNIX security in a supercomputing environment

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    The author critiques some security mechanisms in most versions of the Unix operating system and suggests more effective tools that either have working prototypes or have been implemented, for example in secure Unix systems. Although no computer (not even a secure one) is impenetrable, breaking into systems with these alternate mechanisms will cost more, require more skill, and be more easily detected than penetrations of systems without these mechanisms. The mechanisms described fall into four classes (with considerable overlap). User authentication at the local host affirms the identity of the person using the computer. The principle of least privilege dictates that properly authenticated users should have rights precisely sufficient to perform their tasks, and system administration functions should be compartmentalized; to this end, access control lists or capabilities should either replace or augment the default Unix protection system, and mandatory access controls implementing multilevel security models and integrity mechanisms should be available. Since most users access supercomputing environments using networks, the third class of mechanisms augments authentication (where feasible). As no security is perfect, the fourth class of mechanism logs events that may indicate possible security violations; this will allow the reconstruction of a successful penetration (if discovered), or possibly the detection of an attempted penetration.

  11. Computer Networks and Networking: A Primer.

    ERIC Educational Resources Information Center

    Collins, Mauri P.

    1993-01-01

    Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…

  12. The development of computer networks: First results from a microeconomic model

    NASA Astrophysics Data System (ADS)

    Maier, Gunther; Kaufmann, Alexander

    Computer networks like the Internet are gaining importance in social and economic life. The accelerating pace of the adoption of network technologies for business purposes is a rather recent phenomenon. Many applications are still in the early, sometimes even experimental, phase. Nevertheless, it seems to be certain that networks will change the socioeconomic structures we know today. This is the background for our special interest in the development of networks, in the role of spatial factors influencing the formation of networks, and consequences of networks on spatial structures, and in the role of externalities. This paper discusses a simple economic model - based on a microeconomic calculus - that incorporates the main factors that generate the growth of computer networks. The paper provides analytic results about the generation of computer networks. The paper discusses (1) under what conditions economic factors will initiate the process of network formation, (2) the relationship between individual and social evaluation, and (3) the efficiency of a network that is generated based on economic mechanisms.

  13. Computer network defense system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves networkmore » connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.« less

  14. Mississippi Curriculum Framework for Computer Information Systems Technology. Computer Information Systems Technology (Program CIP: 52.1201--Management Information Systems & Business Data). Computer Programming (Program CIP: 52.1201). Network Support (Program CIP: 52.1290--Computer Network Support Technology). Postsecondary Programs.

    ERIC Educational Resources Information Center

    Mississippi Research and Curriculum Unit for Vocational and Technical Education, State College.

    This document, which is intended for use by community and junior colleges throughout Mississippi, contains curriculum frameworks for two programs in the state's postsecondary-level computer information systems technology cluster: computer programming and network support. Presented in the introduction are program descriptions and suggested course…

  15. From photons to big-data applications: terminating terabits

    PubMed Central

    2016-01-01

    Computer architectures have entered a watershed as the quantity of network data generated by user applications exceeds the data-processing capacity of any individual computer end-system. It will become impossible to scale existing computer systems while a gap grows between the quantity of networked data and the capacity for per system data processing. Despite this, the growth in demand in both task variety and task complexity continues unabated. Networked computer systems provide a fertile environment in which new applications develop. As networked computer systems become akin to infrastructure, any limitation upon the growth in capacity and capabilities becomes an important constraint of concern to all computer users. Considering a networked computer system capable of processing terabits per second, as a benchmark for scalability, we critique the state of the art in commodity computing, and propose a wholesale reconsideration in the design of computer architectures and their attendant ecosystem. Our proposal seeks to reduce costs, save power and increase performance in a multi-scale approach that has potential application from nanoscale to data-centre-scale computers. PMID:26809573

  16. From photons to big-data applications: terminating terabits.

    PubMed

    Zilberman, Noa; Moore, Andrew W; Crowcroft, Jon A

    2016-03-06

    Computer architectures have entered a watershed as the quantity of network data generated by user applications exceeds the data-processing capacity of any individual computer end-system. It will become impossible to scale existing computer systems while a gap grows between the quantity of networked data and the capacity for per system data processing. Despite this, the growth in demand in both task variety and task complexity continues unabated. Networked computer systems provide a fertile environment in which new applications develop. As networked computer systems become akin to infrastructure, any limitation upon the growth in capacity and capabilities becomes an important constraint of concern to all computer users. Considering a networked computer system capable of processing terabits per second, as a benchmark for scalability, we critique the state of the art in commodity computing, and propose a wholesale reconsideration in the design of computer architectures and their attendant ecosystem. Our proposal seeks to reduce costs, save power and increase performance in a multi-scale approach that has potential application from nanoscale to data-centre-scale computers. © 2016 The Authors.

  17. Fall detection in homes of older adults using the Microsoft Kinect.

    PubMed

    Stone, Erik E; Skubic, Marjorie

    2015-01-01

    A method for detecting falls in the homes of older adults using the Microsoft Kinect and a two-stage fall detection system is presented. The first stage of the detection system characterizes a person's vertical state in individual depth image frames, and then segments on ground events from the vertical state time series obtained by tracking the person over time. The second stage uses an ensemble of decision trees to compute a confidence that a fall preceded on a ground event. Evaluation was conducted in the actual homes of older adults, using a combined nine years of continuous data collected in 13 apartments. The dataset includes 454 falls, 445 falls performed by trained stunt actors and nine naturally occurring resident falls. The extensive data collection allows for characterization of system performance under real-world conditions to a degree that has not been shown in other studies. Cross validation results are included for standing, sitting, and lying down positions, near (within 4 m) versus far fall locations, and occluded versus not occluded fallers. The method is compared against five state-of-the-art fall detection algorithms and significantly better results are achieved.

  18. Designing a parallel evolutionary algorithm for inferring gene networks on the cloud computing environment.

    PubMed

    Lee, Wei-Po; Hsiao, Yu-Ting; Hwang, Wei-Che

    2014-01-16

    To improve the tedious task of reconstructing gene networks through testing experimentally the possible interactions between genes, it becomes a trend to adopt the automated reverse engineering procedure instead. Some evolutionary algorithms have been suggested for deriving network parameters. However, to infer large networks by the evolutionary algorithm, it is necessary to address two important issues: premature convergence and high computational cost. To tackle the former problem and to enhance the performance of traditional evolutionary algorithms, it is advisable to use parallel model evolutionary algorithms. To overcome the latter and to speed up the computation, it is advocated to adopt the mechanism of cloud computing as a promising solution: most popular is the method of MapReduce programming model, a fault-tolerant framework to implement parallel algorithms for inferring large gene networks. This work presents a practical framework to infer large gene networks, by developing and parallelizing a hybrid GA-PSO optimization method. Our parallel method is extended to work with the Hadoop MapReduce programming model and is executed in different cloud computing environments. To evaluate the proposed approach, we use a well-known open-source software GeneNetWeaver to create several yeast S. cerevisiae sub-networks and use them to produce gene profiles. Experiments have been conducted and the results have been analyzed. They show that our parallel approach can be successfully used to infer networks with desired behaviors and the computation time can be largely reduced. Parallel population-based algorithms can effectively determine network parameters and they perform better than the widely-used sequential algorithms in gene network inference. These parallel algorithms can be distributed to the cloud computing environment to speed up the computation. By coupling the parallel model population-based optimization method and the parallel computational framework, high quality solutions can be obtained within relatively short time. This integrated approach is a promising way for inferring large networks.

  19. Designing a parallel evolutionary algorithm for inferring gene networks on the cloud computing environment

    PubMed Central

    2014-01-01

    Background To improve the tedious task of reconstructing gene networks through testing experimentally the possible interactions between genes, it becomes a trend to adopt the automated reverse engineering procedure instead. Some evolutionary algorithms have been suggested for deriving network parameters. However, to infer large networks by the evolutionary algorithm, it is necessary to address two important issues: premature convergence and high computational cost. To tackle the former problem and to enhance the performance of traditional evolutionary algorithms, it is advisable to use parallel model evolutionary algorithms. To overcome the latter and to speed up the computation, it is advocated to adopt the mechanism of cloud computing as a promising solution: most popular is the method of MapReduce programming model, a fault-tolerant framework to implement parallel algorithms for inferring large gene networks. Results This work presents a practical framework to infer large gene networks, by developing and parallelizing a hybrid GA-PSO optimization method. Our parallel method is extended to work with the Hadoop MapReduce programming model and is executed in different cloud computing environments. To evaluate the proposed approach, we use a well-known open-source software GeneNetWeaver to create several yeast S. cerevisiae sub-networks and use them to produce gene profiles. Experiments have been conducted and the results have been analyzed. They show that our parallel approach can be successfully used to infer networks with desired behaviors and the computation time can be largely reduced. Conclusions Parallel population-based algorithms can effectively determine network parameters and they perform better than the widely-used sequential algorithms in gene network inference. These parallel algorithms can be distributed to the cloud computing environment to speed up the computation. By coupling the parallel model population-based optimization method and the parallel computational framework, high quality solutions can be obtained within relatively short time. This integrated approach is a promising way for inferring large networks. PMID:24428926

  20. Editorial [Special issue on software defined networks and infrastructures, network function virtualisation, autonomous systems and network management

    DOE PAGES

    Biswas, Amitava; Liu, Chen; Monga, Inder; ...

    2016-01-01

    For last few years, there has been a tremendous growth in data traffic due to high adoption rate of mobile devices and cloud computing. Internet of things (IoT) will stimulate even further growth. This is increasing scale and complexity of telecom/internet service provider (SP) and enterprise data centre (DC) compute and network infrastructures. As a result, managing these large network-compute converged infrastructures is becoming complex and cumbersome. To cope up, network and DC operators are trying to automate network and system operations, administrations and management (OAM) functions. OAM includes all non-functional mechanisms which keep the network running.

  1. Investigation and hazard assessment of the 2003 and 2007 Staircase Falls rock falls, Yosemite National Park, California, USA

    USGS Publications Warehouse

    Wieczorek, G.F.; Stock, Gregory M.; Reichenbach, P.; Snyder, J.B.; Borchers, J.W.; Godt, J.W.

    2008-01-01

    Since 1857 more than 600 rock falls, rock slides, debris slides, and debris flows have been documented in Yosemite National Park, with rock falls in Yosemite Valley representing the majority of the events. On 26 December 2003, a rock fall originating from west of Glacier Point sent approximately 200 m 3 of rock debris down a series of joint-controlled ledges to the floor of Yosemite Valley. The debris impacted talus near the base of Staircase Falls, producing fragments of flying rock that struck occupied cabins in Curry Village. Several years later on 9 June 2007, and again on 26 July 2007, smaller rock falls originated from the same source area. The 26 December 2003 event coincided with a severe winter storm and was likely triggered by precipitation and/or frost wedging, but the 9 June and 26 July 2007 events lack recognizable triggering mechanisms. We investigated the geologic and hydrologic factors contributing to the Staircase Falls rock falls, including bedrock lithology, weathering, joint spacing and orientations, and hydrologic processes affecting slope stability. We improved upon previous geomorphic assessment of rock-fall hazards, based on a shadow angle approach, by using STONE, a three-dimensional rock-fall simulation computer program. STONE produced simulated rock-fall runout patterns similar to the mapped extent of the 2003 and 2007 events, allowing us to simulate potential future rock falls from the Staircase Falls detachment area. Observations of recent rock falls, mapping of rock debris, and simulations of rock fall runouts beneath the Staircase Falls detachment area suggest that rock-fall hazard zones extend farther downslope than the extent previously defined by mapped surface talus deposits.

  2. A computer tool to support in design of industrial Ethernet.

    PubMed

    Lugli, Alexandre Baratella; Santos, Max Mauro Dias; Franco, Lucia Regina Horta Rodrigues

    2009-04-01

    This paper presents a computer tool to support in the project and development of an industrial Ethernet network, verifying the physical layer (cables-resistance and capacitance, scan time, network power supply-POE's concept "Power Over Ethernet" and wireless), and occupation rate (amount of information transmitted to the network versus the controller network scan time). These functions are accomplished without a single physical element installed in the network, using only simulation. The computer tool has a software that presents a detailed vision of the network to the user, besides showing some possible problems in the network, and having an extremely friendly environment.

  3. Sharing Writing through Computer Networking.

    ERIC Educational Resources Information Center

    Fey, Marion H.

    1997-01-01

    Suggests computer networking can support the essential purposes of the collaborative-writing movement, offering opportunities for sharing writing. Notes that literacy teachers are exploring the connectivity of computer networking through numerous designs that use either real-time or asynchronous communication. Discusses new roles for students and…

  4. Organising a University Computer System: Analytical Notes.

    ERIC Educational Resources Information Center

    Jacquot, J. P.; Finance, J. P.

    1990-01-01

    Thirteen trends in university computer system development are identified, system user requirements are analyzed, critical system qualities are outlined, and three options for organizing a computer system are presented. The three systems include a centralized network, local network, and federation of local networks. (MSE)

  5. Classroom Computer Network.

    ERIC Educational Resources Information Center

    Lent, John

    1984-01-01

    This article describes a computer network system that connects several microcomputers to a single disk drive and one copy of software. Many schools are switching to networks as a cheaper and more efficient means of computer instruction. Teachers may be faced with copywriting problems when reproducing programs. (DF)

  6. Preliminary 3d depth migration of a network of 2d seismic lines for fault imaging at a Pyramid Lake, Nevada geothermal prospect

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Frary, R.; Louie, J.; Pullammanappallil, S.

    Roxanna Frary, John N. Louie, Sathish Pullammanappallil, Amy Eisses, 2011, Preliminary 3d depth migration of a network of 2d seismic lines for fault imaging at a Pyramid Lake, Nevada geothermal prospect: presented at American Geophysical Union Fall Meeting, San Francisco, Dec. 5-9, abstract T13G-07.

  7. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

    DTIC Science & Technology

    2009-10-09

    Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US-China Economic and...the People?s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 2 US-China Economic and Security Review

  8. Index of Stations - Surface-Water Data-Collection Network of Texas, September 1999

    DTIC Science & Technology

    2001-01-01

    07312000 Lake Kemp near Mabelle , Tex. 33°45󈧢" 99°09󈧇" R Wichita Falls 07312100 Wichita River near Mabelle , Tex. 33°45󈧨" 99°08󈧥" DQpM2 Wichita Falls...34 96°38󈧵" RQs USACE3 08063800 Waxahachie Creek near Bardwell, Tex. 32°14󈧨" 96°38󈧜" DQp Fort Worth 08064100 Chambers Creek near Rice , Tex. 32°11󈧺

  9. Social play among juvenile wild Japanese macaques (Macaca fuscata) strengthens their social bonds.

    PubMed

    Shimada, Masaki; Sueur, Cédric

    2018-01-01

    Social play and grooming are typical affiliative interactions for many primate species, and are thought to have similar biological functions. However, grooming increases with age, whereas social play decreases. We proposed the hypothesis that both social grooming and social play in juveniles strengthen their social bonds in daily activities. We carried out field research on the social relationships among juvenile wild Japanese macaques in a troop in Kinkazan, Miyagi Prefecture, Japan, from fall 2007 to spring 2008 to investigate this hypothesis. We evaluated three relationships among juveniles, play indices (PI), grooming indices (GI), and 3-m-proximity indices (3mI) of each dyad (i.e., interacting pair), and compared these social networks based on the matrices of the indices. The play and grooming networks were correlated with the association network throughout the two research periods. The multiple network level measurements of the play network, but not the grooming network, resembled those of the association network. Using a causal step approach, we showed that social play and grooming interactions in fall seem to predict associations in the following spring, controlling for the PI and GI matrix in spring, respectively. Social play and grooming for each juvenile were negatively correlated. The results partially support our predictions; therefore, the hypothesis that the biological function of social play among immature Japanese macaques is to strengthen their social bonds in the near future and develop their social life appears to be correct. For juvenile macaques, social play, rather than grooming, functions as an important social mechanism to strengthen affiliative relationships. © 2017 Wiley Periodicals, Inc.

  10. A method of non-contact reading code based on computer vision

    NASA Astrophysics Data System (ADS)

    Zhang, Chunsen; Zong, Xiaoyu; Guo, Bingxuan

    2018-03-01

    With the purpose of guarantee the computer information exchange security between internal and external network (trusted network and un-trusted network), A non-contact Reading code method based on machine vision has been proposed. Which is different from the existing network physical isolation method. By using the computer monitors, camera and other equipment. Deal with the information which will be on exchanged, Include image coding ,Generate the standard image , Display and get the actual image , Calculate homography matrix, Image distort correction and decoding in calibration, To achieve the computer information security, Non-contact, One-way transmission between the internal and external network , The effectiveness of the proposed method is verified by experiments on real computer text data, The speed of data transfer can be achieved 24kb/s. The experiment shows that this algorithm has the characteristics of high security, fast velocity and less loss of information. Which can meet the daily needs of the confidentiality department to update the data effectively and reliably, Solved the difficulty of computer information exchange between Secret network and non-secret network, With distinctive originality, practicability, and practical research value.

  11. Closeness Possible through Computer Networking.

    ERIC Educational Resources Information Center

    Dodd, Julie E.

    1989-01-01

    Points out the benefits of computer networking for scholastic journalism. Discusses three systems currently offering networking possibilities for publications: the Student Press Information Network; the Youth Communication Service; and the Dow Jones Newspaper Fund's electronic mail system. (MS)

  12. Modeling rises and falls in money addicted social hierarchies

    NASA Astrophysics Data System (ADS)

    Dybiec, Bartłomiej; Mitarai, Namiko; Sneppen, Kim

    2014-08-01

    The emergence of large communities is inherently associated with the creation of social structures. Connections between individuals are indispensable for cooperative action of agents building social groups. Moreover, social groups usually evolve and their structure changes over time. Consequently, an underlying network connecting individuals is not static, reflecting an ongoing adaptation to new conditions. The evolution of social connections is influenced by the relative position (hierarchy) of individuals building the system as well as by the availability of resources. We explore this aspect of human ambition by modeling the interplay of social networking and an uneven distribution of external resources. The model naturally generates social hierarchies. Remarkably, this social structure exhibits a rise-and-fall behavior. A well pronounced quasi-periodic dynamics, which is closely associated with the dissipation of resources that are needed to sustain the social links, is revealed.

  13. A posture recognition based fall detection system for monitoring an elderly person in a smart home environment.

    PubMed

    Yu, Miao; Rhuma, Adel; Naqvi, Syed Mohsen; Wang, Liang; Chambers, Jonathon

    2012-11-01

    We propose a novel computer vision based fall detection system for monitoring an elderly person in a home care application. Background subtraction is applied to extract the foreground human body and the result is improved by using certain post-processing. Information from ellipse fitting and a projection histogram along the axes of the ellipse are used as the features for distinguishing different postures of the human. These features are then fed into a directed acyclic graph support vector machine (DAGSVM) for posture classification, the result of which is then combined with derived floor information to detect a fall. From a dataset of 15 people, we show that our fall detection system can achieve a high fall detection rate (97.08%) and a very low false detection rate (0.8%) in a simulated home environment.

  14. Email networks and the spread of computer viruses

    NASA Astrophysics Data System (ADS)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  15. Falling through the Net: Toward Digital Inclusion. A Report on Americans' Access to Technology Tools.

    ERIC Educational Resources Information Center

    National Telecommunications and Information Administration (DOC), Washington, DC.

    This report, the fourth in the "Falling through the Net" series, measures the extent of computer and Internet connection among U.S. households and individuals. The data, obtained from Bureau of the Census statistics and interviews with 48,000 households, show that digital inclusion is rapidly increasing--households with Internet access soared by…

  16. Using Tracker to Understand "Toss Up" and Free Fall Motion: A Case Study

    ERIC Educational Resources Information Center

    Wee, Loo Kang; Tan, Kim Kia; Leong, Tze Kwang; Tan, Ching

    2015-01-01

    This paper reports the use of Tracker as a computer-based learning tool to support effective learning and teaching of "toss up" and free fall motion for beginning secondary three (15?year-old) students. The case study involved (N = 123) students from express pure physics classes at a mainstream school in Singapore. We used eight…

  17. Volcanic Ash fall Impact on Vegetation, Colima 2005

    NASA Astrophysics Data System (ADS)

    Garcia, M. G.; Martin, A.; Fonseca, R.; Nieto, A.; Radillo, R.; Armienta, M.

    2007-05-01

    An ash sampling network was established arround Colima Volcano in 2005. Ash fall was sampled on the North, Northeast, East, Southeast, South, Southwest and West of the volcano. Samples were analyzed for ash components, geochemistry and leachates. Ash fall ocurred on April (12), May (10, 23), June (2, 6, 9, 10, 12, 14), July (27), September (27), October (23) and November (24). Most of the ash is made of andesitic dome-lithics but shows diferences in crystal, juvenile material and lithic content. In May, some samples contained grey and dark pumice (scoria). Texture varies from phi >4 to phi 0. Leachate concentration were low: SO4 (7.33-54.19) Cl- (2.29-4.97) and F- (0.16-0.37). During 2005, Colima Volcano's ash fall rotted some of the guava and peach fruits and had a drying effect on spearment and epazote plants. Even these small ash amounts could have hindered sugar cane and agave growth.

