Home Care Nursing via Computer Networks: Justification and Design Specifications
Brennan, Patricia Flatley
1988-01-01
High-tech home care includes the use of information technologies, such as computer networks, to provide direct care to patients in the home. This paper presents the justification and design of a project using a free, public access computer network to deliver home care nursing. The intervention attempts to reduce isolation and improve problem solving among home care patients and their informal caregivers. Three modules comprise the intervention: a decision module, a communications module, and an information data base. This paper describes the experimental evaluation of the project, and discusses issues in the delivery of nursing care via computers.
Data systems and computer science space data systems: Onboard networking and testbeds
NASA Technical Reports Server (NTRS)
Dalton, Dan
1991-01-01
The technical objectives are to develop high-performance, space-qualifiable, onboard computing, storage, and networking technologies. The topics are presented in viewgraph form and include the following: justification; technology challenges; program description; and state-of-the-art assessment.
Pedagogical Aspects of a UNIX-Based Network Management System of English Instruction.
ERIC Educational Resources Information Center
Schmitt, Lothar M.; Christianson, Kiel T.
1998-01-01
Describes the justification for design and implementation of a UNIX-based computer-assisted language-instruction system using a network of workstations containing functions useful for instructors and students as well as researchers. The present investigation is aimed at teaching writing to Japanese students at the University of Aizu in Japan.…
ERIC Educational Resources Information Center
Lee, Chun-Yi; Chen, Ming-Jang; Chang, Wen-Long
2014-01-01
The aim of this study is to investigate the effects of solution methods and question prompts on generalization and justification of non-routine problem solving for Grade 9 students. The learning activities are based on the context of the frog jumping game. In addition, related computer tools were used to support generalization and justification of…
Explanation production by expert planners
NASA Technical Reports Server (NTRS)
Bridges, Susan; Jhannes, James D.
1988-01-01
Although the explanation capability of expert systems is usually listed as one of the distinguishing characteristics of these systems, the explanation facilities of most existing systems are quite primitive. Computer generated explanations are typically produced from canned text or by direct translation of the knowledge structures. Explanations produced in this manner bear little resemblance to those produced by humans for similar tasks. The focus of our research in explanation is the production of justifications for decisions by expert planning systems. An analysis of justifications written by people for planning tasks has been taken as the starting point. The purpose of this analysis is two-fold. First, analysis of the information content of the justifications will provide a basis for deciding what knowledge must be represented if human-like justifications are to be produced. Second, an analysis of the textual organization of the justifications will be used in the development of a mechanism for selecting and organizing the knowledge to be included in a computer-produced explanation. This paper describes a preliminary analysis done of justifications written by people for a planning task. It is clear that these justifications differ significantly from those that would be produced by an expert system by tracing the firing of production rules. The results from the text analysis have been used to develop an augmented phrase structured grammar (APSG) describing the organization of the justifications. The grammar was designed to provide a computationally feasible method for determining textual organization that will allow the necessary information to be communicated in a cohesive manner.
Approximating local observables on projected entangled pair states
NASA Astrophysics Data System (ADS)
Schwarz, M.; Buerschaper, O.; Eisert, J.
2017-06-01
Tensor network states are for good reasons believed to capture ground states of gapped local Hamiltonians arising in the condensed matter context, states which are in turn expected to satisfy an entanglement area law. However, the computational hardness of contracting projected entangled pair states in two- and higher-dimensional systems is often seen as a significant obstacle when devising higher-dimensional variants of the density-matrix renormalization group method. In this work, we show that for those projected entangled pair states that are expected to provide good approximations of such ground states of local Hamiltonians, one can compute local expectation values in quasipolynomial time. We therefore provide a complexity-theoretic justification of why state-of-the-art numerical tools work so well in practice. We finally turn to the computation of local expectation values on quantum computers, providing a meaningful application for a small-scale quantum computer.
Web mining in soft computing framework: relevance, state of the art and future directions.
Pal, S K; Talwar, V; Mitra, P
2002-01-01
The paper summarizes the different characteristics of Web data, the basic components of Web mining and its different types, and the current state of the art. The reason for considering Web mining, a separate field from data mining, is explained. The limitations of some of the existing Web mining methods and tools are enunciated, and the significance of soft computing (comprising fuzzy logic (FL), artificial neural networks (ANNs), genetic algorithms (GAs), and rough sets (RSs) are highlighted. A survey of the existing literature on "soft Web mining" is provided along with the commercially available systems. The prospective areas of Web mining where the application of soft computing needs immediate attention are outlined with justification. Scope for future research in developing "soft Web mining" systems is explained. An extensive bibliography is also provided.
Atmospheric Mercury Deposition Monitoring – National Atmospheric Deposition Program (NADP)
The National Atmospheric Deposition Program (NADP) developed and operates a collaborative network of atmospheric mercury monitoring sites based in North America – the Atmospheric Mercury Network (AMNet). The justification for the network was growing interest and demand from many ...
NASA Astrophysics Data System (ADS)
Pieper, Steven D.; McKenna, Michael; Chen, David; McDowall, Ian E.
1994-04-01
We are interested in the application of computer animation to surgery. Our current project, a navigation and visualization tool for knee arthroscopy, relies on real-time computer graphics and the human interface technologies associated with virtual reality. We believe that this new combination of techniques will lead to improved surgical outcomes and decreased health care costs. To meet these expectations in the medical field, the system must be safe, usable, and cost-effective. In this paper, we outline some of the most important hardware and software specifications in the areas of video input and output, spatial tracking, stereoscopic displays, computer graphics models and libraries, mass storage and network interfaces, and operating systems. Since this is a fairly new combination of technologies and a new application, our justification for our specifications are drawn from the current generation of surgical technology and by analogy to other fields where virtual reality technology has been more extensively applied and studied.
CVISN business case (commercial vehicle information systems and networks)
DOT National Transportation Integrated Search
2007-10-15
The objective was to evaluate economic justifications and institutional issues affecting motor carriers and State transportation agencies regarding the deployment of CVISN technologies. CVISN (Commercial Vehicle Information Systems and Networks) incl...
A grid-enabled web service for low-resolution crystal structure refinement.
O'Donovan, Daniel J; Stokes-Rees, Ian; Nam, Yunsun; Blacklow, Stephen C; Schröder, Gunnar F; Brunger, Axel T; Sliz, Piotr
2012-03-01
Deformable elastic network (DEN) restraints have proved to be a powerful tool for refining structures from low-resolution X-ray crystallographic data sets. Unfortunately, optimal refinement using DEN restraints requires extensive calculations and is often hindered by a lack of access to sufficient computational resources. The DEN web service presented here intends to provide structural biologists with access to resources for running computationally intensive DEN refinements in parallel on the Open Science Grid, the US cyberinfrastructure. Access to the grid is provided through a simple and intuitive web interface integrated into the SBGrid Science Portal. Using this portal, refinements combined with full parameter optimization that would take many thousands of hours on standard computational resources can now be completed in several hours. An example of the successful application of DEN restraints to the human Notch1 transcriptional complex using the grid resource, and summaries of all submitted refinements, are presented as justification.
Modern design of a fast front-end computer
NASA Astrophysics Data System (ADS)
Šoštarić, Z.; Anic̈ić, D.; Sekolec, L.; Su, J.
1994-12-01
Front-end computers (FEC) at Paul Scherrer Institut provide access to accelerator CAMAC-based sensors and actuators by way of a local area network. In the scope of the new generation FEC project, a front-end is regarded as a collection of services. The functionality of one such service is described in terms of Yourdon's environment, behaviour, processor and task models. The computational model (software representation of the environment) of the service is defined separately, using the information model of the Shlaer-Mellor method, and Sather OO language. In parallel with the analysis and later with the design, a suite of test programmes was developed to evaluate the feasibility of different computing platforms for the project and a set of rapid prototypes was produced to resolve different implementation issues. The past and future aspects of the project and its driving forces are presented. Justification of the choice of methodology, platform and requirement, is given. We conclude with a description of the present state, priorities and limitations of our project.
Promoting Systems Thinking through Biology Lessons
NASA Astrophysics Data System (ADS)
Riess, Werner; Mischo, Christoph
2010-04-01
This study's goal was to analyze various teaching approaches within the context of natural science lessons, especially in biology. The main focus of the paper lies on the effectiveness of different teaching methods in promoting systems thinking in the field of Education for Sustainable Development. The following methods were incorporated into the study: special lessons designed to promote systems thinking, a computer-simulated scenario on the topic "ecosystem forest," and a combination of both special lessons and the computer simulation. These groups were then compared to a control group. A questionnaire was used to assess systems thinking skills of 424 sixth-grade students of secondary schools in Germany. The assessment differentiated between a conceptual understanding (measured as achievement score) and a reflexive justification (measured as justification score) of systems thinking. The following control variables were used: logical thinking, grades in school, memory span, and motivational goal orientation. Based on the pretest-posttest control group design, only those students who received both special instruction and worked with the computer simulation showed a significant increase in their achievement scores. The justification score increased in the computer simulation condition as well as in the combination of computer simulation and lesson condition. The possibilities and limits of promoting various forms of systems thinking by using realistic computer simulations are discussed.
DOT National Transportation Integrated Search
2007-10-02
The objective was to evaluate economic justifications for motor carriers to participate in CVISN deployment. CVISN (Commercial Vehicle Information Systems and Networks) includes: interstate credentials administration (registration and permitting), el...
32 CFR 310.53 - Computer matching agreements (CMAs).
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 2 2013-07-01 2013-07-01 false Computer matching agreements (CMAs). 310.53... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.53 Computer.... (3) Justification and expected results. Explain why computer matching as opposed to some other...
32 CFR 310.53 - Computer matching agreements (CMAs).
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 2 2014-07-01 2014-07-01 false Computer matching agreements (CMAs). 310.53... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.53 Computer.... (3) Justification and expected results. Explain why computer matching as opposed to some other...
32 CFR 310.53 - Computer matching agreements (CMAs).
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 2 2012-07-01 2012-07-01 false Computer matching agreements (CMAs). 310.53... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.53 Computer.... (3) Justification and expected results. Explain why computer matching as opposed to some other...
32 CFR 310.53 - Computer matching agreements (CMAs).
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Computer matching agreements (CMAs). 310.53... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.53 Computer.... (3) Justification and expected results. Explain why computer matching as opposed to some other...
32 CFR 310.53 - Computer matching agreements (CMAs).
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 2 2011-07-01 2011-07-01 false Computer matching agreements (CMAs). 310.53... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.53 Computer.... (3) Justification and expected results. Explain why computer matching as opposed to some other...
Yudkowsky, Rachel; Park, Yoon Soo; Hyderi, Abbas; Bordage, Georges
2015-11-01
To determine the psychometric characteristics of diagnostic justification scores based on the patient note format of the United States Medical Licensing Examination Step 2 Clinical Skills exam, which requires students to document history and physical findings, differential diagnoses, diagnostic justification, and plan for immediate workup. End-of-third-year medical students at one institution wrote notes for five standardized patient cases in May 2013 (n = 180) and 2014 (n = 177). Each case was scored using a four-point rubric to rate each of the four note components. Descriptive statistics and item analyses were computed and a generalizability study done. Across cases, 10% to 48% provided no diagnostic justification or had several missing or incorrect links between history and physical findings and diagnoses. The average intercase correlation for justification scores ranged from 0.06 to 0.16; internal consistency reliability of justification scores (coefficient alpha across cases) was 0.38. Overall, justification scores had the highest mean item discrimination across cases. The generalizability study showed that person-case interaction (12%) and task-case interaction (13%) had the largest variance components, indicating substantial case specificity. The diagnostic justification task provides unique information about student achievement and curricular gaps. Students struggled to correctly justify their diagnoses; performance was highly case specific. Diagnostic justification was the most discriminating element of the patient note and had the greatest variability in student performance across cases. The curriculum should provide a wide range of clinical cases and emphasize recognition and interpretation of clinically discriminating findings to promote the development of clinical reasoning skills.
Using hybridization networks to retrace the evolution of Indo-European languages.
Willems, Matthieu; Lord, Etienne; Laforest, Louise; Labelle, Gilbert; Lapointe, François-Joseph; Di Sciullo, Anna Maria; Makarenkov, Vladimir
2016-09-06
Curious parallels between the processes of species and language evolution have been observed by many researchers. Retracing the evolution of Indo-European (IE) languages remains one of the most intriguing intellectual challenges in historical linguistics. Most of the IE language studies use the traditional phylogenetic tree model to represent the evolution of natural languages, thus not taking into account reticulate evolutionary events, such as language hybridization and word borrowing which can be associated with species hybridization and horizontal gene transfer, respectively. More recently, implicit evolutionary networks, such as split graphs and minimal lateral networks, have been used to account for reticulate evolution in linguistics. Striking parallels existing between the evolution of species and natural languages allowed us to apply three computational biology methods for reconstruction of phylogenetic networks to model the evolution of IE languages. We show how the transfer of methods between the two disciplines can be achieved, making necessary methodological adaptations. Considering basic vocabulary data from the well-known Dyen's lexical database, which contains word forms in 84 IE languages for the meanings of a 200-meaning Swadesh list, we adapt a recently developed computational biology algorithm for building explicit hybridization networks to study the evolution of IE languages and compare our findings to the results provided by the split graph and galled network methods. We conclude that explicit phylogenetic networks can be successfully used to identify donors and recipients of lexical material as well as the degree of influence of each donor language on the corresponding recipient languages. We show that our algorithm is well suited to detect reticulate relationships among languages, and present some historical and linguistic justification for the results obtained. Our findings could be further refined if relevant syntactic, phonological and morphological data could be analyzed along with the available lexical data.
NASA Astrophysics Data System (ADS)
Momot, M. V.; Politsinskaia, E. V.; Sushko, A. V.; Semerenko, I. A.
2016-08-01
The paper considers the problem of mathematical filter selection, used for balancing of wheeled robot in conditions of limited computational resources. The solution based on complementary filter is proposed.
Overview of Design, Lifecycle, and Safety for Computer-Based Systems
NASA Technical Reports Server (NTRS)
Torres-Pomales, Wilfredo
2015-01-01
This document describes the need and justification for the development of a design guide for safety-relevant computer-based systems. This document also makes a contribution toward the design guide by presenting an overview of computer-based systems design, lifecycle, and safety.
Framing U-Net via Deep Convolutional Framelets: Application to Sparse-View CT.
Han, Yoseob; Ye, Jong Chul
2018-06-01
X-ray computed tomography (CT) using sparse projection views is a recent approach to reduce the radiation dose. However, due to the insufficient projection views, an analytic reconstruction approach using the filtered back projection (FBP) produces severe streaking artifacts. Recently, deep learning approaches using large receptive field neural networks such as U-Net have demonstrated impressive performance for sparse-view CT reconstruction. However, theoretical justification is still lacking. Inspired by the recent theory of deep convolutional framelets, the main goal of this paper is, therefore, to reveal the limitation of U-Net and propose new multi-resolution deep learning schemes. In particular, we show that the alternative U-Net variants such as dual frame and tight frame U-Nets satisfy the so-called frame condition which makes them better for effective recovery of high frequency edges in sparse-view CT. Using extensive experiments with real patient data set, we demonstrate that the new network architectures provide better reconstruction performance.
Exascale Workshop Panel Report Meeting
DOE Office of Scientific and Technical Information (OSTI.GOV)
Khaleel, Mohammad A.
2010-07-01
The Exascale Review Panel consists of 12 scientists and engineers with experience in various aspects of high-performance computing and its application, development, and management. The Panel hear presentations by several representatives of the workshops and town meetings convened over the past few years to examine the need for exascale computation capability and the justification for a U.S. Department of Energy (DOE) program to develop such capability. This report summarizes information provided by the presenters and substantial written reports to the Panel in advance of the meeting in Washington D.C. on January 19-20, 2010. The report also summarizes the Panel's conclusionsmore » with regard to the justification of a DOE-led exascale initiative.« less
Methodically Modeling the Tor Network
2012-08-01
relays for their circuits: the choice is weighted by the rela- tive difference in the perceived throughput of each relay in an attempt to balance...network. A lack of details about and justifications for such choices obscures the level of faithfulness to the live network and decreases confidence...first byte of the data payload is shown in (a) and (b), and time to the last byte in (c) and (d), for various download sizes. ping process . File download
Cognitive dissonance reduction as constraint satisfaction.
Shultz, T R; Lepper, M R
1996-04-01
A constraint satisfaction neural network model (the consonance model) simulated data from the two major cognitive dissonance paradigms of insufficient justification and free choice. In several cases, the model fit the human data better than did cognitive dissonance theory. Superior fits were due to the inclusion of constraints that were not part of dissonance theory and to the increased precision inherent to this computational approach. Predictions generated by the model for a free choice between undesirable alternatives were confirmed in a new psychological experiment. The success of the consonance model underscores important, unforeseen similarities between what had been formerly regarded as the rather exotic process of dissonance reduction and a variety of other, more mundane psychological processes. Many of these processes can be understood as the progressive application of constraints supplied by beliefs and attitudes.
New knowledge network evaluation method for design rationale management
NASA Astrophysics Data System (ADS)
Jing, Shikai; Zhan, Hongfei; Liu, Jihong; Wang, Kuan; Jiang, Hao; Zhou, Jingtao
2015-01-01
Current design rationale (DR) systems have not demonstrated the value of the approach in practice since little attention is put to the evaluation method of DR knowledge. To systematize knowledge management process for future computer-aided DR applications, a prerequisite is to provide the measure for the DR knowledge. In this paper, a new knowledge network evaluation method for DR management is presented. The method characterizes the DR knowledge value from four perspectives, namely, the design rationale structure scale, association knowledge and reasoning ability, degree of design justification support and degree of knowledge representation conciseness. The DR knowledge comprehensive value is also measured by the proposed method. To validate the proposed method, different style of DR knowledge network and the performance of the proposed measure are discussed. The evaluation method has been applied in two realistic design cases and compared with the structural measures. The research proposes the DR knowledge evaluation method which can provide object metric and selection basis for the DR knowledge reuse during the product design process. In addition, the method is proved to be more effective guidance and support for the application and management of DR knowledge.
Violence Against Women and Household Ownership of Radios, Computers, and Phones in 20 Countries.
Cardoso, Lauren F; Sorenson, Susan B
2017-07-01
To examine the relationship between household ownership of information and communication technologies (ICTs) and justifications for wife beating. Women aged 15 to 49 years in 20 countries were surveyed via UNICEF's Multiple Indicator Cluster Surveys between 2006 and 2014. Multivariate logistic regressions accounted for individual-, household-, and structural-level variables. Household ownership of any ICT (radio, computer, fixed phone, or mobile phone but not television) was associated with increased odds of women rejecting wife beating. The largest association was with computer ownership: women in homes with a computer were more likely to reject wife beating (adjusted odds ratio [AOR] = 1.81; 97.5% confidence interval [CI] = 1.69, 1.93). Number of ICTs was important: women in households with 1, 2, 3, 4, and 5 ICTs (vs 0) were more likely to reject wife-beating justifications (AOR = 1.10 [97.5% CI = 1.03, 1.17]; AOR = 1.10 [97.5% CI = 1.03, 1.18]; AOR = 1.19 [97.5% CI = 1.11, 1.29]; AOR = 1.71 [97.5% CI = 1.54, 1.88]; and AOR = 2.85 [97.5% CI = 2.48, 3.26]; respectively). Independent of household wealth, country development, and other sociodemographic factors, the more ICTs in a household, the more likely that women will reject wife-beating justifications. Policymakers and program planners should consider potential implications of ICT access relating to intimate partner violence.
Teaching Arabic with Technology at BYU: Learning from the Past to Bridge to the Future
ERIC Educational Resources Information Center
Bush, Michael D.; Browne, Jeremy M.
2004-01-01
Reporting in 1971 on research related to computer-based methods for teaching the Arabic writing system, Bunderson and Abboud cited the potential that computers have for language learning, a largely unfulfilled potential even in 2004. After a review of the relevant historical background for the justification of computer-aided language learning…
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-03-24
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-01-01
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632
David F. DeSante
2005-01-01
Based on the experience of creating and implementing the Monitoring Avian Productivity and Survivorship (MAPS) program, I suggest that, to be successful, a migration-monitoring network must: (1) provide strong justification for the data it proposes to collect; (2) provide direct links between those monitoring data and both research and management goals; (3) provide...
The National Shipbuilding Research Program, Computer Aided Process Planning for Shipyards
1986-08-01
Factory Simulation with Conventional Factory Planning Techniques Financial Justification of State-of-the-Art Investment: A Study Using CAPP I–5 T I T L...and engineer to order.” “Factory Simulation: Approach to Integration of Computer- Based Factory Simulation with Conventional Factory Planning Techniques
Code of Federal Regulations, 2010 CFR
2010-07-01
... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Time. 350.5 Section 350.5... RULES AND PROCEDURES GENERAL ADMINISTRATIVE PROVISIONS § 350.5 Time. (a) Computation. To compute the due... reasons why there is good cause for the delay; (5) The justification for the amount of additional time...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 37 Patents, Trademarks, and Copyrights 1 2011-07-01 2011-07-01 false Time. 350.5 Section 350.5... RULES AND PROCEDURES GENERAL ADMINISTRATIVE PROVISIONS § 350.5 Time. (a) Computation. To compute the due... reasons why there is good cause for the delay; (5) The justification for the amount of additional time...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Time. 350.5 Section 350.5... RULES AND PROCEDURES GENERAL ADMINISTRATIVE PROVISIONS § 350.5 Time. (a) Computation. To compute the due... reasons why there is good cause for the delay; (5) The justification for the amount of additional time...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 37 Patents, Trademarks, and Copyrights 1 2013-07-01 2013-07-01 false Time. 350.5 Section 350.5... RULES AND PROCEDURES GENERAL ADMINISTRATIVE PROVISIONS § 350.5 Time. (a) Computation. To compute the due... reasons why there is good cause for the delay; (5) The justification for the amount of additional time...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 37 Patents, Trademarks, and Copyrights 1 2012-07-01 2012-07-01 false Time. 350.5 Section 350.5... RULES AND PROCEDURES GENERAL ADMINISTRATIVE PROVISIONS § 350.5 Time. (a) Computation. To compute the due... reasons why there is good cause for the delay; (5) The justification for the amount of additional time...
The Humanistic Duo: The Park/Recreation Professional and the Computer. (Computer-Can I Use It?).
ERIC Educational Resources Information Center
Weiner, Myron E.
This paper states that there are two fundamental reasons for the comparative absence of computer use for parks and recreation at the present time. These are (1) lack of clear cut cost justification and (2) reluctance on the part of recreation professionals to accept their role as managers and, consequently, to utilize modern management tools. The…
ERIC Educational Resources Information Center
Vangsnes, Vigdis; Gram Okland, Nils Tore; Krumsvik, Rune
2012-01-01
This article focuses on the didactical implications when commercial educational computer games are used in Norwegian kindergartens by analysing the dramaturgy and the didactics of one particular game and the game in use in a pedagogical context. Our justification for analysing the game by using dramaturgic theory is that we consider the game to be…
Justification of CT scans using referral guidelines for imaging.
Stanescu, G; Rosca-Fartat, G; Stanescu, D
2015-07-01
This study analyses the efficiency of the justification of individual computed tomography (CT) procedures using the good practice guide. The conformity of the CT scans with guide's recommendations was retrospectively analysed in a paediatric emergency hospital in Romania. The involved patient doses were estimated. The results show that around one-third of the examinations were not prescribed in conformity with the guide's recommendations, but these results are affected by unclear guide provisions, discussed here. The implications of the provisions of the revised International Atomic Energy Agency's Basic Safety Standards and of the Council Directive 2013/59/EURATOM were analysed. The education and training courses for medical doctors disseminating the provisions of the good practice guide should be considered as the main support for the justification of the CT scans at the individual level. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Peer influences on moral disengagement in late childhood and early adolescence.
Caravita, Simona C S; Sijtsema, Jelle J; Rambaran, J Ashwin; Gini, Gianluca
2014-02-01
Moral disengagement processes are cognitive self-justification processes of transgressive actions that have been hypothesized to be learned and socialized within social contexts. The current study aimed at investigating socialization of moral disengagement by friends in two developmentally different age groups, namely late childhood (age: 9-10 years; n = 133, 42.9% girls) and early adolescence (age: 11-14 years; n = 236, 40.6% girls) over a 1-year period. Specifically, the current study examined whether similarity in moral disengagement between friends was the result of friends' influence or friend selection. Moreover, gender (42% girls), individual bullying behavior, and perceived popularity status were examined as potential moderators of socialization for moral disengagement within friendship networks. Self-report measures were used to assess moral disengagement, sociometric questions and a peer-nomination scale for friendship networks and bullying behavior, respectively. Longitudinal social network analysis (RSiena) was used to study change of moral disengagement in friendship networks during a 1-year interval. In early adolescence, friends were more likely to be similar to each other over time and this was explained only by influence processes and not by selection processes. Gender, bullying, and perceived popularity did not moderate the friends' influence on moral disengagement over time. Results indicate that self-justification processes change over time already in late childhood, but only in early adolescence this change is likely to be dependent upon peers' moral disengagement.
Energy optimization in mobile sensor networks
NASA Astrophysics Data System (ADS)
Yu, Shengwei
Mobile sensor networks are considered to consist of a network of mobile robots, each of which has computation, communication and sensing capabilities. Energy efficiency is a critical issue in mobile sensor networks, especially when mobility (i.e., locomotion control), routing (i.e., communications) and sensing are unique characteristics of mobile robots for energy optimization. This thesis focuses on the problem of energy optimization of mobile robotic sensor networks, and the research results can be extended to energy optimization of a network of mobile robots that monitors the environment, or a team of mobile robots that transports materials from stations to stations in a manufacturing environment. On the energy optimization of mobile robotic sensor networks, our research focuses on the investigation and development of distributed optimization algorithms to exploit the mobility of robotic sensor nodes for network lifetime maximization. In particular, the thesis studies these five problems: 1. Network-lifetime maximization by controlling positions of networked mobile sensor robots based on local information with distributed optimization algorithms; 2. Lifetime maximization of mobile sensor networks with energy harvesting modules; 3. Lifetime maximization using joint design of mobility and routing; 4. Optimal control for network energy minimization; 5. Network lifetime maximization in mobile visual sensor networks. In addressing the first problem, we consider only the mobility strategies of the robotic relay nodes in a mobile sensor network in order to maximize its network lifetime. By using variable substitutions, the original problem is converted into a convex problem, and a variant of the sub-gradient method for saddle-point computation is developed for solving this problem. An optimal solution is obtained by the method. Computer simulations show that mobility of robotic sensors can significantly prolong the lifetime of the whole robotic sensor network while consuming negligible amount of energy for mobility cost. For the second problem, the problem is extended to accommodate mobile robotic nodes with energy harvesting capability, which makes it a non-convex optimization problem. The non-convexity issue is tackled by using the existing sequential convex approximation method, based on which we propose a novel procedure of modified sequential convex approximation that has fast convergence speed. For the third problem, the proposed procedure is used to solve another challenging non-convex problem, which results in utilizing mobility and routing simultaneously in mobile robotic sensor networks to prolong the network lifetime. The results indicate that joint design of mobility and routing has an edge over other methods in prolonging network lifetime, which is also the justification for the use of mobility in mobile sensor networks for energy efficiency purpose. For the fourth problem, we include the dynamics of the robotic nodes in the problem by modeling the networked robotic system using hybrid systems theory. A novel distributed method for the networked hybrid system is used to solve the optimal moving trajectories for robotic nodes and optimal network links, which are not answered by previous approaches. Finally, the fact that mobility is more effective in prolonging network lifetime for a data-intensive network leads us to apply our methods to study mobile visual sensor networks, which are useful in many applications. We investigate the joint design of mobility, data routing, and encoding power to help improving the video quality while maximizing the network lifetime. This study leads to a better understanding of the role mobility can play in data-intensive surveillance sensor networks.
NASA Technical Reports Server (NTRS)
Marzwell, Neville I.; Chen, Alexander Y. K.
1991-01-01
Dexterous coordination of manipulators based on the use of redundant degrees of freedom, multiple sensors, and built-in robot intelligence represents a critical breakthrough in development of advanced manufacturing technology. A cost-effective approach for achieving this new generation of robotics has been made possible by the unprecedented growth of the latest microcomputer and network systems. The resulting flexible automation offers the opportunity to improve the product quality, increase the reliability of the manufacturing process, and augment the production procedures for optimizing the utilization of the robotic system. Moreover, the Advanced Robotic System (ARS) is modular in design and can be upgraded by closely following technological advancements as they occur in various fields. This approach to manufacturing automation enhances the financial justification and ensures the long-term profitability and most efficient implementation of robotic technology. The new system also addresses a broad spectrum of manufacturing demand and has the potential to address both complex jobs as well as highly labor-intensive tasks. The ARS prototype employs the decomposed optimization technique in spatial planning. This technique is implemented to the framework of the sensor-actuator network to establish the general-purpose geometric reasoning system. The development computer system is a multiple microcomputer network system, which provides the architecture for executing the modular network computing algorithms. The knowledge-based approach used in both the robot vision subsystem and the manipulation control subsystems results in the real-time image processing vision-based capability. The vision-based task environment analysis capability and the responsive motion capability are under the command of the local intelligence centers. An array of ultrasonic, proximity, and optoelectronic sensors is used for path planning. The ARS currently has 18 degrees of freedom made up by two articulated arms, one movable robot head, and two charged coupled device (CCD) cameras for producing the stereoscopic views, and articulated cylindrical-type lower body, and an optional mobile base. A functional prototype is demonstrated.
Computer calculation of device, circuit, equipment, and system reliability.
NASA Technical Reports Server (NTRS)
Crosby, D. R.
1972-01-01
A grouping into four classes is proposed for all reliability computations that are related to electronic equipment. Examples are presented of reliability computations in three of these four classes. Each of the three specific reliability tasks described was originally undertaken to satisfy an engineering need for reliability data. The form and interpretation of the print-out of the specific reliability computations is presented. The justification for the costs of these computations is indicated. The skills of the personnel used to conduct the analysis, the interfaces between the personnel, and the timing of the projects is discussed.
The Effects of Catholic Schooling on Civic Participation. CIRCLE Working Paper 09
ERIC Educational Resources Information Center
Dee, Thomas S.
2003-01-01
The United States has an extensive network of publicly financed and managed schools and provides almost no financial support to private schools. One of the most fundamental justifications for the status quo is the hypothesis that the regulation of private schools cannot adequately ensure that the desired social benefits of schooling will be…
An approach to radiation safety department benchmarking in academic and medical facilities.
Harvey, Richard P
2015-02-01
Based on anecdotal evidence and networking with colleagues at other facilities, it has become evident that some radiation safety departments are not adequately staffed and radiation safety professionals need to increase their staffing levels. Discussions with management regarding radiation safety department staffing often lead to similar conclusions. Management acknowledges the Radiation Safety Officer (RSO) or Director of Radiation Safety's concern but asks the RSO to provide benchmarking and justification for additional full-time equivalents (FTEs). The RSO must determine a method to benchmark and justify additional staffing needs while struggling to maintain a safe and compliant radiation safety program. Benchmarking and justification are extremely important tools that are commonly used to demonstrate the need for increased staffing in other disciplines and are tools that can be used by radiation safety professionals. Parameters that most RSOs would expect to be positive predictors of radiation safety staff size generally are and can be emphasized in benchmarking and justification report summaries. Facilities with large radiation safety departments tend to have large numbers of authorized users, be broad-scope programs, be subject to increased controls regulations, have large clinical operations, have significant numbers of academic radiation-producing machines, and have laser safety responsibilities.
Cognitive Dissonance Reduction as Constraint Satisfaction.
ERIC Educational Resources Information Center
Shultz, Thomas R.; Lepper, Mark R.
1996-01-01
It is argued that the reduction of cognitive dissonance can be viewed as a constraint satisfaction problem, and a computational model of the process of consonance seeking is proposed. Simulations from this model matched psychological findings from the insufficient justification and free-choice paradigms of cognitive dissonance theory. (SLD)
Usability of tablet computers by people with early-stage dementia.
Lim, Fabian S; Wallace, Tim; Luszcz, Mary A; Reynolds, Karen J
2013-01-01
Tablet computers are generally associated with an intuitive interface. The adoption and use of tablet computers within the early-stage dementia context could potentially assist in daily living and provide users with a source for leisure activities and social networking. As dementia mainly affects the older adult population, it is expected that many people with dementia and even their carers do not use tablet computers as part of their everyday living. This paper explores the usability of tablet computers within the early-stage dementia context as a source of leisure for people with dementia. The main advantage of the use of tablet computers in this manner is to provide carers some reprieve from the constant care and attention often required in caring for people with dementia. Seven-day in-home trials were conducted to determine whether people with early-stage dementia were -capable of using a tablet computer independently. Twenty-one people with early-stage dementia and carer dyads participated in the trial. Feedback was gathered through questionnaires from both the person with dementia and their carer regarding the use of a tablet computer as part of their everyday living. Approximately half the participants with dementia were able to engage with and use the tablet computer independently, which proved to be helpful to their carers. No significant traits were observed to help identify those who were less likely to use a tablet computer. Carer relief was quantified by the amount of time participants with dementia spent using the device without supervision. The results and feedback from the trial provide significant insights to introducing new technology within the early-stage dementia context. Users' needs must be considered on a case-by-case basis to successfully facilitate the uptake of tablet computers in the dementia context. The trial has provided sufficient justification to further explore more uses of tablet computers in the dementia context, and not just for early-stage dementia. Copyright © 2012 S. Karger AG, Basel.
Extracting spatial information from networks with low-order eigenvectors
NASA Astrophysics Data System (ADS)
Cucuringu, Mihai; Blondel, Vincent D.; Van Dooren, Paul
2013-03-01
We consider the problem of inferring meaningful spatial information in networks from incomplete information on the connection intensity between the nodes of the network. We consider two spatially distributed networks: a population migration flow network within the US, and a network of mobile phone calls between cities in Belgium. For both networks we use the eigenvectors of the Laplacian matrix constructed from the link intensities to obtain informative visualizations and capture natural geographical subdivisions. We observe that some low-order eigenvectors localize very well and seem to reveal small geographically cohesive regions that match remarkably well with political and administrative boundaries. We discuss possible explanations for this observation by describing diffusion maps and localized eigenfunctions. In addition, we discuss a possible connection with the weighted graph cut problem, and provide numerical evidence supporting the idea that lower-order eigenvectors point out local cuts in the network. However, we do not provide a formal and rigorous justification for our observations.
Applied Computational Electromagnetics Society Journal, Volume 9, Number 1, March 1994
1994-03-01
AD-A7 5 I..... * APPLIED COMPUrA77ONAL ELECTROMAGNETICS SOCIETY Journal FjLECTE TI S*...*....March 1994 Vol. 9 No. 1 .... .. .. .ISSN 1054-4887...25.00. REMIT BY: ( 1 ) BANK DRAFTS (MUST BE DRAWN ON U.S. BANK). (2) INTERNATIONAL MONEY ORDER, (3) TRAVELER’S CHECKS IN U.S. DOLLARS, (4) ELECTRONIC...COMPUTATIONAL ELECTROMAGNETICS SOCIETY "Accesion For Joumal NTIS CRAM OTIC TAB Urannounced Justification. March 1994 By ................ Vol. 9 No. 1
Functional expansion representations of artificial neural networks
NASA Technical Reports Server (NTRS)
Gray, W. Steven
1992-01-01
In the past few years, significant interest has developed in using artificial neural networks to model and control nonlinear dynamical systems. While there exists many proposed schemes for accomplishing this and a wealth of supporting empirical results, most approaches to date tend to be ad hoc in nature and rely mainly on heuristic justifications. The purpose of this project was to further develop some analytical tools for representing nonlinear discrete-time input-output systems, which when applied to neural networks would give insight on architecture selection, pruning strategies, and learning algorithms. A long term goal is to determine in what sense, if any, a neural network can be used as a universal approximator for nonliner input-output maps with memory (i.e., realized by a dynamical system). This property is well known for the case of static or memoryless input-output maps. The general architecture under consideration in this project was a single-input, single-output recurrent feedforward network.
Esthetic Education of Children with Special Needs by Means of Computer Art
ERIC Educational Resources Information Center
Salakhov, Rasykh F.; Salakhova, Rada I.; Nasibullov, Ramis R.
2016-01-01
Thematic justification of the problem under study: growth of social stratification in the present context of social and economic transformations and emerging forms of social inequality, which is creating serious obstacles for the younger generation's social adaptation, specifically among those social groups that are dealing with difficulties due…
Apollo LM guidance computer software for the final lunar descent.
NASA Technical Reports Server (NTRS)
Eyles, D.
1973-01-01
In all manned lunar landings to date, the lunar module Commander has taken partial manual control of the spacecraft during the final stage of the descent, below roughly 500 ft altitude. This report describes programs developed at the Charles Stark Draper Laboratory, MIT, for use in the LM's guidance computer during the final descent. At this time computational demands on the on-board computer are at a maximum, and particularly close interaction with the crew is necessary. The emphasis is on the design of the computer software rather than on justification of the particular guidance algorithms employed. After the computer and the mission have been introduced, the current configuration of the final landing programs and an advanced version developed experimentally by the author are described.
Protracted Low-Dose Ionizing Radiation Effects upon Primate Performance
1977-12-01
61 G. Dosimetry ................................ ............. 74 NTiS Whife Sectle ) U A N O U C E D JUSTIFICATION...AECL facility. Standard dosimetry techniques were utilized during radiation expo- sur.. In addition, extensive preexposure calibration was conducted...During each of the epochs, the five basic variables were deter- mined. These calculations were accomplished on an analog computer, Electronics Associates
Reasoning Based Quality Assurance of Medical Ontologies: A Case Study
Horridge, Matthew; Parsia, Bijan; Noy, Natalya F.; Musenm, Mark A.
2014-01-01
The World Health Organisation is using OWL as a key technology to develop ICD-11 – the next version of the well-known International Classification of Diseases. Besides providing better opportunities for data integration and linkages to other well-known ontologies such as SNOMED-CT, one of the main promises of using OWL is that it will enable various forms of automated error checking. In this paper we investigate how automated OWL reasoning, along with a Justification Finding Service can be used as a Quality Assurance technique for the development of large and complex ontologies such as ICD-11. Using the International Classification of Traditional Medicine (ICTM) – Chapter 24 of ICD-11 – as a case study, and an expert panel of knowledge engineers, we reveal the kinds of problems that can occur, how they can be detected, and how they can be fixed. Specifically, we found that a logically inconsistent version of the ICTM ontology could be repaired using justifications (minimal entailing subsets of an ontology). Although over 600 justifications for the inconsistency were initially computed, we found that there were three main manageable patterns or categories of justifications involving TBox and ABox axioms. These categories represented meaningful domain errors to an expert panel of ICTM project knowledge engineers, who were able to use them to successfully determine the axioms that needed to be revised in order to fix the problem. All members of the expert panel agreed that the approach was useful for debugging and ensuring the quality of ICTM. PMID:25954373
Amended FY 1988/1989 Biennial Budget Justification of Estimates Submitted to Congress
1988-02-01
will be installed in order to provide privacy for network data traffic. - Distributed systems technology will continue to be explored, including...techniques and geophysical and satellite data bases to make relevant information rapidly available to the ".fi /./ P ... . C / AMENDED FY 1988/1989...semantic model of available functions and data , %. AMENDED FV 1988/1989 BIENNIAL BUDGET RDT&E DESCRIPTIVE SUMMARY Program Element: fQ1Q0j, Title
General Services Administration: FY 1998 Congressional Justification.
1997-03-20
APPROPRIATIONS: Consumer Information Center CIC GSA InSite STATEMENT OF DAVID J. BARRAM ACTING ADMINISTRATOR, GENERAL SERVICES ADMINISTRATION BEFORE THE...in every area in which we operate. I think three impulses drive us toward change. First, we believe the customer is king. We’re learning what that...really means. We thrill our customers with GSA Advantage!, with less than 2 cents a network minute for long distance on-net telephone service, and
NASA Astrophysics Data System (ADS)
Çağlayan Mercan, Fatih
2012-06-01
This study examines the epistemic beliefs about justification employed by physics undergraduate and graduate students and faculty in the context of solving a standard classical physics problem and a frontier physics problem. Data were collected by a think-aloud problem solving session followed by a semi-structured interview conducted with 50 participants, 10 participants at freshmen, seniors, masters, PhD, and faculty levels. Seven modes of justification were identified and used for exploring the relationships between each justification mode and problem context, and expertise level. The data showed that justification modes were not mutually exclusive and many respondents combined different modes in their responses in both problem contexts. Success on solving the standard classical physics problem was not related to any of the justification modes and was independent of expertise level. The strength of the association across the problem contexts for the authoritative, rational, and empirical justification modes fell in the medium range and for the modeling justification mode fell in the large range of practical significance. Expertise level was not related with the empirical and religious justification modes. The strength of the association between the expertise level and the authoritative, rational, experiential, and relativistic justification modes fell in the medium range, and the modeling justification mode fell in the large range of practical significance. The results provide support for the importance of context for the epistemic beliefs about justification and are discussed in terms of the implications for teaching and learning science.
Considering the pedophile subculture online.
Holt, Thomas J; Blevins, Kristie R; Burkert, Natasha
2010-03-01
The development of the Internet and computer-mediated communications has fostered the growth of a wide range of deviant sexual behaviors along with deviant subcultures that support and approve of these behaviors. Some of these practices pose little risk to public safety, though acts such as pedophilia and the creation and distribution of child pornography have significant negative ramifications for victims. A growing literature has examined the function of the Internet for child pornography distribution, social networks of pedophiles, and tactics of child solicitation. Few, however, have explored the utility of the Internet to develop a subculture of pedophiles and its role in fostering attitudes and justifications for relationships with children. This study will explore the subcultural norms and enculturation of the pedophile community using a qualitative analysis of five Web forums run by and for pedophiles. The findings suggest that the values of the pedophile culture support and encourage emotional and, in some cases, sexual relationships with boys and girls in virtual and real settings. Implications for the study of pedophiles and the role of the Internet are explored.
Saving Face While Geeking Out: Video Game Testing as a Justification for Learning Computer Science
ERIC Educational Resources Information Center
DiSalvo, Betsy; Guzdial, Mark; Bruckman, Amy; McKlin, Tom
2014-01-01
Why would individuals who are capable of learning opt not to? Learning is important for stability and success. It would seem rational that students in groups that are frequently underrepresented or marginalized would be motivated to learn. However, negotiation of multiple identities and self-beliefs can impact motivations to learn. For example,…
The justification of mathematical statements.
Swinnerton-Dyer, Peter
2005-10-15
The uncompromising ethos of pure mathematics in the early post-war period was that any theorem should be provided with a proof which the reader could and should check. Two things have made this no longer realistic: (i) the appearance of increasingly long and complicated proofs and (ii) the involvement of computers. This paper discusses what compromises the mathematical community needs to make as a result.
Zoetelief, J; Faulkner, K
2008-01-01
The past two decades have witnessed a technologically driven revolution in radiology. At the centre of these developments has been the use of computing. These developments have also been driven by the introduction of new detector and imaging devices in radiology and nuclear medicine, as well as the widespread application of computing techniques to enhance and extract information within the images acquired. Further advances have been introduced into digital practice. These technological developments, however, have not been matched by justification and optimisation studies to ensure that these new imaging devices and techniques are as effective as they might be, or performed at the lowest possible dose. The work programme of the SENTINEL Coordination Action was subdivided into eight work packages: functional performance and standards; efficacy and safety in digital radiology, dentistry and nuclear medicine, cardiology, interventional radiology, population screening/sensitive groups; justification, ethics and efficacy; good practice guidance and training; and project management. The intention of the work programme was to underwrite the safety, efficacy and ethical aspects of digital practice as well as to protect and add value to the equipment used in radiology.
Justification of radiographic examinations: What are the key issues?
Vom, Jason; Williams, Imelda
2017-09-01
Justification of radiographic examinations is the practice of evaluating requested radiological examinations to assess for clinical merit and appropriateness based on clinical notes and patient information. This implies that justification in radiography requires the evaluation of requested examinations, the justification of exposures being applied and determining whether patients fit the recommended criteria for the procedure. Medico-legal requirements by the professional registration body, the Medical Radiation Practice Board of Australia (MRPBA), identify justification as an advocated and obligatory practice for radiographers. Yet, justification remains an inconsistent practice implemented amongst Australian radiographers. This review aims to identify associated barriers inhibiting the consistent practice of justification and the hesitance by radiographers in practicing justification responsibilities. It also recommends a change in workplace culture which encourages radiographers to accept a more autonomous role that cultivates critical thinking, reflection and research-informed decision making as justification will ultimately benefit patients. © 2017 The Authors. Journal of Medical Radiation Sciences published by John Wiley & Sons Australia, Ltd on behalf of Australian Society of Medical Imaging and Radiation Therapy and New Zealand Institute of Medical Radiation Technology.
Influence of computational domain size on the pattern formation of the phase field crystals
NASA Astrophysics Data System (ADS)
Starodumov, Ilya; Galenko, Peter; Alexandrov, Dmitri; Kropotin, Nikolai
2017-04-01
Modeling of crystallization process by the phase field crystal method (PFC) represents one of the important directions of modern computational materials science. This method makes it possible to research the formation of stable or metastable crystal structures. In this paper, we study the effect of computational domain size on the crystal pattern formation obtained as a result of computer simulation by the PFC method. In the current report, we show that if the size of a computational domain is changed, the result of modeling may be a structure in metastable phase instead of pure stable state. The authors present a possible theoretical justification for the observed effect and provide explanations on the possible modification of the PFC method to account for this phenomenon.
Approach to implementing a DICOM network: incorporate both economics and workflow adaptation
NASA Astrophysics Data System (ADS)
Beaver, S. Merritt; Sippel-Schmidt, Teresa M.
1995-05-01
This paper describes an approach to aide in the decision-making process for the justification and design of a digital image and information management system. It identifies key technical and clinical issues that need to be addressed by a healthcare institution during this process. Some issues identified here are very controversial and may take months or years for a department to determine solutions which meet their specific staffing, financial, and technical needs.
A Pragmatic LDI Operational Network Model for Pakistan
NASA Astrophysics Data System (ADS)
Sheikh, Roshan; Mirza, Zahir Abbas
2008-10-01
This paper describes some common components of contemporary designs for the Long Distance & International (LDI) License in Pakistan and identifies critical aspects needed to implement a commercial LDI network in any developing country like Pakistan. An extensive study is carried out to evaluate various methods through which a carrier can receive and transmit voice traffic and identify their respective merits and demerits. Deficiencies which can harm the growth of telecom market in Pakistan and which require redress by the Pakistan Telecommunication Authority (PTA) are highlighted. A pragmatic model is proposed which takes into consideration, the constraints of Pakistan Telecommunication market. The paper concludes that the proposed model be incorporated with specific suggestions and economic justifications.
Woo, E H C; White, P; Lai, C W K
2016-03-01
This paper presents an overview of global ergonomics standards and guidelines for design of computer workstations, with particular focus on their inconsistency and associated health risk impact. Overall, considerable disagreements were found in the design specifications of computer workstations globally, particularly in relation to the results from previous ergonomics research and the outcomes from current ergonomics standards and guidelines. To cope with the rapid advancement in computer technology, this article provides justifications and suggestions for modifications in the current ergonomics standards and guidelines for the design of computer workstations. Practitioner Summary: A research gap exists in ergonomics standards and guidelines for computer workstations. We explore the validity and generalisability of ergonomics recommendations by comparing previous ergonomics research through to recommendations and outcomes from current ergonomics standards and guidelines.
System Justification, Mental Health, and Behavior Among Disadvantaged Mothers and Their Children
Godfrey, Erin B.
2014-01-01
Integrating social psychological research with work in child development, this study explored relationships between system justification (Jost & Banaji, 1994), maternal mental health and child externalizing behavior among low-income immigrants and racial/ethnic minorities. Dominican, Mexican and African-American families (N = 239) were assessed when children were 14-, 24- and 36-months old. SEM was used to explore longitudinal relationships between maternal system justification and mental health and associations with child behavior. Earlier mental health was negatively related to later system justification and system justification was negatively related to children’s externalizing behavior. Implications for system justification theory, child development and immigration are discussed. PMID:25035527
48 CFR 2406.304 - Approval of the justification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Approval of the justification. 2406.304 Section 2406.304 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN... 2406.304 Approval of the justification. (c) A class justification for other than full and open...
48 CFR 1306.303-70 - Documentation and legal review of justifications.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Documentation and legal review of justifications. 1306.303-70 Section 1306.303-70 Federal Acquisition Regulations System... Competition 1306.303-70 Documentation and legal review of justifications. The justification for providing for...
13 CFR 130.460 - Budget justification.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Budget justification. 130.460... CENTERS § 130.460 Budget justification. The SBDC Director, as a part of the renewal application, or the... submit to the SBA Project Officer the budget justification for the upcoming budget period. The budget...
Justification of Estimates for Fiscal Year 1983 Submitted to Congress.
1982-02-01
hierarchies to aid software production; completion of the components of an adaptive suspension vehicle including a storage energy unit, hydraulics, laser...and corrosion (long storage times), and radiation-induced breakdown. Solid- lubricated main engine bearings for cruise missile engines would offer...environments will cause "soft error" (computational and memory storage errors) in advanced microelectronic circuits. Research on high-speed, low-power
Increasing profitability through computerization.
Sokol, D J
1988-01-01
The author explores the pragmatic or financial justification for computerizing a dental practice and discusses a computerized approach to precollection and collection for the dental office. The article also deals with the use of computerized correspondence to augment the recall policy of the office and to help generate new patient referrals and discusses the pros and cons of utilizing a dental computer service bureau in implementing these policies.
Investment Justification of Robotic Technology in Aerospace Manufacturing. User’s Manual
1984-10-01
assessing the economic attractiveness of investments in robotics and/or flexible manufacturing systems (FMS). It models the cash flows...relative. 5. RIDM assesses the inherent economic attractiveness of robotic/FMS implementation. The model is based on real economic events and not...provided for an optional analysis of state and local tax impacts, to be custom designed by the user. (2) Computation of Depreciation
MIPS: The good, the bad and the useful
NASA Technical Reports Server (NTRS)
Richardson, Jerry K.
1987-01-01
Many authors are critical of the use of MIPS (Millions of Instructions per Second) as a measure of computer power. Some feel that MIPS are meaningless. While there is justification for some of the criticism of MIPS, sometimes the criticism is carried too far. MIPS can be a useful number for planning and estimating purposes when used in a homogeneous computer environmnet. Comparisons between published MIPS ratings and benchmark results reveal that there does exist a high positive correlation between MIPS and tested performance, given a homogeneous computer environment. MIPS should be understood so as not to be misused. It is not correct that the use of MIPS is always inappropriate or inaccurate
Chiaburu, Dan S; Harris, T Brad; Smith, Troy A
2014-01-01
We integrate system justification and social role theory to explain how observers' system justification and target employees' gender interact to predict observers' expectations of targets' sportsmanship citizenship behaviors. In contrast with social role theory predictions, observers did not expect greater levels of sportsmanship from women compared to men. Yet observers expected more sportsmanship from women (a) when observers were ideologically motivated by gender-specific beliefs (gender-specific system justification; Study 1) and (b) when system justification was cued experimentally (Study 2). A heretofore-unexamined aspect, observers' ideology, modifies their expectations of sportsmanship citizenship across target genders. This has implications for system justification, social role, and organizational citizenship theoretical perspectives.
Yancura, Loriena A
2013-01-01
Race has been found to predict justifications for caregiving in family caregivers for older adults. However, little is known about this relationship in another type of family caregiver, Grandparents Raising Grandchildren (GRG). This study examined relationships between race and justifications for caregiving in Asian American, Native Hawaiian, and White GRG. A sample of 259 GRG registered as students' primary caregivers with a public school system completed a modified version of the 10-item Cultural Justifications for Caregiving (CJCG) scale. CJCG items did not load onto a single analytic factor. Two factors, custom and responsibility, emerged. Race was predictive of custom, with Native Hawaiian GRG having significantly higher scores than White or Asian American GRG. Native Hawaiian GRG also scored higher than Asian American, but not White, GRG on responsibility. Justifications for raising grandchildren appear to differ among groups based on racial identification. Findings elucidate cultural justification for caregiving in understudied GRG populations and suggest that justifications for caregiving are configured differently in GRG and family caregivers for older adults. Future studies should examine justifications for caregiving in GRG of other races.
Kyratzis, Amy; Ross, Tamara Shuqum; Koymen, S Bahar
2010-01-01
Children are believed to construct their causal theories through talk and interaction, but with the exception of a few studies, little or nothing is known about how young children justify and build theories of the world together with same-age peers through naturally occurring interaction, Children's sensitivity to when a pair or group of interlocutors who interact frequently together feel that a justification is needed, is an index of developing pragmatic competence (Goetz & Shatz, 1999) and may be influenced by interactive goals and gender identity positioning. Studies suggest that salient contexts for justifications for young children are disagreement and control (e.g. Veneziano & Sinclair, 1995) but researchers have been less recognizant of 'situations in which partners verbally assist in the construction of justifications as a means to maintain contact or create solidarity' (Goetz & Shatz, 1999: 722) as contexts for justifications. The present study examined the spontaneously produced justification constructions in the naturally occurring free play of five friendship groups of preschool-aged children (aged from 3 ; 6 to 5 ; 4), in terms of the motivating context of the justification, marking of the causal relationship with a connective, and causal theories accessed in the talk. Partner expansion (validating justifications) was a salient motivating context for justifications, especially in the talk of friendship groups of girls, and seemed to privilege greater marking of the causal relationship with a connective and less arbitrary reasoning. One group of girls varied their use of validating justifications depending on the theme of play. Results are discussed in terms of the implications of use of validating justifications for children's causal theory building with peers, linguistic development, and pragmatic development.
Error analysis for a spaceborne laser ranging system
NASA Technical Reports Server (NTRS)
Pavlis, E. C.
1979-01-01
The dependence (or independence) of baseline accuracies, obtained from a typical mission of a spaceborne ranging system, on several factors is investigated. The emphasis is placed on a priori station information, but factors such as the elevation cut-off angle, the geometry of the network, the mean orbital height, and to a limited extent geopotential modeling are also examined. The results are obtained through simulations, but some theoretical justification is also given. Guidelines for freeing the results from these dependencies are suggested for most of the factors.
The analysis of social network data: an exciting frontier for statisticians.
O'Malley, A James
2013-02-20
The catalyst for this paper is the recent interest in the relationship between social networks and an individual's health, which has arisen following a series of papers by Nicholas Christakis and James Fowler on person- to-person spread of health behaviors. In this issue, they provide a detailed explanation of their methods that offers insights, justifications, and responses to criticisms. In this paper, we introduce some of the key statistical methods used in social network analysis and indicate where those used by Christakis and Fowler (CF) fit into the general framework. The intent is to provide the background necessary for readers to be able to make their own evaluation of the work by CF and understand the challenges of research involving social networks. We entertain possible solutions to some of the difficulties encountered in accounting for confounding effects in analyses of peer effects and provide comments on the contributions of CF. Copyright © 2012 John Wiley & Sons, Ltd.
Functional model of biological neural networks.
Lo, James Ting-Ho
2010-12-01
A functional model of biological neural networks, called temporal hierarchical probabilistic associative memory (THPAM), is proposed in this paper. THPAM comprises functional models of dendritic trees for encoding inputs to neurons, a first type of neuron for generating spike trains, a second type of neuron for generating graded signals to modulate neurons of the first type, supervised and unsupervised Hebbian learning mechanisms for easy learning and retrieving, an arrangement of dendritic trees for maximizing generalization, hardwiring for rotation-translation-scaling invariance, and feedback connections with different delay durations for neurons to make full use of present and past informations generated by neurons in the same and higher layers. These functional models and their processing operations have many functions of biological neural networks that have not been achieved by other models in the open literature and provide logically coherent answers to many long-standing neuroscientific questions. However, biological justifications of these functional models and their processing operations are required for THPAM to qualify as a macroscopic model (or low-order approximate) of biological neural networks.
The Effects of General System Justification on Corruption Perception and Intent
Tan, Xuyun; Liu, Li; Huang, Zhenwei; Zheng, Wenwen; Liang, Yuan
2016-01-01
Previous research stresses that system justifying belief can weaken corruption perception, by this possibly fostering unjust behaviors. However, general results of the effect of general system justification on corruption are ambiguous, indicating also a lessening impact. We conducted a line of studies trying to elucidate these circumstances by testing the effect of general system justification on corruption perception and intention. In addition, we explored institutional trust as a possible mediator in this process. For this purpose, we conducted three studies. The first two studies examined the association between general system justification and corruption. In Study 1, a correlational design was run using questionnaires to assess the relation between general system justification and corruption perception as well as corruption intention. In Study 2, an experimental design was conducted manipulating general system justification via exposure to high or low system threat condition, then measuring its effect on corruption perception and corrupt intention. In Study 3, two sub-studies using correlational and experimental designs were run to explore the mediating role of institutional trust, respectively. Results replicated former studies showing that general system justification is negatively associated with corruption perception. However, they also showed a negative correlation with corrupt intention. Furthermore, they showed that institutional trust mediated the relation between general system justification and corruption. We suggest to consider these findings to further elucidate the psychological basis underlying different effects of general system justification on human behaviors. PMID:27507954
The Effects of General System Justification on Corruption Perception and Intent.
Tan, Xuyun; Liu, Li; Huang, Zhenwei; Zheng, Wenwen; Liang, Yuan
2016-01-01
Previous research stresses that system justifying belief can weaken corruption perception, by this possibly fostering unjust behaviors. However, general results of the effect of general system justification on corruption are ambiguous, indicating also a lessening impact. We conducted a line of studies trying to elucidate these circumstances by testing the effect of general system justification on corruption perception and intention. In addition, we explored institutional trust as a possible mediator in this process. For this purpose, we conducted three studies. The first two studies examined the association between general system justification and corruption. In Study 1, a correlational design was run using questionnaires to assess the relation between general system justification and corruption perception as well as corruption intention. In Study 2, an experimental design was conducted manipulating general system justification via exposure to high or low system threat condition, then measuring its effect on corruption perception and corrupt intention. In Study 3, two sub-studies using correlational and experimental designs were run to explore the mediating role of institutional trust, respectively. Results replicated former studies showing that general system justification is negatively associated with corruption perception. However, they also showed a negative correlation with corrupt intention. Furthermore, they showed that institutional trust mediated the relation between general system justification and corruption. We suggest to consider these findings to further elucidate the psychological basis underlying different effects of general system justification on human behaviors.
Man-Machine Interaction: Operator.
1984-06-01
EASTER OF SCIENCI I COMPUTER SCIENCE Justification from the Distribution/ Availability Codes NAVal POSTGBADUATE SCHOOL Avail and/or June 1984 Dlst...Few pecple, if any, remember everything they see or hear but an anazingly large amount of material can be recalled years after it has been acquired...and skill, learning takes tine. The time required for the learning process will generally vary with the coaplexity of the material cr task he is
Optimizing the African VLBI Network for Astronomy and Geodesy
NASA Astrophysics Data System (ADS)
de Witt, A.; Mayer, D.; MacLeod, G.; Combrinck, L.; Petrov, L.; Nickola, M.
2016-12-01
The African VLBI Network will be a pan-African network of radio telescopes comprised of converted redundant satellite Earth-station antennas and new purpose-built radio telescopes. The first of these antennas, in Ghana, is currently being converted to a radio telescope and current funding is estimated to permit the conversion of two more antennas in Africa. These antennas will initially be equipped with a 5-GHz and 6.7-GHz receiver and the next receiver likely to be fitted is a 1.4-1.7-GHz receiver. While it would be advantageous for the AVN antennas to be able to participate also in geodetic and astrometric VLBI observations, there is no funding currently for this. In this paper we re-visit the scientific justifications for the AVN in an attempt to optimize the AVN for each science case, both astronomical and geodetic.
Brief; Dietz; Cohen; Pugh; Vaslow
2000-01-01
In two experiments, we investigated the effects of prejudice (in the form of modern racism) and business justifications by authority figures (i.e., organizational superiors) to discriminate against minorities (Blacks in our research) in hiring situations. As expected, business justifications by legitimate authority figures led to participants' obedience in the form of discrimination relative to a no-justification condition and, in the second experiment, also relative to a condition in which the business justification came from an illegitimate authority figure. Moreover, in both experiments, as expected, modern racism did not have a main effect on discrimination, but interacted with business justifications such that modern racism predicted discrimination when a legitimate authority figure provided a business-related justification for such discrimination but not in the absence of such a justification. These results are discussed in terms of their theoretical implications for understanding prejudice and obedience to authority in organizations and in terms of their practical implications for addressing the problem of discrimination in the workplace. Copyright 2000 Academic Press.
NASA Astrophysics Data System (ADS)
Herath, Narmada; Del Vecchio, Domitilla
2018-03-01
Biochemical reaction networks often involve reactions that take place on different time scales, giving rise to "slow" and "fast" system variables. This property is widely used in the analysis of systems to obtain dynamical models with reduced dimensions. In this paper, we consider stochastic dynamics of biochemical reaction networks modeled using the Linear Noise Approximation (LNA). Under time-scale separation conditions, we obtain a reduced-order LNA that approximates both the slow and fast variables in the system. We mathematically prove that the first and second moments of this reduced-order model converge to those of the full system as the time-scale separation becomes large. These mathematical results, in particular, provide a rigorous justification to the accuracy of LNA models derived using the stochastic total quasi-steady state approximation (tQSSA). Since, in contrast to the stochastic tQSSA, our reduced-order model also provides approximations for the fast variable stochastic properties, we term our method the "stochastic tQSSA+". Finally, we demonstrate the application of our approach on two biochemical network motifs found in gene-regulatory and signal transduction networks.
Kapucu, Fikret E.; Välkki, Inkeri; Mikkonen, Jarno E.; Leone, Chiara; Lenk, Kerstin; Tanskanen, Jarno M. A.; Hyttinen, Jari A. K.
2016-01-01
Synchrony and asynchrony are essential aspects of the functioning of interconnected neuronal cells and networks. New information on neuronal synchronization can be expected to aid in understanding these systems. Synchronization provides insight in the functional connectivity and the spatial distribution of the information processing in the networks. Synchronization is generally studied with time domain analysis of neuronal events, or using direct frequency spectrum analysis, e.g., in specific frequency bands. However, these methods have their pitfalls. Thus, we have previously proposed a method to analyze temporal changes in the complexity of the frequency of signals originating from different network regions. The method is based on the correlation of time varying spectral entropies (SEs). SE assesses the regularity, or complexity, of a time series by quantifying the uniformity of the frequency spectrum distribution. It has been previously employed, e.g., in electroencephalogram analysis. Here, we revisit our correlated spectral entropy method (CorSE), providing evidence of its justification, usability, and benefits. Here, CorSE is assessed with simulations and in vitro microelectrode array (MEA) data. CorSE is first demonstrated with a specifically tailored toy simulation to illustrate how it can identify synchronized populations. To provide a form of validation, the method was tested with simulated data from integrate-and-fire model based computational neuronal networks. To demonstrate the analysis of real data, CorSE was applied on in vitro MEA data measured from rat cortical cell cultures, and the results were compared with three known event based synchronization measures. Finally, we show the usability by tracking the development of networks in dissociated mouse cortical cell cultures. The results show that temporal correlations in frequency spectrum distributions reflect the network relations of neuronal populations. In the simulated data, CorSE unraveled the synchronizations. With the real in vitro MEA data, CorSE produced biologically plausible results. Since CorSE analyses continuous data, it is not affected by possibly poor spike or other event detection quality. We conclude that CorSE can reveal neuronal network synchronization based on in vitro MEA field potential measurements. CorSE is expected to be equally applicable also in the analysis of corresponding in vivo and ex vivo data analysis. PMID:27803660
Diabat Interpolation for Polymorph Free-Energy Differences.
Kamat, Kartik; Peters, Baron
2017-02-02
Existing methods to compute free-energy differences between polymorphs use harmonic approximations, advanced non-Boltzmann bias sampling techniques, and/or multistage free-energy perturbations. This work demonstrates how Bennett's diabat interpolation method ( J. Comput. Phys. 1976, 22, 245 ) can be combined with energy gaps from lattice-switch Monte Carlo techniques ( Phys. Rev. E 2000, 61, 906 ) to swiftly estimate polymorph free-energy differences. The new method requires only two unbiased molecular dynamics simulations, one for each polymorph. To illustrate the new method, we compute the free-energy difference between face-centered cubic and body-centered cubic polymorphs for a Gaussian core solid. We discuss the justification for parabolic models of the free-energy diabats and similarities to methods that have been used in studies of electron transfer.
Peer review of RELAP5/MOD3 documentation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craddick, W.G.
1993-12-31
A peer review was performed on a portion of the documentation of the RELAP5/MOD3 computer code. The review was performed in two phases. The first phase was a review of Volume 3, Developmental Assessment problems, and Volume 4, Models and Correlations. The reviewers for this phase were Dr. Peter Griffith, Dr. Yassin Hassan, Dr. Gerald S. Lellouche, Dr. Marino di Marzo and Mr. Mark Wendel. The reviewers recommended a number of improvements, including using a frozen version of the code for assessment guided by a validation plan, better justification for flow regime maps and extension of models beyond their datamore » base. The second phase was a review of Volume 6, Quality Assurance of Numerical Techniques in RELAP5/MOD3. The reviewers for the second phase were Mr. Mark Wendel and Dr. Paul T. Williams. Recommendations included correction of numerous grammatical and typographical errors and better justification for the use of Lax`s Equivalence Theorem.« less
2003-11-01
standardizing within subject. So these initial data , at least, support the conceptualization of expertise being associated with decreased variance...correlated .96, and the cadet scores computed using those two standards correlated 1.00. Similar results were found by analyzing the data for the...Intelligence Workshop Volume 2, Part 2: Related Constructs 6 Justification of Aggressive Behavior With this cognitive mindset, prosocial individuals
1988-01-24
vanes.-The new facility is currently being called the Engine Blade/ Vape Facility (EB/VF). There are three primary goals in automating this proc..e...earlier, the search led primarily into the areas of CIM Justification, Automation Strategies , Performance Measurement, and Integration issues. Of...of living, has been steadily eroding. One dangerous trend that has developed in keenly competitive world markets , says Rohan [33], has been for U.S
Theological reflections on the ethics of pain control among the terminally ill.
Purdy, W
1992-01-01
Explores the reality of pain thru explications of the theological notions of "justification by pain," "justification by death," and "justification by faith." Notes particularly the facilitating role of the hospital chaplain in the understanding of pain and its possible Christian meanings.
Wheeler, Melissa A; Laham, Simon M
2016-09-01
Morality is inherently social, yet much extant work in moral psychology ignores the central role of social processes in moral phenomena. To partly address this, this article examined the content of persuasive moral communication-the way people justify their moral attitudes in persuasive contexts. Across two studies, we explored variation in justification content (deontological, consequentialist, or emotive) as a function of moral foundations. Using justification selection techniques (Study 1) and open-ended justification production (Study 2), results demonstrate a preference (a) for deontological appeals in justifications for the sanctity foundation, (b) for consequentialist appeals for the individualizing foundations (care and fairness), and (c) for emotive appeals in justifications for the binding foundations (loyalty, authority and sanctity). The present research questions the generality of inferences about the primacy of emotions/intuition in moral psychology research and highlights the important role of reasons in persuasive moral communication. © 2016 by the Society for Personality and Social Psychology, Inc.
Doing the Math: Supporting Student Justifications
ERIC Educational Resources Information Center
James, Carolyn; Philiben, Lyn; Knievel, Molly
2016-01-01
Teachers have found that engaging students in justification can help students deepen and retain mathematical knowledge, gain a greater sense of ownership over the material, and improve communication and representation skills (Staples, Bartlo, and Thanheiser 2012). Student engagement in a justification activity can also lead to more equitable…
16 CFR 240.15 - Cost justification.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Cost justification. 240.15 Section 240.15 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR ADVERTISING ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.15 Cost justification. It is no defense to a...
Historical Perspectives in Marketing Education: Justification and Implementation
ERIC Educational Resources Information Center
Petkus, Ed, Jr.
2010-01-01
This article provides a justification and an implementation plan for the establishment of a historical orientation across the undergraduate marketing curriculum. The justification for the historical perspective addresses three areas: tapping into the extensive body of knowledge in marketing history, practical implications, and critical thinking.…
48 CFR 806.304 - Approval of the justification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... justification. 806.304 Section 806.304 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS COMPETITION AND ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 806.304....304(c), Table 806.304-1 provides the authorities who may approve a justification: Table 806.304.1...
48 CFR 2806.304 - Approval of the justification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... justification. 2806.304 Section 2806.304 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE Competition and Acquisition Planning COMPETITION REQUIREMENTS Other Than Full and Open Competition 2806.304...) Pursuant to FAR 6.304(c), a class justification for other than full and open competition shall be approved...
Undergraduate Students' Justifications for Source Selection in a Digital Academic Context
ERIC Educational Resources Information Center
List, Alexandra; Grossnickle, Emily M.; Alexander, Patricia A.
2016-01-01
To complete any academic tasks using information from the Internet, undergraduate students first have to select the appropriate sources. However, the types of justifications that undergraduates provide for source selection and how these justifications may be impacted by task characteristics have been underexamined. This study explored…
48 CFR 2406.304-70 - Approval of the justification-field procurements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Other Than Full and Open Competition 2406.304-70 Approval of the justification—field procurements. (a) The justification for other than full and open competition for field procurements shall be approved in... justification-field procurements. 2406.304-70 Section 2406.304-70 Federal Acquisition Regulations System...