  18. Characterizing Crowd Participation and Productivity of Foldit Through Web Scraping

    DTIC Science & Technology

    2016-03-01

    Berkeley Open Infrastructure for Network Computing CDF Cumulative Distribution Function CPU Central Processing Unit CSSG Crowdsourced Serious Game...computers at once can create a similar capacity. According to Anderson [6], principal investigator for the Berkeley Open Infrastructure for Network...extraterrestrial life. From this project, a software-based distributed computing platform called the Berkeley Open Infrastructure for Network Computing

  19. Computers on Wheels: An Alternative to Each One Has One

    ERIC Educational Resources Information Center

    Grant, Michael M.; Ross, Steven M.; Wang, Weiping; Potter, Allison

    2005-01-01

    Four fifth-grade classrooms embarked on a modified ubiquitous computing initiative in the fall of 2003. Two 15-computer wireless laptop carts were shared among the four classrooms in an effort to integrate technology across the curriculum and affect change in student learning and teacher pedagogy. This initiative--in contrast to other one-to-one…

  20. Status of the CP-PACS Project

    NASA Astrophysics Data System (ADS)

    Iwasaki, Y.

    1997-02-01

    The CP-PACS computer with a peak speed of 300 Gflops was completed in March 1996 and has started to operate. We describe the final specification and the hardware implementation of the CP-PACS computer, and its performance for QCD codes. A plan of the grade-up of the computer scheduled for fall of 1996 is also given.

  1. Solving Constraint Satisfaction Problems with Networks of Spiking Neurons

    PubMed Central

    Jonke, Zeno; Habenschuss, Stefan; Maass, Wolfgang

    2016-01-01

    Network of neurons in the brain apply—unlike processors in our current generation of computer hardware—an event-based processing strategy, where short pulses (spikes) are emitted sparsely by neurons to signal the occurrence of an event at a particular point in time. Such spike-based computations promise to be substantially more power-efficient than traditional clocked processing schemes. However, it turns out to be surprisingly difficult to design networks of spiking neurons that can solve difficult computational problems on the level of single spikes, rather than rates of spikes. We present here a new method for designing networks of spiking neurons via an energy function. Furthermore, we show how the energy function of a network of stochastically firing neurons can be shaped in a transparent manner by composing the networks of simple stereotypical network motifs. We show that this design approach enables networks of spiking neurons to produce approximate solutions to difficult (NP-hard) constraint satisfaction problems from the domains of planning/optimization and verification/logical inference. The resulting networks employ noise as a computational resource. Nevertheless, the timing of spikes plays an essential role in their computations. Furthermore, networks of spiking neurons carry out for the Traveling Salesman Problem a more efficient stochastic search for good solutions compared with stochastic artificial neural networks (Boltzmann machines) and Gibbs sampling. PMID:27065785

  2. A Network Primer: Full-Fledged Educational Networks.

    ERIC Educational Resources Information Center

    Lehrer, Ariella

    1988-01-01

    Discusses some of the factors included in choosing appropriate computer networks for the classroom. Describes such networks as those produced by Apple Computer, Corvus Systems, Velan, Berkeley Softworks, Tandy, LAN-TECH, Unisys, and International Business Machines (IBM). (TW)

  3. Dynamics of social balance on networks

    NASA Astrophysics Data System (ADS)

    Antal, T.; Krapivsky, P. L.; Redner, S.

    2005-09-01

    We study the evolution of social networks that contain both friendly and unfriendly pairwise links between individual nodes. The network is endowed with dynamics in which the sense of a link in an imbalanced triad—a triangular loop with one or three unfriendly links—is reversed to make the triad balanced. With this dynamics, an infinite network undergoes a dynamic phase transition from a steady state to “paradise”—all links are friendly—as the propensity p for friendly links in an update event passes through 1/2 . A finite network always falls into a socially balanced absorbing state where no imbalanced triads remain. If the additional constraint that the number of imbalanced triads in the network not increase in an update is imposed, then the network quickly reaches a balanced final state.

  4. Teaching Materials and Methods.

    ERIC Educational Resources Information Center

    Physiologist, 1982

    1982-01-01

    Twelve abstracts of papers presented at the 33rd Annual Fall Meeting of the American Physiological Society are listed, focusing on teaching materials/methods. Topics, among others, include trends in physiology laboratory programs, cardiovascular system model, cardiovascular computer simulation with didactic feedback, and computer generated figures…

  5. Privacy-preserved behavior analysis and fall detection by an infrared ceiling sensor network.

    PubMed

    Tao, Shuai; Kudo, Mineichi; Nonaka, Hidetoshi

    2012-12-07

    An infrared ceiling sensor network system is reported in this study to realize behavior analysis and fall detection of a single person in the home environment. The sensors output multiple binary sequences from which we know the existence/non-existence of persons under the sensors. The short duration averages of the binary responses are shown to be able to be regarded as pixel values of a top-view camera, but more advantageous in the sense of preserving privacy. Using the "pixel values" as features, support vector machine classifiers succeeded in recognizing eight activities (walking, reading, etc.) performed by five subjects at an average recognition rate of 80.65%. In addition, we proposed a martingale framework for detecting falls in this system. The experimental results showed that we attained the best performance of 95.14% (F1 value), the FAR of 7.5% and the FRR of 2.0%. This accuracy is not sufficient in general but surprisingly high with such low-level information. In summary, it is shown that this system has the potential to be used in the home environment to provide personalized services and to detect abnormalities of elders who live alone.

  6. Biological modelling of a computational spiking neural network with neuronal avalanches.

    PubMed

    Li, Xiumin; Chen, Qing; Xue, Fangzheng

    2017-06-28

    In recent years, an increasing number of studies have demonstrated that networks in the brain can self-organize into a critical state where dynamics exhibit a mixture of ordered and disordered patterns. This critical branching phenomenon is termed neuronal avalanches. It has been hypothesized that the homeostatic level balanced between stability and plasticity of this critical state may be the optimal state for performing diverse neural computational tasks. However, the critical region for high performance is narrow and sensitive for spiking neural networks (SNNs). In this paper, we investigated the role of the critical state in neural computations based on liquid-state machines, a biologically plausible computational neural network model for real-time computing. The computational performance of an SNN when operating at the critical state and, in particular, with spike-timing-dependent plasticity for updating synaptic weights is investigated. The network is found to show the best computational performance when it is subjected to critical dynamic states. Moreover, the active-neuron-dominant structure refined from synaptic learning can remarkably enhance the robustness of the critical state and further improve computational accuracy. These results may have important implications in the modelling of spiking neural networks with optimal computational performance.This article is part of the themed issue 'Mathematical methods in medicine: neuroscience, cardiology and pathology'. © 2017 The Author(s).

  7. Biological modelling of a computational spiking neural network with neuronal avalanches

    NASA Astrophysics Data System (ADS)

    Li, Xiumin; Chen, Qing; Xue, Fangzheng

    2017-05-01

    In recent years, an increasing number of studies have demonstrated that networks in the brain can self-organize into a critical state where dynamics exhibit a mixture of ordered and disordered patterns. This critical branching phenomenon is termed neuronal avalanches. It has been hypothesized that the homeostatic level balanced between stability and plasticity of this critical state may be the optimal state for performing diverse neural computational tasks. However, the critical region for high performance is narrow and sensitive for spiking neural networks (SNNs). In this paper, we investigated the role of the critical state in neural computations based on liquid-state machines, a biologically plausible computational neural network model for real-time computing. The computational performance of an SNN when operating at the critical state and, in particular, with spike-timing-dependent plasticity for updating synaptic weights is investigated. The network is found to show the best computational performance when it is subjected to critical dynamic states. Moreover, the active-neuron-dominant structure refined from synaptic learning can remarkably enhance the robustness of the critical state and further improve computational accuracy. These results may have important implications in the modelling of spiking neural networks with optimal computational performance. This article is part of the themed issue `Mathematical methods in medicine: neuroscience, cardiology and pathology'.

  8. Active Computer Network Defense: An Assessment

    DTIC Science & Technology

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  9. Embracing Statistical Challenges in the Information Technology Age

    DTIC Science & Technology

    2006-01-01

    computation and feature selection. Moreover, two research projects on network tomography and arctic cloud detection are used throughout the paper to bring...prominent Network Tomography problem, origin- destination (OD) traffic estimation. It demonstrates well how the two modes of data collection interact...software debugging (Biblit et al, 2005 [2]), and network tomography for computer network management. Computer sys- tem problems exist long before the IT

  10. Artificial Neural Network Metamodels of Stochastic Computer Simulations

    DTIC Science & Technology

    1994-08-10

    SUBTITLE r 5. FUNDING NUMBERS Artificial Neural Network Metamodels of Stochastic I () Computer Simulations 6. AUTHOR(S) AD- A285 951 Robert Allen...8217!298*1C2 ARTIFICIAL NEURAL NETWORK METAMODELS OF STOCHASTIC COMPUTER SIMULATIONS by Robert Allen Kilmer B.S. in Education Mathematics, Indiana...dedicate this document to the memory of my father, William Ralph Kilmer. mi ABSTRACT Signature ARTIFICIAL NEURAL NETWORK METAMODELS OF STOCHASTIC

  11. DISCRETE EVENT SIMULATION OF OPTICAL SWITCH MATRIX PERFORMANCE IN COMPUTER NETWORKS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Imam, Neena; Poole, Stephen W

    2013-01-01

    In this paper, we present application of a Discrete Event Simulator (DES) for performance modeling of optical switching devices in computer networks. Network simulators are valuable tools in situations where one cannot investigate the system directly. This situation may arise if the system under study does not exist yet or the cost of studying the system directly is prohibitive. Most available network simulators are based on the paradigm of discrete-event-based simulation. As computer networks become increasingly larger and more complex, sophisticated DES tool chains have become available for both commercial and academic research. Some well-known simulators are NS2, NS3, OPNET,more » and OMNEST. For this research, we have applied OMNEST for the purpose of simulating multi-wavelength performance of optical switch matrices in computer interconnection networks. Our results suggest that the application of DES to computer interconnection networks provides valuable insight in device performance and aids in topology and system optimization.« less

  12. Thermodynamic characterization of networks using graph polynomials

    NASA Astrophysics Data System (ADS)

    Ye, Cheng; Comin, César H.; Peron, Thomas K. DM.; Silva, Filipi N.; Rodrigues, Francisco A.; Costa, Luciano da F.; Torsello, Andrea; Hancock, Edwin R.

    2015-09-01

    In this paper, we present a method for characterizing the evolution of time-varying complex networks by adopting a thermodynamic representation of network structure computed from a polynomial (or algebraic) characterization of graph structure. Commencing from a representation of graph structure based on a characteristic polynomial computed from the normalized Laplacian matrix, we show how the polynomial is linked to the Boltzmann partition function of a network. This allows us to compute a number of thermodynamic quantities for the network, including the average energy and entropy. Assuming that the system does not change volume, we can also compute the temperature, defined as the rate of change of entropy with energy. All three thermodynamic variables can be approximated using low-order Taylor series that can be computed using the traces of powers of the Laplacian matrix, avoiding explicit computation of the normalized Laplacian spectrum. These polynomial approximations allow a smoothed representation of the evolution of networks to be constructed in the thermodynamic space spanned by entropy, energy, and temperature. We show how these thermodynamic variables can be computed in terms of simple network characteristics, e.g., the total number of nodes and node degree statistics for nodes connected by edges. We apply the resulting thermodynamic characterization to real-world time-varying networks representing complex systems in the financial and biological domains. The study demonstrates that the method provides an efficient tool for detecting abrupt changes and characterizing different stages in network evolution.

  13. Analysis of stationary availability factor of two-level backbone computer networks with arbitrary topology

    NASA Astrophysics Data System (ADS)

    Rahman, P. A.

    2018-05-01

    This scientific paper deals with the two-level backbone computer networks with arbitrary topology. A specialized method, offered by the author for calculation of the stationary availability factor of the two-level backbone computer networks, based on the Markov reliability models for the set of the independent repairable elements with the given failure and repair rates and the methods of the discrete mathematics, is also discussed. A specialized algorithm, offered by the author for analysis of the network connectivity, taking into account different kinds of the network equipment failures, is also observed. Finally, this paper presents an example of calculation of the stationary availability factor for the backbone computer network with the given topology.

  14. High performance network and channel-based storage

    NASA Technical Reports Server (NTRS)

    Katz, Randy H.

    1991-01-01

    In the traditional mainframe-centered view of a computer system, storage devices are coupled to the system through complex hardware subsystems called input/output (I/O) channels. With the dramatic shift towards workstation-based computing, and its associated client/server model of computation, storage facilities are now found attached to file servers and distributed throughout the network. We discuss the underlying technology trends that are leading to high performance network-based storage, namely advances in networks, storage devices, and I/O controller and server architectures. We review several commercial systems and research prototypes that are leading to a new approach to high performance computing based on network-attached storage.

  15. Telecommunication Networks. Tech Use Guide: Using Computer Technology.

    ERIC Educational Resources Information Center

    Council for Exceptional Children, Reston, VA. Center for Special Education Technology.

    One of nine brief guides for special educators on using computer technology, this guide focuses on utilizing the telecommunications capabilities of computers. Network capabilities including electronic mail, bulletin boards, and access to distant databases are briefly explained. Networks useful to the educator, general commercial systems, and local…

  16. Comparison and characterization of Android-based fall detection systems.

    PubMed

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-10-08

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems.

  17. Comparison and Characterization of Android-Based Fall Detection Systems

    PubMed Central

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-01-01

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems. PMID:25299953

  18. Network and computing infrastructure for scientific applications in Georgia

    NASA Astrophysics Data System (ADS)

    Kvatadze, R.; Modebadze, Z.

    2016-09-01

    Status of network and computing infrastructure and available services for research and education community of Georgia are presented. Research and Educational Networking Association - GRENA provides the following network services: Internet connectivity, network services, cyber security, technical support, etc. Computing resources used by the research teams are located at GRENA and at major state universities. GE-01-GRENA site is included in European Grid infrastructure. Paper also contains information about programs of Learning Center and research and development projects in which GRENA is participating.

  19. PROFEAT Update: A Protein Features Web Server with Added Facility to Compute Network Descriptors for Studying Omics-Derived Networks.

    PubMed

    Zhang, P; Tao, L; Zeng, X; Qin, C; Chen, S Y; Zhu, F; Yang, S Y; Li, Z R; Chen, W P; Chen, Y Z

    2017-02-03

    The studies of biological, disease, and pharmacological networks are facilitated by the systems-level investigations using computational tools. In particular, the network descriptors developed in other disciplines have found increasing applications in the study of the protein, gene regulatory, metabolic, disease, and drug-targeted networks. Facilities are provided by the public web servers for computing network descriptors, but many descriptors are not covered, including those used or useful for biological studies. We upgraded the PROFEAT web server http://bidd2.nus.edu.sg/cgi-bin/profeat2016/main.cgi for computing up to 329 network descriptors and protein-protein interaction descriptors. PROFEAT network descriptors comprehensively describe the topological and connectivity characteristics of unweighted (uniform binding constants and molecular levels), edge-weighted (varying binding constants), node-weighted (varying molecular levels), edge-node-weighted (varying binding constants and molecular levels), and directed (oriented processes) networks. The usefulness of the network descriptors is illustrated by the literature-reported studies of the biological networks derived from the genome, interactome, transcriptome, metabolome, and diseasome profiles. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Calculating a checksum with inactive networking components in a computing system

    DOEpatents

    Aho, Michael E; Chen, Dong; Eisley, Noel A; Gooding, Thomas M; Heidelberger, Philip; Tauferner, Andrew T

    2014-12-16

    Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.

  1. Calculating a checksum with inactive networking components in a computing system

    DOEpatents

    Aho, Michael E; Chen, Dong; Eisley, Noel A; Gooding, Thomas M; Heidelberger, Philip; Tauferner, Andrew T

    2015-01-27

    Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.

  2. Deep Learning to Predict Falls in Older Adults Based on Daily-Life Trunk Accelerometry.

    PubMed

    Nait Aicha, Ahmed; Englebienne, Gwenn; van Schooten, Kimberley S; Pijnappels, Mirjam; Kröse, Ben

    2018-05-22

    Early detection of high fall risk is an essential component of fall prevention in older adults. Wearable sensors can provide valuable insight into daily-life activities; biomechanical features extracted from such inertial data have been shown to be of added value for the assessment of fall risk. Body-worn sensors such as accelerometers can provide valuable insight into fall risk. Currently, biomechanical features derived from accelerometer data are used for the assessment of fall risk. Here, we studied whether deep learning methods from machine learning are suited to automatically derive features from raw accelerometer data that assess fall risk. We used an existing dataset of 296 older adults. We compared the performance of three deep learning model architectures (convolutional neural network (CNN), long short-term memory (LSTM) and a combination of these two (ConvLSTM)) to each other and to a baseline model with biomechanical features on the same dataset. The results show that the deep learning models in a single-task learning mode are strong in recognition of identity of the subject, but that these models only slightly outperform the baseline method on fall risk assessment. When using multi-task learning, with gender and age as auxiliary tasks, deep learning models perform better. We also found that preprocessing of the data resulted in the best performance (AUC = 0.75). We conclude that deep learning models, and in particular multi-task learning, effectively assess fall risk on the basis of wearable sensor data.

  3. Deep Learning to Predict Falls in Older Adults Based on Daily-Life Trunk Accelerometry

    PubMed Central

    Englebienne, Gwenn; Pijnappels, Mirjam

    2018-01-01

    Early detection of high fall risk is an essential component of fall prevention in older adults. Wearable sensors can provide valuable insight into daily-life activities; biomechanical features extracted from such inertial data have been shown to be of added value for the assessment of fall risk. Body-worn sensors such as accelerometers can provide valuable insight into fall risk. Currently, biomechanical features derived from accelerometer data are used for the assessment of fall risk. Here, we studied whether deep learning methods from machine learning are suited to automatically derive features from raw accelerometer data that assess fall risk. We used an existing dataset of 296 older adults. We compared the performance of three deep learning model architectures (convolutional neural network (CNN), long short-term memory (LSTM) and a combination of these two (ConvLSTM)) to each other and to a baseline model with biomechanical features on the same dataset. The results show that the deep learning models in a single-task learning mode are strong in recognition of identity of the subject, but that these models only slightly outperform the baseline method on fall risk assessment. When using multi-task learning, with gender and age as auxiliary tasks, deep learning models perform better. We also found that preprocessing of the data resulted in the best performance (AUC = 0.75). We conclude that deep learning models, and in particular multi-task learning, effectively assess fall risk on the basis of wearable sensor data. PMID:29786659

  4. Anomalous yet Brownian.

    PubMed

    Wang, Bo; Anthony, Stephen M; Bae, Sung Chul; Granick, Steve

    2009-09-08

    We describe experiments using single-particle tracking in which mean-square displacement is simply proportional to time (Fickian), yet the distribution of displacement probability is not Gaussian as should be expected of a classical random walk but, instead, is decidedly exponential for large displacements, the decay length of the exponential being proportional to the square root of time. The first example is when colloidal beads diffuse along linear phospholipid bilayer tubes whose radius is the same as that of the beads. The second is when beads diffuse through entangled F-actin networks, bead radius being less than one-fifth of the actin network mesh size. We explore the relevance to dynamic heterogeneity in trajectory space, which has been extensively discussed regarding glassy systems. Data for the second system might suggest activated diffusion between pores in the entangled F-actin networks, in the same spirit as activated diffusion and exponential tails observed in glassy systems. But the first system shows exceptionally rapid diffusion, nearly as rapid as for identical colloids in free suspension, yet still displaying an exponential probability distribution as in the second system. Thus, although the exponential tail is reminiscent of glassy systems, in fact, these dynamics are exceptionally rapid. We also compare with particle trajectories that are at first subdiffusive but Fickian at the longest measurement times, finding that displacement probability distributions fall onto the same master curve in both regimes. The need is emphasized for experiments, theory, and computer simulation to allow definitive interpretation of this simple and clean exponential probability distribution.

  5. ARACHNE: A neural-neuroglial network builder with remotely controlled parallel computing

    PubMed Central

    Rusakov, Dmitri A.; Savtchenko, Leonid P.

    2017-01-01

    Creating and running realistic models of neural networks has hitherto been a task for computing professionals rather than experimental neuroscientists. This is mainly because such networks usually engage substantial computational resources, the handling of which requires specific programing skills. Here we put forward a newly developed simulation environment ARACHNE: it enables an investigator to build and explore cellular networks of arbitrary biophysical and architectural complexity using the logic of NEURON and a simple interface on a local computer or a mobile device. The interface can control, through the internet, an optimized computational kernel installed on a remote computer cluster. ARACHNE can combine neuronal (wired) and astroglial (extracellular volume-transmission driven) network types and adopt realistic cell models from the NEURON library. The program and documentation (current version) are available at GitHub repository https://github.com/LeonidSavtchenko/Arachne under the MIT License (MIT). PMID:28362877

  6. A new graph-based method for pairwise global network alignment

    PubMed Central

    Klau, Gunnar W

    2009-01-01

    Background In addition to component-based comparative approaches, network alignments provide the means to study conserved network topology such as common pathways and more complex network motifs. Yet, unlike in classical sequence alignment, the comparison of networks becomes computationally more challenging, as most meaningful assumptions instantly lead to NP-hard problems. Most previous algorithmic work on network alignments is heuristic in nature. Results We introduce the graph-based maximum structural matching formulation for pairwise global network alignment. We relate the formulation to previous work and prove NP-hardness of the problem. Based on the new formulation we build upon recent results in computational structural biology and present a novel Lagrangian relaxation approach that, in combination with a branch-and-bound method, computes provably optimal network alignments. The Lagrangian algorithm alone is a powerful heuristic method, which produces solutions that are often near-optimal and – unlike those computed by pure heuristics – come with a quality guarantee. Conclusion Computational experiments on the alignment of protein-protein interaction networks and on the classification of metabolic subnetworks demonstrate that the new method is reasonably fast and has advantages over pure heuristics. Our software tool is freely available as part of the LISA library. PMID:19208162

  7. Ground penetrating radar (GPR) for pavement evaluation.

    DOT National Transportation Integrated Search

    2012-12-01

    In the near future the Arkansas State Highway and Transportation Department Pavement Management System (PMS) will utilize a : Falling Weight Deflectometer (FWD) to collect network level pavement structural data to aid in predicting performance of pav...