Orue, Izaskun; Calvete, Esther
2012-02-01
The aim of this study was to evaluate the mediating role of the justification of violence schema in the relationship between exposure to violence and reactive and proactive aggressive behavior. We differentiated between direct and indirect exposure in four contexts: home, neighborhood, school and TV. A total of 675 children, aged between 8 and 12 years, participated in the study. They answered questionnaires about exposure to violence, justification of violence, and proactive and reactive aggressive behavior in two waves six months apart. The results showed that witnessing violence at home and on TV predicted aggressive behavior, and this relationship was mediated by the justification of violence. Victimization in all contexts predicted aggressive behavior and this relationship was generally mediated by the justification of violence.
Khalid, Ruzelan; Nawawi, Mohd Kamal M; Kawsar, Luthful A; Ghani, Noraida A; Kamil, Anton A; Mustafa, Adli
2013-01-01
M/G/C/C state dependent queuing networks consider service rates as a function of the number of residing entities (e.g., pedestrians, vehicles, and products). However, modeling such dynamic rates is not supported in modern Discrete Simulation System (DES) software. We designed an approach to cater this limitation and used it to construct the M/G/C/C state-dependent queuing model in Arena software. Using the model, we have evaluated and analyzed the impacts of various arrival rates to the throughput, the blocking probability, the expected service time and the expected number of entities in a complex network topology. Results indicated that there is a range of arrival rates for each network where the simulation results fluctuate drastically across replications and this causes the simulation results and analytical results exhibit discrepancies. Detail results that show how tally the simulation results and the analytical results in both abstract and graphical forms and some scientific justifications for these have been documented and discussed.
Archer, Charles J; Faraj, Ahmad A; Inglett, Todd A; Ratterman, Joseph D
2013-04-16
Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selected link to the adjacent compute node connected to the compute node through the selected link.
Requirements for Next Generation Comprehensive Analysis of Rotorcraft
NASA Technical Reports Server (NTRS)
Johnson, Wayne; Data, Anubhav
2008-01-01
The unique demands of rotorcraft aeromechanics analysis have led to the development of software tools that are described as comprehensive analyses. The next generation of rotorcraft comprehensive analyses will be driven and enabled by the tremendous capabilities of high performance computing, particularly modular and scaleable software executed on multiple cores. Development of a comprehensive analysis based on high performance computing both demands and permits a new analysis architecture. This paper describes a vision of the requirements for this next generation of comprehensive analyses of rotorcraft. The requirements are described and substantiated for what must be included and justification provided for what should be excluded. With this guide, a path to the next generation code can be found.
Gooldin, Sigal
2013-04-01
Consumption rates of assisted reproductive technologies (ARTs) in Israel is internationally unprecedented, a phenomenon that has been the subject of growing anthropological and sociological attention. Explanations for the singular extent of ARTs use in Israel tend to pre-assume and conceptually prioritize the symbolic and political power of pro-natalist discourses, Jewish religious values, and the demographic interests of the Jewish state. This article attempts to understand the exceptional usage of IVF in Israel in terms of its emergent meanings and unexpected effects in a particular local setup. The question that this article tries to answer is: How is the 'Israeli character' of IVF emerges within and through the interactive practice of moral justifications, and how might this medical technology affect the networks within which it is enmeshed? The article is based on a case-study analysis of a public dispute that took place in 2003-2004 over the extent of public funding for fertility treatments. Ethnographic analysis of parliament discussions, media coverage, and an online forum of IVF consumers recorded three frames of justification for the uniquely generous public funding scheme of IVF in Israel: 'rational-economic', 'nationalist', and 'liberal'. The latter assumes shared 'emotional vulnerability' of all 'childless' Israelis, Jews and Arabs alike and advocates a universal language of 'emotional rights' and 'human rights'. This liberal framing of IVF, which is the most persuasive justification in the dispute, blurs dichotomous rivalries between Jews and Arabs and generates a potential for alliances between traditionally rival sectors. These are some of the unexpected and non-intuitive consequences of ARTs in Israel. Copyright © 2013 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Archer, Charles J.; Faraj, Daniel A.; Inglett, Todd A.
Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selectedmore » link to the adjacent compute node connected to the compute node through the selected link.« less
Students' Problem Solving and Justification
ERIC Educational Resources Information Center
Glass, Barbara; Maher, Carolyn A.
2004-01-01
This paper reports on methods of students' justifications of their solution to a problem in the area of combinatorics. From the analysis of the problem solving of 150 students in a variety of settings from high-school to graduate study, four major forms of reasoning evolved: (1) Justification by Cases, (2) Inductive Argument, (3) Elimination…
Student Perceptions of Justification in Two Disparate Domains: Education and Biology
ERIC Educational Resources Information Center
Dawson, Christi L.; Hennessey, Maeghan N.; Higley, Kelli
2016-01-01
This study investigated the perceptions of epistemic justification of students in two disparate domains of study to determine if any similarities and differences in their methods of justification exist. Two samples of students, or a total of 513 undergraduates from educational psychology (n = 193) and biology (n = 320) courses, completed a…
College Students; Justification for Digital Piracy: A Mixed Methods Study
ERIC Educational Resources Information Center
Yu, Szde
2012-01-01
A mixed methods project was devoted to understanding college students' justification for digital piracy. The project consisted of two studies, a qualitative one and a quantitative one. Qualitative interviews were conducted to identify main themes in students' justification for digital piracy, and then the findings were tested in a quantitative…
The Development of Justifications for Moral Judgements.
ERIC Educational Resources Information Center
Langford, Peter E.; Claydon, Leslie F.
This document reports on two studies that used a novel approach to categorize justifications for moral judgments made by Australian subjects from 7 to 15 and from 7 to 21 years of age. The coding categories consisted of levels of abstraction and reflection. Level of abstraction was determined by the reference group used in justifications. Levels…
ERIC Educational Resources Information Center
Holmes, Dan
This document presents a justification, proposal, and implementation plan for a comprehensive theatre arts program at Badger High School, Lake Geneva, Wisconsin that would offer a full schedule of amateur and professional arts programs involving the students and the community. The brief Justification section notes that every elementary and…
ERIC Educational Resources Information Center
Yan, Jing
2016-01-01
Explanation and justification require cognitive ability which selects and organises relevant information in a logical way, and linguistic ability which enables speakers to encode the information with linguistic knowledge. This study aims to investigate the development of Chinese oral explanation and justification in Singapore primary students. The…
R. S. Peters' "The Justification of Education" Revisited
ERIC Educational Resources Information Center
Cuypers, Stefaan E.
2012-01-01
In his 1973 paper "The Justification of Education" R. S. Peters aspired to give a non-instrumental justification of education. Ever since, his so-called "transcendental argument" has been under attack and most critics conclude that it does not work. They have, however, thrown the baby away with the bathwater, when they furthermore concluded that…
Vargas-Salfate, Salvador; Paez, Dario; Liu, James H; Pratto, Felicia; Gil de Zúñiga, Homero
2018-07-01
This study tests specific competing hypotheses from social dominance theory/realistic conflict theory (RCT) versus system justification theory about the role of social status. In particular, it examines whether system justification belief and effects are stronger among people with low socioeconomic status, and in less socially developed and unequal nations than among better-off people and countries. A cross-national survey was carried out in 19 nations from the Americas, Western and Eastern Europe, Asia, and Oceania using representative online samples ( N = 14,936, 50.15% women, M age = 41.61 years). At the individual level, system justification beliefs, right-wing authoritarianism, social dominance orientation, national identification, sociopolitical conservatism, sex, age, and social status were measured. At the national level, the human development index and the Gini index were used. Multilevel analyses performed indicated that results fit better with the social dominance/RCT approach, as system justification was higher in high-status and developed nations; further, associations between legitimizing ideologies and system justification were stronger among high-status people.
On sanction-goal justifications: How and why deterrence justifications undermine rule compliance.
Mooijman, Marlon; van Dijk, Wilco W; van Dijk, Eric; Ellemers, Naomi
2017-04-01
Authorities frequently justify their sanctions as attempts to deter people from rule breaking. Although providing a sanction justification seems appealing and harmless, we propose that a deterrence justification decreases the extent to which sanctions are effective in promoting rule compliance. We develop a theoretical model that specifies how and why this occurs. Consistent with our model, 5 experiments demonstrated that-compared with sanctions provided without a justification or sanctions provided with a just-deserts justification-sanction effectiveness decreased when sanctions were justified as attempts to deter people from rule breaking. This effect was mediated by people feeling distrusted by the authority. We further demonstrated that (a) the degree to which deterrence fostered distrust was attenuated when the sanction was targeted at others (instead of the participant) and (b) the degree to which distrust undermined rule compliance was attenuated when the authority was perceived as legitimate. We discuss the practical implications for authorities tasked with promoting rule compliance, and the theoretical implications for the literature on sanctions, distrust, and rule compliance. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Research in Parallel Computing: 1987-1990
1994-08-05
emulation, we layered UNIX BSD 4.3 functionality above the kernel primitives, but packaged both as a monolithic unit running in privileged state. This...further, so that only a "pure kernel " or " microkernel " runs in privileged mode, while the other components of the environment execute as one or more client... kernel DTIC TAB 24 2.2.2 Nectar’s communication software Unannounced 0 25 2.2.3 A Nectar programming interface Justification 25 2.3 System evaluation 26
Future prospects for gamma-ray
NASA Technical Reports Server (NTRS)
Fichtel, C.
1980-01-01
Astrophysical phenomena discussed are: the very energetic and nuclear processes associated with compact objects; astrophysical nucleo-synthesis; solar particle acceleration; the chemical composition of the planets and other bodies of the solar system; the structure of our galaxy; the origin and dynamic pressure effects of the cosmic rays; the high energy particles and energetic processes in other galaxies, especially active ones; and the degree of matter antimater symmetry of the universe. The gamma ray results of GAMMA-I, the gamma ray observatory, the gamma ray burst network, solar polar, and very high energy gamma ray telescopes on the ground provide justification for more sophisticated telescopes.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Are there special types of surplus property that require written justification when submitting a transfer request? 102-37.220... types of surplus property that require written justification when submitting a transfer request? Yes, a...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Are there special types of surplus property that require written justification when submitting a transfer request? 102-37.220... types of surplus property that require written justification when submitting a transfer request? Yes, a...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Are there special types of surplus property that require written justification when submitting a transfer request? 102-37.220... types of surplus property that require written justification when submitting a transfer request? Yes, a...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Are there special types of surplus property that require written justification when submitting a transfer request? 102-37.220... types of surplus property that require written justification when submitting a transfer request? Yes, a...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Are there special types of surplus property that require written justification when submitting a transfer request? 102-37.220... types of surplus property that require written justification when submitting a transfer request? Yes, a...
Code of Federal Regulations, 2010 CFR
2010-07-01
... convenience of an employee considered sufficient justification to authorize home-to-work transportation? 102-5...-to-Work Transportation § 102-5.95 Is the comfort and/or convenience of an employee considered sufficient justification to authorize home-to-work transportation? No, the comfort and/or convenience of an...
30 CFR 203.85 - What is in an economic viability and relief justification report?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 30 Mineral Resources 2 2012-07-01 2012-07-01 false What is in an economic viability and relief... Sulfur General § 203.85 What is in an economic viability and relief justification report? This report... economic viability and relief justification report must contain the following items for an oil and gas...
30 CFR 203.85 - What is in an economic viability and relief justification report?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 30 Mineral Resources 2 2013-07-01 2013-07-01 false What is in an economic viability and relief... Sulfur General § 203.85 What is in an economic viability and relief justification report? This report... economic viability and relief justification report must contain the following items for an oil and gas...
30 CFR 203.85 - What is in an economic viability and relief justification report?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 30 Mineral Resources 2 2014-07-01 2014-07-01 false What is in an economic viability and relief... Sulfur General § 203.85 What is in an economic viability and relief justification report? This report... economic viability and relief justification report must contain the following items for an oil and gas...
30 CFR 203.85 - What is in an economic viability and relief justification report?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 30 Mineral Resources 2 2010-07-01 2010-07-01 false What is in an economic viability and relief... Required Reports § 203.85 What is in an economic viability and relief justification report? This report... economic viability and relief justification report must contain the following items for an oil and gas...
ERIC Educational Resources Information Center
Staples, Megan E.; Bartlo, Joanna; Thanheiser, Eva
2012-01-01
Justification is a core mathematics practice. Although the purposes of justification in the mathematician community have been studied extensively, we know relatively little about its role in K-12 classrooms. This paper documents the range of purposes identified by 12 middle grades teachers who were working actively to incorporate justification…
ERIC Educational Resources Information Center
Tiryaki, Esra Nur
2017-01-01
The purpose of this research is to identify discourse markers used in justification types in Turkish language teacher candidates' argumentative texts. Survey model was used since it was aimed to determine the categories into which support and refutation justifications are split and to identify the discourse markers which express these categories.…
Non-harmful insertion of data mimicking computer network attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee
Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.
Definitions and outlook targeting x-ray exposure of patients in diagnostic imaging
NASA Astrophysics Data System (ADS)
Regulla, Dieter F.
2011-03-01
Computer tomography (CT) is vital and currently irreplaceable in diagnostic radiology. But CT operates with ionizing radiation which may cause cancer or non-cancer diseases in humans. The degree of radiation impact depends on the dose administered by an investigation. And this is the core issue: Even CT exams executed lege artis, administer doses to patients which by magnitude are far beyond the level of hitherto known doses of conventional film-screen techniques. Patients undergoing one or multiple CT examinations, digital angiographies or interventions will be exposed to effective doses between roughly several mSv and several 100 mSv depending on type and frequency of the diagnostic investigations. From the radiation protection point of view, there is therefore the worldwide problem of formulating firm rules for the control of these high-dose investigations, as dose limits can not be established for reasons of the medical benefit. This makes the difference compared with radiation protection for occupationally exposed persons. What remains is "software", namely "justification" and "optimization". Justification requires balancing the interests between the health benefit and the potential harm of an exam which has to be responsibly executed by the physician himself; therefore the radiologists' associations are in the duty to prepare practicable rules for justification. Optimization again needs a cooperative solution, and that is the establishment of reference doses for diagnostic examinations, to be checked by the technical service of the producers' companies. Experts and authorities have been aware of the high-dose dilemma in diagnostic imaging since long. It is time for the reflection of active solutions and their implementation into practice.
Organization of the secure distributed computing based on multi-agent system
NASA Astrophysics Data System (ADS)
Khovanskov, Sergey; Rumyantsev, Konstantin; Khovanskova, Vera
2018-04-01
Nowadays developing methods for distributed computing is received much attention. One of the methods of distributed computing is using of multi-agent systems. The organization of distributed computing based on the conventional network computers can experience security threats performed by computational processes. Authors have developed the unified agent algorithm of control system of computing network nodes operation. Network PCs is used as computing nodes. The proposed multi-agent control system for the implementation of distributed computing allows in a short time to organize using of the processing power of computers any existing network to solve large-task by creating a distributed computing. Agents based on a computer network can: configure a distributed computing system; to distribute the computational load among computers operated agents; perform optimization distributed computing system according to the computing power of computers on the network. The number of computers connected to the network can be increased by connecting computers to the new computer system, which leads to an increase in overall processing power. Adding multi-agent system in the central agent increases the security of distributed computing. This organization of the distributed computing system reduces the problem solving time and increase fault tolerance (vitality) of computing processes in a changing computing environment (dynamic change of the number of computers on the network). Developed a multi-agent system detects cases of falsification of the results of a distributed system, which may lead to wrong decisions. In addition, the system checks and corrects wrong results.
45 CFR 154.230 - Submission and posting of Final Justifications for unreasonable rate increases.
Code of Federal Regulations, 2011 CFR
2011-10-01
... information available to the public on its Web site for at least three years. (d) CMS will post all Final Justifications on the CMS Web site. This information will remain available to the public on the CMS Web site for... submitted in the Preliminary Justification supporting the rate increase; and (2) Prominently post on its Web...
"Should We Kill the Grey Squirrels?" A Study Exploring Students' Justifications and Decision-Making
ERIC Educational Resources Information Center
Evagorou, Maria; Jimenez-Aleixandre, Maria Pilar; Osborne, Jonathan
2012-01-01
A problem that is still unexplored in the field of socioscientific issues (SSI) and that was explored in this study is how different students decide upon a SSI they are discussing, how their justifications change during the instruction and how they use (or not) the evidence from the learning environment to support their justifications. For the…
Cichocka, Aleksandra; Jost, John T
2014-02-01
Sociologists and political scientists have often observed that citizens of Central and Eastern Europe express high levels of disillusionment with their social, economic and political systems, in comparison with citizens of Western capitalist societies. In this review, we analyze system legitimation and delegitimation in post-Communist societies from a social psychological perspective. We draw on system justification theory, which seeks to understand how, when and why people do (and do not) defend, bolster and justify existing social systems. We review some of the major tenets and findings of the theory and compare research on system-justifying beliefs and ideologies in traditionally Capitalist and post-Communist countries to determine: (1) whether there are robust differences in the degree of system justification in post-Communist and Capitalist societies, and (2) the extent to which hypotheses derived from system justification theory receive support in the post-Communist context. To this end, we summarize research findings from over 20 countries and cite previously unpublished data from a public opinion survey conducted in Poland. Our analysis confirms that there are lower levels of system justification in post-Communist countries. At the same time, we find that system justification possesses similar social and psychological antecedents, manifestations and consequences in the two types of societies. We offer potential explanations for these somewhat complicated patterns of results and conclude by addressing implications for theory and research on system justification and system change (or transition). © 2013 International Union of Psychological Science.
"Simulated molecular evolution" or computer-generated artifacts?
Darius, F; Rojas, R
1994-11-01
1. The authors define a function with value 1 for the positive examples and 0 for the negative ones. They fit a continuous function but do not deal at all with the error margin of the fit, which is almost as large as the function values they compute. 2. The term "quality" for the value of the fitted function gives the impression that some biological significance is associated with values of the fitted function strictly between 0 and 1, but there is no justification for this kind of interpretation and finding the point where the fit achieves its maximum does not make sense. 3. By neglecting the error margin the authors try to optimize the fitted function using differences in the second, third, fourth, and even fifth decimal place which have no statistical significance. 4. Even if such a fit could profit from more data points, the authors should first prove that the region of interest has some kind of smoothness, that is, that a continuous fit makes any sense at all. 5. "Simulated molecular evolution" is a misnomer. We are dealing here with random search. Since the margin of error is so large, the fitted function does not provide statistically significant information about the points in search space where strings with cleavage sites could be found. This implies that the method is a highly unreliable stochastic search in the space of strings, even if the neural network is capable of learning some simple correlations. 6. Classical statistical methods are for these kind of problems with so few data points clearly superior to the neural networks used as a "black box" by the authors, which in the way they are structured provide a model with an error margin as large as the numbers being computed.7. And finally, even if someone would provide us with a function which separates strings with cleavage sites from strings without them perfectly, so-called simulated molecular evolution would not be better than random selection.Since a perfect fit would only produce exactly ones or zeros,starting a search in a region of space where all strings in the neighborhood get the value zero would not provide any kind of directional information for new iterations. We would just skip from one point to the other in a typical random walk manner.
Line-plane broadcasting in a data communications network of a parallel computer
Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.
2010-06-08
Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.
Line-plane broadcasting in a data communications network of a parallel computer
Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.
2010-11-23
Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.
ERIC Educational Resources Information Center
Wan, Chin-Sheng; Chiou, Wen-Bin
2010-01-01
The negative impact of online gaming on adolescents has received much attention. The question of how to reduce their pathological use of online gaming is a critical issue. Based on the concept of external justification in dissonance theory, this experimental study aimed to examine whether severity of threat and justification of effort would impact…
Real-time topic-aware influence maximization using preprocessing.
Chen, Wei; Lin, Tian; Yang, Cheng
2016-01-01
Influence maximization is the task of finding a set of seed nodes in a social network such that the influence spread of these seed nodes based on certain influence diffusion model is maximized. Topic-aware influence diffusion models have been recently proposed to address the issue that influence between a pair of users are often topic-dependent and information, ideas, innovations etc. being propagated in networks are typically mixtures of topics. In this paper, we focus on the topic-aware influence maximization task. In particular, we study preprocessing methods to avoid redoing influence maximization for each mixture from scratch. We explore two preprocessing algorithms with theoretical justifications. Our empirical results on data obtained in a couple of existing studies demonstrate that one of our algorithms stands out as a strong candidate providing microsecond online response time and competitive influence spread, with reasonable preprocessing effort.
A hierarchical approach for the design improvements of an Organocat biorefinery.
Abdelaziz, Omar Y; Gadalla, Mamdouh A; El-Halwagi, Mahmoud M; Ashour, Fatma H
2015-04-01
Lignocellulosic biomass has emerged as a potentially attractive renewable energy source. Processing technologies of such biomass, particularly its primary separation, still lack economic justification due to intense energy requirements. Establishing an economically viable and energy efficient biorefinery scheme is a significant challenge. In this work, a systematic approach is proposed for improving basic/existing biorefinery designs. This approach is based on enhancing the efficiency of mass and energy utilization through the use of a hierarchical design approach that involves mass and energy integration. The proposed procedure is applied to a novel biorefinery called Organocat to minimize its energy and mass consumption and total annualized cost. An improved heat exchanger network with minimum energy consumption of 4.5 MJ/kgdry biomass is designed. An optimal recycle network with zero fresh water usage and minimum waste discharge is also constructed, making the process more competitive and economically attractive. Copyright © 2015 Elsevier Ltd. All rights reserved.
Tuo, Rui; Jeff Wu, C. F.
2016-07-19
Calibration parameters in deterministic computer experiments are those attributes that cannot be measured or available in physical experiments. Here, an approach to estimate them by using data from physical experiments and computer simulations. A theoretical framework is given which allows us to study the issues of parameter identifiability and estimation. We define the L 2-consistency for calibration as a justification for calibration methods. It is shown that a simplified version of the original KO method leads to asymptotically L 2-inconsistent calibration. This L 2-inconsistency can be remedied by modifying the original estimation procedure. A novel calibration method, called the Lmore » 2 calibration, is proposed and proven to be L 2-consistent and enjoys optimal convergence rate. Furthermore a numerical example and some mathematical analysis are used to illustrate the source of the L 2-inconsistency problem.« less
Sergiievskyi, Volodymyr P; Jeanmairet, Guillaume; Levesque, Maximilien; Borgis, Daniel
2014-06-05
Molecular density functional theory (MDFT) offers an efficient implicit-solvent method to estimate molecule solvation free-energies, whereas conserving a fully molecular representation of the solvent. Even within a second-order approximation for the free-energy functional, the so-called homogeneous reference fluid approximation, we show that the hydration free-energies computed for a data set of 500 organic compounds are of similar quality as those obtained from molecular dynamics free-energy perturbation simulations, with a computer cost reduced by 2-3 orders of magnitude. This requires to introduce the proper partial volume correction to transform the results from the grand canonical to the isobaric-isotherm ensemble that is pertinent to experiments. We show that this correction can be extended to 3D-RISM calculations, giving a sound theoretical justification to empirical partial molar volume corrections that have been proposed recently.
Wegner, Rhiana; Abbey, Antonia; Pierce, Jennifer; Pegram, Sheri E.; Woerner, Jacqueline
2015-01-01
Perpetrators use rape supportive attitudes and sexual assault incident characteristics to justify forcing sex on their victims. Perpetrators who can justify their behaviors are at increased risk for future perpetration. This study examined the relationships between rape supportive attitudes, sexual assault incident characteristics, and the post-assault justifications of 183 men sampled from the community who self-reported committing at least one act of sexual aggression. Hierarchical multiple regression analyses indicated that rape supportive attitudes, expectations for having sex, misperceptions of sexual intent, victims’ alcohol consumption, attempts to be alone with her, and the number of consensual sexual activities prior to the unwanted sex were significant predictors of perpetrators’ post-assault use of justifications. Greater use of justifications was a significant predictor of sexual aggression over a 1-year follow-up interval. These findings demonstrate the need for further research exploring when and why perpetrators use post-assault justifications and whether they are amenable to change. PMID:26056162
Wegner, Rhiana; Abbey, Antonia; Pierce, Jennifer; Pegram, Sheri E; Woerner, Jacqueline
2015-08-01
Perpetrators use rape supportive attitudes and sexual assault incident characteristics to justify forcing sex on their victims. Perpetrators who can justify their behaviors are at increased risk for future perpetration. This study examined the relationships between rape supportive attitudes, sexual assault incident characteristics, and the post-assault justifications of 183 men sampled from the community who self-reported committing at least one act of sexual aggression. Hierarchical multiple regression analyses indicated that rape supportive attitudes, expectations for having sex, misperceptions of sexual intent, victims' alcohol consumption, attempts to be alone with her, and the number of consensual sexual activities prior to the unwanted sex were significant predictors of perpetrators' post-assault use of justifications. Greater use of justifications was a significant predictor of sexual aggression over a 1-year follow-up interval. These findings demonstrate the need for further research exploring when and why perpetrators use post-assault justifications and whether they are amenable to change. © The Author(s) 2015.
Chapleau, Kristine M; Oswald, Debra L
2014-01-01
Rape is a pervasive social problem that causes serious physical and psychological repercussions. Rape victims' recovery is often complicated by the public's failure to believe the victim and restore justice. This study applied system justification theory to examine whether the justification of gender inequality is related to moral outrage (an emotional precursor to corrective action) and rape myth acceptance; we also examined whether rape myth acceptance is associated with moral outrage at injustice. Results showed that gender-specific system justification correlated with less moral outrage at human suffering as well as greater rape myth acceptance. The relationships between these variables were similar for men and for women, a finding that suggests that rape myths are system justifying for women. When we controlled for gender-specific system justification, rape myth acceptance correlated with less moral outrage. Results are discussed in the context of how legitimizing ideologies reduce moral outrage at injustice and perpetuate a system of sexual violence.
Dominiak-Kochanek, Monika; Konopka, Karolina; Rutkowska, Marta; Frączek, Adam; Ramirez, J Martin
2018-06-01
The purpose of this article was to determine the socialisation antecedents of socio-moral approval of aggression (SMAA). In Study 1, we assessed factorial structure and reliability of the SMAA with a sample of 355 students who reported on the extent to which they approved of six forms of aggressive behaviour and six justifications of aggression. Two-factor solutions were obtained with regard to forms and justifications of aggressive acts. Thus, approval of extreme and minor aggression was distinguished as well as legitimate and illegitimate justifications of aggression. In Study 2, we tested the path models of the socialisation antecedents that contributed to the high approval of minor and extreme aggressive acts as well as legitimate and illegitimate justifications of aggression. Data were collected from 173 undergraduate students. Path analyses showed that high levels of approval of extremely aggressive acts and of illegitimate justifications of aggression were preceded by a sequence of negative life events, beginning with frequent misbehaviour in childhood, corporal punishment used by parents and ending with delinquency in adolescence. The approval of minor aggression had little relation to socialisation factors apart from a detrimental effect of psychological aggression while approval of legitimate justifications of aggression had no socialisation antecedents. © 2016 International Union of Psychological Science.
Clinically Unjustified Diagnostic Imaging – a Worrisome Tendency in Today’s Medical Practice
Sobiecka, Aleksandra; Bekiesińska-Figatowska, Monika; Rutkowska, Milena; Latos, Tomasz; Walecki, Jerzy
2016-01-01
Summary Background The purpose of the study was to evaluate the percentage of unjustified examinations among all the CT and MRI studies performed by two radiology departments and to determine the types of examinations which are most commonly carried out unnecessarily. Material/Methods Three radiologists assessed the justification of CT and MRI examinations performed during a period of 14 days based on the referrals. The radiologists assessed 799 referrals for CT scans (847 examinations of a particular part of the body) and 269 MRI referrals (269 examinations). The criteria for justification were: medical expertise and the guidelines. During the first stage radiologists divided the examinations into 3 groups: justified, unjustified and the examinations of questionable justification. The second step was to determine the reasons why the studies were considered as unjustified or of questionable justification. Results 73 of 1116 examinations (6.54%) were considered to be unjustified or of a questionable justification. There were 59 CT scans (59/847=6.97%) and 14 MRI studies (14/269=5.20%). The most common reasons to consider them as unjustified or of questionable justification were: inadequate method of diagnostic imaging chosen as a first-line tool and lacking or insufficient clinical details. Conclusions In our investigation 6.54% of both CT and MRI examinations were considered as unjustified or of questionable justification, which is lower than described in other studies (from 7% to 26%). The assessment was based only on referrals, therefore a total share of these examinations is likely to be higher. PMID:27471577
Hoffarth, Mark Romeo; Hodson, Gordon; Molnar, Danielle S
2017-04-24
Even in relatively tolerant countries, antigay bias remains socially divisive, despite being widely viewed as violating social norms of tolerance. From a Justification-Suppression Model (JSM) framework, social norms may generally suppress antigay bias in tolerant countries, yet be "released" by religious justifications among those who resist gay rights progress. Across large, nationally representative US samples (Study 1) and international samples (Study 2, representing a total of 97 different countries), over 215,000 participants, and various indicators of antigay bias (e.g., dislike, moral condemnation, opposing gay rights), individual differences in religious attendance was uniquely associated with greater antigay bias, over and above religious fundamentalism, political ideology, and religious denomination. Moreover, in 4 of 6 multilevel models, religious attendance was associated with antigay bias in countries with greater gay rights recognition, but was unrelated to antigay bias in countries with lower gay rights recognition (Study 2). In Study 3, Google searches for a religious justification ("love the sinner hate the sin") coincided temporally with gay-rights relevant searches. In U.S. (Study 4) and Canadian (Study 5) samples, much of the association between religious attendance and antigay bias was explained by "sinner-sin" religious justification, with religious attendance not associated with antigay bias when respondents reported relatively low familiarity with this justification (Study 5). These findings suggest that social divisions on homosexuality in relatively tolerant social contexts may be in large part due to religious justifications for antigay bias (consistent with the JSM), with important implications for decreasing bias. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
2009-04-01
resolutions are all forms of state practice. RESTATEMENT (THIRD) OF THE FOREIGN RELATIONS LAW OF THE UNITED STATES § 102 ( 1987 ) [hereinafter...620-21 (quoting the Nicaragua case). But see Mark Baker, Terrorism and the Inherent Right of Self-Defense, 10 HOUS. J. INT’L L. 25,41 ( 1987 ) (raising...BUSINESSWEEK.COM, Dec. 7, 2008, http://www.businessweek.com/bwdaily/dnflash/content/dec2008/ db2008127_817606.htm; Peter Eisler , Raids on Federal Computer
Fault tolerant hypercube computer system architecture
NASA Technical Reports Server (NTRS)
Madan, Herb S. (Inventor); Chow, Edward (Inventor)
1989-01-01
A fault-tolerant multiprocessor computer system of the hypercube type comprising a hierarchy of computers of like kind which can be functionally substituted for one another as necessary is disclosed. Communication between the working nodes is via one communications network while communications between the working nodes and watch dog nodes and load balancing nodes higher in the structure is via another communications network separate from the first. A typical branch of the hierarchy reporting to a master node or host computer comprises, a plurality of first computing nodes; a first network of message conducting paths for interconnecting the first computing nodes as a hypercube. The first network provides a path for message transfer between the first computing nodes; a first watch dog node; and a second network of message connecting paths for connecting the first computing nodes to the first watch dog node independent from the first network, the second network provides an independent path for test message and reconfiguration affecting transfers between the first computing nodes and the first switch watch dog node. There is additionally, a plurality of second computing nodes; a third network of message conducting paths for interconnecting the second computing nodes as a hypercube. The third network provides a path for message transfer between the second computing nodes; a fourth network of message conducting paths for connecting the second computing nodes to the first watch dog node independent from the third network. The fourth network provides an independent path for test message and reconfiguration affecting transfers between the second computing nodes and the first watch dog node; and a first multiplexer disposed between the first watch dog node and the second and fourth networks for allowing the first watch dog node to selectively communicate with individual ones of the computing nodes through the second and fourth networks; as well as, a second watch dog node operably connected to the first multiplexer whereby the second watch dog node can selectively communicate with individual ones of the computing nodes through the second and fourth networks. The branch is completed by a first load balancing node; and a second multiplexer connected between the first load balancing node and the first and second watch dog nodes, allowing the first load balancing node to selectively communicate with the first and second watch dog nodes.
Khalid, Ruzelan; M. Nawawi, Mohd Kamal; Kawsar, Luthful A.; Ghani, Noraida A.; Kamil, Anton A.; Mustafa, Adli
2013-01-01
M/G/C/C state dependent queuing networks consider service rates as a function of the number of residing entities (e.g., pedestrians, vehicles, and products). However, modeling such dynamic rates is not supported in modern Discrete Simulation System (DES) software. We designed an approach to cater this limitation and used it to construct the M/G/C/C state-dependent queuing model in Arena software. Using the model, we have evaluated and analyzed the impacts of various arrival rates to the throughput, the blocking probability, the expected service time and the expected number of entities in a complex network topology. Results indicated that there is a range of arrival rates for each network where the simulation results fluctuate drastically across replications and this causes the simulation results and analytical results exhibit discrepancies. Detail results that show how tally the simulation results and the analytical results in both abstract and graphical forms and some scientific justifications for these have been documented and discussed. PMID:23560037
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
Computer hardware fault administration
Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.
2010-09-14
Computer hardware fault administration carried out in a parallel computer, where the parallel computer includes a plurality of compute nodes. The compute nodes are coupled for data communications by at least two independent data communications networks, where each data communications network includes data communications links connected to the compute nodes. Typical embodiments carry out hardware fault administration by identifying a location of a defective link in the first data communications network of the parallel computer and routing communications data around the defective link through the second data communications network of the parallel computer.
Software For Monitoring A Computer Network
NASA Technical Reports Server (NTRS)
Lee, Young H.
1992-01-01
SNMAT is rule-based expert-system computer program designed to assist personnel in monitoring status of computer network and identifying defective computers, workstations, and other components of network. Also assists in training network operators. Network for SNMAT located at Space Flight Operations Center (SFOC) at NASA's Jet Propulsion Laboratory. Intended to serve as data-reduction system providing windows, menus, and graphs, enabling users to focus on relevant information. SNMAT expected to be adaptable to other computer networks; for example in management of repair, maintenance, and security, or in administration of planning systems, billing systems, or archives.
2007-03-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited. HACKING SOCIAL NETWORKS : EXAMINING THE...VIABILITY OF USING COMPUTER NETWORK ATTACK AGAINST SOCIAL NETWORKS by Russell G. Schuhart II March 2007 Thesis Advisor: David Tucker Second Reader...Master’s Thesis 4. TITLE AND SUBTITLE: Hacking Social Networks : Examining the Viability of Using Computer Network Attack Against Social Networks 6. AUTHOR
Constructing Precisely Computing Networks with Biophysical Spiking Neurons.
Schwemmer, Michael A; Fairhall, Adrienne L; Denéve, Sophie; Shea-Brown, Eric T
2015-07-15
While spike timing has been shown to carry detailed stimulus information at the sensory periphery, its possible role in network computation is less clear. Most models of computation by neural networks are based on population firing rates. In equivalent spiking implementations, firing is assumed to be random such that averaging across populations of neurons recovers the rate-based approach. Recently, however, Denéve and colleagues have suggested that the spiking behavior of neurons may be fundamental to how neuronal networks compute, with precise spike timing determined by each neuron's contribution to producing the desired output (Boerlin and Denéve, 2011; Boerlin et al., 2013). By postulating that each neuron fires to reduce the error in the network's output, it was demonstrated that linear computations can be performed by networks of integrate-and-fire neurons that communicate through instantaneous synapses. This left open, however, the possibility that realistic networks, with conductance-based neurons with subthreshold nonlinearity and the slower timescales of biophysical synapses, may not fit into this framework. Here, we show how the spike-based approach can be extended to biophysically plausible networks. We then show that our network reproduces a number of key features of cortical networks including irregular and Poisson-like spike times and a tight balance between excitation and inhibition. Lastly, we discuss how the behavior of our model scales with network size or with the number of neurons "recorded" from a larger computing network. These results significantly increase the biological plausibility of the spike-based approach to network computation. We derive a network of neurons with standard spike-generating currents and synapses with realistic timescales that computes based upon the principle that the precise timing of each spike is important for the computation. We then show that our network reproduces a number of key features of cortical networks including irregular, Poisson-like spike times, and a tight balance between excitation and inhibition. These results significantly increase the biological plausibility of the spike-based approach to network computation, and uncover how several components of biological networks may work together to efficiently carry out computation. Copyright © 2015 the authors 0270-6474/15/3510112-23$15.00/0.
From mirror self-recognition to the looking-glass self: exploring the Justification Hypothesis.
Shaffer, Leigh S
2005-01-01
In his Tree of Knowledge (ToK) System, Henriques (2003) posits that the human ego or "self" has evolved because human beings are the only animals that have had to justify their behavior to others. This essay provides evidence for this Justification Hypothesis (JH) from everyday life sociology, starting with the work of George Herbert Mead and Charles Horton Cooley, and focuses on research related to the concept of the "looking-glass self." Special emphasis is given to the pragmatics of speech acts, the presentation of self in interaction rituals, the accounts given by actors in justification of their actions, and the role of social norms and conformity in the large-scale justification systems commonly called "culture."
Calvete, Esther
2007-05-01
This study examined whether justification of violence beliefs and social problem solving mediated between maltreatment experiences and aggressive and delinquent behavior in adolescents. Data were collected on 191 maltreated and 546 nonmaltreated adolescents (ages 14 to 17 years), who completed measures of justification of violence beliefs, social problem-solving dimensions (problem orientation, and impulsivity/carelessness style), and psychological problems. Findings indicated that maltreated adolescents' higher levels of delinquent and aggressive behavior were partially accounted for by justification of violence beliefs, and that their higher levels of depressive symptoms were partially mediated by a more negative orientation to social problem-solving. Comparisons between boys and girls indicated that the model linking maltreatment, cognitive variables, and psychological problems was invariant.
Computer Networks as a New Data Base.
ERIC Educational Resources Information Center
Beals, Diane E.
1992-01-01
Discusses the use of communication on computer networks as a data source for psychological, social, and linguistic research. Differences between computer-mediated communication and face-to-face communication are described, the Beginning Teacher Computer Network is discussed, and examples of network conversations are appended. (28 references) (LRW)
10 CFR 727.2 - What are the definitions of the terms used in this part?
Code of Federal Regulations, 2012 CFR
2012-01-01
... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...
10 CFR 727.2 - What are the definitions of the terms used in this part?
Code of Federal Regulations, 2014 CFR
2014-01-01
... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...
10 CFR 727.2 - What are the definitions of the terms used in this part?
Code of Federal Regulations, 2013 CFR
2013-01-01
... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...
10 CFR 727.2 - What are the definitions of the terms used in this part?
Code of Federal Regulations, 2011 CFR
2011-01-01
... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...
10 CFR 727.2 - What are the definitions of the terms used in this part?
Code of Federal Regulations, 2010 CFR
2010-01-01
... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...
Regression relation for pure quantum states and its implications for efficient computing.
Elsayed, Tarek A; Fine, Boris V
2013-02-15
We obtain a modified version of the Onsager regression relation for the expectation values of quantum-mechanical operators in pure quantum states of isolated many-body quantum systems. We use the insights gained from this relation to show that high-temperature time correlation functions in many-body quantum systems can be controllably computed without complete diagonalization of the Hamiltonians, using instead the direct integration of the Schrödinger equation for randomly sampled pure states. This method is also applicable to quantum quenches and other situations describable by time-dependent many-body Hamiltonians. The method implies exponential reduction of the computer memory requirement in comparison with the complete diagonalization. We illustrate the method by numerically computing infinite-temperature correlation functions for translationally invariant Heisenberg chains of up to 29 spins 1/2. Thereby, we also test the spin diffusion hypothesis and find it in a satisfactory agreement with the numerical results. Both the derivation of the modified regression relation and the justification of the computational method are based on the notion of quantum typicality.
Get the Whole Story before You Plug into a Computer Network.
ERIC Educational Resources Information Center
Vernot, David
1989-01-01
Explains the myths and marvels of computer networks; cites how several schools are utilizing networking; and summarizes where the major computer companies stand today when it comes to networking. (MLF)
Network Coding for Function Computation
ERIC Educational Resources Information Center
Appuswamy, Rathinakumar
2011-01-01
In this dissertation, the following "network computing problem" is considered. Source nodes in a directed acyclic network generate independent messages and a single receiver node computes a target function f of the messages. The objective is to maximize the average number of times f can be computed per network usage, i.e., the "computing…
LaRC local area networks to support distributed computing
NASA Technical Reports Server (NTRS)
Riddle, E. P.
1984-01-01
The Langley Research Center's (LaRC) Local Area Network (LAN) effort is discussed. LaRC initiated the development of a LAN to support a growing distributed computing environment at the Center. The purpose of the network is to provide an improved capability (over inteactive and RJE terminal access) for sharing multivendor computer resources. Specifically, the network will provide a data highway for the transfer of files between mainframe computers, minicomputers, work stations, and personal computers. An important influence on the overall network design was the vital need of LaRC researchers to efficiently utilize the large CDC mainframe computers in the central scientific computing facility. Although there was a steady migration from a centralized to a distributed computing environment at LaRC in recent years, the work load on the central resources increased. Major emphasis in the network design was on communication with the central resources within the distributed environment. The network to be implemented will allow researchers to utilize the central resources, distributed minicomputers, work stations, and personal computers to obtain the proper level of computing power to efficiently perform their jobs.
The Importance and Justifications for Astronomy Teaching: A Look at the Researches on the Area
NASA Astrophysics Data System (ADS)
Soler, D. R.; Leite, C.
2013-08-01
Many researchers in Astronomy Teaching often refer to Astronomy as an object of great curiosity. In this paper, we will present a survey concerning the importance and justifications researchers have given to Astronomy Teaching. In a universe of 180 papers about Astronomy Teaching, found in periodicals from the areas of Science, Physics and Astronomy Teaching in the last decade, in 29 of them, discussions about the importance or justifications to Astronomy Teaching were found. As the main result of this work, all the elements related to the importance and the justification for the Astronomy Teaching were organized and grouped in four categories of analysis, which indicate the nature of the justifications presented by the authors: Awakening of feelings and curiosities; Socio-historic-cultural relevance; World view and awareness expansion and Interdisciplinarity. In each category, related elements were grouped. By doing so, we could produce an articulation among the elements taken from different papers, matching them in a way that enabled us to obtain new inferences not individually present in any of the papers. Furthermore, when all the research was analyzed, it was also revealed that there were no papers that aimed at the investigation of the importance and justifications for Astronomy Teaching. It was still noticed that, in general, when researchers invoke the interdisciplinary character of Astronomy, they make it superficially. Since the researches do not show how they get the idea presented to the justifications for teaching Astronomy, some questions could have surfaced, such as: would it be possible to exist a kind of “common sense” for teaching and disseminating Astronomy that would make researchers understand Astronomy as a differential science? Would the "born interest" in Astronomy - pointed by some people - be something real? Does Astronomy really differ from other sciences?
ERIC Educational Resources Information Center
Ruben, Barbara
1994-01-01
Reviews a number of interactive environmental computer education networks and software packages. Computer networks include National Geographic Kids Network, Global Lab, and Global Rivers Environmental Education Network. Computer software involve environmental decision making, simulation games, tropical rainforests, the ocean, the greenhouse…
Terminal-oriented computer-communication networks.
NASA Technical Reports Server (NTRS)
Schwartz, M.; Boorstyn, R. R.; Pickholtz, R. L.
1972-01-01
Four examples of currently operating computer-communication networks are described in this tutorial paper. They include the TYMNET network, the GE Information Services network, the NASDAQ over-the-counter stock-quotation system, and the Computer Sciences Infonet. These networks all use programmable concentrators for combining a multiplicity of terminals. Included in the discussion for each network is a description of the overall network structure, the handling and transmission of messages, communication requirements, routing and reliability consideration where applicable, operating data and design specifications where available, and unique design features in the area of computer communications.
Mertz, Marcel
2007-09-01
With the prevalence of complementary and alternative medicine (CAM) increasing in western societies, questions of the ethical justification of these alternative health care approaches and practices have to be addressed. In order to evaluate philosophical reasoning on this subject, it is of paramount importance to identify and analyse possible arguments for the ethical justification of CAM considering contemporary biomedical ethics as well as more fundamental philosophical aspects. Moreover, it is vital to provide adequate analytical instruments for this task, such as separating 'CAM as belief system' and 'CAM as practice'. Findings show that beneficence and non-maleficence are central issues for an ethical justification of CAM as practice, while freedom of thought and religion are central to CAM as belief system. Many justification strategies have limitations and qualifications that have to be taken into account. Singularly descriptive premises in an argument often prove to be more problematic than universal ethical principles. Thus, non-ethical issues related to a general philosophical underpinning--e.g. epistemology, semantics, and ontology--are highly relevant for determining a justification strategy, especially when strong metaphysical assumptions are involved. Even if some values are shared with traditional biomedicine, axiological differences have to be considered as well. Further research should be done about specific CAM positions. These could be combined with applied qualitative social research methods.
Using satellite communications for a mobile computer network
NASA Technical Reports Server (NTRS)
Wyman, Douglas J.
1993-01-01
The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.
Do You Lock Your Network Doors? Some Network Management Precautions.
ERIC Educational Resources Information Center
Neray, Phil
1997-01-01
Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…
Conceptual model of iCAL4LA: Proposing the components using comparative analysis
NASA Astrophysics Data System (ADS)
Ahmad, Siti Zulaiha; Mutalib, Ariffin Abdul
2016-08-01
This paper discusses an on-going study that initiates an initial process in determining the common components for a conceptual model of interactive computer-assisted learning that is specifically designed for low achieving children. This group of children needs a specific learning support that can be used as an alternative learning material in their learning environment. In order to develop the conceptual model, this study extracts the common components from 15 strongly justified computer assisted learning studies. A comparative analysis has been conducted to determine the most appropriate components by using a set of specific indication classification to prioritize the applicability. The results of the extraction process reveal 17 common components for consideration. Later, based on scientific justifications, 16 of them were selected as the proposed components for the model.
Software for Tracking Costs of Mars Projects
NASA Technical Reports Server (NTRS)
Wong, Alvin; Warfield, Keith
2003-01-01
The Mars Cost Tracking Model is a computer program that administers a system set up for tracking the costs of future NASA projects that pertain to Mars. Previously, no such tracking system existed, and documentation was written in a variety of formats and scattered in various places. It was difficult to justify costs or even track the history of costs of a spacecraft mission to Mars. The present software enables users to maintain all cost-model definitions, documentation, and justifications of cost estimates in one computer system that is accessible via the Internet. The software provides sign-off safeguards to ensure the reliability of information entered into the system. This system may eventually be used to track the costs of projects other than only those that pertain to Mars.
NASA Astrophysics Data System (ADS)
Ng, Theam Foo; Pham, Tuan D.; Zhou, Xiaobo
2010-01-01
With the fast development of multi-dimensional data compression and pattern classification techniques, vector quantization (VQ) has become a system that allows large reduction of data storage and computational effort. One of the most recent VQ techniques that handle the poor estimation of vector centroids due to biased data from undersampling is to use fuzzy declustering-based vector quantization (FDVQ) technique. Therefore, in this paper, we are motivated to propose a justification of FDVQ based hidden Markov model (HMM) for investigating its effectiveness and efficiency in classification of genotype-image phenotypes. The performance evaluation and comparison of the recognition accuracy between a proposed FDVQ based HMM (FDVQ-HMM) and a well-known LBG (Linde, Buzo, Gray) vector quantization based HMM (LBG-HMM) will be carried out. The experimental results show that the performances of both FDVQ-HMM and LBG-HMM are almost similar. Finally, we have justified the competitiveness of FDVQ-HMM in classification of cellular phenotype image database by using hypotheses t-test. As a result, we have validated that the FDVQ algorithm is a robust and an efficient classification technique in the application of RNAi genome-wide screening image data.
NASA Technical Reports Server (NTRS)
Paluzzi, Peter; Miller, Rosalind; Kurihara, West; Eskey, Megan
1998-01-01
Over the past several months, major industry vendors have made a business case for the network computer as a win-win solution toward lowering total cost of ownership. This report provides results from Phase I of the Ames Research Center network computer evaluation project. It identifies factors to be considered for determining cost of ownership; further, it examines where, when, and how network computer technology might fit in NASA's desktop computing architecture.
Directly executable formal models of middleware for MANET and Cloud Networking and Computing
NASA Astrophysics Data System (ADS)
Pashchenko, D. V.; Sadeq Jaafar, Mustafa; Zinkin, S. A.; Trokoz, D. A.; Pashchenko, T. U.; Sinev, M. P.
2016-04-01
The article considers some “directly executable” formal models that are suitable for the specification of computing and networking in the cloud environment and other networks which are similar to wireless networks MANET. These models can be easily programmed and implemented on computer networks.
Ultimate justification: Wittgenstein and medical ethics.
Hughes, J
1995-02-01
Decisions must be justified. In medical ethics various grounds are given to justify decisions, but ultimate justification seems illusory and little considered. The philosopher Wittgenstein discusses the problem of ultimate justification in the context of general philosophy. His comments, nevertheless, are pertinent to ethics. From a discussion of Wittgensteinian notions, such as 'bedrock', the idea that 'ultimate' justification is grounded in human nature as such is derived. This discussion is relevant to medical ethics in at least five ways: it shows generally what type of certainty there is in practical ethics; it seems to imply some objective foundation to our ethical judgements; it squares with our experience of making ethical decisions; it shows something of the nature of moral arguments; and, finally, it has implications for teaching medicine and ethics.
Justifications and comparisons in the division of household labor: the relevance of gender ideology.
Martínez, Carmen; Paterna, Consuelo; Yago, Carmen
2010-05-01
This study tests the direct relevance of justifications and social comparisons (predictors of perceptions of fairness) on different types of household labour distribution, and the importance of masculinity ideology and neosexism on these variables. The participants were heterosexual dual-earner couples. Our results showed that both men and women use more justifications when their housework distribution is not equal, but only women use social comparisons associated with the ways of distributing domestic work. In addition, we observe that, in both men and women, justifications are related to a traditional masculine ideology, but a different model appears in relation to comparisons which are associated with neosexism in men and with traditional masculine ideology in women. Implications and suggestions for future research are discussed.
Competency criteria and the class inclusion task: modeling judgments and justifications.
Thomas, H; Horton, J J
1997-11-01
Preschool age children's class inclusion task responses were modeled as mixtures of different probability distributions. The main idea: Different response strategies are equivalent to different probability distributions. A child displays cognitive strategy s if P (child uses strategy s, given the child's observed score X = x) = p(s) is the most probable strategy. The general approach is widely applicable to many settings. Both judgment and justification questions were asked. Judgment response strategies identified were subclass comparison, guessing, and inclusion logic. Children's justifications lagged their judgments in development. Although justification responses may be useful, C. J. Brainerd was largely correct: If a single response variable is to be selected, a judgments variable is likely the preferable one. But the process must be modeled to identify cognitive strategies, as B. Hodkin has demonstrated.
Ultimate justification: Wittgenstein and medical ethics.
Hughes, J
1995-01-01
Decisions must be justified. In medical ethics various grounds are given to justify decisions, but ultimate justification seems illusory and little considered. The philosopher Wittgenstein discusses the problem of ultimate justification in the context of general philosophy. His comments, nevertheless, are pertinent to ethics. From a discussion of Wittgensteinian notions, such as 'bedrock', the idea that 'ultimate' justification is grounded in human nature as such is derived. This discussion is relevant to medical ethics in at least five ways: it shows generally what type of certainty there is in practical ethics; it seems to imply some objective foundation to our ethical judgements; it squares with our experience of making ethical decisions; it shows something of the nature of moral arguments; and, finally, it has implications for teaching medicine and ethics. PMID:7776343
Advantages of Parallel Processing and the Effects of Communications Time
NASA Technical Reports Server (NTRS)
Eddy, Wesley M.; Allman, Mark
2000-01-01
Many computing tasks involve heavy mathematical calculations, or analyzing large amounts of data. These operations can take a long time to complete using only one computer. Networks such as the Internet provide many computers with the ability to communicate with each other. Parallel or distributed computing takes advantage of these networked computers by arranging them to work together on a problem, thereby reducing the time needed to obtain the solution. The drawback to using a network of computers to solve a problem is the time wasted in communicating between the various hosts. The application of distributed computing techniques to a space environment or to use over a satellite network would therefore be limited by the amount of time needed to send data across the network, which would typically take much longer than on a terrestrial network. This experiment shows how much faster a large job can be performed by adding more computers to the task, what role communications time plays in the total execution time, and the impact a long-delay network has on a distributed computing system.
Justification and radiology: some ethical considerations.
Sia, Santiago
2009-07-01
This paper, which seeks to address the issue of justification in radiology, intends firstly to comment on the current discussion of the ethical foundation of radiological practice that focuses on the move from utilitarianism to the rights-centred criterion. Secondly, and this constitutes the bulk of the paper, it aims to offer a philosophical perspective, which is hoped will lead to a consideration of certain specific areas in ethical decision-making in the attempts here to deal with the main issue of justification in radiology.
Near real-time traffic routing
NASA Technical Reports Server (NTRS)
Yang, Chaowei (Inventor); Xie, Jibo (Inventor); Zhou, Bin (Inventor); Cao, Ying (Inventor)
2012-01-01
A near real-time physical transportation network routing system comprising: a traffic simulation computing grid and a dynamic traffic routing service computing grid. The traffic simulator produces traffic network travel time predictions for a physical transportation network using a traffic simulation model and common input data. The physical transportation network is divided into a multiple sections. Each section has a primary zone and a buffer zone. The traffic simulation computing grid includes multiple of traffic simulation computing nodes. The common input data includes static network characteristics, an origin-destination data table, dynamic traffic information data and historical traffic data. The dynamic traffic routing service computing grid includes multiple dynamic traffic routing computing nodes and generates traffic route(s) using the traffic network travel time predictions.
Discussion on the Technology and Method of Computer Network Security Management
NASA Astrophysics Data System (ADS)
Zhou, Jianlei
2017-09-01
With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.
NASA Technical Reports Server (NTRS)
Bishop, Ann Peterson; Pinelli, Thomas E.
1995-01-01
This paper presents data on the value of computer networks that were obtained from a national survey of 2000 aerospace engineers that was conducted in 1993. Survey respondents reported the extent to which they used computer networks in their work and communication and offered their assessments of the value of various network types and applications. They also provided information about the positive impacts of networks on their work, which presents another perspective on value. Finally, aerospace engineers' recommendations on network implementation present suggestions for increasing the value of computer networks within aerospace organizations.
Archer, Charles J.; Faraj, Ahmad A.; Inglett, Todd A.; Ratterman, Joseph D.
2012-10-23
Methods, apparatus, and products are disclosed for providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: identifying each link in the global combining network for each compute node of the operational group; designating one of a plurality of point-to-point class routing identifiers for each link such that no compute node in the operational group is connected to two adjacent compute nodes in the operational group with links designated for the same class routing identifiers; and configuring each compute node of the operational group for point-to-point communications with each adjacent compute node in the global combining network through the link between that compute node and that adjacent compute node using that link's designated class routing identifier.
A Low Cost Micro-Computer Based Local Area Network for Medical Office and Medical Center Automation
Epstein, Mel H.; Epstein, Lynn H.; Emerson, Ron G.
1984-01-01
A Low Cost Micro-computer based Local Area Network for medical office automation is described which makes use of an array of multiple and different personal computers interconnected by a local area network. Each computer on the network functions as fully potent workstations for data entry and report generation. The network allows each workstation complete access to the entire database. Additionally, designated computers may serve as access ports for remote terminals. Through “Gateways” the network may serve as a front end for a large mainframe, or may interface with another network. The system provides for the medical office environment the expandability and flexibility of a multi-terminal mainframe system at a far lower cost without sacrifice of performance.
Bhanot, Gyan [Princeton, NJ; Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Steinmacher-Burow, Burkhard D [Mount Kisco, NY; Takken, Todd E [Mount Kisco, NY; Vranas, Pavlos M [Bedford Hills, NY
2009-09-08
Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.
Trading biodiversity for pest problems.
Lundgren, Jonathan G; Fausti, Scott W
2015-07-01
Recent shifts in agricultural practices have resulted in altered pesticide use patterns, land use intensification, and landscape simplification, all of which threaten biodiversity in and near farms. Pests are major challenges to food security, and responses to pests can represent unintended socioeconomic and environmental costs. Characteristics of the ecological community influence pest populations, but the nature of these interactions remains poorly understood within realistic community complexities and on operating farms. We examine how species diversity and the topology of linkages in species' abundances affect pest abundance on maize farms across the Northern Great Plains. Our results show that increased species diversity, community evenness, and linkage strength and network centrality within a biological network all correlate with significantly reduced pest populations. This supports the assertion that reduced biological complexity on farms is associated with increased pest populations and provides a further justification for diversification of agroecosystems to improve the profitability, safety, and sustainability of food production systems. Bioinventories as comprehensive as the one conducted here are conspicuously absent for most agroecosystems but provide an important baseline for community and ecosystem ecology and the effects of food production on local biodiversity and ecosystem function. Network analyses of abundance correlations of entire communities (rather than focal interactions, for example, trophic interactions) can reveal key network characteristics, especially the importance and nature of network centrality, which aid in understanding how these communities function.
Trading biodiversity for pest problems
Lundgren, Jonathan G.; Fausti, Scott W.
2015-01-01
Recent shifts in agricultural practices have resulted in altered pesticide use patterns, land use intensification, and landscape simplification, all of which threaten biodiversity in and near farms. Pests are major challenges to food security, and responses to pests can represent unintended socioeconomic and environmental costs. Characteristics of the ecological community influence pest populations, but the nature of these interactions remains poorly understood within realistic community complexities and on operating farms. We examine how species diversity and the topology of linkages in species’ abundances affect pest abundance on maize farms across the Northern Great Plains. Our results show that increased species diversity, community evenness, and linkage strength and network centrality within a biological network all correlate with significantly reduced pest populations. This supports the assertion that reduced biological complexity on farms is associated with increased pest populations and provides a further justification for diversification of agroecosystems to improve the profitability, safety, and sustainability of food production systems. Bioinventories as comprehensive as the one conducted here are conspicuously absent for most agroecosystems but provide an important baseline for community and ecosystem ecology and the effects of food production on local biodiversity and ecosystem function. Network analyses of abundance correlations of entire communities (rather than focal interactions, for example, trophic interactions) can reveal key network characteristics, especially the importance and nature of network centrality, which aid in understanding how these communities function. PMID:26601223
Computer network security for the radiology enterprise.
Eng, J
2001-08-01
As computer networks become an integral part of the radiology practice, it is appropriate to raise concerns regarding their security. The purpose of this article is to present an overview of computer network security risks and preventive strategies as they pertain to the radiology enterprise. A number of technologies are available that provide strong deterrence against attacks on networks and networked computer systems in the radiology enterprise. While effective, these technologies must be supplemented with vigilant user and system management.
Efficiently modeling neural networks on massively parallel computers
NASA Technical Reports Server (NTRS)
Farber, Robert M.
1993-01-01
Neural networks are a very useful tool for analyzing and modeling complex real world systems. Applying neural network simulations to real world problems generally involves large amounts of data and massive amounts of computation. To efficiently handle the computational requirements of large problems, we have implemented at Los Alamos a highly efficient neural network compiler for serial computers, vector computers, vector parallel computers, and fine grain SIMD computers such as the CM-2 connection machine. This paper describes the mapping used by the compiler to implement feed-forward backpropagation neural networks for a SIMD (Single Instruction Multiple Data) architecture parallel computer. Thinking Machines Corporation has benchmarked our code at 1.3 billion interconnects per second (approximately 3 gigaflops) on a 64,000 processor CM-2 connection machine (Singer 1990). This mapping is applicable to other SIMD computers and can be implemented on MIMD computers such as the CM-5 connection machine. Our mapping has virtually no communications overhead with the exception of the communications required for a global summation across the processors (which has a sub-linear runtime growth on the order of O(log(number of processors)). We can efficiently model very large neural networks which have many neurons and interconnects and our mapping can extend to arbitrarily large networks (within memory limitations) by merging the memory space of separate processors with fast adjacent processor interprocessor communications. This paper will consider the simulation of only feed forward neural network although this method is extendable to recurrent networks.
75 FR 34096 - Application(s) for Duty-Free Entry of Scientific Instruments
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-16
... dynamin, using negative stain nad cryo-electron microscopy methods. Justification for Duty-Free Entry..., using negative stain nad cryo-electron microscopy methods. Justification for Duty-Free Entry: There are...
Murshid, N S
2016-12-01
The present study adds to extant literature on the association between microfinance participation and intimate partner violence (IPV) by assessing a national sample of men married to microfinance participants. The key objective was to assess whether there was a positive association between wives' microfinance participation and men's perpetration and justification of IPV in urban areas of Bangladesh. This study is based on a population-based secondary data analysis. In this cross-sectional study, data from a national sample of men from the 2007 Bangladesh Demographic and Health Survey were analysed using logistic regression analyses. IPV perpetration was measured using a modified Conflict Tactics Scale and justification of IPV was measured based on 'justification of wife beating' statements with which men agreed or disagreed. Men married to microfinance participants were not significantly different from men married to non-participants of microfinance in terms of IPV perpetration in both urban and rural areas. However, the interaction effect of wives' microfinance participation and urban living on men's justification of IPV revealed a significant and positive beta coefficient. Specifically, wives' participation in microfinance was positively associated with men's justification of IPV in urban areas (β = 0.51, P < 0.05). Microfinance organizations in urban areas should bundle microfinancial services with IPV screening and intervention geared toward men and women. Copyright © 2016 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
Hyperswitch Communication Network Computer
NASA Technical Reports Server (NTRS)
Peterson, John C.; Chow, Edward T.; Priel, Moshe; Upchurch, Edwin T.
1993-01-01
Hyperswitch Communications Network (HCN) computer is prototype multiple-processor computer being developed. Incorporates improved version of hyperswitch communication network described in "Hyperswitch Network For Hypercube Computer" (NPO-16905). Designed to support high-level software and expansion of itself. HCN computer is message-passing, multiple-instruction/multiple-data computer offering significant advantages over older single-processor and bus-based multiple-processor computers, with respect to price/performance ratio, reliability, availability, and manufacturing. Design of HCN operating-system software provides flexible computing environment accommodating both parallel and distributed processing. Also achieves balance among following competing factors; performance in processing and communications, ease of use, and tolerance of (and recovery from) faults.
Network Patch Cables Demystified: A Super Activity for Computer Networking Technology
ERIC Educational Resources Information Center
Brown, Douglas L.
2004-01-01
This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the…
NASA Technical Reports Server (NTRS)
Pera, R. J.; Onat, E.; Klees, G. W.; Tjonneland, E.
1977-01-01
Weight and envelope dimensions of aircraft gas turbine engines are estimated within plus or minus 5% to 10% using a computer method based on correlations of component weight and design features of 29 data base engines. Rotating components are estimated by a preliminary design procedure where blade geometry, operating conditions, material properties, shaft speed, hub-tip ratio, etc., are the primary independent variables used. The development and justification of the method selected, the various methods of analysis, the use of the program, and a description of the input/output data are discussed.
Chinese Herbal Medicine Meets Biological Networks of Complex Diseases: A Computational Perspective
Gu, Shuo
2017-01-01
With the rapid development of cheminformatics, computational biology, and systems biology, great progress has been made recently in the computational research of Chinese herbal medicine with in-depth understanding towards pharmacognosy. This paper summarized these studies in the aspects of computational methods, traditional Chinese medicine (TCM) compound databases, and TCM network pharmacology. Furthermore, we chose arachidonic acid metabolic network as a case study to demonstrate the regulatory function of herbal medicine in the treatment of inflammation at network level. Finally, a computational workflow for the network-based TCM study, derived from our previous successful applications, was proposed. PMID:28690664
Chinese Herbal Medicine Meets Biological Networks of Complex Diseases: A Computational Perspective.
Gu, Shuo; Pei, Jianfeng
2017-01-01
With the rapid development of cheminformatics, computational biology, and systems biology, great progress has been made recently in the computational research of Chinese herbal medicine with in-depth understanding towards pharmacognosy. This paper summarized these studies in the aspects of computational methods, traditional Chinese medicine (TCM) compound databases, and TCM network pharmacology. Furthermore, we chose arachidonic acid metabolic network as a case study to demonstrate the regulatory function of herbal medicine in the treatment of inflammation at network level. Finally, a computational workflow for the network-based TCM study, derived from our previous successful applications, was proposed.
HeNCE: A Heterogeneous Network Computing Environment
Beguelin, Adam; Dongarra, Jack J.; Geist, George Al; ...
1994-01-01
Network computing seeks to utilize the aggregate resources of many networked computers to solve a single problem. In so doing it is often possible to obtain supercomputer performance from an inexpensive local area network. The drawback is that network computing is complicated and error prone when done by hand, especially if the computers have different operating systems and data formats and are thus heterogeneous. The heterogeneous network computing environment (HeNCE) is an integrated graphical environment for creating and running parallel programs over a heterogeneous collection of computers. It is built on a lower level package called parallel virtual machine (PVM).more » The HeNCE philosophy of parallel programming is to have the programmer graphically specify the parallelism of a computation and to automate, as much as possible, the tasks of writing, compiling, executing, debugging, and tracing the network computation. Key to HeNCE is a graphical language based on directed graphs that describe the parallelism and data dependencies of an application. Nodes in the graphs represent conventional Fortran or C subroutines and the arcs represent data and control flow. This article describes the present state of HeNCE, its capabilities, limitations, and areas of future research.« less
A simple model for DSS-14 outage times
NASA Technical Reports Server (NTRS)
Rumsey, H. C.; Stevens, R.; Posner, E. C.
1989-01-01
A model is proposed to describe DSS-14 outage times. Discrepancy Reporting System outage data for the period from January 1986 through September 1988 are used to estimate the parameters of the model. The model provides a probability distribution for the duration of outages, which agrees well with observed data. The model depends only on a small number of parameters, and has some heuristic justification. This shows that the Discrepancy Reporting System in the Deep Space Network (DSN) can be used to estimate the probability of extended outages in spite of the discrepancy reports ending when the pass ends. The probability of an outage extending beyond the end of a pass is estimated as around 5 percent.
NASA Astrophysics Data System (ADS)
Toledo-Suárez, Carlos D.
It is proposed a way of increasing the cardinality of an alphabet used to write rules in a learning classifier system that extends the idea of relational schemata. Theoretical justifications regarding the possible reduction in the amount of rules for the solution of problems such extended alphabets (st-alphabets) imply are shown. It is shown that when expressed as bipolar neural networks, the matching process of rules over st-alphabets strongly resembles a gene expression mechanism applied to a system over {0,1,#}. In spite of the apparent drawbacks the explicit use of such relational alphabets would imply, their successful implementation in an information gain based classifier system (IGCS) is presented.
Analysis of Computer Network Information Based on "Big Data"
NASA Astrophysics Data System (ADS)
Li, Tianli
2017-11-01
With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.
Pacific Educational Computer Network Study. Final Report.
ERIC Educational Resources Information Center
Hawaii Univ., Honolulu. ALOHA System.
The Pacific Educational Computer Network Feasibility Study examined technical and non-technical aspects of the formation of an international Pacific Area computer network for higher education. The technical study covered the assessment of the feasibility of a packet-switched satellite and radio ground distribution network for data transmission…
The implementation, interpretation, and justification of likelihoods in cosmology
NASA Astrophysics Data System (ADS)
McCoy, C. D.
2018-05-01
I discuss the formal implementation, interpretation, and justification of likelihood attributions in cosmology. I show that likelihood arguments in cosmology suffer from significant conceptual and formal problems that undermine their applicability in this context.
Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.
ERIC Educational Resources Information Center
Pierre, Samuel
2001-01-01
Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…
2000-02-01
CONSIDERATIONS ix-xx FUTURE YEARS DEFENSE PLAN AUDIT TRAIL xxi-xxiii PROJECT JUSTIFICATION DOCUMENTS 1-149 PLANNING & DESIGN JUSTIFICATION DOCUMENT 15 0...OUTSTANDING POLUTION AND SAFETY DEFICIENCIES: DDl°™1390s2 MAY 78 1. COMPONENT FY 2001 GUARD AND RESERVE 2. DATE ARNG MILITARY CONSTRUCTION FEB00 3...TOTAL 36 286 13 MAJOR EQUIPMENT AND AIRCRAFT TYPE AUTHORIZED ASSIGNED 14. OUTSTANDING POLUTION AND SAFETY DEFICIENCIES: DD:A O™1390S2 1
1990-09-01
Justification Cat: Left Timeliness Identifier: Qwe (FI] Domain I Def Text: -Press [F3 to nove in/out of the fields below. Use ARROW keys to scroll- Rec: Host...Delete a record Elemont Creator ID: Justification Cat: Left Timeliness Identifier: Qwe [FI) Domain Def Text: - Press (F3) to move in/out of the...Number: 1 Alias Name: Accounting Code Data Value Type ID: QL Max Length Characters: 34 Timeliness ID: Qwe Justification Category: Left Creator ID: Domain
Distributed Computer Networks in Support of Complex Group Practices
Wess, Bernard P.
1978-01-01
The economics of medical computer networks are presented in context with the patient care and administrative goals of medical networks. Design alternatives and network topologies are discussed with an emphasis on medical network design requirements in distributed data base design, telecommunications, satellite systems, and software engineering. The success of the medical computer networking technology is predicated on the ability of medical and data processing professionals to design comprehensive, efficient, and virtually impenetrable security systems to protect data bases, network access and services, and patient confidentiality.