  8. Pavement Structural Evaluation at the Network Level: Final Report

    DOT National Transportation Integrated Search

    2016-09-01

    As State transportation departments consider structural adequacy as part of their routine pavement management system (PMS) activities by incorporating deflection testing, it is important to advance their practices from measuring deflection using fall...

  9. Engaging Cyber Communities

    DTIC Science & Technology

    2010-04-01

    technology centric operations such as computer network attack and computer network defense. 3 This leads to the question of whether the US military is... information and infrastructure. For the purpose of military operations, CNO are divided into CNA, CND, and computer network exploitation (CNE) enabling...of a CNA if they take undesirable action,” 21 and from a defensive stance in CND, “providing information about non-military threat to computers in

  10. Synchronized Pair Configuration in Virtualization-Based Lab for Learning Computer Networks

    ERIC Educational Resources Information Center

    Kongcharoen, Chaknarin; Hwang, Wu-Yuin; Ghinea, Gheorghita

    2017-01-01

    More studies are concentrating on using virtualization-based labs to facilitate computer or network learning concepts. Some benefits are lower hardware costs and greater flexibility in reconfiguring computer and network environments. However, few studies have investigated effective mechanisms for using virtualization fully for collaboration.…

  11. Systems Librarian and Automation Review.

    ERIC Educational Resources Information Center

    Schuyler, Michael

    1992-01-01

    Discusses software sharing on computer networks and the need for proper bandwidth; and describes the technology behind FidoNet, a computer network made up of electronic bulletin boards. Network features highlighted include front-end mailers, Zone Mail Hour, Nodelist, NetMail, EchoMail, computer conferences, tosser and scanner programs, and host…

  12. Models of Dynamic Relations Among Service Activities, System State and Service Quality on Computer and Network Systems

    DTIC Science & Technology

    2010-01-01

    Service quality on computer and network systems has become increasingly important as many conventional service transactions are moved online. Service quality of computer and network services can be measured by the performance of the service process in throughput, delay, and so on. On a computer and network system, competing service requests of users and associated service activities change the state of limited system resources which in turn affects the achieved service ...relations of service activities, system state and service

  13. I/O routing in a multidimensional torus network

    DOEpatents

    Chen, Dong; Eisley, Noel A.; Heidelberger, Philip

    2017-02-07

    A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destination address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.

  14. I/O routing in a multidimensional torus network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Dong; Eisley, Noel A.; Heidelberger, Philip

    A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destinationmore » address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.« less

  15. Comparative Effectiveness of Published Interventions for Elderly Fall Prevention: A Systematic Review and Network Meta-Analysis

    PubMed Central

    Cheng, Peixia; Tan, Liheng; Ning, Peishan; Li, Li; Gao, Yuyan; Chu, Haitao; Yin, Huaiqiong

    2018-01-01

    Background: Falls are a major threat to older adults worldwide. Although various effective interventions have been developed, their comparative effectiveness remains unreported. Methods: A systematic review and network meta-analysis was conducted to determine the most effective interventions to prevent falls in community-dwelling adults aged 60 and over. Combined odds ratio (OR) and 95% credible interval (95% CrI) were calculated. Results: A total of 49 trials involving 27,740 participants and 9271 fallers were included. Compared to usual care, multifactorial interventions (MFI) demonstrated the greatest efficacy (OR: 0.64, 95% CrI: 0.53 to 0.77) followed by interventions combining education and exercise (EDU + EXC) (OR: 0.65, 95% CrI: 0.38 to 1.00) and interventions combining exercise and hazard assessment and modification (EXC + HAM) (OR: 0.66, 95% CrI: 0.40 to 1.04). The effect of medical care performed the worst (OR: 1.02, 95% CrI: 0.78 to 1.34). Model fit was good, inconsistency was low, and publication bias was considered absent. The overall quality of included trials was high. The pooled odds ratios and ranking probabilities remained relatively stable across all sensitivity analyses. Conclusions: MFI and exercise appear to be effective to reduce falls among older adults, and should be considered first as service delivery options. Further investigation is necessary to verify effectiveness and suitableness of the strategies to at-risk populations. PMID:29534531

  16. The Evaluation of Rekeying Protocols Within the Hubenko Architecture as Applied to Wireless Sensor Networks

    DTIC Science & Technology

    2009-03-01

    SENSOR NETWORKS THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and...hierarchical, and Secure Lock within a wireless sensor network (WSN) under the Hubenko architecture. Using a Matlab computer simulation, the impact of the...rekeying protocol should be applied given particular network parameters, such as WSN size. 10 1.3 Experimental Approach A computer simulation in

  17. Neural-Network Simulator

    NASA Technical Reports Server (NTRS)

    Mitchell, Paul H.

    1991-01-01

    F77NNS (FORTRAN 77 Neural Network Simulator) computer program simulates popular back-error-propagation neural network. Designed to take advantage of vectorization when used on computers having this capability, also used on any computer equipped with ANSI-77 FORTRAN Compiler. Problems involving matching of patterns or mathematical modeling of systems fit class of problems F77NNS designed to solve. Program has restart capability so neural network solved in stages suitable to user's resources and desires. Enables user to customize patterns of connections between layers of network. Size of neural network F77NNS applied to limited only by amount of random-access memory available to user.

  18. Why Do Computer Viruses Survive In The Internet?

    NASA Astrophysics Data System (ADS)

    Ifti, Margarita; Neumann, Paul

    2010-01-01

    We use the three-species cyclic competition model (Rock-Paper-Scissors), described by reactions A+B→2B, B+C→2C, C+A→2A, for emulating a computer network with e-mail viruses. Different topologies of the network bring about different dynamics of the epidemics. When the parameters of the network are varied, it is observed that very high clustering coefficients are necessary for a pandemics to happen. The differences between the networks of computer users, e-mail networks, and social networks, as well as their role in determining the nature of epidemics are also discussed.

  19. Ecological lessons from long-term studies in experimental forests: ponderosa pine silviculture at Pringle Falls Experimental Forest, central Oregon

    Treesearch

    Andrew. Youngblood

    2011-01-01

    The United States Department of Agriculture (USDA) Forest Service celebrated the 100th anniversary of its network of experimental forests in 2008. For a century, the network of experimental forests have contributed immensely, both in the US and around the world, to the practical understanding of the environment and to the formation of management approaches and policies...

  20. Adversaries in Networks

    DTIC Science & Technology

    2010-08-01

    between east and west. In 330 AD, the emperor Constantine I moved the capital of the eastern part to Byzantium, and renamed the city Constantinople . In...Byzantium was renamed. Long after the empire collapsed after Constantinople fell to the Ottomans in 1453, the Byzantine Empire became known for being...It was shown in [19] that standard network coding problems fall into three categories: (1) coding is un- necessary, and routing is enough to achieve

  1. Development of a wearable wireless body area network for health monitoring of the elderly and disabled

    NASA Astrophysics Data System (ADS)

    Rushambwa, Munyaradzi C.; Gezimati, Mavis; Jeeva, J. B.

    2017-11-01

    Novel advancements in systems miniaturization, electronics in health care and communication technologies are enabling the integration of both patients and doctors involvement in health care system. A Wearable Wireless Body Area Network (WWBAN) provides continuous, unobtrusive ambulatory, ubiquitous health monitoring, and provide real time patient’s status to the physician without any constraint on their normal daily life activities. In this project we developed a wearable wireless body area network system that continuously monitor the health of the elderly and the disabled and provide them with independent, safe and secure living. The WWBAN system monitors the following parameters; blood oxygen saturation using a pulse oximeter sensor (SpO2), heart rate (HR) pulse sensor, Temperature, hydration, glucose level and fall detection. When the wearable system is put on, the sensor values are processed and analysed. If any of the monitored parameter values falls below or exceeds the normal range, there is trigger of remote alert by which an SMS is send to a doctor or physician via GSM module and network. The developed system offers flexibility and mobility to the user; it is a real time system and has significance in revolutionizing health care system by enabling non-invasive, inexpensive, continuous health monitoring.

  2. A spatial exploration of informal trail networks within Great Falls Park, VA

    USGS Publications Warehouse

    Wimpey, Jeremy; Marion, Jeffrey L.

    2011-01-01

    Informal (visitor-created) trails represent a threat to the natural resources of protected natural areas around the globe. These trails can remove vegetation, displace wildlife, alter hydrology, alter habitat, spread invasive species, and fragment landscapes. This study examines informal and formal trails within Great Falls Park, VA, a sub-unit of the George Washington Memorial Parkway, managed by the U.S. National Park Service. This study sought to answer three specific questions: 1) Are the physical characteristics and topographic alignments of informal trails significantly different from formal trails, 2) Can landscape fragmentation metrics be used to summarize the relative impacts of formal and informal trail networks on a protected natural area? and 3) What can we learn from examining the spatial distribution of the informal trails within protected natural areas? Statistical comparisons between formal and informal trails in this park indicate that informal trails have less sustainable topographic alignments than their formal counterparts. Spatial summaries of the lineal and areal extent and fragmentation associated with the trail networks by park management zones compare park management goals to the assessed attributes. Hot spot analyses highlight areas of high trail density within the park and findings provide insights regarding potential causes for development of dense informal trail networks.

  3. Using the Hendrich II Inpatient Fall Risk Screen to Predict Outpatient Falls After Emergency Department Visits.

    PubMed

    Patterson, Brian W; Repplinger, Michael D; Pulia, Michael S; Batt, Robert J; Svenson, James E; Trinh, Alex; Mendonça, Eneida A; Smith, Maureen A; Hamedani, Azita G; Shah, Manish N

    2018-04-01

    To evaluate the utility of routinely collected Hendrich II fall scores in predicting returns to the emergency department (ED) for falls within 6 months. Retrospective electronic record review. Academic medical center ED. Individuals aged 65 and older seen in the ED from January 1, 2013, through September 30, 2015. We evaluated the utility of routinely collected Hendrich II fall risk scores in predicting ED visits for a fall within 6 months of an all-cause index ED visit. For in-network patient visits resulting in discharge with a completed Hendrich II score (N = 4,366), the return rate for a fall within 6 months was 8.3%. When applying the score alone to predict revisit for falls among the study population the resultant receiver operating characteristic (ROC) plot had an area under the curve (AUC) of 0.64. In a univariate model, the odds of returning to the ED for a fall in 6 months were 1.23 times as high for every 1-point increase in Hendrich II score (odds ratio (OR)=1.23 (95% confidence interval (CI)=1.19-1.28). When included in a model with other potential confounders or predictors of falls, the Hendrich II score is a significant predictor of a return ED visit for fall (adjusted OR=1.15, 95% CI=1.10-1.20, AUC=0.75). Routinely collected Hendrich II scores were correlated with outpatient falls, but it is likely that they would have little utility as a stand-alone fall risk screen. When combined with easily extractable covariates, the screen performs much better. These results highlight the potential for secondary use of electronic health record data for risk stratification of individuals in the ED. Using data already routinely collected, individuals at high risk of falls after discharge could be identified for referral without requiring additional screening resources. © 2018, Copyright the Authors Journal compilation © 2018, The American Geriatrics Society.

  4. Optical interconnection networks for high-performance computing systems

    NASA Astrophysics Data System (ADS)

    Biberman, Aleksandr; Bergman, Keren

    2012-04-01

    Enabled by silicon photonic technology, optical interconnection networks have the potential to be a key disruptive technology in computing and communication industries. The enduring pursuit of performance gains in computing, combined with stringent power constraints, has fostered the ever-growing computational parallelism associated with chip multiprocessors, memory systems, high-performance computing systems and data centers. Sustaining these parallelism growths introduces unique challenges for on- and off-chip communications, shifting the focus toward novel and fundamentally different communication approaches. Chip-scale photonic interconnection networks, enabled by high-performance silicon photonic devices, offer unprecedented bandwidth scalability with reduced power consumption. We demonstrate that the silicon photonic platforms have already produced all the high-performance photonic devices required to realize these types of networks. Through extensive empirical characterization in much of our work, we demonstrate such feasibility of waveguides, modulators, switches and photodetectors. We also demonstrate systems that simultaneously combine many functionalities to achieve more complex building blocks. We propose novel silicon photonic devices, subsystems, network topologies and architectures to enable unprecedented performance of these photonic interconnection networks. Furthermore, the advantages of photonic interconnection networks extend far beyond the chip, offering advanced communication environments for memory systems, high-performance computing systems, and data centers.

  5. Research Activity in Computational Physics utilizing High Performance Computing: Co-authorship Network Analysis

    NASA Astrophysics Data System (ADS)

    Ahn, Sul-Ah; Jung, Youngim

    2016-10-01

    The research activities of the computational physicists utilizing high performance computing are analyzed by bibliometirc approaches. This study aims at providing the computational physicists utilizing high-performance computing and policy planners with useful bibliometric results for an assessment of research activities. In order to achieve this purpose, we carried out a co-authorship network analysis of journal articles to assess the research activities of researchers for high-performance computational physics as a case study. For this study, we used journal articles of the Scopus database from Elsevier covering the time period of 2004-2013. We extracted the author rank in the physics field utilizing high-performance computing by the number of papers published during ten years from 2004. Finally, we drew the co-authorship network for 45 top-authors and their coauthors, and described some features of the co-authorship network in relation to the author rank. Suggestions for further studies are discussed.

  6. Falling PC Solitaire Cards: An Open-Inquiry Approach

    ERIC Educational Resources Information Center

    Gonzalez-Espada, Wilson J.

    2012-01-01

    Many of us have played the PC Solitaire game that comes as standard software in many computers. Although I am not a great player, occasionally I win a game or two. The game celebrates my accomplishment by pushing the cards forward, one at a time, falling gracefully in what appears to look like a parabolic path in a drag-free environment. One day,…

  7. Node fingerprinting: an efficient heuristic for aligning biological networks.

    PubMed

    Radu, Alex; Charleston, Michael

    2014-10-01

    With the continuing increase in availability of biological data and improvements to biological models, biological network analysis has become a promising area of research. An emerging technique for the analysis of biological networks is through network alignment. Network alignment has been used to calculate genetic distance, similarities between regulatory structures, and the effect of external forces on gene expression, and to depict conditional activity of expression modules in cancer. Network alignment is algorithmically complex, and therefore we must rely on heuristics, ideally as efficient and accurate as possible. The majority of current techniques for network alignment rely on precomputed information, such as with protein sequence alignment, or on tunable network alignment parameters, which may introduce an increased computational overhead. Our presented algorithm, which we call Node Fingerprinting (NF), is appropriate for performing global pairwise network alignment without precomputation or tuning, can be fully parallelized, and is able to quickly compute an accurate alignment between two biological networks. It has performed as well as or better than existing algorithms on biological and simulated data, and with fewer computational resources. The algorithmic validation performed demonstrates the low computational resource requirements of NF.

  8. A program to compute the soft Robinson-Foulds distance between phylogenetic networks.

    PubMed

    Lu, Bingxin; Zhang, Louxin; Leong, Hon Wai

    2017-03-14

    Over the past two decades, phylogenetic networks have been studied to model reticulate evolutionary events. The relationships among phylogenetic networks, phylogenetic trees and clusters serve as the basis for reconstruction and comparison of phylogenetic networks. To understand these relationships, two problems are raised: the tree containment problem, which asks whether a phylogenetic tree is displayed in a phylogenetic network, and the cluster containment problem, which asks whether a cluster is represented at a node in a phylogenetic network. Both the problems are NP-complete. A fast exponential-time algorithm for the cluster containment problem on arbitrary networks is developed and implemented in C. The resulting program is further extended into a computer program for fast computation of the Soft Robinson-Foulds distance between phylogenetic networks. Two computer programs are developed for facilitating reconstruction and validation of phylogenetic network models in evolutionary and comparative genomics. Our simulation tests indicated that they are fast enough for use in practice. Additionally, the distribution of the Soft Robinson-Foulds distance between phylogenetic networks is demonstrated to be unlikely normal by our simulation data.

  9. Student Perceptions of the Value of a University Laptop Program

    ERIC Educational Resources Information Center

    Orr, Claudia; Sherony, Bruce; Steinhaus, Carol

    2008-01-01

    In the fall of 2000, when a mandatory laptop program was initiated at a Midwest regional university, a faculty research team began a longitudinal study to determine student perceptions of the value of the program. Value was defined as usefulness of the computer, reasonable price for the computer and the quality of the computer. A survey of 1,000…

  10. Investigation of land subsidence due to climate changes in surrounding areas of Urmia Lake (located in northwest of Iran) using wavelet coherence analysis of geodetic measurements and methodological data

    NASA Astrophysics Data System (ADS)

    Moghtased-Azar, K.; Mirzaei, A.; Nankali, H. R.; Tavakoli, F.

    2012-04-01

    Urmia Lake (salt lake in northwest of Iran) plays a valuable role in environment, wildlife and economy of Iran and the region, and now faces great challenges for survival. The Lake is in immediate and great danger and rapidly going to become salty desert. During the recent years and new heat wave, Iran, like many other countries are experiencing, is faced with relativity reduced rain fall. From a few years ago environment activists warned about potential dangers. Geodetic measurements, e.g., repeated leveling measurements of first order leveling network of Iran and continuous GPS measurements of Iranian Permanent GPS network of Iran (IPGN) showed that there is subsidence in surrounding areas of the lake. This paper investigates the relation between subsidence and climate changing in the area, using the wavelet coherence of the data of permanent GPS stations and daily methodological data. The results show that there is strong coherence between the subsidence phenomena induced by GPS data and climate warming from January 2009 up to end of August 2009. However, relative lake height variations computed from altimetry observations (TOPEX/POSEIDON (T/P), Jason-1 and Jason-2/OSTM) confirms maximum evaporation rates of the lake in this period.

  11. Calibration of the Total Carbon Column Observing Network using Aircraft Profile Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wunch, Debra; Toon, Geoffrey C.; Wennberg, Paul O.

    2010-03-26

    The Total Carbon Column Observing Network (TCCON) produces precise measurements of the column average dry-air mole fractions of CO{sub 2}, CO, CH{sub 4}, N{sub 2}O and H{sub 2}O at a variety of sites worldwide. These observations rely on spectroscopic parameters that are not known with sufficient accuracy to compute total columns that can be used in combination with in situ measure ments. The TCCON must therefore be calibrated to World Meteorological Organization (WMO) in situ trace gas measurement scales. We present a calibration of TCCON data using WMO-scale instrumentation aboard aircraft that measured profiles over four TCCON stations during 2008more » and 2009. The aircraft campaigns are the Stratosphere-Troposphere Analyses of Regional Transport 2008 (START-08), which included a profile over the Park Falls site, the HIAPER Pole-to-Pole Observations (HIPPO-1) campaign, which included profiles over the Lamont and Lauder sites, a series of Learjet profiles over the Lamont site, and a Beechcraft King Air profile over the Tsukuba site. These calibrations are compared with similar observations made during the INTEX-NA (2004), COBRA-ME (2004) and TWP-ICE (2006) campaigns. A single, global calibration factor for each gas accurately captures the TCCON total column data within error.« less

  12. Student and Instructor Perceptions of the Usefulness of Computer-Based Microworlds in Supporting the Teaching and Assessment of Computer Networking Skills: An Exploratory Study

    ERIC Educational Resources Information Center

    Dabbagh, Nada; Beattie, Mark

    2010-01-01

    Skill shortages in the area of computer network troubleshooting are becoming increasingly acute. According to research sponsored by Cisco's Learning Institute, the demand for professionals with computer networking skills in the United States and Canada will outpace the supply of workers with those skills by an average of eight percent per year…

  13. Spatiotemporal Dynamics and Reliable Computations in Recurrent Spiking Neural Networks

    NASA Astrophysics Data System (ADS)

    Pyle, Ryan; Rosenbaum, Robert

    2017-01-01

    Randomly connected networks of excitatory and inhibitory spiking neurons provide a parsimonious model of neural variability, but are notoriously unreliable for performing computations. We show that this difficulty is overcome by incorporating the well-documented dependence of connection probability on distance. Spatially extended spiking networks exhibit symmetry-breaking bifurcations and generate spatiotemporal patterns that can be trained to perform dynamical computations under a reservoir computing framework.

  14. Ubiquitous human computing.

    PubMed

    Zittrain, Jonathan

    2008-10-28

    Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a drawing pin and as large as a worldwide product distribution chain. What could happen when people are so readily networked? This paper explores issues arising from two possible emerging models of ubiquitous human computing: fungible networked brainpower and collective personal vital sign monitoring.

  15. Computer-Based Semantic Network in Molecular Biology: A Demonstration.

    ERIC Educational Resources Information Center

    Callman, Joshua L.; And Others

    This paper analyzes the hardware and software features that would be desirable in a computer-based semantic network system for representing biology knowledge. It then describes in detail a prototype network of molecular biology knowledge that has been developed using Filevision software and a Macintosh computer. The prototype contains about 100…

  16. Neural network approach to proximity effect corrections in electron-beam lithography

    NASA Astrophysics Data System (ADS)

    Frye, Robert C.; Cummings, Kevin D.; Rietman, Edward A.

    1990-05-01

    The proximity effect, caused by electron beam backscattering during resist exposure, is an important concern in writing submicron features. It can be compensated by appropriate local changes in the incident beam dose, but computation of the optimal correction usually requires a prohibitively long time. We present an example of such a computation on a small test pattern, which we performed by an iterative method. We then used this solution as a training set for an adaptive neural network. After training, the network computed the same correction as the iterative method, but in a much shorter time. Correcting the image with a software based neural network resulted in a decrease in the computation time by a factor of 30, and a hardware based network enhanced the computation speed by more than a factor of 1000. Both methods had an acceptably small error of 0.5% compared to the results of the iterative computation. Additionally, we verified that the neural network correctly generalized the solution of the problem to include patterns not contained in its training set.