Military clouds: utilization of cloud computing systems at the battlefield
NASA Astrophysics Data System (ADS)
Süleyman, Sarıkürk; Volkan, Karaca; İbrahim, Kocaman; Ahmet, Şirzai
2012-05-01
Cloud computing is known as a novel information technology (IT) concept, which involves facilitated and rapid access to networks, servers, data saving media, applications and services via Internet with minimum hardware requirements. Use of information systems and technologies at the battlefield is not new. Information superiority is a force multiplier and is crucial to mission success. Recent advances in information systems and technologies provide new means to decision makers and users in order to gain information superiority. These developments in information technologies lead to a new term, which is known as network centric capability. Similar to network centric capable systems, cloud computing systems are operational today. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to network centric applications will increase the flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities. In this paper, cloud computing and network centric capability concepts are defined. Some commercial cloud computing products and applications are mentioned. Network centric capable applications are covered. Cloud computing supported battlefield applications are analyzed. The effects of cloud computing systems on network centric capability and on the information domain in future warfare are discussed. Battlefield opportunities and novelties which might be introduced to network centric capability by cloud computing systems are researched. The role of military clouds in future warfare is proposed in this paper. It was concluded that military clouds will be indispensible components of the future battlefield. Military clouds have the potential of improving network centric capabilities, increasing situational awareness at the battlefield and facilitating the settlement of information superiority.
Moving BASISplus and TECHLIBplus from VAX/VMS to UNIX
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dominiak, R.
1993-12-31
BASISplus is used at the Laboratory by the Technical Information Services (TIS) Department which is part of the Information and Publishing Division at ARGONNE. TIS operates the Argonne Information Management System (AIM). The AIM System consists of the ANL Libraries On-Line Database (a TECHLIBplus database), the Current Journals Database (IDI`s current contents search), the ANL Publications Tracking Database (a TECHLIBplus database), the Powder Diffraction File Database, and several CD-ROM databases available through a Novell network. The AIM System is available from the desktop of ANL staff through modem and network connections, as well as from the 10 science libraries atmore » ARGONNE. TIS has been a BASISplus and TECHLIBplus site from the start, and never migrated from BASIS K. The decision to migrate from the VAX/VMS platform to a UNIX platform. Migrating a product from one platform to another involves many decisions and considerations. These justifications, decisions, and considerations are explored in this report.« less
Archer, Charles J.; Inglett, Todd A.; Ratterman, Joseph D.; Smith, Brian E.
2010-03-02
Methods, apparatus, and products are disclosed for configuring compute nodes of a parallel computer in an operational group into a plurality of independent non-overlapping collective networks, the compute nodes in the operational group connected together for data communications through a global combining network, that include: partitioning the compute nodes in the operational group into a plurality of non-overlapping subgroups; designating one compute node from each of the non-overlapping subgroups as a master node; and assigning, to the compute nodes in each of the non-overlapping subgroups, class routing instructions that organize the compute nodes in that non-overlapping subgroup as a collective network such that the master node is a physical root.
An Argumentation Framework based on Paraconsistent Logic
NASA Astrophysics Data System (ADS)
Umeda, Yuichi; Takahashi, Takehisa; Sawamura, Hajime
Argumentation is the most representative of intelligent activities of humans. Therefore, it is natural to think that it could have many implications for artificial intelligence and computer science as well. Specifically, argumentation may be considered a most primitive capability for interaction among computational agents. In this paper we present an argumentation framework based on the four-valued paraconsistent logic. Tolerance and acceptance of inconsistency that this logic has as its logical feature allow for arguments on inconsistent knowledge bases with which we are often confronted. We introduce various concepts for argumentation, such as arguments, attack relations, argument justification, preferential criteria of arguments based on social norms, and so on, in a way proper to the four-valued paraconsistent logic. Then, we provide the fixpoint semantics and dialectical proof theory for our argumentation framework. We also give the proofs of the soundness and completeness.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tuo, Rui; Jeff Wu, C. F.
Calibration parameters in deterministic computer experiments are those attributes that cannot be measured or available in physical experiments. Here, an approach to estimate them by using data from physical experiments and computer simulations. A theoretical framework is given which allows us to study the issues of parameter identifiability and estimation. We define the L 2-consistency for calibration as a justification for calibration methods. It is shown that a simplified version of the original KO method leads to asymptotically L 2-inconsistent calibration. This L 2-inconsistency can be remedied by modifying the original estimation procedure. A novel calibration method, called the Lmore » 2 calibration, is proposed and proven to be L 2-consistent and enjoys optimal convergence rate. Furthermore a numerical example and some mathematical analysis are used to illustrate the source of the L 2-inconsistency problem.« less
Appealing to the crowd: ethical justifications in Canadian medical crowdfunding campaigns
Snyder, Jeremy; Crooks, Valorie A; Mathers, Annalise; Chow-White, Peter
2017-01-01
Medical crowdfunding is growing in terms of the number of active campaigns, amount of funding raised and public visibility. Little is known about how campaigners appeal to potential donors outside of anecdotal evidence collected in news reports on specific medical crowdfunding campaigns. This paper offers a first step towards addressing this knowledge gap by examining medical crowdfunding campaigns for Canadian recipients. Using 80 medical crowdfunding campaigns for Canadian recipients, we analyse how Canadians justify to others that they ought to contribute to funding their health needs. We find the justifications campaigners tend to fall into three themes: personal connections, depth of need and giving back. We further discuss how these appeals can understood in terms of ethical justifications for giving and how these justifications should be assessed in light of the academic literature on ethical concerns raised by medical crowdfunding. PMID:28137998
Feygina, Irina; Jost, John T; Goldsmith, Rachel E
2010-03-01
Despite extensive evidence of climate change and environmental destruction, polls continue to reveal widespread denial and resistance to helping the environment. It is posited here that these responses are linked to the motivational tendency to defend and justify the societal status quo in the face of the threat posed by environmental problems. The present research finds that system justification tendencies are associated with greater denial of environmental realities and less commitment to pro-environmental action. Moreover, the effects of political conservatism, national identification, and gender on denial of environmental problems are explained by variability in system justification tendencies. However, this research finds that it is possible to eliminate the negative effect of system justification on environmentalism by encouraging people to regard pro-environmental change as patriotic and consistent with protecting the status quo (i.e., as a case of "system-sanctioned change"). Theoretical and practical implications of these findings are discussed.
Justification bias in self-reported disability: New evidence from panel data.
Black, Nicole; Johnston, David W; Suziedelyte, Agne
2017-07-01
The relationship between health and work is frequently investigated using self-assessments of disability from social surveys. The complication is that respondents may overstate their level of disability to justify non-employment and welfare receipt. This study provides new evidence on the existence and magnitude of justification bias by exploiting a novel feature of a large longitudinal survey: each wave respondents are asked identical disability questions twice; near the beginning and end of the face-to-face interview. Prior to answering the second disability question, respondents are asked a series of questions that increase the salience of their employment and welfare circumstances. Justification bias is identified by comparing the variation between the two measures within-individuals over time, with the variation in employment status over time. Results indicate substantial and statistically significant justification bias; especially for men and women who receive disability pensions. Copyright © 2017 Elsevier B.V. All rights reserved.
Building a medical image processing algorithm verification database
NASA Astrophysics Data System (ADS)
Brown, C. Wayne
2000-06-01
The design of a database containing head Computed Tomography (CT) studies is presented, along with a justification for the database's composition. The database will be used to validate software algorithms that screen normal head CT studies from studies that contain pathology. The database is designed to have the following major properties: (1) a size sufficient for statistical viability, (2) inclusion of both normal (no pathology) and abnormal scans, (3) inclusion of scans due to equipment malfunction, technologist error, and uncooperative patients, (4) inclusion of data sets from multiple scanner manufacturers, (5) inclusion of data sets from different gender and age groups, and (6) three independent diagnosis of each data set. Designed correctly, the database will provide a partial basis for FDA (United States Food and Drug Administration) approval of image processing algorithms for clinical use. Our goal for the database is the proof of viability of screening head CT's for normal anatomy using computer algorithms. To put this work into context, a classification scheme for 'computer aided diagnosis' systems is proposed.
ERIC Educational Resources Information Center
Aupperle, Eric M.; Davis, Donna L.
1978-01-01
The successful Merit Computer Network is examined in terms of both technology and operational management. The network is fully operational and has a significant and rapidly increasing usage, with three major institutions currently sharing computer resources. (Author/CMV)
NASA Astrophysics Data System (ADS)
Zhang, Hong
2017-06-01
In recent years, with the continuous development and application of network technology, network security has gradually entered people's field of vision. The host computer network external network of violations is an important reason for the threat of network security. At present, most of the work units have a certain degree of attention to network security, has taken a lot of means and methods to prevent network security problems such as the physical isolation of the internal network, install the firewall at the exit. However, these measures and methods to improve network security are often not comply with the safety rules of human behavior damage. For example, the host to wireless Internet access and dual-network card to access the Internet, inadvertently formed a two-way network of external networks and computer connections [1]. As a result, it is possible to cause some important documents and confidentiality leak even in the the circumstances of user unaware completely. Secrecy Computer Violation Out-of-band monitoring technology can largely prevent the violation by monitoring the behavior of the offending connection. In this paper, we mainly research and discuss the technology of secret computer monitoring.
Integrated Information and State Differentiation
Marshall, William; Gomez-Ramirez, Jaime; Tononi, Giulio
2016-01-01
Integrated information (Φ) is a measure of the cause-effect power of a physical system. This paper investigates the relationship between Φ as defined in Integrated Information Theory and state differentiation (D), the number of, and difference between potential system states. Here we provide theoretical justification of the relationship between Φ and D, then validate the results using a simulation study. First, we show that a physical system in a state with high Φ necessarily has many elements and specifies many causal relationships. Furthermore, if the average value of integrated information across all states is high, the system must also have high differentiation. Next, we explore the use of D as a proxy for Φ using artificial networks, evolved to have integrated structures. The results show a positive linear relationship between Φ and D for multiple network sizes and connectivity patterns. Finally we investigate the differentiation evoked by sensory inputs and show that, under certain conditions, it is possible to estimate integrated information without a direct perturbation of its internal elements. In concluding, we discuss the need for further validation on larger networks and explore the potential applications of this work to the empirical study of consciousness, especially concerning the practical estimation of Φ from neuroimaging data. PMID:27445896
A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks
NASA Technical Reports Server (NTRS)
Cui, Zhenqian
1999-01-01
With the development of high-speed networking technology, computer networks, including local-area networks (LANs), wide-area networks (WANs) and the Internet, are extending their traditional roles of carrying computer data. They are being used for Internet telephony, multimedia applications such as conferencing and video on demand, distributed simulations, and other real-time applications. LANs are even used for distributed real-time process control and computing as a cost-effective approach. Differing from traditional data transfer, these new classes of high-speed network applications (video, audio, real-time process control, and others) are delay sensitive. The usefulness of data depends not only on the correctness of received data, but also the time that data are received. In other words, these new classes of applications require networks to provide guaranteed services or quality of service (QoS). Quality of service can be defined by a set of parameters and reflects a user's expectation about the underlying network's behavior. Traditionally, distinct services are provided by different kinds of networks. Voice services are provided by telephone networks, video services are provided by cable networks, and data transfer services are provided by computer networks. A single network providing different services is called an integrated-services network.
A Study of Complex Deep Learning Networks on High Performance, Neuromorphic, and Quantum Computers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Potok, Thomas E; Schuman, Catherine D; Young, Steven R
Current Deep Learning models use highly optimized convolutional neural networks (CNN) trained on large graphical processing units (GPU)-based computers with a fairly simple layered network topology, i.e., highly connected layers, without intra-layer connections. Complex topologies have been proposed, but are intractable to train on current systems. Building the topologies of the deep learning network requires hand tuning, and implementing the network in hardware is expensive in both cost and power. In this paper, we evaluate deep learning models using three different computing architectures to address these problems: quantum computing to train complex topologies, high performance computing (HPC) to automatically determinemore » network topology, and neuromorphic computing for a low-power hardware implementation. Due to input size limitations of current quantum computers we use the MNIST dataset for our evaluation. The results show the possibility of using the three architectures in tandem to explore complex deep learning networks that are untrainable using a von Neumann architecture. We show that a quantum computer can find high quality values of intra-layer connections and weights, while yielding a tractable time result as the complexity of the network increases; a high performance computer can find optimal layer-based topologies; and a neuromorphic computer can represent the complex topology and weights derived from the other architectures in low power memristive hardware. This represents a new capability that is not feasible with current von Neumann architecture. It potentially enables the ability to solve very complicated problems unsolvable with current computing technologies.« less
Computer Mediated Social Network Approach to Software Support and Maintenance
2010-06-01
Page 1 Computer Mediated Social Network Approach to Software Support and Maintenance LTC J. Carlos Vega *Student Paper* Point...DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Computer Mediated Social Network Approach to Software Support and Maintenance...This research highlights the preliminary findings on the potential of computer mediated social networks . This research focused on social networks as
Pecevski, Dejan; Buesing, Lars; Maass, Wolfgang
2011-01-01
An important open problem of computational neuroscience is the generic organization of computations in networks of neurons in the brain. We show here through rigorous theoretical analysis that inherent stochastic features of spiking neurons, in combination with simple nonlinear computational operations in specific network motifs and dendritic arbors, enable networks of spiking neurons to carry out probabilistic inference through sampling in general graphical models. In particular, it enables them to carry out probabilistic inference in Bayesian networks with converging arrows (“explaining away”) and with undirected loops, that occur in many real-world tasks. Ubiquitous stochastic features of networks of spiking neurons, such as trial-to-trial variability and spontaneous activity, are necessary ingredients of the underlying computational organization. We demonstrate through computer simulations that this approach can be scaled up to neural emulations of probabilistic inference in fairly large graphical models, yielding some of the most complex computations that have been carried out so far in networks of spiking neurons. PMID:22219717
Spontaneous Ad Hoc Mobile Cloud Computing Network
Lacuesta, Raquel; Sendra, Sandra; Peñalver, Lourdes
2014-01-01
Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715
Spontaneous ad hoc mobile cloud computing network.
Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes
2014-01-01
Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.
Getting Online: A Friendly Guide for Teachers, Students, and Parents.
ERIC Educational Resources Information Center
Educational Resources Information Center (ED), Washington, DC.
This brochure provides teachers, students, and parents with information on how to connect to a computer network; describes some of the education offerings available to network users; and offers hints to help make exploration of computer networks easy and successful. The brochure explains the equipment needed to connect to a computer network; ways…
Multiphasic Health Testing in the Clinic Setting
LaDou, Joseph
1971-01-01
The economy of automated multiphasic health testing (amht) activities patterned after the high-volume Kaiser program can be realized in low-volume settings. amht units have been operated at daily volumes of 20 patients in three separate clinical environments. These programs have displayed economics entirely compatible with cost figures published by the established high-volume centers. This experience, plus the expanding capability of small, general purpose, digital computers (minicomputers) indicates that a group of six or more physicians generating 20 laboratory appraisals per day can economically justify a completely automated multiphasic health testing facility. This system would reside in the clinic or hospital where it is used and can be configured to do analyses such as electrocardiography and generate laboratory reports, and communicate with large computer systems in university medical centers. Experience indicates that the most effective means of implementing these benefits of automation is to make them directly available to the medical community with the physician playing the central role. Economic justification of a dedicated computer through low-volume health testing then allows, as a side benefit, automation of administrative as well as other diagnostic activities—for example, patient billing, computer-aided diagnosis, and computer-aided therapeutics. PMID:4935771
49 CFR 611.9 - Project justification criteria for grants and loans for fixed guideway systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... evaluations and assign ratings for project justification, FTA will evaluate information developed locally... of the criteria will be expressed in terms of descriptive indicators, as follows: “high,” “medium...
49 CFR 611.9 - Project justification criteria for grants and loans for fixed guideway systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... evaluations and assign ratings for project justification, FTA will evaluate information developed locally... of the criteria will be expressed in terms of descriptive indicators, as follows: “high,” “medium...
49 CFR 611.9 - Project justification criteria for grants and loans for fixed guideway systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... evaluations and assign ratings for project justification, FTA will evaluate information developed locally... of the criteria will be expressed in terms of descriptive indicators, as follows: “high,” “medium...
Ku-band signal design study. [space shuttle orbiter data processing network
NASA Technical Reports Server (NTRS)
Rubin, I.
1978-01-01
Analytical tools, methods and techniques for assessing the design and performance of the space shuttle orbiter data processing system (DPS) are provided. The computer data processing network is evaluated in the key areas of queueing behavior synchronization and network reliability. The structure of the data processing network is described as well as the system operation principles and the network configuration. The characteristics of the computer systems are indicated. System reliability measures are defined and studied. System and network invulnerability measures are computed. Communication path and network failure analysis techniques are included.
ERIC Educational Resources Information Center
Emery, James C., Ed.
A comprehensive review of the current status, prospects, and problems of computer networking in higher education is presented from the perspectives of both computer users and network suppliers. Several areas of computer use are considered including applications for instruction, research, and administration in colleges and universities. In the…
Malone, J; Guleria, R; Craven, C; Horton, P; Järvinen, H; Mayo, J; O'reilly, G; Picano, E; Remedios, D; Le Heron, J; Rehani, M; Holmberg, O; Czarwinski, R
2012-05-01
The Radiation Protection of Patients Unit of the International Atomic Energy Agency (IAEA) is concerned about the effectiveness of justification of diagnostic medical exposures. Recent published work and the report of an initial IAEA consultation in the area gave grounds for such concerns. There is a significant level of inappropriate usage, and, in some cases, a poor level of awareness of dose and risk among some key groups involved. This article aims to address this. The IAEA convened a second group of experts in November 2008 to review practical and achievable actions that might lead to more effective justification. This report summarises the matters that this group considered and the outcome of their deliberations. There is a need for improved communication, both within professions and between professionals on one hand, and between professionals and the patients/public on the other. Coupled with this, the issue of consent to imaging procedures was revisited. The need for good evidence-based referral guidelines or criteria of acceptability was emphasised, as was the need for their global adaptation and dissemination. Clinical audit was regarded as a key tool in ensuring that justification becomes an effective, transparent and accountable part of normal radiological practice. In summary, justification would be facilitated by the "3 As": awareness, appropriateness and audit.
Teaching Advanced Concepts in Computer Networks: VNUML-UM Virtualization Tool
ERIC Educational Resources Information Center
Ruiz-Martinez, A.; Pereniguez-Garcia, F.; Marin-Lopez, R.; Ruiz-Martinez, P. M.; Skarmeta-Gomez, A. F.
2013-01-01
In the teaching of computer networks the main problem that arises is the high price and limited number of network devices the students can work with in the laboratories. Nowadays, with virtualization we can overcome this limitation. In this paper, we present a methodology that allows students to learn advanced computer network concepts through…
Computer Networks and Networking: A Primer.
ERIC Educational Resources Information Center
Collins, Mauri P.
1993-01-01
Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…
The development of computer networks: First results from a microeconomic model
NASA Astrophysics Data System (ADS)
Maier, Gunther; Kaufmann, Alexander
Computer networks like the Internet are gaining importance in social and economic life. The accelerating pace of the adoption of network technologies for business purposes is a rather recent phenomenon. Many applications are still in the early, sometimes even experimental, phase. Nevertheless, it seems to be certain that networks will change the socioeconomic structures we know today. This is the background for our special interest in the development of networks, in the role of spatial factors influencing the formation of networks, and consequences of networks on spatial structures, and in the role of externalities. This paper discusses a simple economic model - based on a microeconomic calculus - that incorporates the main factors that generate the growth of computer networks. The paper provides analytic results about the generation of computer networks. The paper discusses (1) under what conditions economic factors will initiate the process of network formation, (2) the relationship between individual and social evaluation, and (3) the efficiency of a network that is generated based on economic mechanisms.
Computer network defense system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Urias, Vincent; Stout, William M. S.; Loverro, Caleb
A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves networkmore » connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.« less
ERIC Educational Resources Information Center
Mississippi Research and Curriculum Unit for Vocational and Technical Education, State College.
This document, which is intended for use by community and junior colleges throughout Mississippi, contains curriculum frameworks for two programs in the state's postsecondary-level computer information systems technology cluster: computer programming and network support. Presented in the introduction are program descriptions and suggested course…
From photons to big-data applications: terminating terabits
2016-01-01
Computer architectures have entered a watershed as the quantity of network data generated by user applications exceeds the data-processing capacity of any individual computer end-system. It will become impossible to scale existing computer systems while a gap grows between the quantity of networked data and the capacity for per system data processing. Despite this, the growth in demand in both task variety and task complexity continues unabated. Networked computer systems provide a fertile environment in which new applications develop. As networked computer systems become akin to infrastructure, any limitation upon the growth in capacity and capabilities becomes an important constraint of concern to all computer users. Considering a networked computer system capable of processing terabits per second, as a benchmark for scalability, we critique the state of the art in commodity computing, and propose a wholesale reconsideration in the design of computer architectures and their attendant ecosystem. Our proposal seeks to reduce costs, save power and increase performance in a multi-scale approach that has potential application from nanoscale to data-centre-scale computers. PMID:26809573
From photons to big-data applications: terminating terabits.
Zilberman, Noa; Moore, Andrew W; Crowcroft, Jon A
2016-03-06
Computer architectures have entered a watershed as the quantity of network data generated by user applications exceeds the data-processing capacity of any individual computer end-system. It will become impossible to scale existing computer systems while a gap grows between the quantity of networked data and the capacity for per system data processing. Despite this, the growth in demand in both task variety and task complexity continues unabated. Networked computer systems provide a fertile environment in which new applications develop. As networked computer systems become akin to infrastructure, any limitation upon the growth in capacity and capabilities becomes an important constraint of concern to all computer users. Considering a networked computer system capable of processing terabits per second, as a benchmark for scalability, we critique the state of the art in commodity computing, and propose a wholesale reconsideration in the design of computer architectures and their attendant ecosystem. Our proposal seeks to reduce costs, save power and increase performance in a multi-scale approach that has potential application from nanoscale to data-centre-scale computers. © 2016 The Authors.
Lee, Wei-Po; Hsiao, Yu-Ting; Hwang, Wei-Che
2014-01-16
To improve the tedious task of reconstructing gene networks through testing experimentally the possible interactions between genes, it becomes a trend to adopt the automated reverse engineering procedure instead. Some evolutionary algorithms have been suggested for deriving network parameters. However, to infer large networks by the evolutionary algorithm, it is necessary to address two important issues: premature convergence and high computational cost. To tackle the former problem and to enhance the performance of traditional evolutionary algorithms, it is advisable to use parallel model evolutionary algorithms. To overcome the latter and to speed up the computation, it is advocated to adopt the mechanism of cloud computing as a promising solution: most popular is the method of MapReduce programming model, a fault-tolerant framework to implement parallel algorithms for inferring large gene networks. This work presents a practical framework to infer large gene networks, by developing and parallelizing a hybrid GA-PSO optimization method. Our parallel method is extended to work with the Hadoop MapReduce programming model and is executed in different cloud computing environments. To evaluate the proposed approach, we use a well-known open-source software GeneNetWeaver to create several yeast S. cerevisiae sub-networks and use them to produce gene profiles. Experiments have been conducted and the results have been analyzed. They show that our parallel approach can be successfully used to infer networks with desired behaviors and the computation time can be largely reduced. Parallel population-based algorithms can effectively determine network parameters and they perform better than the widely-used sequential algorithms in gene network inference. These parallel algorithms can be distributed to the cloud computing environment to speed up the computation. By coupling the parallel model population-based optimization method and the parallel computational framework, high quality solutions can be obtained within relatively short time. This integrated approach is a promising way for inferring large networks.
2014-01-01
Background To improve the tedious task of reconstructing gene networks through testing experimentally the possible interactions between genes, it becomes a trend to adopt the automated reverse engineering procedure instead. Some evolutionary algorithms have been suggested for deriving network parameters. However, to infer large networks by the evolutionary algorithm, it is necessary to address two important issues: premature convergence and high computational cost. To tackle the former problem and to enhance the performance of traditional evolutionary algorithms, it is advisable to use parallel model evolutionary algorithms. To overcome the latter and to speed up the computation, it is advocated to adopt the mechanism of cloud computing as a promising solution: most popular is the method of MapReduce programming model, a fault-tolerant framework to implement parallel algorithms for inferring large gene networks. Results This work presents a practical framework to infer large gene networks, by developing and parallelizing a hybrid GA-PSO optimization method. Our parallel method is extended to work with the Hadoop MapReduce programming model and is executed in different cloud computing environments. To evaluate the proposed approach, we use a well-known open-source software GeneNetWeaver to create several yeast S. cerevisiae sub-networks and use them to produce gene profiles. Experiments have been conducted and the results have been analyzed. They show that our parallel approach can be successfully used to infer networks with desired behaviors and the computation time can be largely reduced. Conclusions Parallel population-based algorithms can effectively determine network parameters and they perform better than the widely-used sequential algorithms in gene network inference. These parallel algorithms can be distributed to the cloud computing environment to speed up the computation. By coupling the parallel model population-based optimization method and the parallel computational framework, high quality solutions can be obtained within relatively short time. This integrated approach is a promising way for inferring large networks. PMID:24428926
78 FR 13860 - Application(s) for Duty-Free Entry of Scientific Instruments
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-01
... human diseases including cancer, cardiovascular disease, immunodeficiency and dementia. Justification... organism levels. The data will be used to improve management of human diseases including cancer, cardiovascular disease, immunodeficiency and dementia. Justification for Duty-Free Entry: There are no...
Inoculating against Pro-Plagiarism Justifications: Rational and Affective Strategies
ERIC Educational Resources Information Center
Compton, Josh; Pfau, Michael
2008-01-01
Student plagiarism continues to threaten academic integrity. This investigation assessed whether an inoculation message strategy could combat university plagiarism by protecting student attitudes against pro-plagiarism justification arguments. Additionally, we sought theoretical confirmation of previous findings on involvement and accessibility in…
48 CFR 606.304 - Approval of the justification.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Approval of the justification. 606.304 Section 606.304 Federal Acquisition Regulations System DEPARTMENT OF STATE COMPETITION AND ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.304...
16 CFR 1702.7 - Justification for the exemption.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 2 2014-01-01 2014-01-01 false Justification for the exemption. 1702.7 Section 1702.7 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION POISON PREVENTION PACKAGING ACT OF 1970 REGULATIONS PETITIONS FOR EXEMPTIONS FROM POISON PREVENTION PACKAGING ACT REQUIREMENTS; PETITION...
16 CFR 1702.7 - Justification for the exemption.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 2 2011-01-01 2011-01-01 false Justification for the exemption. 1702.7 Section 1702.7 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION POISON PREVENTION PACKAGING ACT OF 1970 REGULATIONS PETITIONS FOR EXEMPTIONS FROM POISON PREVENTION PACKAGING ACT REQUIREMENTS; PETITION...
16 CFR 1702.7 - Justification for the exemption.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Justification for the exemption. 1702.7 Section 1702.7 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION POISON PREVENTION PACKAGING ACT OF 1970 REGULATIONS PETITIONS FOR EXEMPTIONS FROM POISON PREVENTION PACKAGING ACT REQUIREMENTS; PETITION...
16 CFR 1702.7 - Justification for the exemption.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Justification for the exemption. 1702.7 Section 1702.7 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION POISON PREVENTION PACKAGING ACT OF 1970 REGULATIONS PETITIONS FOR EXEMPTIONS FROM POISON PREVENTION PACKAGING ACT REQUIREMENTS; PETITION...
Biswas, Amitava; Liu, Chen; Monga, Inder; ...
2016-01-01
For last few years, there has been a tremendous growth in data traffic due to high adoption rate of mobile devices and cloud computing. Internet of things (IoT) will stimulate even further growth. This is increasing scale and complexity of telecom/internet service provider (SP) and enterprise data centre (DC) compute and network infrastructures. As a result, managing these large network-compute converged infrastructures is becoming complex and cumbersome. To cope up, network and DC operators are trying to automate network and system operations, administrations and management (OAM) functions. OAM includes all non-functional mechanisms which keep the network running.
A computer tool to support in design of industrial Ethernet.
Lugli, Alexandre Baratella; Santos, Max Mauro Dias; Franco, Lucia Regina Horta Rodrigues
2009-04-01
This paper presents a computer tool to support in the project and development of an industrial Ethernet network, verifying the physical layer (cables-resistance and capacitance, scan time, network power supply-POE's concept "Power Over Ethernet" and wireless), and occupation rate (amount of information transmitted to the network versus the controller network scan time). These functions are accomplished without a single physical element installed in the network, using only simulation. The computer tool has a software that presents a detailed vision of the network to the user, besides showing some possible problems in the network, and having an extremely friendly environment.
Sharing Writing through Computer Networking.
ERIC Educational Resources Information Center
Fey, Marion H.
1997-01-01
Suggests computer networking can support the essential purposes of the collaborative-writing movement, offering opportunities for sharing writing. Notes that literacy teachers are exploring the connectivity of computer networking through numerous designs that use either real-time or asynchronous communication. Discusses new roles for students and…
Organising a University Computer System: Analytical Notes.
ERIC Educational Resources Information Center
Jacquot, J. P.; Finance, J. P.
1990-01-01
Thirteen trends in university computer system development are identified, system user requirements are analyzed, critical system qualities are outlined, and three options for organizing a computer system are presented. The three systems include a centralized network, local network, and federation of local networks. (MSE)
ERIC Educational Resources Information Center
Lent, John
1984-01-01
This article describes a computer network system that connects several microcomputers to a single disk drive and one copy of software. Many schools are switching to networks as a cheaper and more efficient means of computer instruction. Teachers may be faced with copywriting problems when reproducing programs. (DF)
2009-10-09
Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US-China Economic and...the People?s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 2 US-China Economic and Security Review
Braverman, Derek W; Marcus, Brian S; Wakim, Paul G; Mercurio, Mark R; Kopf, Gary S
2017-10-01
Health care professionals (HCPs) are crucial to physician-assisted death (PAD) provision. To quantitatively assess the favorability of justifications for or against PAD legalization among HCPs, the effect of the terms "suicide" and "euthanasia" on their views and their support for three forms of PAD. Our questionnaire presented three cases: physician-assisted suicide, euthanasia for a competent patient, and euthanasia for an incompetent patient with an advance directive for euthanasia. Respondents judged whether each case was ethical and should be legal and selected their justifications from commonly cited reasons. The sample included physician clinicians, researchers, nonphysician clinicians, and other nonclinical staff at a major academic medical center. Of 221 HCPs, the majority thought that each case was ethical and should be legal. In order of declining favorability, justifications supporting PAD legalization were relief of suffering, right to die, mercy, acceptance of death, nonabandonment, and saving money for the health care system; opposing justifications were the slippery slope argument, unnecessary due to palliative care, killing patients is wrong, religious views, and suicide is wrong. The use of suicide and euthanasia terminology did not affect responses. Participants preferred physician-assisted suicide to euthanasia for a competent patient (P < 0.0001) and euthanasia for an incompetent patient to euthanasia for a competent patient (P < 0.005). HCPs endorsed patient-centered justifications over other reasons, including role-specific duties. Suicide and euthanasia language did not bias HCPs against PAD, challenging claims that such value-laden terms hinder dialogue. More research is required to understand the significance of competency in shaping attitudes toward PAD. Published by Elsevier Inc.
An examination of domestic partner violence and its justification in the Republic of Georgia
2013-01-01
Background Little research on Intimate Partner Violence (IPV) and social perceptions toward this behavior has been disseminated from Eastern Europe. This study explores the prevalence and risk factors of IPV and the justification of this behavior among women in the Republic of Georgia. It seeks to better understand how IPV and IPV justification relate and how social justification of IPV differs across socio-economic measures among this population of women. Methods This study utilizes a national sample of ever-married women from the Republic of Georgia (N = 4,302). We describe the factors that predict IPV justification among these women and the relationship between of the acceptability of IPV and victimization overall and across socio-demographic factors. Results While the overall lifetime prevalence of IPV in this sample was relatively low (4%), these women were two to four times more likely to justify IPV, Just under one-quarter of the sample agreed that IPV was justified in at least one scenario, namely when the wife was unfaithful, compared with women who had no experience being abused by a partner. Georgian women who were poor, from a rural community, had lower education, were not working and who experienced child abuse or IPV among their parents were more likely to justify this behavior. Conclusions These findings begin to fill a gap in our understanding of IPV experienced by women in Eastern Europe. In addition, these findings emphasize the need for researchers, practitioners and policy makers to contextualize IPV in terms of the justification of this behavior among the population being considered as this can play an important role in perpetration, victimization and response. PMID:24180483
A method of non-contact reading code based on computer vision
NASA Astrophysics Data System (ADS)
Zhang, Chunsen; Zong, Xiaoyu; Guo, Bingxuan
2018-03-01
With the purpose of guarantee the computer information exchange security between internal and external network (trusted network and un-trusted network), A non-contact Reading code method based on machine vision has been proposed. Which is different from the existing network physical isolation method. By using the computer monitors, camera and other equipment. Deal with the information which will be on exchanged, Include image coding ,Generate the standard image , Display and get the actual image , Calculate homography matrix, Image distort correction and decoding in calibration, To achieve the computer information security, Non-contact, One-way transmission between the internal and external network , The effectiveness of the proposed method is verified by experiments on real computer text data, The speed of data transfer can be achieved 24kb/s. The experiment shows that this algorithm has the characteristics of high security, fast velocity and less loss of information. Which can meet the daily needs of the confidentiality department to update the data effectively and reliably, Solved the difficulty of computer information exchange between Secret network and non-secret network, With distinctive originality, practicability, and practical research value.
Closeness Possible through Computer Networking.
ERIC Educational Resources Information Center
Dodd, Julie E.
1989-01-01
Points out the benefits of computer networking for scholastic journalism. Discusses three systems currently offering networking possibilities for publications: the Student Press Information Network; the Youth Communication Service; and the Dow Jones Newspaper Fund's electronic mail system. (MS)
Email networks and the spread of computer viruses
NASA Astrophysics Data System (ADS)
Newman, M. E.; Forrest, Stephanie; Balthrop, Justin
2002-09-01
Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.
13 CFR 130.460 - Budget justification.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Budget justification. 130.460 Section 130.460 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS DEVELOPMENT... in the normal course of Program administration, and conform to the written travel policies of the...
28 CFR 570.32 - Justification for furlough.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Justification for furlough. 570.32 Section 570.32 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE COMMUNITY PROGRAMS AND... plans; (3) To reestablish family and community ties; (4) To participate in selected educational, social...
48 CFR 6.305 - Availability of the justification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.305 Availability of the... contractor proprietary data and remove all such data, and such references and citations as are necessary to protect the proprietary data, before making the justifications available for public inspection...
48 CFR 6.305 - Availability of the justification.
Code of Federal Regulations, 2011 CFR
2011-10-01
... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.305 Availability of the... contractor proprietary data and remove all such data, and such references and citations as are necessary to protect the proprietary data, before making the justifications available for public inspection...
48 CFR 6.305 - Availability of the justification.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.305 Availability of the... contractor proprietary data and remove all such data, and such references and citations as are necessary to protect the proprietary data, before making the justifications available for public inspection...
48 CFR 6.305 - Availability of the justification.
Code of Federal Regulations, 2012 CFR
2012-10-01
... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.305 Availability of the... contractor proprietary data and remove all such data, and such references and citations as are necessary to protect the proprietary data, before making the justifications available for public inspection...
48 CFR 6.305 - Availability of the justification.
Code of Federal Regulations, 2013 CFR
2013-10-01
... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.305 Availability of the... contractor proprietary data and remove all such data, and such references and citations as are necessary to protect the proprietary data, before making the justifications available for public inspection...
NASA Technical Reports Server (NTRS)
Tanveer, S.; Foster, M. R.
2002-01-01
We report progress in three areas of investigation related to dendritic crystal growth. Those items include: 1. Selection of tip features dendritic crystal growth; 2) Investigation of nonlinear evolution for two-sided model; and 3) Rigorous mathematical justification.
30 CFR 700.12 - Petitions to initiate rulemaking.
Code of Federal Regulations, 2010 CFR
2010-07-01
... statement of the facts, technical justification, and law which require issuance, amendment, or repeal of a... of the petition, the Director shall determine if the petition sets forth facts, technical.... Facts, technical justification or law previously considered in a petition or rulemaking on the same...
Justification of Paternalism in Education.
ERIC Educational Resources Information Center
Nordenbo, Sven Erik
1986-01-01
A systematic presentation is given of the theories of justification normally applied to paternalistic acts: (1) pseudo-paternalism, (2) consequentialism, and (3) consent-based theories. The validity of four common arguments for educational paternalism is discussed: education is necessary, children are ignorant, children are unable to choose, and…
48 CFR 6.304 - Approval of the justification.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Approval of the justification. 6.304 Section 6.304 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.304 Approval of the...
48 CFR 1306.304 - Approval of the justification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... justification. 1306.304 Section 1306.304 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE COMPETITION AND ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 1306.304... open competition at the dollar thresholds in FAR 6.304 is set forth in CAM 1301.70. ...
48 CFR 1406.304 - Approval of the justification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Approval of the justification. 1406.304 Section 1406.304 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR COMPETITION AND ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 1406.304...
48 CFR 906.304 - Approval of the justification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Approval of the justification. 906.304 Section 906.304 Federal Acquisition Regulations System DEPARTMENT OF ENERGY COMPETITION ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 906.304 Approval of the...
Appealing to the crowd: ethical justifications in Canadian medical crowdfunding campaigns.
Snyder, Jeremy; Crooks, Valorie A; Mathers, Annalise; Chow-White, Peter
2017-06-01
Medical crowdfunding is growing in terms of the number of active campaigns, amount of funding raised and public visibility. Little is known about how campaigners appeal to potential donors outside of anecdotal evidence collected in news reports on specific medical crowdfunding campaigns. This paper offers a first step towards addressing this knowledge gap by examining medical crowdfunding campaigns for Canadian recipients. Using 80 medical crowdfunding campaigns for Canadian recipients, we analyse how Canadians justify to others that they ought to contribute to funding their health needs. We find the justifications campaigners tend to fall into three themes: personal connections, depth of need and giving back. We further discuss how these appeals can understood in terms of ethical justifications for giving and how these justifications should be assessed in light of the academic literature on ethical concerns raised by medical crowdfunding. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
On Engster's care-justification of the specialness thesis about healthcare.
Rumbold, Benedict
2017-08-01
To say health is 'special' is to say that it has a moral significance that differentiates it from other goods (cars, say or radios) and, as a matter of justice, warrants distributing it separately. In this essay, I critique a new justification for the specialness thesis about healthcare (STHC) recently put forth by Engster. I argue that, regrettably, Engster's justification of STHC ultimately fails and fails on much the same grounds as have previous justifications of STHC. However, I also argue that Engster's argument still adds something valuable to the debate around STHC insofar as it reminds us that the moral significance of healthcare may be wider than simply its effect on the incidence of disability and disease: one further reason we may think healthcare is morally significant is because it concerns the treatment and care of those who are already unwell. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Justification beliefs of violence, myths about love and cyber dating abuse.
Borrajo, Erika; Gámez-Guadix, Manuel; Calvete, Esther
2015-01-01
Distorted beliefs about violence and love are often associated with the presence of violence in dating relationships. This study analyzes the relationship between beliefs that justify violence and myths about love in two types of cyber dating abuse (control and direct aggression). The sample consisted of 656 young people between the ages of 18 and 30 years (79.5% women). Regression analysis showed that justification of cyber dating abuse was significantly associated with a higher likelihood of direct aggression in online dating relationships. Myths about love were associated with a greater likelihood of control in online dating relationships. Furthermore, the relationship between justification of cyber dating abuse and perpetration of direct aggression was stronger in women. The relationship between myths about love and perpetration of online control was stronger among the youngest individuals. The justification of abuse and myths about love are important aspects in the development of different kinds of online abuse among young couples. This finding has important implications for the prevention of and intervention in these behaviors.
Jost, John T; Kay, Aaron C
2005-03-01
Many have suggested that complementary gender stereotypes of men as agentic (but not communal) and women as communal (but not agentic) serve to increase system justification, but direct experimental support has been lacking. The authors exposed people to specific types of gender-related beliefs and subsequently asked them to complete measures of gender-specific or diffuse system justification. In Studies 1 and 2, activating (a) communal or complementary (communal + agentic) gender stereotypes or (b) benevolent or complementary (benevolent + hostile) sexist items increased support for the status quo among women. In Study 3, activating stereotypes of men as agentic also increased system justification among men and women, but only when women's characteristics were associated with higher status. Results suggest that complementary stereotypes psychologically offset the one-sided advantage of any single group and contribute to an image of society in which everyone benefits through a balanced dispersion of benefits. ((c) 2005 APA, all rights reserved).
Reducing duplicate testing: a comparison of two clinical decision support tools.
Procop, Gary W; Keating, Catherine; Stagno, Paul; Kottke-Marchant, Kandice; Partin, Mary; Tuttle, Robert; Wyllie, Robert
2015-05-01
Unnecessary duplicate laboratory testing is common and costly. Systems-based means to avert unnecessary testing should be investigated and employed. We compared the effectiveness and cost savings associated with two clinical decision support tools to stop duplicate testing. The Hard Stop required telephone contact with the laboratory and justification to have the duplicate test performed, whereas the Smart Alert allowed the provider to bypass the alert at the point of order entry without justification. The Hard Stop alert was significantly more effective than the Smart Alert (92.3% vs 42.6%, respectively; P < .0001). The cost savings realized per alert activation was $16.08/alert for the Hard Stop alert vs $3.52/alert for the Smart Alert. Structural and process changes that require laboratory contact and justification for duplicate testing are more effective than interventions that allow providers to bypass alerts without justification at point of computerized physician order entry. Copyright© by the American Society for Clinical Pathology.
Characterizing Crowd Participation and Productivity of Foldit Through Web Scraping
2016-03-01
Berkeley Open Infrastructure for Network Computing CDF Cumulative Distribution Function CPU Central Processing Unit CSSG Crowdsourced Serious Game...computers at once can create a similar capacity. According to Anderson [6], principal investigator for the Berkeley Open Infrastructure for Network...extraterrestrial life. From this project, a software-based distributed computing platform called the Berkeley Open Infrastructure for Network Computing
Introduction: Greening the countryside? Changing frameworks of EU agricultural policy.
Lowe, Philip; Feindt, Peter H; Vihinen, Hilkka
2010-01-01
In response to wide-ranging criticism of agricultural policy, especially within Western industrialized countries, new frameworks of justification are emerging and new hybrid policy fields have been established to tackle some of the ‘externalities’ of agricultural support. However, institutional frameworks are proving slower to change, partly because this would require coordinated action across different levels of governance. Nevertheless, previously marginalized environmental concerns have successfully gained entrance to agricultural policy networks, while the intersection of trade liberalization and rural diversification have undermined the dominance of the productivist mindset in government. This gives rise to a plurality of policy actors and actions which defy the conventional categories of analysis of agricultural policy, calling for changing frameworks on the polity of agriculture too.
1986-02-01
ionospheric sensing 118 I device, provide more reliable comnunications, especially when HF propagation is uncertain, by determining which frequencies...the Fleet Numerical Oceanography Center computer systems. GDEM generates a sound velocity profile from the surface to the sea floor at every 1/2...degrees of lat/log for the Northern Hemisphere oceans. GDEM is a Navy standard data base for all acoustic models. 18) Software Improvement Plan (SIP) as 600
Solving Constraint Satisfaction Problems with Networks of Spiking Neurons
Jonke, Zeno; Habenschuss, Stefan; Maass, Wolfgang
2016-01-01
Network of neurons in the brain apply—unlike processors in our current generation of computer hardware—an event-based processing strategy, where short pulses (spikes) are emitted sparsely by neurons to signal the occurrence of an event at a particular point in time. Such spike-based computations promise to be substantially more power-efficient than traditional clocked processing schemes. However, it turns out to be surprisingly difficult to design networks of spiking neurons that can solve difficult computational problems on the level of single spikes, rather than rates of spikes. We present here a new method for designing networks of spiking neurons via an energy function. Furthermore, we show how the energy function of a network of stochastically firing neurons can be shaped in a transparent manner by composing the networks of simple stereotypical network motifs. We show that this design approach enables networks of spiking neurons to produce approximate solutions to difficult (NP-hard) constraint satisfaction problems from the domains of planning/optimization and verification/logical inference. The resulting networks employ noise as a computational resource. Nevertheless, the timing of spikes plays an essential role in their computations. Furthermore, networks of spiking neurons carry out for the Traveling Salesman Problem a more efficient stochastic search for good solutions compared with stochastic artificial neural networks (Boltzmann machines) and Gibbs sampling. PMID:27065785
A Network Primer: Full-Fledged Educational Networks.
ERIC Educational Resources Information Center
Lehrer, Ariella
1988-01-01
Discusses some of the factors included in choosing appropriate computer networks for the classroom. Describes such networks as those produced by Apple Computer, Corvus Systems, Velan, Berkeley Softworks, Tandy, LAN-TECH, Unisys, and International Business Machines (IBM). (TW)
Kasturirangan, Rajesh
2008-01-01
Philosophers as well lay people often think of beliefs as psychological states with dubious epistemic properties. Beliefs are conceptualized as unregulated conceptual structures, for the most part hypothetical and often fanciful or deluded. Thinking and reasoning on the other hand are seen as rational activities regulated by rules and governed by norms. Computational modeling of the mind has focused on rule-governed behavior, ultimately trying to reduce them to rules of logic. What if thinking is less like reasoning and more like believing? I argue that the classical model of thought as rational is mistaken and that thinking is fundamentally constituted by believing. This new approach forces us to re-evaluate classical epistemic concepts like "truth", "justification" etc. Furthermore, if thinking is believing, then it is not clear how thoughts can be modeled computationally. We need new mathematical ideas to model thought, ideas that are quite different from traditional logic-based mathematical structures.
Biological modelling of a computational spiking neural network with neuronal avalanches.
Li, Xiumin; Chen, Qing; Xue, Fangzheng
2017-06-28
In recent years, an increasing number of studies have demonstrated that networks in the brain can self-organize into a critical state where dynamics exhibit a mixture of ordered and disordered patterns. This critical branching phenomenon is termed neuronal avalanches. It has been hypothesized that the homeostatic level balanced between stability and plasticity of this critical state may be the optimal state for performing diverse neural computational tasks. However, the critical region for high performance is narrow and sensitive for spiking neural networks (SNNs). In this paper, we investigated the role of the critical state in neural computations based on liquid-state machines, a biologically plausible computational neural network model for real-time computing. The computational performance of an SNN when operating at the critical state and, in particular, with spike-timing-dependent plasticity for updating synaptic weights is investigated. The network is found to show the best computational performance when it is subjected to critical dynamic states. Moreover, the active-neuron-dominant structure refined from synaptic learning can remarkably enhance the robustness of the critical state and further improve computational accuracy. These results may have important implications in the modelling of spiking neural networks with optimal computational performance.This article is part of the themed issue 'Mathematical methods in medicine: neuroscience, cardiology and pathology'. © 2017 The Author(s).
Biological modelling of a computational spiking neural network with neuronal avalanches
NASA Astrophysics Data System (ADS)
Li, Xiumin; Chen, Qing; Xue, Fangzheng
2017-05-01
In recent years, an increasing number of studies have demonstrated that networks in the brain can self-organize into a critical state where dynamics exhibit a mixture of ordered and disordered patterns. This critical branching phenomenon is termed neuronal avalanches. It has been hypothesized that the homeostatic level balanced between stability and plasticity of this critical state may be the optimal state for performing diverse neural computational tasks. However, the critical region for high performance is narrow and sensitive for spiking neural networks (SNNs). In this paper, we investigated the role of the critical state in neural computations based on liquid-state machines, a biologically plausible computational neural network model for real-time computing. The computational performance of an SNN when operating at the critical state and, in particular, with spike-timing-dependent plasticity for updating synaptic weights is investigated. The network is found to show the best computational performance when it is subjected to critical dynamic states. Moreover, the active-neuron-dominant structure refined from synaptic learning can remarkably enhance the robustness of the critical state and further improve computational accuracy. These results may have important implications in the modelling of spiking neural networks with optimal computational performance. This article is part of the themed issue `Mathematical methods in medicine: neuroscience, cardiology and pathology'.
Active Computer Network Defense: An Assessment
2001-04-01
sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center
Embracing Statistical Challenges in the Information Technology Age
2006-01-01
computation and feature selection. Moreover, two research projects on network tomography and arctic cloud detection are used throughout the paper to bring...prominent Network Tomography problem, origin- destination (OD) traffic estimation. It demonstrates well how the two modes of data collection interact...software debugging (Biblit et al, 2005 [2]), and network tomography for computer network management. Computer sys- tem problems exist long before the IT
Artificial Neural Network Metamodels of Stochastic Computer Simulations
1994-08-10
SUBTITLE r 5. FUNDING NUMBERS Artificial Neural Network Metamodels of Stochastic I () Computer Simulations 6. AUTHOR(S) AD- A285 951 Robert Allen...8217!298*1C2 ARTIFICIAL NEURAL NETWORK METAMODELS OF STOCHASTIC COMPUTER SIMULATIONS by Robert Allen Kilmer B.S. in Education Mathematics, Indiana...dedicate this document to the memory of my father, William Ralph Kilmer. mi ABSTRACT Signature ARTIFICIAL NEURAL NETWORK METAMODELS OF STOCHASTIC
DISCRETE EVENT SIMULATION OF OPTICAL SWITCH MATRIX PERFORMANCE IN COMPUTER NETWORKS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Imam, Neena; Poole, Stephen W
2013-01-01
In this paper, we present application of a Discrete Event Simulator (DES) for performance modeling of optical switching devices in computer networks. Network simulators are valuable tools in situations where one cannot investigate the system directly. This situation may arise if the system under study does not exist yet or the cost of studying the system directly is prohibitive. Most available network simulators are based on the paradigm of discrete-event-based simulation. As computer networks become increasingly larger and more complex, sophisticated DES tool chains have become available for both commercial and academic research. Some well-known simulators are NS2, NS3, OPNET,more » and OMNEST. For this research, we have applied OMNEST for the purpose of simulating multi-wavelength performance of optical switch matrices in computer interconnection networks. Our results suggest that the application of DES to computer interconnection networks provides valuable insight in device performance and aids in topology and system optimization.« less
Thermodynamic characterization of networks using graph polynomials
NASA Astrophysics Data System (ADS)
Ye, Cheng; Comin, César H.; Peron, Thomas K. DM.; Silva, Filipi N.; Rodrigues, Francisco A.; Costa, Luciano da F.; Torsello, Andrea; Hancock, Edwin R.
2015-09-01
In this paper, we present a method for characterizing the evolution of time-varying complex networks by adopting a thermodynamic representation of network structure computed from a polynomial (or algebraic) characterization of graph structure. Commencing from a representation of graph structure based on a characteristic polynomial computed from the normalized Laplacian matrix, we show how the polynomial is linked to the Boltzmann partition function of a network. This allows us to compute a number of thermodynamic quantities for the network, including the average energy and entropy. Assuming that the system does not change volume, we can also compute the temperature, defined as the rate of change of entropy with energy. All three thermodynamic variables can be approximated using low-order Taylor series that can be computed using the traces of powers of the Laplacian matrix, avoiding explicit computation of the normalized Laplacian spectrum. These polynomial approximations allow a smoothed representation of the evolution of networks to be constructed in the thermodynamic space spanned by entropy, energy, and temperature. We show how these thermodynamic variables can be computed in terms of simple network characteristics, e.g., the total number of nodes and node degree statistics for nodes connected by edges. We apply the resulting thermodynamic characterization to real-world time-varying networks representing complex systems in the financial and biological domains. The study demonstrates that the method provides an efficient tool for detecting abrupt changes and characterizing different stages in network evolution.
NASA Astrophysics Data System (ADS)
Rahman, P. A.
2018-05-01
This scientific paper deals with the two-level backbone computer networks with arbitrary topology. A specialized method, offered by the author for calculation of the stationary availability factor of the two-level backbone computer networks, based on the Markov reliability models for the set of the independent repairable elements with the given failure and repair rates and the methods of the discrete mathematics, is also discussed. A specialized algorithm, offered by the author for analysis of the network connectivity, taking into account different kinds of the network equipment failures, is also observed. Finally, this paper presents an example of calculation of the stationary availability factor for the backbone computer network with the given topology.
High performance network and channel-based storage
NASA Technical Reports Server (NTRS)
Katz, Randy H.
1991-01-01
In the traditional mainframe-centered view of a computer system, storage devices are coupled to the system through complex hardware subsystems called input/output (I/O) channels. With the dramatic shift towards workstation-based computing, and its associated client/server model of computation, storage facilities are now found attached to file servers and distributed throughout the network. We discuss the underlying technology trends that are leading to high performance network-based storage, namely advances in networks, storage devices, and I/O controller and server architectures. We review several commercial systems and research prototypes that are leading to a new approach to high performance computing based on network-attached storage.
NASA Astrophysics Data System (ADS)
Fiss, Andrew
2014-02-01
This article introduces the justification problem for mathematics, which it explores through the case study of 1820s-1840s rationales for the teaching of mathematics to women in the United States. It argues that, while educators in the 1820s justified women's studies through mental discipline (a common reason for men's study), those of the 1830s-1840s increasingly relied on separate, gendered justifications, tied to emerging ideals of middle-class femininity. This article therefore emphasizes the contingency of the justification problem, which serves to break the present-day cycle of gender stereotypes regarding mathematics.
Medically Inappropriate or Futile Treatment: Deliberation and Justification 1
Misak, Cheryl J.; White, Douglas B.; Truog, Robert D.
2016-01-01
This paper reframes the futility debate, moving away from the question “Who decides when to end what is considered to be a medically inappropriate or futile treatment?” and toward the question “How can society make policy that will best account for the multitude of values and conflicts involved in such decision-making?” It offers a pragmatist moral epistemology that provides us with (1) a clear justification of why it is important to take best standards, norms, and physician judgment seriously and (2) a clear justification of why ample opportunity must be made for patients, families, and society to challenge those standards and norms. PMID:26681796
Telecommunication Networks. Tech Use Guide: Using Computer Technology.
ERIC Educational Resources Information Center
Council for Exceptional Children, Reston, VA. Center for Special Education Technology.
One of nine brief guides for special educators on using computer technology, this guide focuses on utilizing the telecommunications capabilities of computers. Network capabilities including electronic mail, bulletin boards, and access to distant databases are briefly explained. Networks useful to the educator, general commercial systems, and local…
Network and computing infrastructure for scientific applications in Georgia
NASA Astrophysics Data System (ADS)
Kvatadze, R.; Modebadze, Z.
2016-09-01
Status of network and computing infrastructure and available services for research and education community of Georgia are presented. Research and Educational Networking Association - GRENA provides the following network services: Internet connectivity, network services, cyber security, technical support, etc. Computing resources used by the research teams are located at GRENA and at major state universities. GE-01-GRENA site is included in European Grid infrastructure. Paper also contains information about programs of Learning Center and research and development projects in which GRENA is participating.
Zhang, P; Tao, L; Zeng, X; Qin, C; Chen, S Y; Zhu, F; Yang, S Y; Li, Z R; Chen, W P; Chen, Y Z
2017-02-03
The studies of biological, disease, and pharmacological networks are facilitated by the systems-level investigations using computational tools. In particular, the network descriptors developed in other disciplines have found increasing applications in the study of the protein, gene regulatory, metabolic, disease, and drug-targeted networks. Facilities are provided by the public web servers for computing network descriptors, but many descriptors are not covered, including those used or useful for biological studies. We upgraded the PROFEAT web server http://bidd2.nus.edu.sg/cgi-bin/profeat2016/main.cgi for computing up to 329 network descriptors and protein-protein interaction descriptors. PROFEAT network descriptors comprehensively describe the topological and connectivity characteristics of unweighted (uniform binding constants and molecular levels), edge-weighted (varying binding constants), node-weighted (varying molecular levels), edge-node-weighted (varying binding constants and molecular levels), and directed (oriented processes) networks. The usefulness of the network descriptors is illustrated by the literature-reported studies of the biological networks derived from the genome, interactome, transcriptome, metabolome, and diseasome profiles. Copyright © 2016 Elsevier Ltd. All rights reserved.
Calculating a checksum with inactive networking components in a computing system
Aho, Michael E; Chen, Dong; Eisley, Noel A; Gooding, Thomas M; Heidelberger, Philip; Tauferner, Andrew T
2014-12-16
Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.
Calculating a checksum with inactive networking components in a computing system
Aho, Michael E; Chen, Dong; Eisley, Noel A; Gooding, Thomas M; Heidelberger, Philip; Tauferner, Andrew T
2015-01-27
Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.
41 CFR 109-26.501-52 - Justification for purchase.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Justification for purchase. 109-26.501-52 Section 109-26.501-52 Public Contracts and Property Management Federal Property Management Regulations System (Continued) DEPARTMENT OF ENERGY PROPERTY MANAGEMENT REGULATIONS SUPPLY AND...
Satellite image-based maps: Scientific inference or pretty pictures?
Ronald E. McRoberts
2011-01-01
The scientific method has been characterized as having two distinct components, Discovery and Justification. Discovery emphasizes ideas and creativity, focuses on conceiving hypotheses and constructing models, and is generally regarded as lacking a formal logic. Justification begins with the hypotheses and models and ends with a...
16 CFR § 1702.7 - Justification for the exemption.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 16 Commercial Practices 2 2013-01-01 2013-01-01 false Justification for the exemption. § 1702.7 Section § 1702.7 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION POISON PREVENTION PACKAGING ACT OF 1970 REGULATIONS PETITIONS FOR EXEMPTIONS FROM POISON PREVENTION PACKAGING ACT REQUIREMENTS...
ARACHNE: A neural-neuroglial network builder with remotely controlled parallel computing
Rusakov, Dmitri A.; Savtchenko, Leonid P.
2017-01-01
Creating and running realistic models of neural networks has hitherto been a task for computing professionals rather than experimental neuroscientists. This is mainly because such networks usually engage substantial computational resources, the handling of which requires specific programing skills. Here we put forward a newly developed simulation environment ARACHNE: it enables an investigator to build and explore cellular networks of arbitrary biophysical and architectural complexity using the logic of NEURON and a simple interface on a local computer or a mobile device. The interface can control, through the internet, an optimized computational kernel installed on a remote computer cluster. ARACHNE can combine neuronal (wired) and astroglial (extracellular volume-transmission driven) network types and adopt realistic cell models from the NEURON library. The program and documentation (current version) are available at GitHub repository https://github.com/LeonidSavtchenko/Arachne under the MIT License (MIT). PMID:28362877
A new graph-based method for pairwise global network alignment
Klau, Gunnar W
2009-01-01
Background In addition to component-based comparative approaches, network alignments provide the means to study conserved network topology such as common pathways and more complex network motifs. Yet, unlike in classical sequence alignment, the comparison of networks becomes computationally more challenging, as most meaningful assumptions instantly lead to NP-hard problems. Most previous algorithmic work on network alignments is heuristic in nature. Results We introduce the graph-based maximum structural matching formulation for pairwise global network alignment. We relate the formulation to previous work and prove NP-hardness of the problem. Based on the new formulation we build upon recent results in computational structural biology and present a novel Lagrangian relaxation approach that, in combination with a branch-and-bound method, computes provably optimal network alignments. The Lagrangian algorithm alone is a powerful heuristic method, which produces solutions that are often near-optimal and – unlike those computed by pure heuristics – come with a quality guarantee. Conclusion Computational experiments on the alignment of protein-protein interaction networks and on the classification of metabolic subnetworks demonstrate that the new method is reasonably fast and has advantages over pure heuristics. Our software tool is freely available as part of the LISA library. PMID:19208162
Mentalizing regions represent distributed, continuous, and abstract dimensions of others' beliefs.
Koster-Hale, Jorie; Richardson, Hilary; Velez, Natalia; Asaba, Mika; Young, Liane; Saxe, Rebecca
2017-11-01
The human capacity to reason about others' minds includes making causal inferences about intentions, beliefs, values, and goals. Previous fMRI research has suggested that a network of brain regions, including bilateral temporo-parietal junction (TPJ), superior temporal sulcus (STS), and medial prefrontal-cortex (MPFC), are reliably recruited for mental state reasoning. Here, in two fMRI experiments, we investigate the representational content of these regions. Building on existing computational and neural evidence, we hypothesized that social brain regions contain at least two functionally and spatially distinct components: one that represents information related to others' motivations and values, and another that represents information about others' beliefs and knowledge. Using multi-voxel pattern analysis, we find evidence that motivational versus epistemic features are independently represented by theory of mind (ToM) regions: RTPJ contains information about the justification of the belief, bilateral TPJ represents the modality of the source of knowledge, and VMPFC represents the valence of the resulting emotion. These representations are found only in regions implicated in social cognition and predict behavioral responses at the level of single items. We argue that cortical regions implicated in mental state inference contain complementary, but distinct, representations of epistemic and motivational features of others' beliefs, and that, mirroring the processes observed in sensory systems, social stimuli are represented in distinct and distributed formats across the human brain. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.
Autonomy and informed consent: a mistaken association?
Kristinsson, Sigurdur
2007-09-01
For decades, the greater part of efforts to improve regulatory frameworks for research ethics has focused on informed consent procedures; their design, codification and regulation. Why is informed consent thought to be so important? Since the publication of the Belmont Report in 1979, the standard response has been that obtaining informed consent is a way of treating individuals as autonomous agents. Despite its political success, the philosophical validity of this Belmont view cannot be taken for granted. If the Belmont view is to be based on a conception of autonomy that generates moral justification, it will either have to be reinterpreted along Kantian lines or coupled with a something like Mill's conception of individuality. The Kantian interpretation would be a radical reinterpretation of the Belmont view, while the Millian justification is incompatible with the liberal requirement that justification for public policy should be neutral between controversial conceptions of the good. This consequence might be avoided by replacing Mill's conception of individuality with a procedural conception of autonomy, but I argue that the resulting view would in fact fail to support a non-Kantian, autonomy-based justification of informed consent. These difficulties suggest that insofar as informed consent is justified by respect for persons and considerations of autonomy, as the Belmont report maintained, the justification should be along the lines of Kantian autonomy and not individual autonomy.
Malone, J; Guleria, R; Craven, C; Horton, P; Järvinen, H; Mayo, J; O’reilly, G; Picano, E; Remedios, D; Le Heron, J; Rehani, M; Holmberg, O; Czarwinski, R
2012-01-01
Objectives The Radiation Protection of Patients Unit of the International Atomic Energy Agency (IAEA) is concerned about the effectiveness of justification of diagnostic medical exposures. Recent published work and the report of an initial IAEA consultation in the area gave grounds for such concerns. There is a significant level of inappropriate usage, and, in some cases, a poor level of awareness of dose and risk among some key groups involved. This article aims to address this. Methods The IAEA convened a second group of experts in November 2008 to review practical and achievable actions that might lead to more effective justification. Results This report summarises the matters that this group considered and the outcome of their deliberations. There is a need for improved communication, both within professions and between professionals on one hand, and between professionals and the patients/public on the other. Coupled with this, the issue of consent to imaging procedures was revisited. The need for good evidence-based referral guidelines or criteria of acceptability was emphasised, as was the need for their global adaptation and dissemination. Conclusion Clinical audit was regarded as a key tool in ensuring that justification becomes an effective, transparent and accountable part of normal radiological practice. In summary, justification would be facilitated by the “3 As”: awareness, appropriateness and audit. PMID:21343316
2010-04-01
technology centric operations such as computer network attack and computer network defense. 3 This leads to the question of whether the US military is... information and infrastructure. For the purpose of military operations, CNO are divided into CNA, CND, and computer network exploitation (CNE) enabling...of a CNA if they take undesirable action,” 21 and from a defensive stance in CND, “providing information about non-military threat to computers in
Synchronized Pair Configuration in Virtualization-Based Lab for Learning Computer Networks
ERIC Educational Resources Information Center
Kongcharoen, Chaknarin; Hwang, Wu-Yuin; Ghinea, Gheorghita
2017-01-01
More studies are concentrating on using virtualization-based labs to facilitate computer or network learning concepts. Some benefits are lower hardware costs and greater flexibility in reconfiguring computer and network environments. However, few studies have investigated effective mechanisms for using virtualization fully for collaboration.…
Systems Librarian and Automation Review.
ERIC Educational Resources Information Center
Schuyler, Michael
1992-01-01
Discusses software sharing on computer networks and the need for proper bandwidth; and describes the technology behind FidoNet, a computer network made up of electronic bulletin boards. Network features highlighted include front-end mailers, Zone Mail Hour, Nodelist, NetMail, EchoMail, computer conferences, tosser and scanner programs, and host…
2010-01-01
Service quality on computer and network systems has become increasingly important as many conventional service transactions are moved online. Service quality of computer and network services can be measured by the performance of the service process in throughput, delay, and so on. On a computer and network system, competing service requests of users and associated service activities change the state of limited system resources which in turn affects the achieved service ...relations of service activities, system state and service
I/O routing in a multidimensional torus network
Chen, Dong; Eisley, Noel A.; Heidelberger, Philip
2017-02-07
A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destination address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.
I/O routing in a multidimensional torus network
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Dong; Eisley, Noel A.; Heidelberger, Philip
A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destinationmore » address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.« less
NASA Astrophysics Data System (ADS)
Gay, D. A.; Schmeltz, D.; Prestbo, E.; Olson, M.; Sharac, T.; Tordon, R.
2013-04-01
The National Atmospheric Deposition Program (NADP) developed and operates a collaborative network of atmospheric mercury monitoring sites based in North America - the Atmospheric Mercury Network (AMNet). The justification for the network was growing interest and demand from many scientists and policy makers for a robust database of measurements to improve model development, assess policies and programs, and improve estimates of mercury dry deposition. Many different agencies and groups support the network, including federal, state, tribal, and international governments, academic institutions, and private companies. AMNet has added two high elevation sites outside of continental North America in Hawaii and Taiwan because of new partnerships forged within NADP. Network sites measure concentrations of atmospheric mercury fractions using automated, continuous mercury speciation systems. The procedures that NADP developed for field operations, data management, and quality assurance ensure that the network makes scientifically valid and consistent measurements. AMNet reports concentrations of hourly gaseous elemental mercury (GEM), two-hour gaseous oxidized mercury (GOM), and two-hour particulate-bound mercury less than 2.5 microns in size (PBM2.5). As of January 2012, over 450 000 valid observations are available from 30 stations. The AMNet also collects ancillary meteorological data and information on land-use and vegetation, when available. We present atmospheric mercury data comparisons by time (3 yr) at 22 unique site locations. Highlighted are contrasting values for site locations across the network: urban versus rural, coastal versus high-elevation and the range of maximum observations. The data presented should catalyze the formation of many scientific questions that may be answered through further in-depth analysis and modeling studies of the AMNet database. All data and methods are publically available through an online database on the NADP website (http://nadp.isws.illinois.edu/amn/). Future network directions are to foster new network partnerships and continue to collect, quality assure, and post data, including dry deposition estimates, for each fraction.
NASA Astrophysics Data System (ADS)
Gay, D. A.; Schmeltz, D.; Prestbo, E.; Olson, M.; Sharac, T.; Tordon, R.
2013-11-01
The National Atmospheric Deposition Program (NADP) developed and operates a collaborative network of atmospheric-mercury-monitoring sites based in North America - the Atmospheric Mercury Network (AMNet). The justification for the network was growing interest and demand from many scientists and policy makers for a robust database of measurements to improve model development, assess policies and programs, and improve estimates of mercury dry deposition. Many different agencies and groups support the network, including federal, state, tribal, and international governments, academic institutions, and private companies. AMNet has added two high-elevation sites outside of continental North America in Hawaii and Taiwan because of new partnerships forged within NADP. Network sites measure concentrations of atmospheric mercury fractions using automated, continuous mercury speciation systems. The procedures that NADP developed for field operations, data management, and quality assurance ensure that the network makes scientifically valid and consistent measurements. AMNet reports concentrations of hourly gaseous elemental mercury (GEM), two-hour gaseous oxidized mercury (GOM), and two-hour particulate-bound mercury less than 2.5 microns in size (PBM2.5). As of January 2012, over 450 000 valid observations are available from 30 stations. AMNet also collects ancillary meteorological data and information on land use and vegetation, when available. We present atmospheric mercury data comparisons by time (3 yr) at 21 individual sites and instruments. Highlighted are contrasting values for site locations across the network: urban versus rural, coastal versus high elevation and the range of maximum observations. The data presented should catalyze the formation of many scientific questions that may be answered through further in-depth analysis and modeling studies of the AMNet database. All data and methods are publically available through an online database on the NADP website (http://nadp.sws.uiuc.edu/amn/). Future network directions are to foster new network partnerships and continue to collect, quality assure, and post data, including dry deposition estimates, for each fraction.
Which coordinate system for modelling path integration?