  17. Critical phenomena in communication/computation networks with various topologies and suboptimal to optimal resource allocation

    NASA Astrophysics Data System (ADS)

    Cogoni, Marco; Busonera, Giovanni; Anedda, Paolo; Zanetti, Gianluigi

    2015-01-01

    We generalize previous studies on critical phenomena in communication networks [1,2] by adding computational capabilities to the nodes. In our model, a set of tasks with random origin, destination and computational structure is distributed on a computational network, modeled as a graph. By varying the temperature of a Metropolis Montecarlo, we explore the global latency for an optimal to suboptimal resource assignment at a given time instant. By computing the two-point correlation function for the local overload, we study the behavior of the correlation distance (both for links and nodes) while approaching the congested phase: a transition from peaked to spread g(r) is seen above a critical (Montecarlo) temperature Tc. The average latency trend of the system is predicted by averaging over several network traffic realizations while maintaining a spatially detailed information for each node: a sharp decrease of performance is found over Tc independently of the workload. The globally optimized computational resource allocation and network routing defines a baseline for a future comparison of the transition behavior with respect to existing routing strategies [3,4] for different network topologies.

  18. National Children's Center for Rural and Agricultural Health and Safety

    MedlinePlus

    ... Network Grain Safety Model Policy: Youth Employment in Agriculture Agricultural Youth Work Guidelines North American Guidelines for ... Sept. 20 Teaching fall and electrical safety in agriculture: free webinar, Sept. 13 Agricultural Youth Work Guidelines ...

  19. PAVECHECK : integrating deflection and GPR for network condition surveys.

    DOT National Transportation Integrated Search

    2009-01-01

    The PAVECHECK data integration and analysis system was developed to merge Falling Weight : Deflectometer (FWD) and Ground Penetrating Radar (GPR) data together with digital video images of : surface conditions. In this study Global Positioning System...

  20. TCGA researchers identify 4 subtypes of stomach cancer

    Cancer.gov

    Stomach cancers fall into four distinct molecular subtypes, researchers with The Cancer Genome Atlas (TCGA) Network have found. Scientists report that this discovery could change how researchers think about developing treatments for stomach cancer, also c

  1. Extending Simple Network Management Protocol (SNMP) Beyond Network Management: A MIB Architecture for Network-Centric Services

    DTIC Science & Technology

    2007-03-01

    potential of moving closer to the goal of a fully service-oriented GIG by allowing even computing - and bandwidth-constrained elements to participate...the functionality provided by core network assets with relatively unlimited bandwidth and computing resources. Finally, the nature of information is...the Department of Defense is a requirement for ubiquitous computer connectivity. An espoused vehicle for delivering that ubiquity is the Global

  2. Fatal falls involving stairs: an anthropological analysis of skeletal trauma.

    PubMed

    Rowbotham, Samantha K; Blau, Soren; Hislop-Jambrich, Jacqueline; Francis, Victoria

    2018-06-01

    The skeletal blunt force trauma resulting from fatal falls involving stairs is complex. There are countless ways an individual may fall when stairs are involved, and thus a variety of ways the skeleton may fracture. Therefore anecdotally, it may be said that there is no specific skeletal trauma characteristic of this fall type. In order to scientifically investigate this anecdotal understanding, this study provides a detailed investigation of the skeletal fracture patterns and morphologies resulting from fatal falls involving stairs. Skeletal trauma was analyzed using the full-body postmortem computed tomography scans of 57 individuals who died from a fall involving stairs. Trauma was examined in the context of the variables that potentially influence how an individual falls (i.e. sex, age, body mass index, number of stairs involved, psychoactive drugs, pre-existing conditions, landing surface and manner of the fall) using logistic regression. Skeletal trauma primarily occurred in the axial skeleton. An analysis of fracture patterns showed the cranial base was less likely to fracture in younger individuals and the cervical vertebrae were more likely to fracture in falls that involved more than half a flight of stairs. A total of 56 fracture morphologies were identified. Of these, diastatic fractures were less likely to occur in older individuals. Findings indicate that there are skeletal fracture patterns and morphologies characteristic of a fatal fall involving stairs.

  3. Modeling a Wireless Network for International Space Station

    NASA Technical Reports Server (NTRS)

    Alena, Richard; Yaprak, Ece; Lamouri, Saad

    2000-01-01

    This paper describes the application of wireless local area network (LAN) simulation modeling methods to the hybrid LAN architecture designed for supporting crew-computing tools aboard the International Space Station (ISS). These crew-computing tools, such as wearable computers and portable advisory systems, will provide crew members with real-time vehicle and payload status information and access to digital technical and scientific libraries, significantly enhancing human capabilities in space. A wireless network, therefore, will provide wearable computer and remote instruments with the high performance computational power needed by next-generation 'intelligent' software applications. Wireless network performance in such simulated environments is characterized by the sustainable throughput of data under different traffic conditions. This data will be used to help plan the addition of more access points supporting new modules and more nodes for increased network capacity as the ISS grows.

  4. Distributed computing methodology for training neural networks in an image-guided diagnostic application.

    PubMed

    Plagianakos, V P; Magoulas, G D; Vrahatis, M N

    2006-03-01

    Distributed computing is a process through which a set of computers connected by a network is used collectively to solve a single problem. In this paper, we propose a distributed computing methodology for training neural networks for the detection of lesions in colonoscopy. Our approach is based on partitioning the training set across multiple processors using a parallel virtual machine. In this way, interconnected computers of varied architectures can be used for the distributed evaluation of the error function and gradient values, and, thus, training neural networks utilizing various learning methods. The proposed methodology has large granularity and low synchronization, and has been implemented and tested. Our results indicate that the parallel virtual machine implementation of the training algorithms developed leads to considerable speedup, especially when large network architectures and training sets are used.

  5. Local area networking: Ames centerwide network

    NASA Technical Reports Server (NTRS)

    Price, Edwin

    1988-01-01

    A computer network can benefit the user by making his/her work quicker and easier. A computer network is made up of seven different layers with the lowest being the hardware, the top being the user, and the middle being the software. These layers are discussed.

  6. Using E-Mail across Computer Networks.

    ERIC Educational Resources Information Center

    Hazari, Sunil

    1990-01-01

    Discusses the use of telecommunications technology to exchange electronic mail, files, and messages across different computer networks. Networks highlighted include ARPA Internet; BITNET; USENET; FidoNet; MCI Mail; and CompuServe. Examples of the successful use of networks in higher education are given. (Six references) (LRW)

  7. Inverse targeting —An effective immunization strategy

    NASA Astrophysics Data System (ADS)

    Schneider, C. M.; Mihaljev, T.; Herrmann, H. J.

    2012-05-01

    We propose a new method to immunize populations or computer networks against epidemics which is more efficient than any continuous immunization method considered before. The novelty of our method resides in the way of determining the immunization targets. First we identify those individuals or computers that contribute the least to the disease spreading measured through their contribution to the size of the largest connected cluster in the social or a computer network. The immunization process follows the list of identified individuals or computers in inverse order, immunizing first those which are most relevant for the epidemic spreading. We have applied our immunization strategy to several model networks and two real networks, the Internet and the collaboration network of high-energy physicists. We find that our new immunization strategy is in the case of model networks up to 14%, and for real networks up to 33% more efficient than immunizing dynamically the most connected nodes in a network. Our strategy is also numerically efficient and can therefore be applied to large systems.

  8. Local-Area-Network Simulator

    NASA Technical Reports Server (NTRS)

    Gibson, Jim; Jordan, Joe; Grant, Terry

    1990-01-01

    Local Area Network Extensible Simulator (LANES) computer program provides method for simulating performance of high-speed local-area-network (LAN) technology. Developed as design and analysis software tool for networking computers on board proposed Space Station. Load, network, link, and physical layers of layered network architecture all modeled. Mathematically models according to different lower-layer protocols: Fiber Distributed Data Interface (FDDI) and Star*Bus. Written in FORTRAN 77.

  9. Object-oriented Tools for Distributed Computing

    NASA Technical Reports Server (NTRS)

    Adler, Richard M.

    1993-01-01

    Distributed computing systems are proliferating, owing to the availability of powerful, affordable microcomputers and inexpensive communication networks. A critical problem in developing such systems is getting application programs to interact with one another across a computer network. Remote interprogram connectivity is particularly challenging across heterogeneous environments, where applications run on different kinds of computers and operating systems. NetWorks! (trademark) is an innovative software product that provides an object-oriented messaging solution to these problems. This paper describes the design and functionality of NetWorks! and illustrates how it is being used to build complex distributed applications for NASA and in the commercial sector.

  10. Distinguishing humans from computers in the game of go: A complex network approach

    NASA Astrophysics Data System (ADS)

    Coquidé, C.; Georgeot, B.; Giraud, O.

    2017-08-01

    We compare complex networks built from the game of go and obtained from databases of human-played games with those obtained from computer-played games. Our investigations show that statistical features of the human-based networks and the computer-based networks differ, and that these differences can be statistically significant on a relatively small number of games using specific estimators. We show that the deterministic or stochastic nature of the computer algorithm playing the game can also be distinguished from these quantities. This can be seen as a tool to implement a Turing-like test for go simulators.

  11. High-speed on-chip windowed centroiding using photodiode-based CMOS imager

    NASA Technical Reports Server (NTRS)

    Pain, Bedabrata (Inventor); Sun, Chao (Inventor); Yang, Guang (Inventor); Cunningham, Thomas J. (Inventor); Hancock, Bruce (Inventor)

    2003-01-01

    A centroid computation system is disclosed. The system has an imager array, a switching network, computation elements, and a divider circuit. The imager array has columns and rows of pixels. The switching network is adapted to receive pixel signals from the image array. The plurality of computation elements operates to compute inner products for at least x and y centroids. The plurality of computation elements has only passive elements to provide inner products of pixel signals the switching network. The divider circuit is adapted to receive the inner products and compute the x and y centroids.

  12. High-speed on-chip windowed centroiding using photodiode-based CMOS imager

    NASA Technical Reports Server (NTRS)

    Pain, Bedabrata (Inventor); Sun, Chao (Inventor); Yang, Guang (Inventor); Cunningham, Thomas J. (Inventor); Hancock, Bruce (Inventor)

    2004-01-01

    A centroid computation system is disclosed. The system has an imager array, a switching network, computation elements, and a divider circuit. The imager array has columns and rows of pixels. The switching network is adapted to receive pixel signals from the image array. The plurality of computation elements operates to compute inner products for at least x and y centroids. The plurality of computation elements has only passive elements to provide inner products of pixel signals the switching network. The divider circuit is adapted to receive the inner products and compute the x and y centroids.

  13. Physically-Based Modelling and Real-Time Simulation of Fluids.

    NASA Astrophysics Data System (ADS)

    Chen, Jim Xiong

    1995-01-01

    Simulating physically realistic complex fluid behaviors presents an extremely challenging problem for computer graphics researchers. Such behaviors include the effects of driving boats through water, blending differently colored fluids, rain falling and flowing on a terrain, fluids interacting in a Distributed Interactive Simulation (DIS), etc. Such capabilities are useful in computer art, advertising, education, entertainment, and training. We present a new method for physically-based modeling and real-time simulation of fluids in computer graphics and dynamic virtual environments. By solving the 2D Navier -Stokes equations using a CFD method, we map the surface into 3D using the corresponding pressures in the fluid flow field. This achieves realistic real-time fluid surface behaviors by employing the physical governing laws of fluids but avoiding extensive 3D fluid dynamics computations. To complement the surface behaviors, we calculate fluid volume and external boundary changes separately to achieve full 3D general fluid flow. To simulate physical activities in a DIS, we introduce a mechanism which uses a uniform time scale proportional to the clock-time and variable time-slicing to synchronize physical models such as fluids in the networked environment. Our approach can simulate many different fluid behaviors by changing the internal or external boundary conditions. It can model different kinds of fluids by varying the Reynolds number. It can simulate objects moving or floating in fluids. It can also produce synchronized general fluid flows in a DIS. Our model can serve as a testbed to simulate many other fluid phenomena which have never been successfully modeled previously.

  14. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers.

    PubMed

    Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne

    2018-01-01

    State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems.

  15. Learning Universal Computations with Spikes

    PubMed Central

    Thalmeier, Dominik; Uhlmann, Marvin; Kappen, Hilbert J.; Memmesheimer, Raoul-Martin

    2016-01-01

    Providing the neurobiological basis of information processing in higher animals, spiking neural networks must be able to learn a variety of complicated computations, including the generation of appropriate, possibly delayed reactions to inputs and the self-sustained generation of complex activity patterns, e.g. for locomotion. Many such computations require previous building of intrinsic world models. Here we show how spiking neural networks may solve these different tasks. Firstly, we derive constraints under which classes of spiking neural networks lend themselves to substrates of powerful general purpose computing. The networks contain dendritic or synaptic nonlinearities and have a constrained connectivity. We then combine such networks with learning rules for outputs or recurrent connections. We show that this allows to learn even difficult benchmark tasks such as the self-sustained generation of desired low-dimensional chaotic dynamics or memory-dependent computations. Furthermore, we show how spiking networks can build models of external world systems and use the acquired knowledge to control them. PMID:27309381

  16. Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers

    PubMed Central

    Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne

    2018-01-01

    State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems. PMID:29503613

  17. Embedding global barrier and collective in torus network with each node combining input from receivers according to class map for output to senders

    DOEpatents

    Chen, Dong; Coteus, Paul W; Eisley, Noel A; Gara, Alan; Heidelberger, Philip; Senger, Robert M; Salapura, Valentina; Steinmacher-Burow, Burkhard; Sugawara, Yutaka; Takken, Todd E

    2013-08-27

    Embodiments of the invention provide a method, system and computer program product for embedding a global barrier and global interrupt network in a parallel computer system organized as a torus network. The computer system includes a multitude of nodes. In one embodiment, the method comprises taking inputs from a set of receivers of the nodes, dividing the inputs from the receivers into a plurality of classes, combining the inputs of each of the classes to obtain a result, and sending said result to a set of senders of the nodes. Embodiments of the invention provide a method, system and computer program product for embedding a collective network in a parallel computer system organized as a torus network. In one embodiment, the method comprises adding to a torus network a central collective logic to route messages among at least a group of nodes in a tree structure.

  18. An improved wavelet neural network medical image segmentation algorithm with combined maximum entropy

    NASA Astrophysics Data System (ADS)

    Hu, Xiaoqian; Tao, Jinxu; Ye, Zhongfu; Qiu, Bensheng; Xu, Jinzhang

    2018-05-01

    In order to solve the problem of medical image segmentation, a wavelet neural network medical image segmentation algorithm based on combined maximum entropy criterion is proposed. Firstly, we use bee colony algorithm to optimize the network parameters of wavelet neural network, get the parameters of network structure, initial weights and threshold values, and so on, we can quickly converge to higher precision when training, and avoid to falling into relative extremum; then the optimal number of iterations is obtained by calculating the maximum entropy of the segmented image, so as to achieve the automatic and accurate segmentation effect. Medical image segmentation experiments show that the proposed algorithm can reduce sample training time effectively and improve convergence precision, and segmentation effect is more accurate and effective than traditional BP neural network (back propagation neural network : a multilayer feed forward neural network which trained according to the error backward propagation algorithm.

  19. The stability of financial market networks

    NASA Astrophysics Data System (ADS)

    Yan, Xin-Guo; Xie, Chi; Wang, Gang-Jin

    2014-08-01

    We investigate the stability of a financial market network by measuring its topological robustness, namely the ability of the network to resist structural or topological changes. The closing prices of 710 stocks in the Shanghai Stock Exchange (SSE) from 2005 to 2011 are chosen as the empirical data. We divide the period into three sub-periods: before, during, and after the US sub-prime crisis. By monitoring the size of the clusters which fall apart from the network after removing the nodes (i.e., the listed companies in the SSE), we find that: i) the SSE network is sensitive to the nodes' failure, which implies that the network is unstable. ii) the SSE network before the financial crisis has the strongest robustness against the intentional topological damage; iii) the hubs (i.e., highly connected nodes) connect with each other directly and play a vital important role in maintaining SSE network's stability.

  20. Computer Code for Transportation Network Design and Analysis

    DOT National Transportation Integrated Search

    1977-01-01

    This document describes the results of research into the application of the mathematical programming technique of decomposition to practical transportation network problems. A computer code called Catnap (for Control Analysis Transportation Network A...

  1. Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neil, Joshua Charles; Fisk, Michael Edward; Brugh, Alexander William

    A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalousmore » behavior. Data collected by a Unified Host Collection Agent ("UHCA") may also be used to detect anomalous behavior.« less

  2. Peer Standing and Substance Use in Early-Adolescent Grade-Level Networks: A Short-Term Longitudinal Study

    PubMed Central

    Killeya-Jones, Ley A.; Nakajima, Ryo; Costanzo, Philip R.

    2009-01-01

    Two competing hypotheses were tested concerning the associations between current alcohol and cigarette use and measures of individual, group and network peer standing in an ethnically-diverse sample of 156 male and female adolescents sampled at two time points in the seventh grade. Findings lent greater support to the person hypothesis, with early regular substance users enjoying elevated standing amongst their peers and maintaining this standing regardless of their maintenance of or desistance from current use later in the school year. In the fall semester, users (n=20, 13%) had greater social impact, were described by their peers as more popular, and were more central to the peer network than abstainers (i.e., those who did not report current use). Conversely, in the spring semester, there were no differences between users (n=22, 13%) and abstainers in peer ratings of popularity or social impact. Notably, the spring semester users group retained fewer than half of the users from the fall semester. Further, students who had reported current use in the fall, as a group, retained their positions of elevated peer standing in the spring, compared to all other students, and continued to be rated by their peers as more popular and as having greater social impact. We discuss the findings in terms of the benefit of employing simultaneous systemic and individual measures of peer standing or group prominence, which in the case of peer-based prevention programs, can help clarify the truly influential from the “pretenders” in the case of diffusion of risk-related behaviors. PMID:17013672

  3. The predictive value of fall assessment tools for patients admitted to hospice care.

    PubMed

    Patrick, Rebecca J; Slobodian, Dana; Debanne, Sara; Huang, Ying; Wellman, Charles

    2017-09-01

    Fall assessment tools are commonly used to evaluate the likelihood of fall. For patients found to be at high risk, patient-specific fall prevention interventions are implemented. The purposes of this study were to describe the population, evaluate and compare the efficacy of fall assessment tools, and suggest the best use for these tools in hospice. Data were downloaded from the electronic medical record for all patients who were admitted to and died in hospice care in 2013. Variables included demographic, clinical and initial fall assessment scores that had been computed on admission to hospice care, using our standard fall assessment tool. To facilitate comparison among three tools, additional fall assessment calculations were made for each patient using the Morse Fall Scale and MACH-10, two tools commonly used in a variety of healthcare settings. Data were available for 3446 hospice patients. Female patients were less likely to fall than males; Fallers lived longer than Nonfallers; and patients with a primary dementia diagnosis fell 10 days sooner than those with a primary non-dementia diagnosis. A comparison of three fall assessment tools revealed that no tool had a good positive predictive value, but each demonstrated a good negative predictive value. Fall assessment scores should not be used as the sole predictor of likelihood of fall, and are best used as a supplement to clinical judgement. Patients with a primary dementia diagnosis are likely to fall earlier in their hospice care than those with other primary diagnoses. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  4. Fluid Centrality: A Social Network Analysis of Social-Technical Relations in Computer-Mediated Communication

    ERIC Educational Resources Information Center

    Enriquez, Judith Guevarra

    2010-01-01

    In this article, centrality is explored as a measure of computer-mediated communication (CMC) in networked learning. Centrality measure is quite common in performing social network analysis (SNA) and in analysing social cohesion, strength of ties and influence in CMC, and computer-supported collaborative learning research. It argues that measuring…

  5. The Effectiveness of Using Virtual Laboratories to Teach Computer Networking Skills in Zambia

    ERIC Educational Resources Information Center

    Lampi, Evans

    2013-01-01

    The effectiveness of using virtual labs to train students in computer networking skills, when real equipment is limited or unavailable, is uncertain. The purpose of this study was to determine the effectiveness of using virtual labs to train students in the acquisition of computer network configuration and troubleshooting skills. The study was…

  6. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    PubMed

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  7. Better Strength, Better Balance! Partnering to deliver a fall prevention program for older adults.

    PubMed

    Taing, Darcie; McKay, Kelly

    2017-09-14

    Falls incur significant health and economic costs, particularly among older adults. Physical activity has been found to be the single most important fall prevention behaviour an older adult can do. This manuscript describes Ottawa Public Health's (OPH) experience implementing the Better Strength, Better Balance! (BSBB) program, a fall prevention exercise program for older adults, through an innovative partnership with the local Recreation, Cultural & Facility Services (RCFS) Department. BSBB aims to reach 1300 community-dwelling adults (aged 65 years and older) per year through approximately 86-130 exercise programs. Designed as a universal program, BSBB addresses participation barriers such as transportation, cost and location. BSBB was enabled with funding from the Champlain Local Health Integration Network, and coincided with the implementation of an Older Adult Plan for the City of Ottawa. BSBB is a beginner-level, fall prevention exercise and education program that takes place twice a week, over 12 weeks. Certified RCFS instructors delivered the exercise components of the program and OPH staff incorporated fall prevention messaging and conducted the evaluation. The formative evaluation indicated that participants experienced improved strength and balance, decreased fear of falling and the intent to adopt new fall prevention behaviours following the program. The partnership between OPH and RCFS allowed both partners to leverage their unique and mutual strengths to continually improve the program. Improving access to strength and balance programming is an important public health strategy to reduce falls. The recreation sector is an ideal partner to help public health in this pursuit.

  8. Potential Solution of a Hardware-Software System V-Cluster for Big Data Analysis

    NASA Astrophysics Data System (ADS)

    Morra, G.; Tufo, H.; Yuen, D. A.; Brown, J.; Zihao, S.

    2017-12-01

    Today it cannot be denied that the Big Data revolution is taking place and is replacing HPC and numerical simulation as the main driver in society. Outside the immediate scientific arena, the Big Data market encompass much more than the AGU. There are many sectors in society that Big Data can ably serve, such as governments finances, hospitals, tourism, and, last by not least, scientific and engineering problems. In many countries, education has not kept pace with the demands from students outside computer science to get into Big Data science. Ultimate Vision (UV) in Beijing attempts to address this need in China by focusing part of our energy on education and training outside the immediate university environment. UV plans a strategy to maximize profits in our beginning. Therefore, we will focus on growing markets such as provincial governments, medical sectors, mass media, and education. And will not address issues such as performance for scientific collaboration, such as seismic networks, where the market share and profits are small by comparison. We have developed a software-hardware system, called V-Cluster, built with the latest NVIDIA GPUs and Intel CPUs with ample amounts of RAM (over couple of Tbytes) and local storage. We have put in an internal network with high bandwidth (over 100 Gbits/sec) and each node of V-Cluster can run at around 40 Tflops. Our system can scale linearly with the number of codes. Our main strength in data analytics is the use of graph-computing paradigm for optimizing the transfer rate in collaborative efforts. We focus in training and education with our clients in order to gain experience in learning about new applications. We will present the philosophy of this second generation of our Data Analytic system, whose costs fall far below those offered elsewhere.

  9. Real-time classification of signals from three-component seismic sensors using neural nets

    NASA Astrophysics Data System (ADS)

    Bowman, B. C.; Dowla, F.

    1992-05-01

    Adaptive seismic data acquisition systems with capabilities of signal discrimination and event classification are important in treaty monitoring, proliferation, and earthquake early detection systems. Potential applications include monitoring underground chemical explosions, as well as other military, cultural, and natural activities where characteristics of signals change rapidly and without warning. In these applications, the ability to detect and interpret events rapidly without falling behind the influx of the data is critical. We developed a system for real-time data acquisition, analysis, learning, and classification of recorded events employing some of the latest technology in computer hardware, software, and artificial neural networks methods. The system is able to train dynamically, and updates its knowledge based on new data. The software is modular and hardware-independent; i.e., the front-end instrumentation is transparent to the analysis system. The software is designed to take advantage of the multiprocessing environment of the Unix operating system. The Unix System V shared memory and static RAM protocols for data access and the semaphore mechanism for interprocess communications were used. As the three-component sensor detects a seismic signal, it is displayed graphically on a color monitor using X11/Xlib graphics with interactive screening capabilities. For interesting events, the triaxial signal polarization is computed, a fast Fourier Transform (FFT) algorithm is applied, and the normalized power spectrum is transmitted to a backpropagation neural network for event classification. The system is currently capable of handling three data channels with a sampling rate of 500 Hz, which covers the bandwidth of most seismic events. The system has been tested in laboratory setting with artificial events generated in the vicinity of a three-component sensor.

  10. Computer Exercises in Meteorology.

    ERIC Educational Resources Information Center

    Trapasso, L. Michael; Conner, Glen; Stallins, Keith

    Beginning with Western Kentucky University's (Bowling Green) fall 1999 semester, exercises required for the geography and meteorology course used computers for learning. This course enrolls about 250 students per year, most of whom choose it to fulfill a general education requirement. Of the 185 geography majors, it is required for those who…

  11. Data Aggregation, Curation and Modeling Approaches to Deliver Prediction Models to Support Computational Toxicology at the EPA (ACS Fall meeting)

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) Computational Toxicology Program develops and utilizes QSAR modeling approaches across a broad range of applications. In terms of physical chemistry we have a particular interest in the prediction of basic physicochemical parameters ...

  12. Use of Falling Weight Deflectometer Data for Assessing Pavement Structural Evaluation Values

    DOT National Transportation Integrated Search

    1999-09-01

    Structural evaluation can be very useful at the network level for project prioritization purposes. In the project priority ranking procedure of the Kansas Department of Transportation (KDOT), a pavement rating attribute, Pavement Structural Evaluatio...

  13. Documentary of MFENET, a national computer network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shuttleworth, B.O.

    1977-06-01

    The national Magnetic Fusion Energy Computer Network (MFENET) is a newly operational star network of geographically separated heterogeneous hosts and a communications subnetwork of PDP-11 processors. Host processors interfaced to the subnetwork currently include a CDC 7600 at the Central Computer Center (CCC) and several DECsystem-10's at User Service Centers (USC's). The network was funded by a U.S. government agency (ERDA) to provide in an economical manner the needed computational resources to magnetic confinement fusion researchers. Phase I operation of MFENET distributed the processing power of the CDC 7600 among the USC's through the provision of file transport between anymore » two hosts and remote job entry to the 7600. Extending the capabilities of Phase I, MFENET Phase II provided interactive terminal access to the CDC 7600 from the USC's. A file management system is maintained at the CCC for all network users. The history and development of MFENET are discussed, with emphasis on the protocols used to link the host computers and the USC software. Comparisons are made of MFENET versus ARPANET (Advanced Research Projects Agency Computer Network) and DECNET (Digital Distributed Network Architecture). DECNET and MFENET host-to host, host-to-CCP, and link protocols are discussed in detail. The USC--CCP interface is described briefly. 43 figures, 2 tables.« less

  14. Network Management of the SPLICE Computer Network.

    DTIC Science & Technology

    1982-12-01

    Approved for public release; distri4ition unlimited. Network lanagenent Df the SPLICE Computer Network by Zriig E. Opal captaini United St~tes larine... structure of the network must leni itself t3 change and reconfiguration, one author [Ref. 2: p.21] recommended that a global bus topology be adopted for...statistics, trace statistics, snapshot statistiZs, artifi - cial traffic generators, auulat on, a network measurement center which includes control, collction

  15. Postural imbalance and falls in PSP correlate with functional pathology of the thalamus.

    PubMed

    Zwergal, A; la Fougère, C; Lorenzl, S; Rominger, A; Xiong, G; Deutschenbaur, L; Linn, J; Krafczyk, S; Dieterich, M; Brandt, T; Strupp, M; Bartenstein, P; Jahn, K

    2011-07-12

    To determine how postural imbalance and falls are related to regional cerebral glucose metabolism (PET) and functional activation of the cerebral postural network (fMRI) in patients with progressive supranuclear palsy (PSP). Sixteen patients with PSP, who had self-monitored their frequency of falls, underwent a standardized clinical assessment, posturographic measurement of balance during modified sensory input, and a resting [¹⁸F]FDG-PET. In addition, patients performed an fMRI paradigm using mental imagery of standing. Results were compared to healthy controls (n = 16). The frequency of falls/month in patients (range 1-40) correlated with total PSP rating score (r = 0.90). Total sway path in PSP significantly correlated with frequency of falls, especially during modulated sensory input (eyes open: r = 0.62, eyes closed: r = 0.67, eyes open/head extended: r = 0.84, eyes open/foam-padded platform: r = 0.87). Higher sway path values and frequency of falls were associated with decreased regional glucose metabolism (rCGM) in the thalamus (sway path: r = -0.80, falls: r = -0.64) and increased rCGM in the precentral gyrus (sway path: r = 0.79, falls: r = 0.64). Mental imagery of standing during fMRI revealed a reduced activation of the mesencephalic brainstem tegmentum and the thalamus in patients with postural imbalance and falls. The new and clinically relevant finding of this study is that imbalance and falls in PSP are closely associated with thalamic dysfunction. Deficits in thalamic postural control get most evident when balance is assessed during modified sensory input. The results are consistent with the hypothesis that reduced thalamic activation via the ascending brainstem projections may cause postural imbalance in PSP.

  16. Computer-Based Information Networks: Selected Examples.

    ERIC Educational Resources Information Center

    Hardesty, Larry

    The history, purpose, and operation of six computer-based information networks are described in general and nontechnical terms. In the introduction the many definitions of an information network are explored. Ohio College Library Center's network (OCLC) is the first example. OCLC began in 1963, and since early 1973 has been extending its services…

  17. Network Computing for Distributed Underwater Acoustic Sensors

    DTIC Science & Technology

    2014-03-31

    underwater sensor network with mobility. In preparation. [3] EvoLogics (2013), Underwater Acoustic Modems, (Product Information Guide... Wireless Communications, 9(9), 2934–2944. [21] Pompili, D. and Akyildiz, I. (2010), A multimedia cross-layer protocol for underwater acoustic sensor networks ... Network Computing for Distributed Underwater Acoustic Sensors M. Barbeau E. Kranakis

  18. MapReduce Based Parallel Neural Networks in Enabling Large Scale Machine Learning

    PubMed Central

    Yang, Jie; Huang, Yuan; Xu, Lixiong; Li, Siguang; Qi, Man

    2015-01-01

    Artificial neural networks (ANNs) have been widely used in pattern recognition and classification applications. However, ANNs are notably slow in computation especially when the size of data is large. Nowadays, big data has received a momentum from both industry and academia. To fulfill the potentials of ANNs for big data applications, the computation process must be speeded up. For this purpose, this paper parallelizes neural networks based on MapReduce, which has become a major computing model to facilitate data intensive applications. Three data intensive scenarios are considered in the parallelization process in terms of the volume of classification data, the size of the training data, and the number of neurons in the neural network. The performance of the parallelized neural networks is evaluated in an experimental MapReduce computer cluster from the aspects of accuracy in classification and efficiency in computation. PMID:26681933

  19. Deep learning with coherent nanophotonic circuits

    NASA Astrophysics Data System (ADS)

    Shen, Yichen; Harris, Nicholas C.; Skirlo, Scott; Prabhu, Mihika; Baehr-Jones, Tom; Hochberg, Michael; Sun, Xin; Zhao, Shijie; Larochelle, Hugo; Englund, Dirk; Soljačić, Marin

    2017-07-01

    Artificial neural networks are computational network models inspired by signal processing in the brain. These models have dramatically improved performance for many machine-learning tasks, including speech and image recognition. However, today's computing hardware is inefficient at implementing neural networks, in large part because much of it was designed for von Neumann computing schemes. Significant effort has been made towards developing electronic architectures tuned to implement artificial neural networks that exhibit improved computational speed and accuracy. Here, we propose a new architecture for a fully optical neural network that, in principle, could offer an enhancement in computational speed and power efficiency over state-of-the-art electronics for conventional inference tasks. We experimentally demonstrate the essential part of the concept using a programmable nanophotonic processor featuring a cascaded array of 56 programmable Mach-Zehnder interferometers in a silicon photonic integrated circuit and show its utility for vowel recognition.

  20. MapReduce Based Parallel Neural Networks in Enabling Large Scale Machine Learning.

    PubMed

    Liu, Yang; Yang, Jie; Huang, Yuan; Xu, Lixiong; Li, Siguang; Qi, Man

    2015-01-01

    Artificial neural networks (ANNs) have been widely used in pattern recognition and classification applications. However, ANNs are notably slow in computation especially when the size of data is large. Nowadays, big data has received a momentum from both industry and academia. To fulfill the potentials of ANNs for big data applications, the computation process must be speeded up. For this purpose, this paper parallelizes neural networks based on MapReduce, which has become a major computing model to facilitate data intensive applications. Three data intensive scenarios are considered in the parallelization process in terms of the volume of classification data, the size of the training data, and the number of neurons in the neural network. The performance of the parallelized neural networks is evaluated in an experimental MapReduce computer cluster from the aspects of accuracy in classification and efficiency in computation.

  1. On the sample complexity of learning for networks of spiking neurons with nonlinear synaptic interactions.

    PubMed

    Schmitt, Michael

    2004-09-01

    We study networks of spiking neurons that use the timing of pulses to encode information. Nonlinear interactions model the spatial groupings of synapses on the neural dendrites and describe the computations performed at local branches. Within a theoretical framework of learning we analyze the question of how many training examples these networks must receive to be able to generalize well. Bounds for this sample complexity of learning can be obtained in terms of a combinatorial parameter known as the pseudodimension. This dimension characterizes the computational richness of a neural network and is given in terms of the number of network parameters. Two types of feedforward architectures are considered: constant-depth networks and networks of unconstrained depth. We derive asymptotically tight bounds for each of these network types. Constant depth networks are shown to have an almost linear pseudodimension, whereas the pseudodimension of general networks is quadratic. Networks of spiking neurons that use temporal coding are becoming increasingly more important in practical tasks such as computer vision, speech recognition, and motor control. The question of how well these networks generalize from a given set of training examples is a central issue for their successful application as adaptive systems. The results show that, although coding and computation in these networks is quite different and in many cases more powerful, their generalization capabilities are at least as good as those of traditional neural network models.

  2. Broadcasting a message in a parallel computer

    DOEpatents

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  3. A Feasibility Study of Synthesizing Subsurfaces Modeled with Computational Neural Networks

    NASA Technical Reports Server (NTRS)

    Wang, John T.; Housner, Jerrold M.; Szewczyk, Z. Peter

    1998-01-01

    This paper investigates the feasibility of synthesizing substructures modeled with computational neural networks. Substructures are modeled individually with computational neural networks and the response of the assembled structure is predicted by synthesizing the neural networks. A superposition approach is applied to synthesize models for statically determinate substructures while an interface displacement collocation approach is used to synthesize statically indeterminate substructure models. Beam and plate substructures along with components of a complicated Next Generation Space Telescope (NGST) model are used in this feasibility study. In this paper, the limitations and difficulties of synthesizing substructures modeled with neural networks are also discussed.

  4. Computer Network Security- The Challenges of Securing a Computer Network

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  5. Scalable Optical-Fiber Communication Networks

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Peterson, John C.

    1993-01-01

    Scalable arbitrary fiber extension network (SAFEnet) is conceptual fiber-optic communication network passing digital signals among variety of computers and input/output devices at rates from 200 Mb/s to more than 100 Gb/s. Intended for use with very-high-speed computers and other data-processing and communication systems in which message-passing delays must be kept short. Inherent flexibility makes it possible to match performance of network to computers by optimizing configuration of interconnections. In addition, interconnections made redundant to provide tolerance to faults.

  6. Constructing Neuronal Network Models in Massively Parallel Environments.

    PubMed

    Ippen, Tammo; Eppler, Jochen M; Plesser, Hans E; Diesmann, Markus

    2017-01-01

    Recent advances in the development of data structures to represent spiking neuron network models enable us to exploit the complete memory of petascale computers for a single brain-scale network simulation. In this work, we investigate how well we can exploit the computing power of such supercomputers for the creation of neuronal networks. Using an established benchmark, we divide the runtime of simulation code into the phase of network construction and the phase during which the dynamical state is advanced in time. We find that on multi-core compute nodes network creation scales well with process-parallel code but exhibits a prohibitively large memory consumption. Thread-parallel network creation, in contrast, exhibits speedup only up to a small number of threads but has little overhead in terms of memory. We further observe that the algorithms creating instances of model neurons and their connections scale well for networks of ten thousand neurons, but do not show the same speedup for networks of millions of neurons. Our work uncovers that the lack of scaling of thread-parallel network creation is due to inadequate memory allocation strategies and demonstrates that thread-optimized memory allocators recover excellent scaling. An analysis of the loop order used for network construction reveals that more complex tests on the locality of operations significantly improve scaling and reduce runtime by allowing construction algorithms to step through large networks more efficiently than in existing code. The combination of these techniques increases performance by an order of magnitude and harnesses the increasingly parallel compute power of the compute nodes in high-performance clusters and supercomputers.

  7. Constructing Neuronal Network Models in Massively Parallel Environments

    PubMed Central

    Ippen, Tammo; Eppler, Jochen M.; Plesser, Hans E.; Diesmann, Markus

    2017-01-01

    Recent advances in the development of data structures to represent spiking neuron network models enable us to exploit the complete memory of petascale computers for a single brain-scale network simulation. In this work, we investigate how well we can exploit the computing power of such supercomputers for the creation of neuronal networks. Using an established benchmark, we divide the runtime of simulation code into the phase of network construction and the phase during which the dynamical state is advanced in time. We find that on multi-core compute nodes network creation scales well with process-parallel code but exhibits a prohibitively large memory consumption. Thread-parallel network creation, in contrast, exhibits speedup only up to a small number of threads but has little overhead in terms of memory. We further observe that the algorithms creating instances of model neurons and their connections scale well for networks of ten thousand neurons, but do not show the same speedup for networks of millions of neurons. Our work uncovers that the lack of scaling of thread-parallel network creation is due to inadequate memory allocation strategies and demonstrates that thread-optimized memory allocators recover excellent scaling. An analysis of the loop order used for network construction reveals that more complex tests on the locality of operations significantly improve scaling and reduce runtime by allowing construction algorithms to step through large networks more efficiently than in existing code. The combination of these techniques increases performance by an order of magnitude and harnesses the increasingly parallel compute power of the compute nodes in high-performance clusters and supercomputers. PMID:28559808

  8. AGU Hosts Networking Event for Female Scientists

    NASA Astrophysics Data System (ADS)

    McEntee, Chris

    2013-01-01

    At Fall Meeting this year I had the pleasure of cohosting a new event, a Networking Reception for Early Career Female Scientists and Students, with Jane Lubchenco, under secretary of Commerce for Oceans and Atmosphere and National Oceanic and Atmospheric Administration administrator, and Marcia McNutt, director of the U.S. Geological Survey. AGU recognizes the importance of having a diverse pool of new researchers who can enrich Earth and space sciences with their skills and innovation. That's why one of our four strategic goals is to help build the global talent pool and provide early-career scientists with networking opportunities like this one.

  9. Network security.

    PubMed

    Chang, Kyle

    2006-01-01

    As you can see, there are a number of different ways to protect your network with different protocols, all of which can be very confusing to people whose core business process is not technology. This article is only a brief synopsis of the dangers that lurk in the corners of the technology world. Therefore, the best course of action is to do as much research as possible rather than falling into a situation of risk and vulnerability by implementing a system or network that does not work with your business. Remember, the technology is there to support your business; the business should not have to work around the technology.

  10. Locating hardware faults in a data communications network of a parallel computer

    DOEpatents

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-01-12

    Hardware faults location in a data communications network of a parallel computer. Such a parallel computer includes a plurality of compute nodes and a data communications network that couples the compute nodes for data communications and organizes the compute node as a tree. Locating hardware faults includes identifying a next compute node as a parent node and a root of a parent test tree, identifying for each child compute node of the parent node a child test tree having the child compute node as root, running a same test suite on the parent test tree and each child test tree, and identifying the parent compute node as having a defective link connected from the parent compute node to a child compute node if the test suite fails on the parent test tree and succeeds on all the child test trees.

  11. OpenFlow Extensions for Programmable Quantum Networks

    DTIC Science & Technology

    2017-06-19

    Extensions for Programmable Quantum Networks by Venkat Dasari, Nikolai Snow, and Billy Geerhart Computational and Information Sciences Directorate...distribution is unlimited. 1 1. Introduction Quantum networks and quantum computing have been receiving a surge of interest recently.1–3 However, there has...communicate using entangled particles and perform calculations using quantum logic gates. Additionally, quantum computing uses a quantum bit (qubit

  12. Advanced Computational Techniques for Power Tube Design.

    DTIC Science & Technology

    1986-07-01

    fixturing applications, in addition to the existing computer-aided engineering capabilities. o Helix TWT Manufacturing has Implemented a tooling and fixturing...illustrates the ajor features of this computer network. ) The backbone of our system is a Sytek Broadband Network (LAN) which Interconnects terminals and...automatic network analyzer (FANA) which electrically characterizes the slow-wave helices of traveling-wave tubes ( TWTs ) -- both for engineering design

  13. Computed tomography pattern of traumatic head injury in Niger Delta, Nigeria: A multicenter evaluation

    PubMed Central

    Onwuchekwa, Chinwe Regina; Alazigha, Nengi S.

    2017-01-01

    Background and Purpose: Traumatic head injury has a high mortality and morbidity in low- and middle-income countries. Brain injury following trauma is the cause of death in about one-third of patients that die after trauma. The aim of the study was to assess the pattern of computed tomography (CT) findings in head trauma at the tertiary health institutions serving the Niger Delta region of Nigeria. Patients and Methods: The CT scans of the head of 310 consecutive patients referred specifically for evaluation of head injury were prospectively reviewed. The images acquired were analyzed by the radiologists. The radiological features and anatomical distribution of the lesions on the CT Images were assessed and documented. Patients with congenital abnormalities of the head and those whose fall or injury were secondary to stroke were excluded from the study. The Ethical Committee of our institutions gave approval for the study. Results: There were 225 (72.58%) males and 85 (27.42%) females. About 44.84% of the patients were in the third and fourth decades of life. The major causes of head injury were road traffic accidents in 67.74%, falls in 14.84%, and assaults in 7.42%. Most of the patients 102 (33.0%) presented within the 1st week of injury. Cranial fractures were found in 87 (28.06%) patients. In this series, 111 (35.81%) had normal CT findings while 199 (64.19%) had abnormal CT findings. Intra-axial lesions were the most common, constituting 131 (42.26%) cases. Conclusion: This study had demonstrated that majority of head trauma evaluated by CT were associated with cranial and brain injuries. Intra-axial injuries are more prevalent. Poor health facilities and bad road networks in addition to being risk factors for head injury also hamper the management of head-injured patients as shown by the long duration of injury before health facilities are accessed. PMID:28971028

  14. Use of the Dynamic Visual Acuity Test as a screener for community-dwelling older adults who fall.

    PubMed

    Honaker, Julie A; Shepard, Neil T

    2011-01-01

    Adequate function of the peripheral vestibular system, specifically the vestibulo-ocular reflex (VOR; a network of neural connections between the peripheral vestibular system and the extraocular muscles) is essential for maintaining stable vision during head movements. Decreased visual acuity resulting from an impaired peripheral vestibular system may impede balance and postural control and place an individual at risk of falling. Therefore, sensitive measures of the vestibular system are warranted to screen for the tendency to fall, alerting clinicians to recommend further risk of falling assessment and referral to a falling risk reduction program. Dynamic Visual Acuity (DVA) testing is a computerized VOR assessment method to evaluate the peripheral vestibular system during head movements; reduced visual acuity as documented with DVA testing may be sensitive to screen for falling risk. This study examined the sensitivity and specificity of the computerized DVA test with yaw plane head movements for identifying community-dwelling adults (58-78 years) who are prone to falling. A total of 16 older adults with a history of two or more unexplained falls in the previous twelve months and 16 age and gender matched controls without a history of falls in the previous twelve months participated. Computerized DVA with horizontal head movements at a fixed velocity of 120 deg/sec was measured and compared with the Dynamic Gait Index (DGI) a gold standard gait assessment measurement for identifying falling risk. Receiver operating characteristics (ROC) curve analysis and area under the ROC curve (AUC) were used to assess the sensitivity and specificity of the computerized DVA as a screening measure for falling risk as determined by the DGI. Results suggested a link between computerized DVA and the propensity to fall; DVA in the yaw plane was found to be a sensitive (92%) and accurate screening measure when using a cutoff logMAR value of >0.25.