Vickerstaff, Robert J; Cheung, Allen
2010-03-21
Path integration is a navigation strategy widely observed in nature where an animal maintains a running estimate, called the home vector, of its location during an excursion. Evidence suggests it is both ancient and ubiquitous in nature, and has been studied for over a century. In that time, canonical and neural network models have flourished, based on a wide range of assumptions, justifications and supporting data. Despite the importance of the phenomenon, consensus and unifying principles appear lacking. A fundamental issue is the neural representation of space needed for biological path integration. This paper presents a scheme to classify path integration systems on the basis of the way the home vector records and updates the spatial relationship between the animal and its home location. Four extended classes of coordinate systems are used to unify and review both canonical and neural network models of path integration, from the arthropod and mammalian literature. This scheme demonstrates analytical equivalence between models which may otherwise appear unrelated, and distinguishes between models which may superficially appear similar. A thorough analysis is carried out of the equational forms of important facets of path integration including updating, steering, searching and systematic errors, using each of the four coordinate systems. The type of available directional cue, namely allothetic or idiothetic, is also considered. It is shown that on balance, the class of home vectors which includes the geocentric Cartesian coordinate system, appears to be the most robust for biological systems. A key conclusion is that deducing computational structure from behavioural data alone will be difficult or impossible, at least in the absence of an analysis of random errors. Consequently it is likely that further theoretical insights into path integration will require an in-depth study of the effect of noise on the four classes of home vectors. Copyright 2009 Elsevier Ltd. All rights reserved.
2009-03-01
SENSOR NETWORKS THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and...hierarchical, and Secure Lock within a wireless sensor network (WSN) under the Hubenko architecture. Using a Matlab computer simulation, the impact of the...rekeying protocol should be applied given particular network parameters, such as WSN size. 10 1.3 Experimental Approach A computer simulation in
NASA Technical Reports Server (NTRS)
Mitchell, Paul H.
1991-01-01
F77NNS (FORTRAN 77 Neural Network Simulator) computer program simulates popular back-error-propagation neural network. Designed to take advantage of vectorization when used on computers having this capability, also used on any computer equipped with ANSI-77 FORTRAN Compiler. Problems involving matching of patterns or mathematical modeling of systems fit class of problems F77NNS designed to solve. Program has restart capability so neural network solved in stages suitable to user's resources and desires. Enables user to customize patterns of connections between layers of network. Size of neural network F77NNS applied to limited only by amount of random-access memory available to user.
Why Do Computer Viruses Survive In The Internet?
NASA Astrophysics Data System (ADS)
Ifti, Margarita; Neumann, Paul
2010-01-01
We use the three-species cyclic competition model (Rock-Paper-Scissors), described by reactions A+B→2B, B+C→2C, C+A→2A, for emulating a computer network with e-mail viruses. Different topologies of the network bring about different dynamics of the epidemics. When the parameters of the network are varied, it is observed that very high clustering coefficients are necessary for a pandemics to happen. The differences between the networks of computer users, e-mail networks, and social networks, as well as their role in determining the nature of epidemics are also discussed.
ICT Student Teachers' Judgments and Justifications about Ethical Issues
ERIC Educational Resources Information Center
Alakurt, Turgay; Bardakci, Salih; Keser, Hafize
2012-01-01
In this study, Turkish ICT student teachers' judgments and justifications in four scenarios involving ICT-related ethical problems were investigated. Scenarios were designed based on Mason's (1986) four ethical issues: privacy, accuracy, property and accessibility. The study was carried out in the fall of 2010. We used the critical incidents…
Kierkegaard, Justification and the Integrity of Christian Education
ERIC Educational Resources Information Center
Wright, Andrew W.
2015-01-01
The doctrine of justification is frequently interpreted in a manner that excludes our active involvement in the drama of salvation. This reading has a detrimental effect on Christian education concerned to enable the learner's attentive, reasonable and responsible understanding of the Gospel. Taking its lead from Kierkegaard's account of…
41 CFR 109-28.5004 - Justification and review procedures.
Code of Federal Regulations, 2010 CFR
2010-07-01
... PROCUREMENT 28-STORAGE AND DISTRIBUTION 28.50-Management of Equipment Held for Future Projects § 109-28.5004... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Justification and review procedures. 109-28.5004 Section 109-28.5004 Public Contracts and Property Management Federal Property...
Self-Justification as a Determinant of Performance-Style Effectiveness
ERIC Educational Resources Information Center
McKenna, Ralph J.
1971-01-01
This study examined experimentally the effect of justification on role playing, attempting a more complete verification of the performance style type. Also of concern was whether scores on the Performance Style Test were generalizable to overt behavior on the part of females. Results supported both concerns. (Author/CG)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-14
... 2] RIN 9000-AL55 Federal Acquisition Regulation; Justification and Approval of Sole-Source 8(a... removes language indicating that the applicable section of the National Defense Authorization Act for...: June 8, 2012. Laura Auletta, Director, Office of Governmentwide Acquisition Policy, Office of...
What Exactly (If Anything) Is Wrong with Paternalism towards Children?
ERIC Educational Resources Information Center
Drerup, Johannes
2017-01-01
Theoretical and practical issues concerning the justification of paternalism towards children are widely debated in a variety of philosophical contexts. The major focus of these debates lies either on questions concerning the general legitimacy of paternalism towards children or on justifications of paternalism in concrete situations involving…
Cyber Attacks and the Legal Justification for an Armed Response
2017-05-25
conflict between military forces of any origin.ൟ The definition above applies only to Title 18, Chapter 113B “ Terrorism ,” and is not applicable...beyond the context of terrorism . Applying this definition to cyber attacks outside the context of terrorism will not provide legal justification for
The Learning Society: Two Justifications
ERIC Educational Resources Information Center
Su, Ya-hui
2010-01-01
This article examines the view that has long been fashionable in related policies and literature that the establishment of the learning society is a necessary response to changing times. This article suggests that the association between the learning society and current change may be defensible but is limited. The justification of the learning…
Lower Pay for Women's Coaches: Refuting Some Common Justifications.
ERIC Educational Resources Information Center
Williams, Joseph P.
1995-01-01
The two standard justifications for different salaries paid to male and female coaches under 1963 and 1964 civil rights/equal pay legislation must fail under Title IX of the Education Amendments of 1972, which independently prohibits gender discrimination in employment and mandates equal athletic opportunity for female students. Some suggestions…
48 CFR 306.304 - Approval of the justification.
Code of Federal Regulations, 2011 CFR
2011-10-01
... justification. 306.304 Section 306.304 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES COMPETITION AND ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 306.304... acquisitions in the dollar amount cited in FAR 6.304(a)(2) through (a)(4), the CCO, if applicable, and the HCA...
ERIC Educational Resources Information Center
Krumm, Andrew E.; Holmstrom, Kristi
2011-01-01
This article argues that the processes of enactment and justification comprise two key, underdeveloped aspects of sensemaking theory as applied to educational organizations. Enactment and justification are illustrated using examples drawn from a school that significantly changed the way in which it coordinated reading instruction. Examples drawn…
Optical interconnection networks for high-performance computing systems
NASA Astrophysics Data System (ADS)
Biberman, Aleksandr; Bergman, Keren
2012-04-01
Enabled by silicon photonic technology, optical interconnection networks have the potential to be a key disruptive technology in computing and communication industries. The enduring pursuit of performance gains in computing, combined with stringent power constraints, has fostered the ever-growing computational parallelism associated with chip multiprocessors, memory systems, high-performance computing systems and data centers. Sustaining these parallelism growths introduces unique challenges for on- and off-chip communications, shifting the focus toward novel and fundamentally different communication approaches. Chip-scale photonic interconnection networks, enabled by high-performance silicon photonic devices, offer unprecedented bandwidth scalability with reduced power consumption. We demonstrate that the silicon photonic platforms have already produced all the high-performance photonic devices required to realize these types of networks. Through extensive empirical characterization in much of our work, we demonstrate such feasibility of waveguides, modulators, switches and photodetectors. We also demonstrate systems that simultaneously combine many functionalities to achieve more complex building blocks. We propose novel silicon photonic devices, subsystems, network topologies and architectures to enable unprecedented performance of these photonic interconnection networks. Furthermore, the advantages of photonic interconnection networks extend far beyond the chip, offering advanced communication environments for memory systems, high-performance computing systems, and data centers.
NASA Astrophysics Data System (ADS)
Ahn, Sul-Ah; Jung, Youngim
2016-10-01
The research activities of the computational physicists utilizing high performance computing are analyzed by bibliometirc approaches. This study aims at providing the computational physicists utilizing high-performance computing and policy planners with useful bibliometric results for an assessment of research activities. In order to achieve this purpose, we carried out a co-authorship network analysis of journal articles to assess the research activities of researchers for high-performance computational physics as a case study. For this study, we used journal articles of the Scopus database from Elsevier covering the time period of 2004-2013. We extracted the author rank in the physics field utilizing high-performance computing by the number of papers published during ten years from 2004. Finally, we drew the co-authorship network for 45 top-authors and their coauthors, and described some features of the co-authorship network in relation to the author rank. Suggestions for further studies are discussed.
Node fingerprinting: an efficient heuristic for aligning biological networks.
Radu, Alex; Charleston, Michael
2014-10-01
With the continuing increase in availability of biological data and improvements to biological models, biological network analysis has become a promising area of research. An emerging technique for the analysis of biological networks is through network alignment. Network alignment has been used to calculate genetic distance, similarities between regulatory structures, and the effect of external forces on gene expression, and to depict conditional activity of expression modules in cancer. Network alignment is algorithmically complex, and therefore we must rely on heuristics, ideally as efficient and accurate as possible. The majority of current techniques for network alignment rely on precomputed information, such as with protein sequence alignment, or on tunable network alignment parameters, which may introduce an increased computational overhead. Our presented algorithm, which we call Node Fingerprinting (NF), is appropriate for performing global pairwise network alignment without precomputation or tuning, can be fully parallelized, and is able to quickly compute an accurate alignment between two biological networks. It has performed as well as or better than existing algorithms on biological and simulated data, and with fewer computational resources. The algorithmic validation performed demonstrates the low computational resource requirements of NF.
A program to compute the soft Robinson-Foulds distance between phylogenetic networks.
Lu, Bingxin; Zhang, Louxin; Leong, Hon Wai
2017-03-14
Over the past two decades, phylogenetic networks have been studied to model reticulate evolutionary events. The relationships among phylogenetic networks, phylogenetic trees and clusters serve as the basis for reconstruction and comparison of phylogenetic networks. To understand these relationships, two problems are raised: the tree containment problem, which asks whether a phylogenetic tree is displayed in a phylogenetic network, and the cluster containment problem, which asks whether a cluster is represented at a node in a phylogenetic network. Both the problems are NP-complete. A fast exponential-time algorithm for the cluster containment problem on arbitrary networks is developed and implemented in C. The resulting program is further extended into a computer program for fast computation of the Soft Robinson-Foulds distance between phylogenetic networks. Two computer programs are developed for facilitating reconstruction and validation of phylogenetic network models in evolutionary and comparative genomics. Our simulation tests indicated that they are fast enough for use in practice. Additionally, the distribution of the Soft Robinson-Foulds distance between phylogenetic networks is demonstrated to be unlikely normal by our simulation data.
ERIC Educational Resources Information Center
Dabbagh, Nada; Beattie, Mark
2010-01-01
Skill shortages in the area of computer network troubleshooting are becoming increasingly acute. According to research sponsored by Cisco's Learning Institute, the demand for professionals with computer networking skills in the United States and Canada will outpace the supply of workers with those skills by an average of eight percent per year…
Spatiotemporal Dynamics and Reliable Computations in Recurrent Spiking Neural Networks
NASA Astrophysics Data System (ADS)
Pyle, Ryan; Rosenbaum, Robert
2017-01-01
Randomly connected networks of excitatory and inhibitory spiking neurons provide a parsimonious model of neural variability, but are notoriously unreliable for performing computations. We show that this difficulty is overcome by incorporating the well-documented dependence of connection probability on distance. Spatially extended spiking networks exhibit symmetry-breaking bifurcations and generate spatiotemporal patterns that can be trained to perform dynamical computations under a reservoir computing framework.
Deep learning for computational chemistry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goh, Garrett B.; Hodas, Nathan O.; Vishnu, Abhinav
The rise and fall of artificial neural networks is well documented in the scientific literature of both the fields of computer science and computational chemistry. Yet almost two decades later, we are now seeing a resurgence of interest in deep learning, a machine learning algorithm based on “deep” neural networks. Within the last few years, we have seen the transformative impact of deep learning the computer science domain, notably in speech recognition and computer vision, to the extent that the majority of practitioners in those field are now regularly eschewing prior established models in favor of deep learning models. Inmore » this review, we provide an introductory overview into the theory of deep neural networks and their unique properties as compared to traditional machine learning algorithms used in cheminformatics. By providing an overview of the variety of emerging applications of deep neural networks, we highlight its ubiquity and broad applicability to a wide range of challenges in the field, including QSAR, virtual screening, protein structure modeling, QM calculations, materials synthesis and property prediction. In reviewing the performance of deep neural networks, we observed a consistent outperformance against non neural networks state-of-the-art models across disparate research topics, and deep neural network based models often exceeded the “glass ceiling” expectations of their respective tasks. Coupled with the maturity of GPU-accelerated computing for training deep neural networks and the exponential growth of chemical data on which to train these networks on, we anticipate that deep learning algorithms will be a useful tool and may grow into a pivotal role for various challenges in the computational chemistry field.« less
Zittrain, Jonathan
2008-10-28
Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a drawing pin and as large as a worldwide product distribution chain. What could happen when people are so readily networked? This paper explores issues arising from two possible emerging models of ubiquitous human computing: fungible networked brainpower and collective personal vital sign monitoring.
Computer-Based Semantic Network in Molecular Biology: A Demonstration.
ERIC Educational Resources Information Center
Callman, Joshua L.; And Others
This paper analyzes the hardware and software features that would be desirable in a computer-based semantic network system for representing biology knowledge. It then describes in detail a prototype network of molecular biology knowledge that has been developed using Filevision software and a Macintosh computer. The prototype contains about 100…
Neural network approach to proximity effect corrections in electron-beam lithography
NASA Astrophysics Data System (ADS)
Frye, Robert C.; Cummings, Kevin D.; Rietman, Edward A.
1990-05-01
The proximity effect, caused by electron beam backscattering during resist exposure, is an important concern in writing submicron features. It can be compensated by appropriate local changes in the incident beam dose, but computation of the optimal correction usually requires a prohibitively long time. We present an example of such a computation on a small test pattern, which we performed by an iterative method. We then used this solution as a training set for an adaptive neural network. After training, the network computed the same correction as the iterative method, but in a much shorter time. Correcting the image with a software based neural network resulted in a decrease in the computation time by a factor of 30, and a hardware based network enhanced the computation speed by more than a factor of 1000. Both methods had an acceptably small error of 0.5% compared to the results of the iterative computation. Additionally, we verified that the neural network correctly generalized the solution of the problem to include patterns not contained in its training set.
NASA Astrophysics Data System (ADS)
Cogoni, Marco; Busonera, Giovanni; Anedda, Paolo; Zanetti, Gianluigi
2015-01-01
We generalize previous studies on critical phenomena in communication networks [1,2] by adding computational capabilities to the nodes. In our model, a set of tasks with random origin, destination and computational structure is distributed on a computational network, modeled as a graph. By varying the temperature of a Metropolis Montecarlo, we explore the global latency for an optimal to suboptimal resource assignment at a given time instant. By computing the two-point correlation function for the local overload, we study the behavior of the correlation distance (both for links and nodes) while approaching the congested phase: a transition from peaked to spread g(r) is seen above a critical (Montecarlo) temperature Tc. The average latency trend of the system is predicted by averaging over several network traffic realizations while maintaining a spatially detailed information for each node: a sharp decrease of performance is found over Tc independently of the workload. The globally optimized computational resource allocation and network routing defines a baseline for a future comparison of the transition behavior with respect to existing routing strategies [3,4] for different network topologies.
2007-03-01
potential of moving closer to the goal of a fully service-oriented GIG by allowing even computing - and bandwidth-constrained elements to participate...the functionality provided by core network assets with relatively unlimited bandwidth and computing resources. Finally, the nature of information is...the Department of Defense is a requirement for ubiquitous computer connectivity. An espoused vehicle for delivering that ubiquity is the Global
Modeling a Wireless Network for International Space Station
NASA Technical Reports Server (NTRS)
Alena, Richard; Yaprak, Ece; Lamouri, Saad
2000-01-01
This paper describes the application of wireless local area network (LAN) simulation modeling methods to the hybrid LAN architecture designed for supporting crew-computing tools aboard the International Space Station (ISS). These crew-computing tools, such as wearable computers and portable advisory systems, will provide crew members with real-time vehicle and payload status information and access to digital technical and scientific libraries, significantly enhancing human capabilities in space. A wireless network, therefore, will provide wearable computer and remote instruments with the high performance computational power needed by next-generation 'intelligent' software applications. Wireless network performance in such simulated environments is characterized by the sustainable throughput of data under different traffic conditions. This data will be used to help plan the addition of more access points supporting new modules and more nodes for increased network capacity as the ISS grows.
Plagianakos, V P; Magoulas, G D; Vrahatis, M N
2006-03-01
Distributed computing is a process through which a set of computers connected by a network is used collectively to solve a single problem. In this paper, we propose a distributed computing methodology for training neural networks for the detection of lesions in colonoscopy. Our approach is based on partitioning the training set across multiple processors using a parallel virtual machine. In this way, interconnected computers of varied architectures can be used for the distributed evaluation of the error function and gradient values, and, thus, training neural networks utilizing various learning methods. The proposed methodology has large granularity and low synchronization, and has been implemented and tested. Our results indicate that the parallel virtual machine implementation of the training algorithms developed leads to considerable speedup, especially when large network architectures and training sets are used.
Local area networking: Ames centerwide network
NASA Technical Reports Server (NTRS)
Price, Edwin
1988-01-01
A computer network can benefit the user by making his/her work quicker and easier. A computer network is made up of seven different layers with the lowest being the hardware, the top being the user, and the middle being the software. These layers are discussed.
Using E-Mail across Computer Networks.
ERIC Educational Resources Information Center
Hazari, Sunil
1990-01-01
Discusses the use of telecommunications technology to exchange electronic mail, files, and messages across different computer networks. Networks highlighted include ARPA Internet; BITNET; USENET; FidoNet; MCI Mail; and CompuServe. Examples of the successful use of networks in higher education are given. (Six references) (LRW)
Burning of liquid pools in reduced gravity
NASA Technical Reports Server (NTRS)
Kanury, A. M.
1977-01-01
The existing literature on the combustion of liquid fuel pools is reviewed to identify the physical and chemical aspects which require an improved understanding. Among the pre-, trans- and post-ignition processes, a delineation was made of those which seem to uniquely benefit from studies in the essential environment offered by spacelab. The role played by the gravitational constant in analytical and experimental justifications was developed. The analytical justifications were based on hypotheses, models and dimensional analyses whereas the experimental justifications were based on an examination of the range of gravity and gravity-dependent variables possible in the earth-based laboratories. Some preliminary expositions into the questions of feasibility of the proposed spacelab experiment are also reported.
Idleness aversion and the need for justifiable busyness.
Hsee, Christopher K; Yang, Adelle X; Wang, Liangyan
2010-07-01
There are many apparent reasons why people engage in activity, such as to earn money, to become famous, or to advance science. In this report, however, we suggest a potentially deeper reason: People dread idleness, yet they need a reason to be busy. Accordingly, we show in two experiments that without a justification, people choose to be idle; that even a specious justification can motivate people to be busy; and that people who are busy are happier than people who are idle. Curiously, this last effect is true even if people are forced to be busy. Our research suggests that many purported goals that people pursue may be merely justifications to keep themselves busy.
Inverse targeting —An effective immunization strategy
NASA Astrophysics Data System (ADS)
Schneider, C. M.; Mihaljev, T.; Herrmann, H. J.
2012-05-01
We propose a new method to immunize populations or computer networks against epidemics which is more efficient than any continuous immunization method considered before. The novelty of our method resides in the way of determining the immunization targets. First we identify those individuals or computers that contribute the least to the disease spreading measured through their contribution to the size of the largest connected cluster in the social or a computer network. The immunization process follows the list of identified individuals or computers in inverse order, immunizing first those which are most relevant for the epidemic spreading. We have applied our immunization strategy to several model networks and two real networks, the Internet and the collaboration network of high-energy physicists. We find that our new immunization strategy is in the case of model networks up to 14%, and for real networks up to 33% more efficient than immunizing dynamically the most connected nodes in a network. Our strategy is also numerically efficient and can therefore be applied to large systems.
NASA Technical Reports Server (NTRS)
Gibson, Jim; Jordan, Joe; Grant, Terry
1990-01-01
Local Area Network Extensible Simulator (LANES) computer program provides method for simulating performance of high-speed local-area-network (LAN) technology. Developed as design and analysis software tool for networking computers on board proposed Space Station. Load, network, link, and physical layers of layered network architecture all modeled. Mathematically models according to different lower-layer protocols: Fiber Distributed Data Interface (FDDI) and Star*Bus. Written in FORTRAN 77.
Object-oriented Tools for Distributed Computing
NASA Technical Reports Server (NTRS)
Adler, Richard M.
1993-01-01
Distributed computing systems are proliferating, owing to the availability of powerful, affordable microcomputers and inexpensive communication networks. A critical problem in developing such systems is getting application programs to interact with one another across a computer network. Remote interprogram connectivity is particularly challenging across heterogeneous environments, where applications run on different kinds of computers and operating systems. NetWorks! (trademark) is an innovative software product that provides an object-oriented messaging solution to these problems. This paper describes the design and functionality of NetWorks! and illustrates how it is being used to build complex distributed applications for NASA and in the commercial sector.
Distinguishing humans from computers in the game of go: A complex network approach
NASA Astrophysics Data System (ADS)
Coquidé, C.; Georgeot, B.; Giraud, O.
2017-08-01
We compare complex networks built from the game of go and obtained from databases of human-played games with those obtained from computer-played games. Our investigations show that statistical features of the human-based networks and the computer-based networks differ, and that these differences can be statistically significant on a relatively small number of games using specific estimators. We show that the deterministic or stochastic nature of the computer algorithm playing the game can also be distinguished from these quantities. This can be seen as a tool to implement a Turing-like test for go simulators.
Mixed reality framework for collective motion patterns of swarms with delay coupling
NASA Astrophysics Data System (ADS)
Szwaykowska, Klementyna; Schwartz, Ira
The formation of coherent patterns in swarms of interacting self-propelled autonomous agents is an important subject for many applications within the field of distributed robotic systems. However, there are significant logistical challenges associated with testing fully distributed systems in real-world settings. In this paper, we provide a rigorous theoretical justification for the use of mixed-reality experiments as a stepping stone to fully physical testing of distributed robotic systems. We also model and experimentally realize a mixed-reality large-scale swarm of delay-coupled agents. Our analyses, assuming agents communicating over an Erdos-Renyi network, demonstrate the existence of stable coherent patterns that can be achieved only with delay coupling and that are robust to decreasing network connectivity and heterogeneity in agent dynamics. We show how the bifurcation structure for emergence of different patterns changes with heterogeneity in agent acceleration capabilities and limited connectivity in the network as a function of coupling strength and delay. Our results are verified through simulation as well as preliminary experimental results of delay-induced pattern formation in a mixed-reality swarm. K. S. was a National Research Council postdoctoral fellow. I.B.S was supported by the U.S. Naval Research Laboratory funding (N0001414WX00023) and office of Naval Research (N0001414WX20610).
High-speed on-chip windowed centroiding using photodiode-based CMOS imager
NASA Technical Reports Server (NTRS)
Pain, Bedabrata (Inventor); Sun, Chao (Inventor); Yang, Guang (Inventor); Cunningham, Thomas J. (Inventor); Hancock, Bruce (Inventor)
2003-01-01
A centroid computation system is disclosed. The system has an imager array, a switching network, computation elements, and a divider circuit. The imager array has columns and rows of pixels. The switching network is adapted to receive pixel signals from the image array. The plurality of computation elements operates to compute inner products for at least x and y centroids. The plurality of computation elements has only passive elements to provide inner products of pixel signals the switching network. The divider circuit is adapted to receive the inner products and compute the x and y centroids.
High-speed on-chip windowed centroiding using photodiode-based CMOS imager
NASA Technical Reports Server (NTRS)
Pain, Bedabrata (Inventor); Sun, Chao (Inventor); Yang, Guang (Inventor); Cunningham, Thomas J. (Inventor); Hancock, Bruce (Inventor)
2004-01-01
A centroid computation system is disclosed. The system has an imager array, a switching network, computation elements, and a divider circuit. The imager array has columns and rows of pixels. The switching network is adapted to receive pixel signals from the image array. The plurality of computation elements operates to compute inner products for at least x and y centroids. The plurality of computation elements has only passive elements to provide inner products of pixel signals the switching network. The divider circuit is adapted to receive the inner products and compute the x and y centroids.
Explicating mathematical thinking in differential equations using a computer algebra system
NASA Astrophysics Data System (ADS)
Zeynivandnezhad, Fereshteh; Bates, Rachel
2018-07-01
The importance of developing students' mathematical thinking is frequently highlighted in literature regarding the teaching and learning of mathematics. Despite this importance, most curricula and instructional activities for undergraduate mathematics fail to bring the learner beyond the mathematics. The purpose of this study was to enhance students' mathematical thinking by implementing a computer algebra system and active learning pedagogical approaches. students' mathematical thinking processes were analyzed while completing specific differential equations tasks based on posed prompts and questions and Instrumental Genesis. Data were collected from 37 engineering students in a public Malaysian university. This study used the descriptive and interpretive qualitative research design to investigate the students' perspectives of emerging mathematical understanding and approaches to learning mathematics in an undergraduate differential equations course. Results of this study concluded that students used a variety of mathematical thinking processes in a non-sequential manner. Additionally, the outcomes provide justification for continued use of technologies such as computer algebra systems in undergraduate mathematics courses and the need for further studies to uncover the various processes students utilize to complete specific mathematical tasks.
Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers.
Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne
2018-01-01
State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems.
Learning Universal Computations with Spikes
Thalmeier, Dominik; Uhlmann, Marvin; Kappen, Hilbert J.; Memmesheimer, Raoul-Martin
2016-01-01
Providing the neurobiological basis of information processing in higher animals, spiking neural networks must be able to learn a variety of complicated computations, including the generation of appropriate, possibly delayed reactions to inputs and the self-sustained generation of complex activity patterns, e.g. for locomotion. Many such computations require previous building of intrinsic world models. Here we show how spiking neural networks may solve these different tasks. Firstly, we derive constraints under which classes of spiking neural networks lend themselves to substrates of powerful general purpose computing. The networks contain dendritic or synaptic nonlinearities and have a constrained connectivity. We then combine such networks with learning rules for outputs or recurrent connections. We show that this allows to learn even difficult benchmark tasks such as the self-sustained generation of desired low-dimensional chaotic dynamics or memory-dependent computations. Furthermore, we show how spiking networks can build models of external world systems and use the acquired knowledge to control them. PMID:27309381
Extremely Scalable Spiking Neuronal Network Simulation Code: From Laptops to Exascale Computers
Jordan, Jakob; Ippen, Tammo; Helias, Moritz; Kitayama, Itaru; Sato, Mitsuhisa; Igarashi, Jun; Diesmann, Markus; Kunkel, Susanne
2018-01-01
State-of-the-art software tools for neuronal network simulations scale to the largest computing systems available today and enable investigations of large-scale networks of up to 10 % of the human cortex at a resolution of individual neurons and synapses. Due to an upper limit on the number of incoming connections of a single neuron, network connectivity becomes extremely sparse at this scale. To manage computational costs, simulation software ultimately targeting the brain scale needs to fully exploit this sparsity. Here we present a two-tier connection infrastructure and a framework for directed communication among compute nodes accounting for the sparsity of brain-scale networks. We demonstrate the feasibility of this approach by implementing the technology in the NEST simulation code and we investigate its performance in different scaling scenarios of typical network simulations. Our results show that the new data structures and communication scheme prepare the simulation kernel for post-petascale high-performance computing facilities without sacrificing performance in smaller systems. PMID:29503613
Chen, Dong; Coteus, Paul W; Eisley, Noel A; Gara, Alan; Heidelberger, Philip; Senger, Robert M; Salapura, Valentina; Steinmacher-Burow, Burkhard; Sugawara, Yutaka; Takken, Todd E
2013-08-27
Embodiments of the invention provide a method, system and computer program product for embedding a global barrier and global interrupt network in a parallel computer system organized as a torus network. The computer system includes a multitude of nodes. In one embodiment, the method comprises taking inputs from a set of receivers of the nodes, dividing the inputs from the receivers into a plurality of classes, combining the inputs of each of the classes to obtain a result, and sending said result to a set of senders of the nodes. Embodiments of the invention provide a method, system and computer program product for embedding a collective network in a parallel computer system organized as a torus network. In one embodiment, the method comprises adding to a torus network a central collective logic to route messages among at least a group of nodes in a tree structure.
The Race and Racism of the I.Q. Argument.
ERIC Educational Resources Information Center
Willhelm, Sidney M.
A brief historical resume outlining the relationship between economics, racism, and intellectual justification for racism begins this paper, which notes that the I.Q. argument is a racist ideology in exactly the same way that Christianity, Darwinism, and Equality have been systems of justifications for America's racism. It fits the definition of…
Is There a Need for Transcendental Arguments in Discourse Ethics?
ERIC Educational Resources Information Center
Johnston, James Scott
2016-01-01
In this essay, James Scott Johnston examines Jürgen Habermas's transcendental justification of his discourse theory of morality. According to Johnston, the application of Habermas's theory to educational issues often assumes that this justification is a cogent one. However, if the theory is to provide reasoned and appropriate guidance for…
Academic Freedom: In Justification of a Universal Ideal
ERIC Educational Resources Information Center
Karran, Terence
2009-01-01
This article examines the justification for, and benefits of, academic freedom to academics, students, universities and the world at large. It surveys the development of the concept of academic freedom within Europe, more especially the impact of the reforms at the University of Berlin instigated by Wilhelm von Humboldt. Following from this, the…
NASA Technical Reports Server (NTRS)
1976-01-01
Sensitivity requirements of the various measurements obtained by microwave sensors, and radiometry techniques are described. Analytical techniques applied to detailed sharing analyses are discussed. A bibliography of publications pertinent to the scientific justification of frequency requirements for passive microwave remote sensing is included.
Using Empirical Evidence in the Process of Proving: The Case of Dynamic Geometry
ERIC Educational Resources Information Center
Guven, Bulent; Cekmez, Erdem; Karatas, Ilhan
2010-01-01
With the emergence of Dynamic Geometry Software (DGS), a theoretical gap between the acquisition (inductive) and the justification (deductive) of a mathematical statement has started a debate. Some educators believe that deductive proof in geometry should be abandoned in favour of an experimental approach to mathematical justification. This…
49 CFR 611.303 - Small Starts project justification criteria.
Code of Federal Regulations, 2014 CFR
2014-10-01
... and assign ratings for project justification, FTA will evaluate information developed locally through the planning, NEPA and project development processes. (1) The method used by FTA to evaluate and rate... ratings for each of the criteria in § 611.303(b)(1) through (6) will be expressed in terms of descriptive...
49 CFR 611.203 - New Starts project justification criteria.
Code of Federal Regulations, 2014 CFR
2014-10-01
... project justification, FTA will evaluate information developed locally through the planning and NEPA processes. (1) The method used by FTA to evaluate and rate projects will be a multiple measure approach by... each of the criteria in § 611.203(b)(1) through (6) will be expressed in terms of descriptive...
49 CFR 611.303 - Small Starts project justification criteria.
Code of Federal Regulations, 2013 CFR
2013-10-01
... and assign ratings for project justification, FTA will evaluate information developed locally through the planning, NEPA and project development processes. (1) The method used by FTA to evaluate and rate... ratings for each of the criteria in § 611.303(b)(1) through (6) will be expressed in terms of descriptive...
49 CFR 611.203 - New Starts project justification criteria.
Code of Federal Regulations, 2013 CFR
2013-10-01
... project justification, FTA will evaluate information developed locally through the planning and NEPA processes. (1) The method used by FTA to evaluate and rate projects will be a multiple measure approach by... each of the criteria in § 611.203(b)(1) through (6) will be expressed in terms of descriptive...
14 CFR 221.205 - Justification and explanation for certain fares.
Code of Federal Regulations, 2010 CFR
2010-01-01
... fares. 221.205 Section 221.205 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF... Justification and explanation for certain fares. Any carrier or its agent must provide, as to any new or increased bundled or unbundled (whichever is lower) on-demand economy fare in a direct-service market, a...
Extricating Justification Scheme Theory in Middle School Mathematical Problem Solving
ERIC Educational Resources Information Center
Matteson, Shirley; Capraro, Mary Margaret; Capraro, Robert M.; Lincoln, Yvonna S.
2012-01-01
Twenty middle grades students were interviewed to gain insights into their reasoning about problem-solving strategies using a Problem Solving Justification Scheme as our theoretical lens and the basis for our analysis. The scheme was modified from the work of Harel and Sowder (1998) making it more broadly applicable and accounting for research…
Dewey's Ethical Justification for Public Deliberation Democracy
ERIC Educational Resources Information Center
Shook, John
2013-01-01
Interpretations of John Dewey's political theory grasp his respect for public deliberation, but typically overlook his ethical justification for democracy. Dewey gave two primary reasons why democracy is superior to other forms of government. First, a public educated in the tools of social intelligence can be more effective at managing their…
Chinese Children's Justifications for Sharing Resources: Why Do We Have to Share?
ERIC Educational Resources Information Center
Wong, Mun
2011-01-01
Gilligan argued that Kohlberg's justice-based stage theory of morality reflects only one type of morality and does not consider people's tendency to use care-based moral judgements. This study examines Chinese children's tendency to use justice-based and care-based justifications for moral reasoning. Children's attitudes to conforming to the…
ERIC Educational Resources Information Center
Cioe, Michael; King, Sherryl; Ostien, Deborah; Pansa, Nancy; Staples, Megan
2015-01-01
Justification is a critical mathematical practice that must play a role in teaching and learning at all grade levels. Having students share their reasoning and explain how they know something is true or correct is the process of justification. The authors (a team of teachers and researchers) worked together for two years with an NSF-funded project…
Using social-network research to improve outcomes in natural resource management.
Groce, Julie E; Farrelly, Megan A; Jorgensen, Bradley S; Cook, Carly N
2018-05-08
The conservation and management of natural resources operates within social-ecological systems, in which resource users are embedded in social and environmental contexts that influence their management decisions. Characterizing social networks of resource users has received growing interest as an approach for understanding social influences on decision-making, and social network analysis (SNA) has emerged as a useful technique to explore these relationships. In this review, we synthesize how SNA has been used in studies of natural resource management. To present our findings, we developed a theory of change which outlines the influence between social networks and social processes (e.g., interactions between individuals), which in turn influence social outcomes (e.g., decisions or actions) that impact environmental outcomes (e.g., improved condition). Our review of 85 studies demonstrate frequent use of descriptive methods to characterize social processes, yet few studies considered social outcomes or examined network structure relative to environmental outcomes. Only 4 studies assessed network interventions intended to impact relevant processes or outcomes. The heterogeneity in case studies, methods, and analyses preclude general lessons. Thus, we offer a typology of appropriate measures for each stage of our theory of change, to structure and progress our learning about the role of social networks in achieving environmental outcomes. In addition, we suggest shifts in research foci towards intervention studies, to aid in understanding causality and inform the design of conservation initiatives. We also identify the need for developing clearer justification and guidance around the proliferation of network measures. The use of SNA in natural resource management is expanding rapidly, thus now is the ideal time for the conservation community to build a more rigorous evidence base to demonstrate the extent to which social networks can play a role in achieving desired social and environmental outcomes. This article is protected by copyright. All rights reserved.