  15. A Strategic Approach to Network Defense: Framing the Cloud

    DTIC Science & Technology

    2011-03-10

    accepted network defensive principles, to reduce risks associated with emerging virtualization capabilities and scalability of cloud computing . This expanded...defensive framework can assist enterprise networking and cloud computing architects to better design more secure systems.

  16. Code 672 observational science branch computer networks

    NASA Technical Reports Server (NTRS)

    Hancock, D. W.; Shirk, H. G.

    1988-01-01

    In general, networking increases productivity due to the speed of transmission, easy access to remote computers, ability to share files, and increased availability of peripherals. Two different networks within the Observational Science Branch are described in detail.

  17. A Novel College Network Resource Management Method using Cloud Computing

    NASA Astrophysics Data System (ADS)

    Lin, Chen

    At present information construction of college mainly has construction of college networks and management information system; there are many problems during the process of information. Cloud computing is development of distributed processing, parallel processing and grid computing, which make data stored on the cloud, make software and services placed in the cloud and build on top of various standards and protocols, you can get it through all kinds of equipments. This article introduces cloud computing and function of cloud computing, then analyzes the exiting problems of college network resource management, the cloud computing technology and methods are applied in the construction of college information sharing platform.

  18. Cellular computational platform and neurally inspired elements thereof

    DOEpatents

    Okandan, Murat

    2016-11-22

    A cellular computational platform is disclosed that includes a multiplicity of functionally identical, repeating computational hardware units that are interconnected electrically and optically. Each computational hardware unit includes a reprogrammable local memory and has interconnections to other such units that have reconfigurable weights. Each computational hardware unit is configured to transmit signals into the network for broadcast in a protocol-less manner to other such units in the network, and to respond to protocol-less broadcast messages that it receives from the network. Each computational hardware unit is further configured to reprogram the local memory in response to incoming electrical and/or optical signals.

  19. Embedding global and collective in a torus network with message class map based tree path selection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Dong; Coteus, Paul W.; Eisley, Noel A.

    Embodiments of the invention provide a method, system and computer program product for embedding a global barrier and global interrupt network in a parallel computer system organized as a torus network. The computer system includes a multitude of nodes. In one embodiment, the method comprises taking inputs from a set of receivers of the nodes, dividing the inputs from the receivers into a plurality of classes, combining the inputs of each of the classes to obtain a result, and sending said result to a set of senders of the nodes. Embodiments of the invention provide a method, system and computermore » program product for embedding a collective network in a parallel computer system organized as a torus network. In one embodiment, the method comprises adding to a torus network a central collective logic to route messages among at least a group of nodes in a tree structure.« less

  20. Interlending and document supply trends in NHS North West health libraries 2003/2004 to 2006/2007.

    PubMed

    Glover, Steven William; Addison, John; Gleghorn, Colette; Aalai, Elham; Annis, Shan

    2009-03-01

    The Library and Information for Health Network North West (LIHNN) represents health libraries in Cheshire, Cumbria, Greater Manchester, Isle of Man, Lancashire, Merseyside and Wirral. LIHNN members take part in a regional co-operative network supporting interlending and document supply. Data were analysed over a 4-year period to identify trends and patterns. In addition, a literature review was conducted to compare trends seen in NHS libraries to those trends seen in other sectors and in other countries. RESULTS/TRENDS: Between 2003/2004 and 2006/2007 there was a significant drop in document supply activity reported by NHS North West libraries from 59 321 to 37 134 copies, representing a fall of 37.4%. During the same period, lending between libraries stayed constant. The NHS supplies a significant number of documents to its users and it is investigating a number of options to increase efficiencies. The observed fall in document supply activity has been reported in several sectors and has been attributed to a number of cofactors. Although the fall in document supply activity is expected to continue, a critical mass of information is likely to remain behind subscription barriers and this, in turn, will necessitate supply from external sources.

  1. Dreaming of mathematical neuroscience for half a century.

    PubMed

    Amari, Shun-ichi

    2013-01-01

    Theoreticians have been enchanted by the secrets of the brain for many years: how and why does it work so well? There has been a long history of searching for its mechanisms. Theoretical or even mathematical scientists have proposed various models of neural networks which has led to the birth of a new field of research. We can think of the 'pre-historic' period of Rashevski and Wiener, and then the period of perceptrons which is the beginning of learning machines, neurodynamics approaches, and further connectionist approaches. Now is currently the period of computational neuroscience. I have been working in this field for nearly half a century, and have experienced its repeated rise and fall. Now having reached very old age, I would like to state my own endeavors on establishing mathematical neuroscience for half a century, from a personal, even biased, point of view. It would be my pleasure if my experiences could encourage young researchers to participate in mathematical neuroscience. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Flexcam Image Capture Viewing and Spot Tracking

    NASA Technical Reports Server (NTRS)

    Rao, Shanti

    2008-01-01

    Flexcam software was designed to allow continuous monitoring of the mechanical deformation of the telescope structure at Palomar Observatory. Flexcam allows the user to watch the motion of a star with a low-cost astronomical camera, to measure the motion of the star on the image plane, and to feed this data back into the telescope s control system. This automatic interaction between the camera and a user interface facilitates integration and testing. Flexcam is a CCD image capture and analysis tool for the ST-402 camera from Santa Barbara Instruments Group (SBIG). This program will automatically take a dark exposure and then continuously display corrected images. The image size, bit depth, magnification, exposure time, resolution, and filter are always displayed on the title bar. Flexcam locates the brightest pixel and then computes the centroid position of the pixels falling in a box around that pixel. This tool continuously writes the centroid position to a network file that can be used by other instruments.

  3. Cut set-based risk and reliability analysis for arbitrarily interconnected networks

    DOEpatents

    Wyss, Gregory D.

    2000-01-01

    Method for computing all-terminal reliability for arbitrarily interconnected networks such as the United States public switched telephone network. The method includes an efficient search algorithm to generate minimal cut sets for nonhierarchical networks directly from the network connectivity diagram. Efficiency of the search algorithm stems in part from its basis on only link failures. The method also includes a novel quantification scheme that likewise reduces computational effort associated with assessing network reliability based on traditional risk importance measures. Vast reductions in computational effort are realized since combinatorial expansion and subsequent Boolean reduction steps are eliminated through analysis of network segmentations using a technique of assuming node failures to occur on only one side of a break in the network, and repeating the technique for all minimal cut sets generated with the search algorithm. The method functions equally well for planar and non-planar networks.

  4. Automatic transducer switching provides accurate wide range measurement of pressure differential

    NASA Technical Reports Server (NTRS)

    Yoder, S. K.

    1967-01-01

    Automatic pressure transducer switching network sequentially selects any one of a number of limited-range transducers as gas pressure rises or falls, extending the range of measurement and lessening the chances of damage due to high pressure.

  5. CyFall: A Cyber-Network Game Scenario

    DTIC Science & Technology

    2014-08-01

    results. This report examines the development of a conceptual game ( gamification ) that would aid nonexperts in identifying with their role and the...user study, gamification 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 36 19a

  6. Network-level pavement evaluation of Virginia's interstate system using the falling weight deflectometer.

    DOT National Transportation Integrated Search

    2008-01-01

    The Virginia Department of Transportation (VDOT) currently uses the results of automated surface distress surveys to assist in developing pavement maintenance strategies for its interstate and primary roadways. Totaling nearly 27,000 lane-miles, thes...

  7. Computer network access to scientific information systems for minority universities

    NASA Astrophysics Data System (ADS)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  8. Networking Micro-Processors for Effective Computer Utilization in Nursing

    PubMed Central

    Mangaroo, Jewellean; Smith, Bob; Glasser, Jay; Littell, Arthur; Saba, Virginia

    1982-01-01

    Networking as a social entity has important implications for maximizing computer resources for improved utilization in nursing. This paper describes the one process of networking of complementary resources at three institutions. Prairie View A&M University, Texas A&M University and the University of Texas School of Public Health, which has effected greater utilization of computers at the college. The results achieved in this project should have implications for nurses, users, and consumers in the development of computer resources.

  9. Use of medical information by computer networks raises major concerns about privacy.

    PubMed Central

    OReilly, M

    1995-01-01

    The development of computer data-bases and long-distance computer networks is leading to improvements in Canada's health care system. However, these developments come at a cost and require a balancing act between access and confidentiality. Columnist Michael OReilly, who in this article explores the security of computer networks, notes that respect for patients' privacy must be given as high a priority as the ability to see their records in the first place. Images p213-a PMID:7600474

  10. Research on Influence of Cloud Environment on Traditional Network Security

    NASA Astrophysics Data System (ADS)

    Ming, Xiaobo; Guo, Jinhua

    2018-02-01

    Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.

  11. Collective Computation of Neural Network

    DTIC Science & Technology

    1990-03-15

    Sciences, Beijing ABSTRACT Computational neuroscience is a new branch of neuroscience originating from current research on the theory of computer...scientists working in artificial intelligence engineering and neuroscience . The paper introduces the collective computational properties of model neural...vision research. On this basis, the authors analyzed the significance of the Hopfield model. Key phrases: Computational Neuroscience , Neural Network, Model

  12. An Exploratory Study of Internet Addiction, Usage and Communication Pleasure.

    ERIC Educational Resources Information Center

    Chou, Chien; Chou, Jung; Tyan, Nay-Ching Nancy

    This study examined the correlation between Internet addiction, usage, and communication pleasure. Research questions were: (1) What is computer network addiction? (2) How can one measure the degree of computer network addiction? (3) What is the correlation between the degree of users' network addiction and their network usage? (4) What is the…

  13. SNAP: A computer program for generating symbolic network functions

    NASA Technical Reports Server (NTRS)

    Lin, P. M.; Alderson, G. E.

    1970-01-01

    The computer program SNAP (symbolic network analysis program) generates symbolic network functions for networks containing R, L, and C type elements and all four types of controlled sources. The program is efficient with respect to program storage and execution time. A discussion of the basic algorithms is presented, together with user's and programmer's guides.

  14. A theoretical and experimental study of neuromorphic atomic switch networks for reservoir computing.

    PubMed

    Sillin, Henry O; Aguilera, Renato; Shieh, Hsien-Hang; Avizienis, Audrius V; Aono, Masakazu; Stieg, Adam Z; Gimzewski, James K

    2013-09-27

    Atomic switch networks (ASNs) have been shown to generate network level dynamics that resemble those observed in biological neural networks. To facilitate understanding and control of these behaviors, we developed a numerical model based on the synapse-like properties of individual atomic switches and the random nature of the network wiring. We validated the model against various experimental results highlighting the possibility to functionalize the network plasticity and the differences between an atomic switch in isolation and its behaviors in a network. The effects of changing connectivity density on the nonlinear dynamics were examined as characterized by higher harmonic generation in response to AC inputs. To demonstrate their utility for computation, we subjected the simulated network to training within the framework of reservoir computing and showed initial evidence of the ASN acting as a reservoir which may be optimized for specific tasks by adjusting the input gain. The work presented represents steps in a unified approach to experimentation and theory of complex systems to make ASNs a uniquely scalable platform for neuromorphic computing.

  15. A theoretical and experimental study of neuromorphic atomic switch networks for reservoir computing

    NASA Astrophysics Data System (ADS)

    Sillin, Henry O.; Aguilera, Renato; Shieh, Hsien-Hang; Avizienis, Audrius V.; Aono, Masakazu; Stieg, Adam Z.; Gimzewski, James K.

    2013-09-01

    Atomic switch networks (ASNs) have been shown to generate network level dynamics that resemble those observed in biological neural networks. To facilitate understanding and control of these behaviors, we developed a numerical model based on the synapse-like properties of individual atomic switches and the random nature of the network wiring. We validated the model against various experimental results highlighting the possibility to functionalize the network plasticity and the differences between an atomic switch in isolation and its behaviors in a network. The effects of changing connectivity density on the nonlinear dynamics were examined as characterized by higher harmonic generation in response to AC inputs. To demonstrate their utility for computation, we subjected the simulated network to training within the framework of reservoir computing and showed initial evidence of the ASN acting as a reservoir which may be optimized for specific tasks by adjusting the input gain. The work presented represents steps in a unified approach to experimentation and theory of complex systems to make ASNs a uniquely scalable platform for neuromorphic computing.

  16. Network Monitoring and Fault Detection on the University of Illinois at Urbana-Champaign Campus Computer Network.

    ERIC Educational Resources Information Center

    Sng, Dennis Cheng-Hong

    The University of Illinois at Urbana-Champaign (UIUC) has a large campus computer network serving a community of about 20,000 users. With such a large network, it is inevitable that there are a wide variety of technologies co-existing in a multi-vendor environment. Effective network monitoring tools can help monitor traffic and link usage, as well…

  17. On the upscaling of process-based models in deltaic applications

    NASA Astrophysics Data System (ADS)

    Li, L.; Storms, J. E. A.; Walstra, D. J. R.

    2018-03-01

    Process-based numerical models are increasingly used to study the evolution of marine and terrestrial depositional environments. Whilst a detailed description of small-scale processes provides an accurate representation of reality, application on geological timescales is restrained by the associated increase in computational time. In order to reduce the computational time, a number of acceleration methods are combined and evaluated for a schematic supply-driven delta (static base level) and an accommodation-driven delta (variable base level). The performance of the combined acceleration methods is evaluated by comparing the morphological indicators such as distributary channel networking and delta volumes derived from the model predictions for various levels of acceleration. The results of the accelerated models are compared to the outcomes from a series of simulations to capture autogenic variability. Autogenic variability is quantified by re-running identical models on an initial bathymetry with 1 cm added noise. The overall results show that the variability of the accelerated models fall within the autogenic variability range, suggesting that the application of acceleration methods does not significantly affect the simulated delta evolution. The Time-scale compression method (the acceleration method introduced in this paper) results in an increased computational efficiency of 75% without adversely affecting the simulated delta evolution compared to a base case. The combination of the Time-scale compression method with the existing acceleration methods has the potential to extend the application range of process-based models towards geologic timescales.

  18. Link failure detection in a parallel computer

    DOEpatents

    Archer, Charles J.; Blocksome, Michael A.; Megerian, Mark G.; Smith, Brian E.

    2010-11-09

    Methods, apparatus, and products are disclosed for link failure detection in a parallel computer including compute nodes connected in a rectangular mesh network, each pair of adjacent compute nodes in the rectangular mesh network connected together using a pair of links, that includes: assigning each compute node to either a first group or a second group such that adjacent compute nodes in the rectangular mesh network are assigned to different groups; sending, by each of the compute nodes assigned to the first group, a first test message to each adjacent compute node assigned to the second group; determining, by each of the compute nodes assigned to the second group, whether the first test message was received from each adjacent compute node assigned to the first group; and notifying a user, by each of the compute nodes assigned to the second group, whether the first test message was received.

  19. Antenna analysis using neural networks

    NASA Technical Reports Server (NTRS)

    Smith, William T.

    1992-01-01

    Conventional computing schemes have long been used to analyze problems in electromagnetics (EM). The vast majority of EM applications require computationally intensive algorithms involving numerical integration and solutions to large systems of equations. The feasibility of using neural network computing algorithms for antenna analysis is investigated. The ultimate goal is to use a trained neural network algorithm to reduce the computational demands of existing reflector surface error compensation techniques. Neural networks are computational algorithms based on neurobiological systems. Neural nets consist of massively parallel interconnected nonlinear computational elements. They are often employed in pattern recognition and image processing problems. Recently, neural network analysis has been applied in the electromagnetics area for the design of frequency selective surfaces and beam forming networks. The backpropagation training algorithm was employed to simulate classical antenna array synthesis techniques. The Woodward-Lawson (W-L) and Dolph-Chebyshev (D-C) array pattern synthesis techniques were used to train the neural network. The inputs to the network were samples of the desired synthesis pattern. The outputs are the array element excitations required to synthesize the desired pattern. Once trained, the network is used to simulate the W-L or D-C techniques. Various sector patterns and cosecant-type patterns (27 total) generated using W-L synthesis were used to train the network. Desired pattern samples were then fed to the neural network. The outputs of the network were the simulated W-L excitations. A 20 element linear array was used. There were 41 input pattern samples with 40 output excitations (20 real parts, 20 imaginary). A comparison between the simulated and actual W-L techniques is shown for a triangular-shaped pattern. Dolph-Chebyshev is a different class of synthesis technique in that D-C is used for side lobe control as opposed to pattern shaping. The interesting thing about D-C synthesis is that the side lobes have the same amplitude. Five-element arrays were used. Again, 41 pattern samples were used for the input. Nine actual D-C patterns ranging from -10 dB to -30 dB side lobe levels were used to train the network. A comparison between simulated and actual D-C techniques for a pattern with -22 dB side lobe level is shown. The goal for this research was to evaluate the performance of neural network computing with antennas. Future applications will employ the backpropagation training algorithm to drastically reduce the computational complexity involved in performing EM compensation for surface errors in large space reflector antennas.

  20. Antenna analysis using neural networks

    NASA Astrophysics Data System (ADS)

    Smith, William T.

    1992-09-01

    Conventional computing schemes have long been used to analyze problems in electromagnetics (EM). The vast majority of EM applications require computationally intensive algorithms involving numerical integration and solutions to large systems of equations. The feasibility of using neural network computing algorithms for antenna analysis is investigated. The ultimate goal is to use a trained neural network algorithm to reduce the computational demands of existing reflector surface error compensation techniques. Neural networks are computational algorithms based on neurobiological systems. Neural nets consist of massively parallel interconnected nonlinear computational elements. They are often employed in pattern recognition and image processing problems. Recently, neural network analysis has been applied in the electromagnetics area for the design of frequency selective surfaces and beam forming networks. The backpropagation training algorithm was employed to simulate classical antenna array synthesis techniques. The Woodward-Lawson (W-L) and Dolph-Chebyshev (D-C) array pattern synthesis techniques were used to train the neural network. The inputs to the network were samples of the desired synthesis pattern. The outputs are the array element excitations required to synthesize the desired pattern. Once trained, the network is used to simulate the W-L or D-C techniques. Various sector patterns and cosecant-type patterns (27 total) generated using W-L synthesis were used to train the network. Desired pattern samples were then fed to the neural network. The outputs of the network were the simulated W-L excitations. A 20 element linear array was used. There were 41 input pattern samples with 40 output excitations (20 real parts, 20 imaginary).

  1. Computers, Networks, and Desegregation at San Jose High Academy.

    ERIC Educational Resources Information Center

    Solomon, Gwen

    1987-01-01

    Describes magnet high school which was created in California to meet desegregation requirements and emphasizes computer technology. Highlights include local computer networks that connect science and music labs, the library/media center, business computer lab, writing lab, language arts skills lab, and social studies classrooms; software; teacher…

  2. Specification of Computer Systems by Objectives.

    ERIC Educational Resources Information Center

    Eltoft, Douglas

    1989-01-01

    Discusses the evolution of mainframe and personal computers, and presents a case study of a network developed at the University of Iowa called the Iowa Computer-Aided Engineering Network (ICAEN) that combines Macintosh personal computers with Apollo workstations. Functional objectives are stressed as the best measure of system performance. (LRW)

  3. Sign: large-scale gene network estimation environment for high performance computing.

    PubMed

    Tamada, Yoshinori; Shimamura, Teppei; Yamaguchi, Rui; Imoto, Seiya; Nagasaki, Masao; Miyano, Satoru

    2011-01-01

    Our research group is currently developing software for estimating large-scale gene networks from gene expression data. The software, called SiGN, is specifically designed for the Japanese flagship supercomputer "K computer" which is planned to achieve 10 petaflops in 2012, and other high performance computing environments including Human Genome Center (HGC) supercomputer system. SiGN is a collection of gene network estimation software with three different sub-programs: SiGN-BN, SiGN-SSM and SiGN-L1. In these three programs, five different models are available: static and dynamic nonparametric Bayesian networks, state space models, graphical Gaussian models, and vector autoregressive models. All these models require a huge amount of computational resources for estimating large-scale gene networks and therefore are designed to be able to exploit the speed of 10 petaflops. The software will be available freely for "K computer" and HGC supercomputer system users. The estimated networks can be viewed and analyzed by Cell Illustrator Online and SBiP (Systems Biology integrative Pipeline). The software project web site is available at http://sign.hgc.jp/ .

  4. Primer on computers and information technology. Part two: an introduction to computer networking.

    PubMed

    Channin, D S; Chang, P J

    1997-01-01

    Computers networks are a way of connecting computers together such that they can exchange information. For this exchange to be successful, system behavior must be planned and specified very clearly at a number of different levels. Although there are many choices to be made at each level, often there are simple decisions that can be made to rapidly reduce the number of options. Planning is most important at the highest (application) and lowest (wiring) levels, whereas the middle levels must be specified to ensure compatibility. Because of the widespread use of the Internet, solutions based on Internet technologies are often cost-effective and should be considered when designing a network. As in all technical fields, consultation with experts (ie, computer networking specialists) may be worthwhile.

  5. Human Inspired Self-developmental Model of Neural Network (HIM): Introducing Content/Form Computing

    NASA Astrophysics Data System (ADS)

    Krajíček, Jiří

    This paper presents cross-disciplinary research between medical/psychological evidence on human abilities and informatics needs to update current models in computer science to support alternative methods for computation and communication. In [10] we have already proposed hypothesis introducing concept of human information model (HIM) as cooperative system. Here we continue on HIM design in detail. In our design, first we introduce Content/Form computing system which is new principle of present methods in evolutionary computing (genetic algorithms, genetic programming). Then we apply this system on HIM (type of artificial neural network) model as basic network self-developmental paradigm. Main inspiration of our natural/human design comes from well known concept of artificial neural networks, medical/psychological evidence and Sheldrake theory of "Nature as Alive" [22].

  6. PRiFi Networking for Tracking-Resistant Mobile Computing

    DTIC Science & Technology

    2017-11-01

    PRiFi NETWORKING FOR TRACKING-RESISTANT MOBILE COMPUTING YALE UNIVERSITY NOVEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE...From - To) FEB 2016 – MAY 2017 4. TITLE AND SUBTITLE PRiFi NETWORKING FOR TRACKING-RESISTANT MOBILE COMPUTING 5a. CONTRACT NUMBER FA8750-16-2-0034...3 Figure 2: What We Have: A Cloud of Secret Mass Surveillance Processes .................................. 6 Figure 3: What

  7. A Prototype System for a Computer-Based Statewide Film Library Network: A Model for Operation. Statewide Film Library Network: System-1 Specifications - Files.

    ERIC Educational Resources Information Center

    Sullivan, Todd

    Using an IBM System/360 Model 50 computer, the New York Statewide Film Library Network schedules film use, reports on materials handling and statistics, and provides for interlibrary loan of films. Communications between the film libraries and the computer are maintained by Teletype model 33 ASR Teletypewriter terminals operating on TWX…

  8. The ASCI Network for SC 2000: Gigabyte Per Second Networking

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    PRATT, THOMAS J.; NAEGLE, JOHN H.; MARTINEZ JR., LUIS G.

    2001-11-01

    This document highlights the Discom's Distance computing and communication team activities at the 2000 Supercomputing conference in Dallas Texas. This conference is sponsored by the IEEE and ACM. Sandia's participation in the conference has now spanned a decade, for the last five years Sandia National Laboratories, Los Alamos National Lab and Lawrence Livermore National Lab have come together at the conference under the DOE's ASCI, Accelerated Strategic Computing Initiatives, Program rubric to demonstrate ASCI's emerging capabilities in computational science and our combined expertise in high performance computer science and communication networking developments within the program. At SC 2000, DISCOM demonstratedmore » an infrastructure. DISCOM2 uses this forum to demonstrate and focus communication and pre-standard implementation of 10 Gigabit Ethernet, the first gigabyte per second data IP network transfer application, and VPN technology that enabled a remote Distributed Resource Management tools demonstration. Additionally a national OC48 POS network was constructed to support applications running between the show floor and home facilities. This network created the opportunity to test PSE's Parallel File Transfer Protocol (PFTP) across a network that had similar speed and distances as the then proposed DISCOM WAN. The SCINET SC2000 showcased wireless networking and the networking team had the opportunity to explore this emerging technology while on the booth. This paper documents those accomplishments, discusses the details of their convention exhibit floor. We also supported the production networking needs of the implementation, and describes how these demonstrations supports DISCOM overall strategies in high performance computing networking.« less

  9. Path tortuosity in everyday movements of elderly persons increases fall prediction beyond knowledge of fall history, medication use, and standardized gait and balance assessments.

    PubMed

    Kearns, William D; Fozard, James L; Becker, Marion; Jasiewicz, Jan M; Craighead, Jeffrey D; Holtsclaw, Lori; Dion, Charles

    2012-09-01

    We hypothesized that variability in voluntary movement paths of assisted living facility (ALF) residents would be greater in the week preceding a fall compared with residents who did not fall. Prospective, observational study using telesurveillance technology. Two ALFs. The sample consisted of 69 older ALF residents (53 female) aged 76.9 (SD ± 11.9 years). Daytime movement in ALF common use areas was automatically tracked using a commercially available ultra-wideband radio real-time location sensor network with a spatial resolution of approximately 20 cm. Movement path variability (tortuosity) was gauged using fractal dimension (fractal D). A logistic regression was performed predicting movement related falls from fractal D, presence of a fall in the prior year, psychoactive medication use, and movement path length. Fallers and non-fallers were also compared on activities of daily living requiring supervision or assistance, performance on standardized static and dynamic balance, and stride velocity assessments gathered at the start of a 1-year fall observation period. Fall risk due to cognitive deficit was assessed by the Mini Mental Status Examination (MMSE), and by clinical dementia diagnoses from participant's activities of daily living health record. Logistic regression analysis revealed odds of falling increased 2.548 (P = .021) for every 0.1 increase in fractal D, and having a fall in the prior year increased odds of falling by 7.36 (P = .006). There was a trend for longer movement paths to reduce the odds of falling (OR .976 P = .08) but it was not significant. Number of psychoactive medications did not contribute significantly to fall prediction in the model. Fallers had more variable stride-to-stride velocities and required more activities of daily living assistance. High fractal D levels can be detected using commercially available telesurveillance technologies and offers a new tool for health services administrators seeking to reduce falls at their facilities. Copyright © 2012 American Medical Directors Association. Published by Elsevier Inc. All rights reserved.

  10. Incorporating Computational Chemistry into the Chemical Engineering Curriculum

    ERIC Educational Resources Information Center

    Wilcox, Jennifer

    2006-01-01

    A graduate-level computational chemistry course was designed and developed and carried out in the Department of Chemical Engineering at Worcester Polytechnic Institute in the Fall of 2005. The thrust of the course was a reaction assignment that led students through a series of steps, beginning with energetic predictions based upon fundamental…

  11. The Effects of Computer-Aided Instruction on Learning and Attitudes in Economic Principles Courses: Revised Results.

    ERIC Educational Resources Information Center

    Henry, Mark

    1979-01-01

    Recounts statistical inaccuracies in an article on computer-aided instruction in economics courses on the college level. The article, published in the J. Econ. Ed (Fall 1978), erroneously placed one student in the TIPS group instead of the control group. Implications of this alteration are discussed. (DB)

  12. Logo and Equity: A Natural Partnership.

    ERIC Educational Resources Information Center

    Yoder, Sharon Burrowes; And Others

    In the fall of 1987, Cleveland State University in conjunction with Cleveland area schools and Logo Computer Systems, Inc., embarked on a series of workshops designed to train teachers in group learning techniques and Logo programming for use in computer training for junior high school girls or minorities. The first serious exposure to computing…

  13. Implementing Content Review for Communication and Computation Prerequisites. Adopted Spring 2011

    ERIC Educational Resources Information Center

    Academic Senate for California Community Colleges, 2011

    2011-01-01

    This paper is one of a collection of papers written by the Academic Senate for California Community Colleges (ASCCC) to support the use of content review as the basis for establishing communication and computation prerequisites. "Student Success: The Case for Establishing Prerequisites Through Content Review" was adopted at the Fall 2010…

  14. The Mathematics and Computer Science Learning Center (MLC).

    ERIC Educational Resources Information Center

    Abraham, Solomon T.

    The Mathematics and Computer Science Learning Center (MLC) was established in the Department of Mathematics at North Carolina Central University during the fall semester of the 1982-83 academic year. The initial operations of the MLC were supported by grants to the University from the Burroughs-Wellcome Company and the Kenan Charitable Trust Fund.…

  15. Three-Dimensional Computational Fluid Dynamics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Haworth, D.C.; O'Rourke, P.J.; Ranganathan, R.

    1998-09-01

    Computational fluid dynamics (CFD) is one discipline falling under the broad heading of computer-aided engineering (CAE). CAE, together with computer-aided design (CAD) and computer-aided manufacturing (CAM), comprise a mathematical-based approach to engineering product and process design, analysis and fabrication. In this overview of CFD for the design engineer, our purposes are three-fold: (1) to define the scope of CFD and motivate its utility for engineering, (2) to provide a basic technical foundation for CFD, and (3) to convey how CFD is incorporated into engineering product and process design.

  16. Statistical Model Applied to NetFlow for Network Intrusion Detection

    NASA Astrophysics Data System (ADS)

    Proto, André; Alexandre, Leandro A.; Batista, Maira L.; Oliveira, Isabela L.; Cansian, Adriano M.

    The computers and network services became presence guaranteed in several places. These characteristics resulted in the growth of illicit events and therefore the computers and networks security has become an essential point in any computing environment. Many methodologies were created to identify these events; however, with increasing of users and services on the Internet, many difficulties are found in trying to monitor a large network environment. This paper proposes a methodology for events detection in large-scale networks. The proposal approaches the anomaly detection using the NetFlow protocol, statistical methods and monitoring the environment in a best time for the application.

  17. LINCS: Livermore's network architecture. [Octopus computing network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fletcher, J.G.

    1982-01-01

    Octopus, a local computing network that has been evolving at the Lawrence Livermore National Laboratory for over fifteen years, is currently undergoing a major revision. The primary purpose of the revision is to consolidate and redefine the variety of conventions and formats, which have grown up over the years, into a single standard family of protocols, the Livermore Interactive Network Communication Standard (LINCS). This standard treats the entire network as a single distributed operating system such that access to a computing resource is obtained in a single way, whether that resource is local (on the same computer as the accessingmore » process) or remote (on another computer). LINCS encompasses not only communication but also such issues as the relationship of customer to server processes and the structure, naming, and protection of resources. The discussion includes: an overview of the Livermore user community and computing hardware, the functions and structure of each of the seven layers of LINCS protocol, the reasons why we have designed our own protocols and why we are dissatisfied by the directions that current protocol standards are taking.« less

  18. Magnetic Skyrmion as a Nonlinear Resistive Element: A Potential Building Block for Reservoir Computing

    NASA Astrophysics Data System (ADS)

    Prychynenko, Diana; Sitte, Matthias; Litzius, Kai; Krüger, Benjamin; Bourianoff, George; Kläui, Mathias; Sinova, Jairo; Everschor-Sitte, Karin

    2018-01-01

    Inspired by the human brain, there is a strong effort to find alternative models of information processing capable of imitating the high energy efficiency of neuromorphic information processing. One possible realization of cognitive computing involves reservoir computing networks. These networks are built out of nonlinear resistive elements which are recursively connected. We propose that a Skyrmion network embedded in magnetic films may provide a suitable physical implementation for reservoir computing applications. The significant key ingredient of such a network is a two-terminal device with nonlinear voltage characteristics originating from magnetoresistive effects, such as the anisotropic magnetoresistance or the recently discovered noncollinear magnetoresistance. The most basic element for a reservoir computing network built from "Skyrmion fabrics" is a single Skyrmion embedded in a ferromagnetic ribbon. In order to pave the way towards reservoir computing systems based on Skyrmion fabrics, we simulate and analyze (i) the current flow through a single magnetic Skyrmion due to the anisotropic magnetoresistive effect and (ii) the combined physics of local pinning and the anisotropic magnetoresistive effect.

  19. Computer Network Resources for Physical Geography Instruction.

    ERIC Educational Resources Information Center

    Bishop, Michael P.; And Others

    1993-01-01

    Asserts that the use of computer networks provides an important and effective resource for geography instruction. Describes the use of the Internet network in physical geography instruction. Provides an example of the use of Internet resources in a climatology/meteorology course. (CFR)

  20. Including Internet insurance as part of a hospital computer network security plan.

    PubMed

    Riccardi, Ken

    2002-01-01

    Cyber attacks on a hospital's computer network is a new crime to be reckoned with. Should your hospital consider internet insurance? The author explains this new phenomenon and presents a risk assessment for determining network vulnerabilities.

  1. The University of Michigan's Computer-Aided Engineering Network.

    ERIC Educational Resources Information Center

    Atkins, D. E.; Olsen, Leslie A.

    1986-01-01

    Presents an overview of the Computer-Aided Engineering Network (CAEN) of the University of Michigan. Describes its arrangement of workstations, communication networks, and servers. Outlines the factors considered in hardware and software decision making. Reviews the program's impact on students. (ML)

  2. Network Community Detection based on the Physarum-inspired Computational Framework.

    PubMed

    Gao, Chao; Liang, Mingxin; Li, Xianghua; Zhang, Zili; Wang, Zhen; Zhou, Zhili

    2016-12-13

    Community detection is a crucial and essential problem in the structure analytics of complex networks, which can help us understand and predict the characteristics and functions of complex networks. Many methods, ranging from the optimization-based algorithms to the heuristic-based algorithms, have been proposed for solving such a problem. Due to the inherent complexity of identifying network structure, how to design an effective algorithm with a higher accuracy and a lower computational cost still remains an open problem. Inspired by the computational capability and positive feedback mechanism in the wake of foraging process of Physarum, which is a large amoeba-like cell consisting of a dendritic network of tube-like pseudopodia, a general Physarum-based computational framework for community detection is proposed in this paper. Based on the proposed framework, the inter-community edges can be identified from the intra-community edges in a network and the positive feedback of solving process in an algorithm can be further enhanced, which are used to improve the efficiency of original optimization-based and heuristic-based community detection algorithms, respectively. Some typical algorithms (e.g., genetic algorithm, ant colony optimization algorithm, and Markov clustering algorithm) and real-world datasets have been used to estimate the efficiency of our proposed computational framework. Experiments show that the algorithms optimized by Physarum-inspired computational framework perform better than the original ones, in terms of accuracy and computational cost. Moreover, a computational complexity analysis verifies the scalability of our framework.

  3. Open source system OpenVPN in a function of Virtual Private Network

    NASA Astrophysics Data System (ADS)

    Skendzic, A.; Kovacic, B.

    2017-05-01

    Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.

  4. DSGRN: Examining the Dynamics of Families of Logical Models.

    PubMed

    Cummins, Bree; Gedeon, Tomas; Harker, Shaun; Mischaikow, Konstantin

    2018-01-01

    We present a computational tool DSGRN for exploring the dynamics of a network by computing summaries of the dynamics of switching models compatible with the network across all parameters. The network can arise directly from a biological problem, or indirectly as the interaction graph of a Boolean model. This tool computes a finite decomposition of parameter space such that for each region, the state transition graph that describes the coarse dynamical behavior of a network is the same. Each of these parameter regions corresponds to a different logical description of the network dynamics. The comparison of dynamics across parameters with experimental data allows the rejection of parameter regimes or entire networks as viable models for representing the underlying regulatory mechanisms. This in turn allows a search through the space of perturbations of a given network for networks that robustly fit the data. These are the first steps toward discovering a network that optimally matches the observed dynamics by searching through the space of networks.

  5. Determination of trajectories of fireballs using seismic network data

    NASA Astrophysics Data System (ADS)

    Ishihara, Y.

    2006-12-01

    Fireballs, Bolides, which are caused by high velocity passages of meteoroids through the atmosphere, generate shockwaves. Meteor shockwave provide us very important information (arrival time and amplitude) to study meteor physics. The shockwave arrival time data enable us to determine trajectories of the fireballs. On the other hand, the shockwave amplitude tells us size and ablation history of the meteoroid. Infrasound observation is one of the ways of detecting bolide shockwaves. However, we have no infrasound observational networks extends for large area with enough spatial distribution for determination of trajectories and estimate ablation histories. We have only a few infrasound arrays that have three or four elements, in the Japanese islands. Last decade, digital seismic networks are greatly improved for the purpose of monitoring micro earthquakes. Those seismic networks are quite sensitive for detecting micro ground vibration, and then those networks could detect not only seismic wave generated by earthquakes, but also ground oscillations generated by coupling of meteor shockwave with the ground near station. Last years, I analyses this kind of ground motion data recorded by seismic network, as meteor shockwave signals. For example, we estimate some great fireball's aerial path from arrival times of shockwaves (e.g., Ishihara et. al., 2003 Earth Planets, and Space, 2004 Geophysical Research. Letters.; Pujol et al., 2006 Planetary and Space Science), and we estimate sizes and ablation history of some great fireball and a meteorite fall (Ishihara et al., 2004 Meteoroids2004). In Japan, some great fireball falls occurred during 2004 to 2005. In this presentation, I show the trajectories of these fireballs determined from shockwave analysis. Some fireballs trajectories are also determined from photographic records. The trajectories determined from shockwave and that from photos show good agreement.

  6. The Erector Set Computer: Building a Virtual Workstation over a Large Multi-Vendor Network.

    ERIC Educational Resources Information Center

    Farago, John M.

    1989-01-01

    Describes a computer network developed at the City University of New York Law School that uses device sharing and local area networking to create a simulated law office. Topics discussed include working within a multi-vendor environment, and the communication, information, and database access services available through the network. (CLB)

  7. Neural-Network Computer Transforms Coordinates

    NASA Technical Reports Server (NTRS)

    Josin, Gary M.

    1990-01-01

    Numerical simulation demonstrated ability of conceptual neural-network computer to generalize what it has "learned" from few examples. Ability to generalize achieved with even simple neural network (relatively few neurons) and after exposure of network to only few "training" examples. Ability to obtain fairly accurate mappings after only few training examples used to provide solutions to otherwise intractable mapping problems.

  8. On-Line Learning Technologies: Networking in the Classroom. Rural, Small Schools Network Information Exchange No. 16, Summer 1994.

    ERIC Educational Resources Information Center

    Regional Laboratory for Educational Improvement of the Northeast & Islands, Andover, MA.

    This packet includes reprints of articles and other information concerning the use of computer networks in small, rural schools. Computer networks can minimize isolation; develop stronger links to the community; access reference information from remote sources; and create professional and academic exchanges for teachers, administrators, and…

  9. Instrumentation for Scientific Computing in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics.

    DTIC Science & Technology

    1987-10-01

    include Security Classification) Instrumentation for scientific computing in neural networks, information science, artificial intelligence, and...instrumentation grant to purchase equipment for support of research in neural networks, information science, artificail intellignece , and applied mathematics...in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics Contract AFOSR 86-0282 Principal Investigator: Stephen

  10. Polymorphic Attacks and Network Topology: Application of Concepts from Natural Systems

    ERIC Educational Resources Information Center

    Rangan, Prahalad

    2010-01-01

    The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…

  11. Efficient computation of aerodynamic influence coefficients for aeroelastic analysis on a transputer network

    NASA Technical Reports Server (NTRS)

    Janetzke, David C.; Murthy, Durbha V.

    1991-01-01

    Aeroelastic analysis is multi-disciplinary and computationally expensive. Hence, it can greatly benefit from parallel processing. As part of an effort to develop an aeroelastic capability on a distributed memory transputer network, a parallel algorithm for the computation of aerodynamic influence coefficients is implemented on a network of 32 transputers. The aerodynamic influence coefficients are calculated using a 3-D unsteady aerodynamic model and a parallel discretization. Efficiencies up to 85 percent were demonstrated using 32 processors. The effect of subtask ordering, problem size, and network topology are presented. A comparison to results on a shared memory computer indicates that higher speedup is achieved on the distributed memory system.

  12. Distributed computation of graphics primitives on a transputer network

    NASA Technical Reports Server (NTRS)

    Ellis, Graham K.

    1988-01-01

    A method is developed for distributing the computation of graphics primitives on a parallel processing network. Off-the-shelf transputer boards are used to perform the graphics transformations and scan-conversion tasks that would normally be assigned to a single transputer based display processor. Each node in the network performs a single graphics primitive computation. Frequently requested tasks can be duplicated on several nodes. The results indicate that the current distribution of commands on the graphics network shows a performance degradation when compared to the graphics display board alone. A change to more computation per node for every communication (perform more complex tasks on each node) may cause the desired increase in throughput.

  13. SCinet Architecture: Featured at the International Conference for High Performance Computing,Networking, Storage and Analysis 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lyonnais, Marc; Smith, Matt; Mace, Kate P.

    SCinet is the purpose-built network that operates during the International Conference for High Performance Computing,Networking, Storage and Analysis (Super Computing or SC). Created each year for the conference, SCinet brings to life a high-capacity network that supports applications and experiments that are a hallmark of the SC conference. The network links the convention center to research and commercial networks around the world. This resource serves as a platform for exhibitors to demonstrate the advanced computing resources of their home institutions and elsewhere by supporting a wide variety of applications. Volunteers from academia, government and industry work together to design andmore » deliver the SCinet infrastructure. Industry vendors and carriers donate millions of dollars in equipment and services needed to build and support the local and wide area networks. Planning begins more than a year in advance of each SC conference and culminates in a high intensity installation in the days leading up to the conference. The SCinet architecture for SC16 illustrates a dramatic increase in participation from the vendor community, particularly those that focus on network equipment. Software-Defined Networking (SDN) and Data Center Networking (DCN) are present in nearly all aspects of the design.« less

  14. Neural computation of arithmetic functions

    NASA Technical Reports Server (NTRS)

    Siu, Kai-Yeung; Bruck, Jehoshua

    1990-01-01

    An area of application of neural networks is considered. A neuron is modeled as a linear threshold gate, and the network architecture considered is the layered feedforward network. It is shown how common arithmetic functions such as multiplication and sorting can be efficiently computed in a shallow neural network. Some known results are improved by showing that the product of two n-bit numbers and sorting of n n-bit numbers can be computed by a polynomial-size neural network using only four and five unit delays, respectively. Moreover, the weights of each threshold element in the neural networks require O(log n)-bit (instead of n-bit) accuracy. These results can be extended to more complicated functions such as multiple products, division, rational functions, and approximation of analytic functions.

  15. Fall risk in Chinese community-dwelling older adults: A physiological profile assessment study.

    PubMed

    Siong, Kar-Ho; Kwan, Marcella Mun-San; Lord, Stephen R; Lam, Andrew Kwok-Cheung; Tsang, William Wai-Nam; Cheong, Allen Ming-Yan

    2016-02-01

    The short-form Physiological Profile Assessment (PPA) is increasingly used in clinical practice for assessing fall risk in older people. However, a normative database is only available for Caucasian populations. The purpose of the present study was to develop a normative database for Hong Kong Chinese older people and examine the fall risk profile of this population. A total of 622 participants aged 60-95 years were recruited. Participants underwent the PPA (containing tests of contrast sensitivity, proprioception, quadriceps strength, reaction time and sway), and composite fall risk scores were computed. Participants were then followed up for falls for 1 year. Quadriceps strength and lower limb proprioception scores were comparable with those reported for Caucasian populations. However, contrast sensitivity, simple reaction time and postural sway scores were relatively poor. The average composite fall risk score was 1.7 ± 1.5, showing a "moderate" fall risk when compared with the Caucasian norms. Despite the relatively poor physical performances and moderately high fall risk scores, the incidence of one plus falls in the 1-year follow-up period was just 16.4%, with just 2.6% reporting two plus falls. The area under the curve for composite fall risk scores in discriminating fallers from non-fallers was 0.53 (95% CI 0.45-0.60). Despite poorer performance in PPA tests, the incidence of prospective falls in a Hong Kong Chinese population was low. In consequence, the PPA could not discriminate well between fallers and non-fallers. The present study provided normality data for short-form PPA measures for older Chinese people as a reference for further studies. © 2015 Japan Geriatrics Society.

  16. Shared-resource computing for small research labs.

    PubMed

    Ackerman, M J

    1982-04-01

    A real time laboratory computer network is described. This network is composed of four real-time laboratory minicomputers located in each of four division laboratories and a larger minicomputer in a centrally located computer room. Off the shelf hardware and software were used with no customization. The network is configured for resource sharing using DECnet communications software and the RSX-11-M multi-user real-time operating system. The cost effectiveness of the shared resource network and multiple real-time processing using priority scheduling is discussed. Examples of utilization within a medical research department are given.

  17. User's guide to the Octopus computer network (the SHOC manual)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schneider, C.; Thompson, D.; Whitten, G.

    1977-07-18

    This guide explains how to enter, run, and debug programs on the Octopus network. It briefly describes the network's operation, and directs the reader to other documents for further information. It stresses those service programs that will be most useful in the long run; ''quick'' methods that have little flexibility are not discussed. The Octopus timesharing network gives the user access to four CDC 7600 computers, two CDC STAR computers, and a broad array of peripheral equipment, from any of 800 or so remote terminals. 16 figures, 7 tables.

  18. User's guide to the Octopus computer network (the SHOC manual)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schneider, C.; Thompson, D.; Whitten, G.

    1976-10-07

    This guide explains how to enter, run, and debug programs on the Octopus network. It briefly describes the network's operation, and directs the reader to other documents for further information. It stresses those service programs that will be most useful in the long run; ''quick'' methods that have little flexibility are not discussed. The Octopus timesharing network gives the user access to four CDC 7600 computers, two CDC STAR computers, and a broad array of peripheral equipment, from any of 800 or so remote terminals. 8 figures, 4 tables.

  19. User's guide to the Octopus computer network (the SHOC manual)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schneider, C.; Thompson, D.; Whitten, G.

    1975-06-02

    This guide explains how to enter, run, and debug programs on the Octopus network. It briefly describes the network's operation, and directs the reader to other documents for further information. It stresses those service programs that will be most useful in the long run; ''quick'' methods that have little flexibility are not discussed. The Octopus timesharing network gives the user access to four CDC 7600 computers and a broad array of peripheral equipment, from any of 800 remote terminals. Octopus will soon include the Laboratory's STAR-100 computers. 9 figures, 5 tables. (auth)

  20. A Diagrammatic Language for Biochemical Networks

    NASA Astrophysics Data System (ADS)

    Maimon, Ron

    2002-03-01

    I present a diagrammatic language for representing the structure of biochemical networks. The language is designed to represent modular structure in a computational fasion, with composition of reactions replacing functional composition. This notation is used to represent arbitrarily large networks efficiently. The notation finds its most natural use in representing biological interaction networks, but it is a general computing language appropriate to any naturally occuring computation. Unlike lambda-calculus, or text-derived languages, it does not impose a tree-structure on the diagrams, and so is more effective at representing biological fucntion than competing notations.

  1. Software for Brain Network Simulations: A Comparative Study

    PubMed Central

    Tikidji-Hamburyan, Ruben A.; Narayana, Vikram; Bozkus, Zeki; El-Ghazawi, Tarek A.

    2017-01-01

    Numerical simulations of brain networks are a critical part of our efforts in understanding brain functions under pathological and normal conditions. For several decades, the community has developed many software packages and simulators to accelerate research in computational neuroscience. In this article, we select the three most popular simulators, as determined by the number of models in the ModelDB database, such as NEURON, GENESIS, and BRIAN, and perform an independent evaluation of these simulators. In addition, we study NEST, one of the lead simulators of the Human Brain Project. First, we study them based on one of the most important characteristics, the range of supported models. Our investigation reveals that brain network simulators may be biased toward supporting a specific set of models. However, all simulators tend to expand the supported range of models by providing a universal environment for the computational study of individual neurons and brain networks. Next, our investigations on the characteristics of computational architecture and efficiency indicate that all simulators compile the most computationally intensive procedures into binary code, with the aim of maximizing their computational performance. However, not all simulators provide the simplest method for module development and/or guarantee efficient binary code. Third, a study of their amenability for high-performance computing reveals that NEST can almost transparently map an existing model on a cluster or multicore computer, while NEURON requires code modification if the model developed for a single computer has to be mapped on a computational cluster. Interestingly, parallelization is the weakest characteristic of BRIAN, which provides no support for cluster computations and limited support for multicore computers. Fourth, we identify the level of user support and frequency of usage for all simulators. Finally, we carry out an evaluation using two case studies: a large network with simplified neural and synaptic models and a small network with detailed models. These two case studies allow us to avoid any bias toward a particular software package. The results indicate that BRIAN provides the most concise language for both cases considered. Furthermore, as expected, NEST mostly favors large network models, while NEURON is better suited for detailed models. Overall, the case studies reinforce our general observation that simulators have a bias in the computational performance toward specific types of the brain network models. PMID:28775687

  2. Pilot study : rolling wheel deflectometer, falling weight deflectometer, and ground penetrating radar on New Hampshire roadways.

    DOT National Transportation Integrated Search

    2011-02-01

    The New Hampshire Department of Transportation Pavement Management Sections scope of work includes monitoring, evaluating, and : sometimes forecasting the condition of New Hampshires 4,560 miles of roadway network in order to provide guidance o...

  3. Using high-performance networks to enable computational aerosciences applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1992-01-01

    One component of the U.S. Federal High Performance Computing and Communications Program (HPCCP) is the establishment of a gigabit network to provide a communications infrastructure for researchers across the nation. This gigabit network will provide new services and capabilities, in addition to increased bandwidth, to enable future applications. An understanding of these applications is necessary to guide the development of the gigabit network and other high-performance networks of the future. In this paper we focus on computational aerosciences applications run remotely using the Numerical Aerodynamic Simulation (NAS) facility located at NASA Ames Research Center. We characterize these applications in terms of network-related parameters and relate user experiences that reveal limitations imposed by the current wide-area networking infrastructure. Then we investigate how the development of a nationwide gigabit network would enable users of the NAS facility to work in new, more productive ways.

  4. Queuing theory models for computer networks

    NASA Technical Reports Server (NTRS)

    Galant, David C.

    1989-01-01

    A set of simple queuing theory models which can model the average response of a network of computers to a given traffic load has been implemented using a spreadsheet. The impact of variations in traffic patterns and intensities, channel capacities, and message protocols can be assessed using them because of the lack of fine detail in the network traffic rates, traffic patterns, and the hardware used to implement the networks. A sample use of the models applied to a realistic problem is included in appendix A. Appendix B provides a glossary of terms used in this paper. This Ames Research Center computer communication network is an evolving network of local area networks (LANs) connected via gateways and high-speed backbone communication channels. Intelligent planning of expansion and improvement requires understanding the behavior of the individual LANs as well as the collection of networks as a whole.

  5. Design and implementation of a UNIX based distributed computing system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Love, J.S.; Michael, M.W.

    1994-12-31

    We have designed, implemented, and are running a corporate-wide distributed processing batch queue on a large number of networked workstations using the UNIX{reg_sign} operating system. Atlas Wireline researchers and scientists have used the system for over a year. The large increase in available computer power has greatly reduced the time required for nuclear and electromagnetic tool modeling. Use of remote distributed computing has simultaneously reduced computation costs and increased usable computer time. The system integrates equipment from different manufacturers, using various CPU architectures, distinct operating system revisions, and even multiple processors per machine. Various differences between the machines have tomore » be accounted for in the master scheduler. These differences include shells, command sets, swap spaces, memory sizes, CPU sizes, and OS revision levels. Remote processing across a network must be performed in a manner that is seamless from the users` perspective. The system currently uses IBM RISC System/6000{reg_sign}, SPARCstation{sup TM}, HP9000s700, HP9000s800, and DEC Alpha AXP{sup TM} machines. Each CPU in the network has its own speed rating, allowed working hours, and workload parameters. The system if designed so that all of the computers in the network can be optimally scheduled without adversely impacting the primary users of the machines. The increase in the total usable computational capacity by means of distributed batch computing can change corporate computing strategy. The integration of disparate computer platforms eliminates the need to buy one type of computer for computations, another for graphics, and yet another for day-to-day operations. It might be possible, for example, to meet all research and engineering computing needs with existing networked computers.« less

  6. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    PubMed Central

    Wu, Jun; Su, Zhou; Li, Jianhua

    2017-01-01

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems. PMID:28758943

  7. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.

    PubMed

    Wu, Jun; Su, Zhou; Wang, Shen; Li, Jianhua

    2017-07-30

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on "friend" relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  8. A fall prevention guideline for older adults living in long-term care facilities.

    PubMed

    Jung, D; Shin, S; Kim, H

    2014-12-01

    Falls are among the most frequent critical health problems for older adults over 65 years of age and often result in consequential injuries. This study developed a guideline covering risk factors and interventions for falls in order to prevent them from occurring in long-term care facilities. This study was grounded in the methodological approach of the Scottish Intercollegiate Guideline Network for establishing evidence-based guidelines: (1) establishment of the target population and scope of the guideline, (2) systematic literature review and critical analysis, (3) determination of the recommendation grade, (4) development of a draft nursing intervention guideline and algorithm, (5) expert evaluation of the draft nursing intervention guideline, and (6) confirmation of the final intervention guideline and completion of the algorithm. The resulting evidence-based fall prevention guideline consists of a three-step factor assessment and a three-step intervention approach. The resulting guideline was based on the literature and clinical experts. Further research is required to test the guideline's feasibility in across long term care facilities. This guideline can be used by nurses to screen patients who are at a high risk of falling to provide patient interventions to help prevent falls. Considering the high rate of falls at long-term care facilities and the absence of evidence-based guidelines to prevent them, additional studies on falls at long-term care facilities are necessary. Meanwhile, given prior research that indicates the importance of human resources in the application of such guidelines, continuous investigations are needed as to whether the research outcomes are actually conveyed to nurses. © 2014 International Council of Nurses.

  9. Appraising the uptake and use of recommendations for a common outcome data set for clinical trials: a case study in fall injury prevention.

    PubMed

    Copsey, Bethan; Hopewell, Sally; Becker, Clemens; Cameron, Ian D; Lamb, Sarah E

    2016-03-10

    Many researchers and professional bodies are seeking consensus for core outcomes for clinical trials. The Prevention of Falls Network Europe (ProFaNE) developed a common outcome data set for fall injury prevention trials 10 years ago. This study assesses the impact of these recommendations. A systematic search (up to 16 January 2015) was performed using Web of Science, Scopus and PubMed for articles citing the ProFaNE recommendations. Randomised trials on fall prevention in older people were selected for further analysis. Data were extracted on study characteristics and adherence to the key domains recommended by the ProFaNE consensus: falls, fall injury, physical activity, psychological consequences and health-related quality of life. Details of non-recommended outcome measures used were also recorded. The ProFaNE recommendations were cited in a total of 464 published articles, of which 34 were randomised trials on fall prevention in older people. Only one study (3 %) reported on all core domains. Most of the trials reported on falls (n = 32/34, 94 %) as a core outcome measure. Most of the recommendations within the falls domain were well-followed. Around half of the trials reported on fall-related injury (n = 16/34, 47 %). However, none reported the number of radiologically confirmed peripheral fracture events, which is the recommended outcome measure for injury. The other key domains (quality of life, physical activity and psychological consequences) were less frequently reported on, with a lack of consistency in the outcome measures used. The ProFaNE recommendations had a limited effect on standardising the reporting of outcomes in randomised trials on fall injury prevention in older people during the search period. Authors of consensus guidelines should consider maximising buy-in by including a diversity of geographic areas and academic disciplines at the development stage and using a solid dissemination strategy.

  10. What do computer worlds tell us about changes to rain and falling ice-water in the state where this meeting is usually held?

    NASA Astrophysics Data System (ADS)

    Langenbrunner, B.

    2017-12-01

    To learn how the world will change because of human-caused warming, we use computer-made worlds that couple land, water, and air to study their responses to the causes of warming over many years. For changes to rain and falling ice-water, these computer worlds are great at answering questions about very large places, like big areas of land or water, but they are not as good when thinking about more focused areas, like cities or states. This is especially true in the state where this meeting happens most years; will it be wetter or drier by the year 2100, and by how much? I will talk about the work being done to learn why these computer worlds do not always agree, as well as the work that finds changes on which they do agree. One big reason they don't agree is because these computer worlds arrive at different guesses on how winds will shift high up in the air in cooler months. These winds will push rain and falling ice-water to different places up and down the state over time, making it hard to know what we can expect, though our best guess is that it will be ever-so-slightly wetter. Computer worlds do agree, however, on two important things across most of the state: that the very largest bursts of rain will happen more often as the world warms, and that more often, very wet years will follow very dry years immediately before them. Taken together, these changes are important to the those in the state who plan for up-coming water needs. Knowing how normal rain and ice-water will change is part of the story, but perhaps more important is understanding how the very biggest showers are shifting, which will help the state plan for and handle these more sudden (and serious) bursts of water.

  11. BITNET: Past, Present, and Future.

    ERIC Educational Resources Information Center

    Oberst, Daniel J.; Smith, Sheldon B.

    1986-01-01

    Discusses history and development of the academic computer network BITNET, including BITNET Network Support Center's growth and services, and international expansion. Network users, reasons for growth, and future developments are reviewed. A BITNET applications sampler and listings of compatible computers and operating systems, sites, and…

  12. Real-World Neuroimaging Technologies

    DTIC Science & Technology

    2013-05-10

    system enables long-term wear of up to 10 consecutive hours of operation time. The system’s wireless technologies, light weight (200g), and dry sensor ...biomarkers, body sensor networks , brain computer interactionbrain, computer interfaces, data acquisition, electroencephalography monitoring, translational...brain activity in real-world scenarios. INDEX TERMS Behavioral science, biomarkers, body sensor networks , brain computer interfaces, brain computer

  13. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  14. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, Xiuying; Deng, Donglin; Yuan, Xinxing; Hou, Panyu; Huang, Yuanyuan; Duan, Luming; Department of Physics, University of Michigan Collaboration; CenterQuantum Information in Tsinghua University Team

    2017-04-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  15. Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods, and Results for a User Study

    DTIC Science & Technology

    2016-11-01

    Display Design, Methods , and Results for a User Study by Christopher J Garneau and Robert F Erbacher Approved for public...NOV 2016 US Army Research Laboratory Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods ...January 2013–September 2015 4. TITLE AND SUBTITLE Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods

  16. Identifying messaging completion in a parallel computer by checking for change in message received and transmitted count at each node

    DOEpatents

    Archer, Charles J [Rochester, MN; Hardwick, Camesha R [Fayetteville, NC; McCarthy, Patrick J [Rochester, MN; Wallenfelt, Brian P [Eden Prairie, MN

    2009-06-23

    Methods, parallel computers, and products are provided for identifying messaging completion on a parallel computer. The parallel computer includes a plurality of compute nodes, the compute nodes coupled for data communications by at least two independent data communications networks including a binary tree data communications network optimal for collective operations that organizes the nodes as a tree and a torus data communications network optimal for point to point operations that organizes the nodes as a torus. Embodiments include reading all counters at each node of the torus data communications network; calculating at each node a current node value in dependence upon the values read from the counters at each node; and determining for all nodes whether the current node value for each node is the same as a previously calculated node value for each node. If the current node is the same as the previously calculated node value for all nodes of the torus data communications network, embodiments include determining that messaging is complete and if the current node is not the same as the previously calculated node value for all nodes of the torus data communications network, embodiments include determining that messaging is currently incomplete.

  17. Distributed multiple path routing in complex networks

    NASA Astrophysics Data System (ADS)

    Chen, Guang; Wang, San-Xiu; Wu, Ling-Wei; Mei, Pan; Yang, Xu-Hua; Wen, Guang-Hui

    2016-12-01

    Routing in complex transmission networks is an important problem that has garnered extensive research interest in the recent years. In this paper, we propose a novel routing strategy called the distributed multiple path (DMP) routing strategy. For each of the O-D node pairs in a given network, the DMP routing strategy computes and stores multiple short-length paths that overlap less with each other in advance. And during the transmission stage, it rapidly selects an actual routing path which provides low transmission cost from the pre-computed paths for each transmission task, according to the real-time network transmission status information. Computer simulation results obtained for the lattice, ER random, and scale-free networks indicate that the strategy can significantly improve the anti-congestion ability of transmission networks, as well as provide favorable routing robustness against partial network failures.

  18. Program Helps Simulate Neural Networks

    NASA Technical Reports Server (NTRS)

    Villarreal, James; Mcintire, Gary

    1993-01-01

    Neural Network Environment on Transputer System (NNETS) computer program provides users high degree of flexibility in creating and manipulating wide variety of neural-network topologies at processing speeds not found in conventional computing environments. Supports back-propagation and back-propagation-related algorithms. Back-propagation algorithm used is implementation of Rumelhart's generalized delta rule. NNETS developed on INMOS Transputer(R). Predefines back-propagation network, Jordan network, and reinforcement network to assist users in learning and defining own networks. Also enables users to configure other neural-network paradigms from NNETS basic architecture. Small portion of software written in OCCAM(R) language.

  19. Ranking network of a captive rhesus macaque society: a sophisticated corporative kingdom.

    PubMed

    Fushing, Hsieh; McAssey, Michael P; Beisner, Brianne; McCowan, Brenda

    2011-03-15

    We develop a three-step computing approach to explore a hierarchical ranking network for a society of captive rhesus macaques. The computed network is sufficiently informative to address the question: Is the ranking network for a rhesus macaque society more like a kingdom or a corporation? Our computations are based on a three-step approach. These steps are devised to deal with the tremendous challenges stemming from the transitivity of dominance as a necessary constraint on the ranking relations among all individual macaques, and the very high sampling heterogeneity in the behavioral conflict data. The first step simultaneously infers the ranking potentials among all network members, which requires accommodation of heterogeneous measurement error inherent in behavioral data. Our second step estimates the social rank for all individuals by minimizing the network-wide errors in the ranking potentials. The third step provides a way to compute confidence bounds for selected empirical features in the social ranking. We apply this approach to two sets of conflict data pertaining to two captive societies of adult rhesus macaques. The resultant ranking network for each society is found to be a sophisticated mixture of both a kingdom and a corporation. Also, for validation purposes, we reanalyze conflict data from twenty longhorn sheep and demonstrate that our three-step approach is capable of correctly computing a ranking network by eliminating all ranking error.

  20. Real-time signal processing of accelerometer data for wearable medical patient monitoring devices.

    PubMed

    Van Wieringen, Matt; Eklund, J

    2008-01-01

    Elderly and other people who live at home but required some physical assistance to do so are often more susceptible injury causing falls in and around their place of residence. In the event that a fall does occur, as a direct result of a previous medical condition or the fall itself, these people are typically less likely to be able to seek timely medical help without assistance. The goal of this research is to develop a wearable sensor device that uses an accelerometer for monitoring the movement of the person to detect falls after they have occurred in order to enable timely medical assistance. The data coming from the accelerometer is processed in real-time in the device and sent to a remote monitoring station where operators can attempt to make contact with the person and/or notify medical personnel of the situation. The ADXL330 accelerometer is contained within a Nintendo WiiMote controller, which forms the basis of the wearable medical sensor. The accelerometer data can then be sent via Bluetooth connection and processed by a local gateway processor. If a fall is detected, the gateway will then contact a remote monitoring station, on a cellular network, for example, via satellite, and/or through a hardwired phone or Internet connection. To detect the occurrence of ta fall, the accelerometer data is passed through a matched filter and the data is compared to benchmark analysis data that will define the conditions that represents the occurrence of a fall.

Top