Computer Code for Transportation Network Design and Analysis
DOT National Transportation Integrated Search
1977-01-01
This document describes the results of research into the application of the mathematical programming technique of decomposition to practical transportation network problems. A computer code called Catnap (for Control Analysis Transportation Network A...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neil, Joshua Charles; Fisk, Michael Edward; Brugh, Alexander William
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalousmore » behavior. Data collected by a Unified Host Collection Agent ("UHCA") may also be used to detect anomalous behavior.« less
ERIC Educational Resources Information Center
Enriquez, Judith Guevarra
2010-01-01
In this article, centrality is explored as a measure of computer-mediated communication (CMC) in networked learning. Centrality measure is quite common in performing social network analysis (SNA) and in analysing social cohesion, strength of ties and influence in CMC, and computer-supported collaborative learning research. It argues that measuring…
The Effectiveness of Using Virtual Laboratories to Teach Computer Networking Skills in Zambia
ERIC Educational Resources Information Center
Lampi, Evans
2013-01-01
The effectiveness of using virtual labs to train students in computer networking skills, when real equipment is limited or unavailable, is uncertain. The purpose of this study was to determine the effectiveness of using virtual labs to train students in the acquisition of computer network configuration and troubleshooting skills. The study was…
Kraemer, Sara; Carayon, Pascale
2007-03-01
This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.
A grid to facilitate physics staffing justification.
Klein, Eric E
2009-12-03
Justification of clinical physics staffing levels is difficult due to the lack of direction as how to equate clinical needs with the staffing levels and competency required. When a physicist negotiates staffing requests to administration, she/he often refers to American College of Radiology staffing level suggestions, and resources such as the Abt studies. This approach is often met with questions as to how to fairly derive the time it takes to perform tasks. The result is often insufficient and/or inexperienced staff handling complex and cumbersome tasks. We undertook development of a staffing justification grid to equate the clinical needs to the quantity and quality of staffing required. The first step is using the Abt study, customized to the clinical setting, to derive time per task multiplied by the anticipated number of such tasks. Inclusion of vacation, meeting, and developmental time may be incorporated along with allocated time for education and administration. This is followed by mapping the tasks to the level of competency/experience needed. For example, in an academic setting the faculty appointment levels correlate with experience. Non-staff personnel, such as IMRT QA technicians or clerical staff, should also be part of the equation. By using the staffing justification grid, we derived strong documentation to justify a substantial budget increase. The grid also proved useful when our clinical demands changed. Justification for physics staffing can be significantly strengthened with a properly developed data-based time and work analysis. A staffing grid is presented, along with a development methodology that facilitated our justification. Though our grid is for a large academic facility, the methodology can be extended to a non-academic setting, and to a smaller scale. This grid method not only equates the clinical needs with the quantity of staffing, but can also help generate the personnel budget, based on the type of staff and personnel required. The grid is easily adaptable when changes to the clinical environment change, such as an increase in IMRT or IGRT applications.
Documentary of MFENET, a national computer network
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shuttleworth, B.O.
1977-06-01
The national Magnetic Fusion Energy Computer Network (MFENET) is a newly operational star network of geographically separated heterogeneous hosts and a communications subnetwork of PDP-11 processors. Host processors interfaced to the subnetwork currently include a CDC 7600 at the Central Computer Center (CCC) and several DECsystem-10's at User Service Centers (USC's). The network was funded by a U.S. government agency (ERDA) to provide in an economical manner the needed computational resources to magnetic confinement fusion researchers. Phase I operation of MFENET distributed the processing power of the CDC 7600 among the USC's through the provision of file transport between anymore » two hosts and remote job entry to the 7600. Extending the capabilities of Phase I, MFENET Phase II provided interactive terminal access to the CDC 7600 from the USC's. A file management system is maintained at the CCC for all network users. The history and development of MFENET are discussed, with emphasis on the protocols used to link the host computers and the USC software. Comparisons are made of MFENET versus ARPANET (Advanced Research Projects Agency Computer Network) and DECNET (Digital Distributed Network Architecture). DECNET and MFENET host-to host, host-to-CCP, and link protocols are discussed in detail. The USC--CCP interface is described briefly. 43 figures, 2 tables.« less
Network Management of the SPLICE Computer Network.
1982-12-01
Approved for public release; distri4ition unlimited. Network lanagenent Df the SPLICE Computer Network by Zriig E. Opal captaini United St~tes larine... structure of the network must leni itself t3 change and reconfiguration, one author [Ref. 2: p.21] recommended that a global bus topology be adopted for...statistics, trace statistics, snapshot statistiZs, artifi - cial traffic generators, auulat on, a network measurement center which includes control, collction
Computer-Based Information Networks: Selected Examples.
ERIC Educational Resources Information Center
Hardesty, Larry
The history, purpose, and operation of six computer-based information networks are described in general and nontechnical terms. In the introduction the many definitions of an information network are explored. Ohio College Library Center's network (OCLC) is the first example. OCLC began in 1963, and since early 1973 has been extending its services…
Network Computing for Distributed Underwater Acoustic Sensors
2014-03-31
underwater sensor network with mobility. In preparation. [3] EvoLogics (2013), Underwater Acoustic Modems, (Product Information Guide... Wireless Communications, 9(9), 2934–2944. [21] Pompili, D. and Akyildiz, I. (2010), A multimedia cross-layer protocol for underwater acoustic sensor networks ... Network Computing for Distributed Underwater Acoustic Sensors M. Barbeau E. Kranakis
MapReduce Based Parallel Neural Networks in Enabling Large Scale Machine Learning
Yang, Jie; Huang, Yuan; Xu, Lixiong; Li, Siguang; Qi, Man
2015-01-01
Artificial neural networks (ANNs) have been widely used in pattern recognition and classification applications. However, ANNs are notably slow in computation especially when the size of data is large. Nowadays, big data has received a momentum from both industry and academia. To fulfill the potentials of ANNs for big data applications, the computation process must be speeded up. For this purpose, this paper parallelizes neural networks based on MapReduce, which has become a major computing model to facilitate data intensive applications. Three data intensive scenarios are considered in the parallelization process in terms of the volume of classification data, the size of the training data, and the number of neurons in the neural network. The performance of the parallelized neural networks is evaluated in an experimental MapReduce computer cluster from the aspects of accuracy in classification and efficiency in computation. PMID:26681933
Deep learning with coherent nanophotonic circuits
NASA Astrophysics Data System (ADS)
Shen, Yichen; Harris, Nicholas C.; Skirlo, Scott; Prabhu, Mihika; Baehr-Jones, Tom; Hochberg, Michael; Sun, Xin; Zhao, Shijie; Larochelle, Hugo; Englund, Dirk; Soljačić, Marin
2017-07-01
Artificial neural networks are computational network models inspired by signal processing in the brain. These models have dramatically improved performance for many machine-learning tasks, including speech and image recognition. However, today's computing hardware is inefficient at implementing neural networks, in large part because much of it was designed for von Neumann computing schemes. Significant effort has been made towards developing electronic architectures tuned to implement artificial neural networks that exhibit improved computational speed and accuracy. Here, we propose a new architecture for a fully optical neural network that, in principle, could offer an enhancement in computational speed and power efficiency over state-of-the-art electronics for conventional inference tasks. We experimentally demonstrate the essential part of the concept using a programmable nanophotonic processor featuring a cascaded array of 56 programmable Mach-Zehnder interferometers in a silicon photonic integrated circuit and show its utility for vowel recognition.
MapReduce Based Parallel Neural Networks in Enabling Large Scale Machine Learning.
Liu, Yang; Yang, Jie; Huang, Yuan; Xu, Lixiong; Li, Siguang; Qi, Man
2015-01-01
Artificial neural networks (ANNs) have been widely used in pattern recognition and classification applications. However, ANNs are notably slow in computation especially when the size of data is large. Nowadays, big data has received a momentum from both industry and academia. To fulfill the potentials of ANNs for big data applications, the computation process must be speeded up. For this purpose, this paper parallelizes neural networks based on MapReduce, which has become a major computing model to facilitate data intensive applications. Three data intensive scenarios are considered in the parallelization process in terms of the volume of classification data, the size of the training data, and the number of neurons in the neural network. The performance of the parallelized neural networks is evaluated in an experimental MapReduce computer cluster from the aspects of accuracy in classification and efficiency in computation.
Schmitt, Michael
2004-09-01
We study networks of spiking neurons that use the timing of pulses to encode information. Nonlinear interactions model the spatial groupings of synapses on the neural dendrites and describe the computations performed at local branches. Within a theoretical framework of learning we analyze the question of how many training examples these networks must receive to be able to generalize well. Bounds for this sample complexity of learning can be obtained in terms of a combinatorial parameter known as the pseudodimension. This dimension characterizes the computational richness of a neural network and is given in terms of the number of network parameters. Two types of feedforward architectures are considered: constant-depth networks and networks of unconstrained depth. We derive asymptotically tight bounds for each of these network types. Constant depth networks are shown to have an almost linear pseudodimension, whereas the pseudodimension of general networks is quadratic. Networks of spiking neurons that use temporal coding are becoming increasingly more important in practical tasks such as computer vision, speech recognition, and motor control. The question of how well these networks generalize from a given set of training examples is a central issue for their successful application as adaptive systems. The results show that, although coding and computation in these networks is quite different and in many cases more powerful, their generalization capabilities are at least as good as those of traditional neural network models.
Broadcasting a message in a parallel computer
Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN
2011-08-02
Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.
Lai, Chin-Feng; Chen, Min; Pan, Jeng-Shyang; Youn, Chan-Hyun; Chao, Han-Chieh
2014-03-01
As cloud computing and wireless body sensor network technologies become gradually developed, ubiquitous healthcare services prevent accidents instantly and effectively, as well as provides relevant information to reduce related processing time and cost. This study proposes a co-processing intermediary framework integrated cloud and wireless body sensor networks, which is mainly applied to fall detection and 3-D motion reconstruction. In this study, the main focuses includes distributed computing and resource allocation of processing sensing data over the computing architecture, network conditions and performance evaluation. Through this framework, the transmissions and computing time of sensing data are reduced to enhance overall performance for the services of fall events detection and 3-D motion reconstruction.
A Feasibility Study of Synthesizing Subsurfaces Modeled with Computational Neural Networks
NASA Technical Reports Server (NTRS)
Wang, John T.; Housner, Jerrold M.; Szewczyk, Z. Peter
1998-01-01
This paper investigates the feasibility of synthesizing substructures modeled with computational neural networks. Substructures are modeled individually with computational neural networks and the response of the assembled structure is predicted by synthesizing the neural networks. A superposition approach is applied to synthesize models for statically determinate substructures while an interface displacement collocation approach is used to synthesize statically indeterminate substructure models. Beam and plate substructures along with components of a complicated Next Generation Space Telescope (NGST) model are used in this feasibility study. In this paper, the limitations and difficulties of synthesizing substructures modeled with neural networks are also discussed.
Computer Network Security- The Challenges of Securing a Computer Network
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2011-01-01
This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.
Scalable Optical-Fiber Communication Networks
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Peterson, John C.
1993-01-01
Scalable arbitrary fiber extension network (SAFEnet) is conceptual fiber-optic communication network passing digital signals among variety of computers and input/output devices at rates from 200 Mb/s to more than 100 Gb/s. Intended for use with very-high-speed computers and other data-processing and communication systems in which message-passing delays must be kept short. Inherent flexibility makes it possible to match performance of network to computers by optimizing configuration of interconnections. In addition, interconnections made redundant to provide tolerance to faults.
Constructing Neuronal Network Models in Massively Parallel Environments.
Ippen, Tammo; Eppler, Jochen M; Plesser, Hans E; Diesmann, Markus
2017-01-01
Recent advances in the development of data structures to represent spiking neuron network models enable us to exploit the complete memory of petascale computers for a single brain-scale network simulation. In this work, we investigate how well we can exploit the computing power of such supercomputers for the creation of neuronal networks. Using an established benchmark, we divide the runtime of simulation code into the phase of network construction and the phase during which the dynamical state is advanced in time. We find that on multi-core compute nodes network creation scales well with process-parallel code but exhibits a prohibitively large memory consumption. Thread-parallel network creation, in contrast, exhibits speedup only up to a small number of threads but has little overhead in terms of memory. We further observe that the algorithms creating instances of model neurons and their connections scale well for networks of ten thousand neurons, but do not show the same speedup for networks of millions of neurons. Our work uncovers that the lack of scaling of thread-parallel network creation is due to inadequate memory allocation strategies and demonstrates that thread-optimized memory allocators recover excellent scaling. An analysis of the loop order used for network construction reveals that more complex tests on the locality of operations significantly improve scaling and reduce runtime by allowing construction algorithms to step through large networks more efficiently than in existing code. The combination of these techniques increases performance by an order of magnitude and harnesses the increasingly parallel compute power of the compute nodes in high-performance clusters and supercomputers.
Constructing Neuronal Network Models in Massively Parallel Environments
Ippen, Tammo; Eppler, Jochen M.; Plesser, Hans E.; Diesmann, Markus
2017-01-01
Recent advances in the development of data structures to represent spiking neuron network models enable us to exploit the complete memory of petascale computers for a single brain-scale network simulation. In this work, we investigate how well we can exploit the computing power of such supercomputers for the creation of neuronal networks. Using an established benchmark, we divide the runtime of simulation code into the phase of network construction and the phase during which the dynamical state is advanced in time. We find that on multi-core compute nodes network creation scales well with process-parallel code but exhibits a prohibitively large memory consumption. Thread-parallel network creation, in contrast, exhibits speedup only up to a small number of threads but has little overhead in terms of memory. We further observe that the algorithms creating instances of model neurons and their connections scale well for networks of ten thousand neurons, but do not show the same speedup for networks of millions of neurons. Our work uncovers that the lack of scaling of thread-parallel network creation is due to inadequate memory allocation strategies and demonstrates that thread-optimized memory allocators recover excellent scaling. An analysis of the loop order used for network construction reveals that more complex tests on the locality of operations significantly improve scaling and reduce runtime by allowing construction algorithms to step through large networks more efficiently than in existing code. The combination of these techniques increases performance by an order of magnitude and harnesses the increasingly parallel compute power of the compute nodes in high-performance clusters and supercomputers. PMID:28559808
Locating hardware faults in a data communications network of a parallel computer
Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.
2010-01-12
Hardware faults location in a data communications network of a parallel computer. Such a parallel computer includes a plurality of compute nodes and a data communications network that couples the compute nodes for data communications and organizes the compute node as a tree. Locating hardware faults includes identifying a next compute node as a parent node and a root of a parent test tree, identifying for each child compute node of the parent node a child test tree having the child compute node as root, running a same test suite on the parent test tree and each child test tree, and identifying the parent compute node as having a defective link connected from the parent compute node to a child compute node if the test suite fails on the parent test tree and succeeds on all the child test trees.
Aeronautics Technology Possibilities for 2000: Report of a workshop
NASA Technical Reports Server (NTRS)
1984-01-01
The potential of aeronautical research and technology (R&T) development, which could provide the basis for facility planning and long range guidance of R&T programs and could establish justification for support of aeronautical research and technology was studied. The projections served specific purposes: (1) to provide a base for research and future facilities needed to support the projected technologies, and development advanced vehicles; (2) to provide insight on the possible state of the art in aeronautical technology by the year 2000 for civil and military planners of air vehicles and systems. Topics discussed include: aerodynamics; propulsion; structures; materials; guidance, navigation and control; computer and information technology; human factors; and systems integration.
NASA Astrophysics Data System (ADS)
Kartashev, A. L.; Vaulin, S. D.; Kartasheva, M. A.; Martynov, A. A.; Safonov, E. V.
2016-06-01
This article presents information about the main distinguishing features of microturbine power plants. The justification of the use of Francis turbine in microturbine power plants with rated power of 100 kW is given. Initial analytical engineering calculations of the turbine (without using computational fluid dynamics) with appropriate calculation methods are considered. The parametric study of nozzle blade and whole turbine stage using ANSYS CFX is descripted. The calculations determined the optimal geometry on the criterion of maximizing efficiency at total pressure ratio. The calculation results are presented in graphical form, as well as the velocity and pressure fields at the interscapular channels of nozzle unit and the impeller.
A strategy for selecting data mining techniques in metabolomics.
Banimustafa, Ahmed Hmaidan; Hardy, Nigel W
2012-01-01
There is a general agreement that the development of metabolomics depends not only on advances in chemical analysis techniques but also on advances in computing and data analysis methods. Metabolomics data usually requires intensive pre-processing, analysis, and mining procedures. Selecting and applying such procedures requires attention to issues including justification, traceability, and reproducibility. We describe a strategy for selecting data mining techniques which takes into consideration the goals of data mining techniques on the one hand, and the goals of metabolomics investigations and the nature of the data on the other. The strategy aims to ensure the validity and soundness of results and promote the achievement of the investigation goals.
A graph algebra for scalable visual analytics.
Shaverdian, Anna A; Zhou, Hao; Michailidis, George; Jagadish, Hosagrahar V
2012-01-01
Visual analytics (VA), which combines analytical techniques with advanced visualization features, is fast becoming a standard tool for extracting information from graph data. Researchers have developed many tools for this purpose, suggesting a need for formal methods to guide these tools' creation. Increased data demands on computing requires redesigning VA tools to consider performance and reliability in the context of analysis of exascale datasets. Furthermore, visual analysts need a way to document their analyses for reuse and results justification. A VA graph framework encapsulated in a graph algebra helps address these needs. Its atomic operators include selection and aggregation. The framework employs a visual operator and supports dynamic attributes of data to enable scalable visual exploration of data.
OpenFlow Extensions for Programmable Quantum Networks
2017-06-19
Extensions for Programmable Quantum Networks by Venkat Dasari, Nikolai Snow, and Billy Geerhart Computational and Information Sciences Directorate...distribution is unlimited. 1 1. Introduction Quantum networks and quantum computing have been receiving a surge of interest recently.1–3 However, there has...communicate using entangled particles and perform calculations using quantum logic gates. Additionally, quantum computing uses a quantum bit (qubit
Advanced Computational Techniques for Power Tube Design.
1986-07-01
fixturing applications, in addition to the existing computer-aided engineering capabilities. o Helix TWT Manufacturing has Implemented a tooling and fixturing...illustrates the ajor features of this computer network. ) The backbone of our system is a Sytek Broadband Network (LAN) which Interconnects terminals and...automatic network analyzer (FANA) which electrically characterizes the slow-wave helices of traveling-wave tubes ( TWTs ) -- both for engineering design
A Strategic Approach to Network Defense: Framing the Cloud
2011-03-10
accepted network defensive principles, to reduce risks associated with emerging virtualization capabilities and scalability of cloud computing . This expanded...defensive framework can assist enterprise networking and cloud computing architects to better design more secure systems.
Code 672 observational science branch computer networks
NASA Technical Reports Server (NTRS)
Hancock, D. W.; Shirk, H. G.
1988-01-01
In general, networking increases productivity due to the speed of transmission, easy access to remote computers, ability to share files, and increased availability of peripherals. Two different networks within the Observational Science Branch are described in detail.
A Novel College Network Resource Management Method using Cloud Computing
NASA Astrophysics Data System (ADS)
Lin, Chen
At present information construction of college mainly has construction of college networks and management information system; there are many problems during the process of information. Cloud computing is development of distributed processing, parallel processing and grid computing, which make data stored on the cloud, make software and services placed in the cloud and build on top of various standards and protocols, you can get it through all kinds of equipments. This article introduces cloud computing and function of cloud computing, then analyzes the exiting problems of college network resource management, the cloud computing technology and methods are applied in the construction of college information sharing platform.
Cellular computational platform and neurally inspired elements thereof
Okandan, Murat
2016-11-22
A cellular computational platform is disclosed that includes a multiplicity of functionally identical, repeating computational hardware units that are interconnected electrically and optically. Each computational hardware unit includes a reprogrammable local memory and has interconnections to other such units that have reconfigurable weights. Each computational hardware unit is configured to transmit signals into the network for broadcast in a protocol-less manner to other such units in the network, and to respond to protocol-less broadcast messages that it receives from the network. Each computational hardware unit is further configured to reprogram the local memory in response to incoming electrical and/or optical signals.
Embedding global and collective in a torus network with message class map based tree path selection
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Dong; Coteus, Paul W.; Eisley, Noel A.
Embodiments of the invention provide a method, system and computer program product for embedding a global barrier and global interrupt network in a parallel computer system organized as a torus network. The computer system includes a multitude of nodes. In one embodiment, the method comprises taking inputs from a set of receivers of the nodes, dividing the inputs from the receivers into a plurality of classes, combining the inputs of each of the classes to obtain a result, and sending said result to a set of senders of the nodes. Embodiments of the invention provide a method, system and computermore » program product for embedding a collective network in a parallel computer system organized as a torus network. In one embodiment, the method comprises adding to a torus network a central collective logic to route messages among at least a group of nodes in a tree structure.« less
48 CFR 306.304 - Approval of the justification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... where the individual designated as the CA does not meet the requirements of FAR 6.304 (a)(3)(ii). This... acquisitions in the dollar amount cited in FAR 6.304(a)(2) through (a)(4), the CCO, if applicable, and the HCA shall indicate their review of, and concurrence with, the justification by signing the JOFOC. (a) The...
48 CFR 306.304 - Approval of the justification.
Code of Federal Regulations, 2014 CFR
2014-10-01
... where the individual designated as the CA does not meet the requirements of FAR 6.304 (a)(3)(ii). This... acquisitions in the dollar amount cited in FAR 6.304(a)(2) through (a)(4), the CCO, if applicable, and the HCA shall indicate their review of, and concurrence with, the justification by signing the JOFOC. (a) The...
48 CFR 306.304 - Approval of the justification.
Code of Federal Regulations, 2012 CFR
2012-10-01
... where the individual designated as the CA does not meet the requirements of FAR 6.304 (a)(3)(ii). This... acquisitions in the dollar amount cited in FAR 6.304(a)(2) through (a)(4), the CCO, if applicable, and the HCA shall indicate their review of, and concurrence with, the justification by signing the JOFOC. (a) The...
48 CFR 306.304 - Approval of the justification.
Code of Federal Regulations, 2013 CFR
2013-10-01
... where the individual designated as the CA does not meet the requirements of FAR 6.304 (a)(3)(ii). This... acquisitions in the dollar amount cited in FAR 6.304(a)(2) through (a)(4), the CCO, if applicable, and the HCA shall indicate their review of, and concurrence with, the justification by signing the JOFOC. (a) The...
Middle School Students' Responses to Two-Tier Tasks
ERIC Educational Resources Information Center
Haja, Shajahan; Clarke, David
2011-01-01
The structure of two-tier testing is such that the first tier consists of a multiple-choice question and the second tier requires justifications for choices of answers made in the first tier. This study aims to evaluate two-tier tasks in "proportion" in terms of students' capacity to write and select justifications and to examine the effect of…
ERIC Educational Resources Information Center
Sekiwu, Denis; Botha, M. M.
2014-01-01
This qualitative study employs grounded theory and the Wilsonian concept analysis, as interpretative paradigms, to examine participants' voices on the justification and avenues of values integration into management of school discipline in Uganda. By using John Dewey's educational philosophy [pragmatism] as the theoretical lens for the study, we…
Young Children's Ideas about the Nature, Causes, Justification, and Alleviation of Poverty
ERIC Educational Resources Information Center
Chafel, Judith A.; Neitzel, Carin
2005-01-01
Sixty-four 8-year-old boys and girls from urban and rural settings and representing different races and socioeconomic status backgrounds responded to questions about the nature, causes, justification, and alleviation of poverty. Much of what the children said indicated that they had not yet internalized prevailing adult norms and values about the…
ERIC Educational Resources Information Center
Chapman, Michael; McBride, Michelle L.
1992-01-01
Children of 4 to 10 years of age were given 2 class inclusion tasks. Younger children's performance was inflated by guessing. Scores were higher in the marked task than in the unmarked task as a result of differing rates of inclusion logic. Children's verbal justifications closely approximated estimates of their true competence. (GLR)
The Labours of Hercules: Ethical Embodiment and an Erasmian Justification for Higher Education
ERIC Educational Resources Information Center
De Barros, Eric L.
2014-01-01
In the early 1990s, a popular American dorm-room poster luminously asserted crass materialism as "JUSTIFICATION FOR HIGHER EDUCATION". Self-consciously premised on the paradoxical success of my failure or failure of my success as a professor of Renaissance literature and culture, this essay draws on Erasmus's educational theory of…
30 CFR 203.84 - What is in a net revenue and relief justification report?
Code of Federal Regulations, 2011 CFR
2011-07-01
... justification report? This report presents cash flow data for 12 qualifying months, using the format specified... having some production. (a) The cash flow table you submit must include historical data for: (1) Lease... allowable costs; and (5) Transportation and processing costs. (b) Do not include in your cash flow table the...
30 CFR 203.4 - How do the provisions in this part apply to different types of leases and projects?
Code of Federal Regulations, 2011 CFR
2011-07-01
... justification report (prescribed format) X (3) Economic viability and relief justification report (Royalty Suspension Viability Program (RSVP) model inputs justified with Geological and Geophysical (G&G), Engineering... template) (6) Determined to be economic only with relief X X X (d) The following table indicates by an X...
30 CFR 203.4 - How do the provisions in this part apply to different types of leases and projects?
Code of Federal Regulations, 2012 CFR
2012-07-01
... justification report (prescribed format) X (3) Economic viability and relief justification report (Royalty Suspension Viability Program (RSVP) model inputs justified with Geological and Geophysical (G&G), Engineering...) (6) Determined to be economic only with relief X X X (d) The following table indicates by an X, and...
30 CFR 203.4 - How do the provisions in this part apply to different types of leases and projects?
Code of Federal Regulations, 2013 CFR
2013-07-01
... justification report (prescribed format) X (3) Economic viability and relief justification report (Royalty Suspension Viability Program (RSVP) model inputs justified with Geological and Geophysical (G&G), Engineering...) (6) Determined to be economic only with relief X X X (d) The following table indicates by an X, and...
30 CFR 203.85 - What is in an economic viability and relief justification report?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 30 Mineral Resources 2 2011-07-01 2011-07-01 false What is in an economic viability and relief... Oil, Gas, and Sulfur General Required Reports § 203.85 What is in an economic viability and relief... your own model and results. The economic viability and relief justification report must contain the...
30 CFR 203.4 - How do the provisions in this part apply to different types of leases and projects?
Code of Federal Regulations, 2014 CFR
2014-07-01
... justification report (prescribed format) X (3) Economic viability and relief justification report (Royalty Suspension Viability Program (RSVP) model inputs justified with Geological and Geophysical (G&G), Engineering...) (6) Determined to be economic only with relief X X X (d) The following table indicates by an X, and...
A Reply on Behalf of the Relativist to Mark Mason's Justification of Universal Ethical Principles
ERIC Educational Resources Information Center
MacKenzie, Jim
2007-01-01
Mark Mason, in his "A Justification, After the Postmodern Turn, of Universal Ethical Principles and Educational Ideals" Educational Philosophy and Theory, 37 (2005), attempts to justify transcultural multiculturalism. In this paper I argue that he fails to refute moral relativism, and that multiculturalism as he interprets it is not morally…
ERIC Educational Resources Information Center
Stylianou, Despina A.
2013-01-01
Representation and justification are two central "mathematical practices". In the past, each has been examined to gain insights in the functions that they have in students' mathematical problem solving. Here, we examine the ways that representation and justification interact and influence the development of one another. We focus on the…
ERIC Educational Resources Information Center
Mercan, Fatih Caglayan
2012-01-01
This study examines the epistemic beliefs about justification employed by physics undergraduate and graduate students and faculty in the context of solving a standard classical physics problem and a frontier physics problem. Data were collected by a think-aloud problem solving session followed by a semi-structured interview conducted with 50…
Developing an Understanding of Children's Justifications for the Circle Area Formula
ERIC Educational Resources Information Center
O'Dell, Jenna R.; Rupnow, Theodore J.; Cullen, Craig J.; Barrett, Jeffrey E.; Clements, Douglas H.; Sarama, Julie; Van Dine, Douglas W.
2016-01-01
In this study we investigated eighth grade students' informal justification for the circle area formula to expand accounts of the measurement knowledge for middle-school age students. Data were collected during three paired interviews of a three-year teaching experiment. Here we describe schemes students exhibited as they operated on measurement…
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Environmental Protection... Regulations System ENVIRONMENTAL PROTECTION AGENCY Ch. 15, App. I Appendix I to Chapter 15—Environmental Protection Agency; Class Justification for Other Than Full and Open Competition in Acquisitions From the...
Can one do good medical ethics without principles?
Macklin, Ruth
2015-01-01
The criteria for determining what it is to do good medical ethics are the quality of ethical analysis and ethical justifications for decisions and actions. Justifications for decisions and actions rely on ethical principles, be they the 'famous four' or subsidiary ethical principles relevant to specific contexts. Examples from clinical ethics, research ethics and public health ethics reveal that even when not stated explicitly, principles are involved in ethical justifications. Principles may come into conflict, however, and the resolution of an ethical dilemma requires providing good reasons for preferring one principle over another. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Adolescent judgments and reasoning about the failure to include peers with social disabilities.
Bottema-Beutel, Kristen; Li, Zhushan
2015-06-01
Adolescents with autism spectrum disorder often do not have access to crucial peer social activities. This study examines how typically developing adolescents evaluate decisions not to include a peer based on disability status, and the justifications they apply to these decisions. A clinical interview methodology was used to elicit judgments and justifications across four contexts. We found adolescents are more likely to judge the failure to include as acceptable in personal as compared to public contexts. Using logistic regression, we found that adolescents are more likely to provide moral justifications as to why failure to include is acceptable in a classroom as compared to home, lab group, and soccer practice contexts. Implications for intervention are also discussed.
Cut set-based risk and reliability analysis for arbitrarily interconnected networks
Wyss, Gregory D.
2000-01-01
Method for computing all-terminal reliability for arbitrarily interconnected networks such as the United States public switched telephone network. The method includes an efficient search algorithm to generate minimal cut sets for nonhierarchical networks directly from the network connectivity diagram. Efficiency of the search algorithm stems in part from its basis on only link failures. The method also includes a novel quantification scheme that likewise reduces computational effort associated with assessing network reliability based on traditional risk importance measures. Vast reductions in computational effort are realized since combinatorial expansion and subsequent Boolean reduction steps are eliminated through analysis of network segmentations using a technique of assuming node failures to occur on only one side of a break in the network, and repeating the technique for all minimal cut sets generated with the search algorithm. The method functions equally well for planar and non-planar networks.
Computer network access to scientific information systems for minority universities
NASA Astrophysics Data System (ADS)
Thomas, Valerie L.; Wakim, Nagi T.
1993-08-01
The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.
Networking Micro-Processors for Effective Computer Utilization in Nursing
Mangaroo, Jewellean; Smith, Bob; Glasser, Jay; Littell, Arthur; Saba, Virginia
1982-01-01
Networking as a social entity has important implications for maximizing computer resources for improved utilization in nursing. This paper describes the one process of networking of complementary resources at three institutions. Prairie View A&M University, Texas A&M University and the University of Texas School of Public Health, which has effected greater utilization of computers at the college. The results achieved in this project should have implications for nurses, users, and consumers in the development of computer resources.
Use of medical information by computer networks raises major concerns about privacy.
OReilly, M
1995-01-01
The development of computer data-bases and long-distance computer networks is leading to improvements in Canada's health care system. However, these developments come at a cost and require a balancing act between access and confidentiality. Columnist Michael OReilly, who in this article explores the security of computer networks, notes that respect for patients' privacy must be given as high a priority as the ability to see their records in the first place. Images p213-a PMID:7600474
Research on Influence of Cloud Environment on Traditional Network Security
NASA Astrophysics Data System (ADS)
Ming, Xiaobo; Guo, Jinhua
2018-02-01
Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.
Collective Computation of Neural Network
1990-03-15
Sciences, Beijing ABSTRACT Computational neuroscience is a new branch of neuroscience originating from current research on the theory of computer...scientists working in artificial intelligence engineering and neuroscience . The paper introduces the collective computational properties of model neural...vision research. On this basis, the authors analyzed the significance of the Hopfield model. Key phrases: Computational Neuroscience , Neural Network, Model
An Exploratory Study of Internet Addiction, Usage and Communication Pleasure.
ERIC Educational Resources Information Center
Chou, Chien; Chou, Jung; Tyan, Nay-Ching Nancy
This study examined the correlation between Internet addiction, usage, and communication pleasure. Research questions were: (1) What is computer network addiction? (2) How can one measure the degree of computer network addiction? (3) What is the correlation between the degree of users' network addiction and their network usage? (4) What is the…
SNAP: A computer program for generating symbolic network functions
NASA Technical Reports Server (NTRS)
Lin, P. M.; Alderson, G. E.
1970-01-01
The computer program SNAP (symbolic network analysis program) generates symbolic network functions for networks containing R, L, and C type elements and all four types of controlled sources. The program is efficient with respect to program storage and execution time. A discussion of the basic algorithms is presented, together with user's and programmer's guides.
A theoretical and experimental study of neuromorphic atomic switch networks for reservoir computing.
Sillin, Henry O; Aguilera, Renato; Shieh, Hsien-Hang; Avizienis, Audrius V; Aono, Masakazu; Stieg, Adam Z; Gimzewski, James K
2013-09-27
Atomic switch networks (ASNs) have been shown to generate network level dynamics that resemble those observed in biological neural networks. To facilitate understanding and control of these behaviors, we developed a numerical model based on the synapse-like properties of individual atomic switches and the random nature of the network wiring. We validated the model against various experimental results highlighting the possibility to functionalize the network plasticity and the differences between an atomic switch in isolation and its behaviors in a network. The effects of changing connectivity density on the nonlinear dynamics were examined as characterized by higher harmonic generation in response to AC inputs. To demonstrate their utility for computation, we subjected the simulated network to training within the framework of reservoir computing and showed initial evidence of the ASN acting as a reservoir which may be optimized for specific tasks by adjusting the input gain. The work presented represents steps in a unified approach to experimentation and theory of complex systems to make ASNs a uniquely scalable platform for neuromorphic computing.
A theoretical and experimental study of neuromorphic atomic switch networks for reservoir computing
NASA Astrophysics Data System (ADS)
Sillin, Henry O.; Aguilera, Renato; Shieh, Hsien-Hang; Avizienis, Audrius V.; Aono, Masakazu; Stieg, Adam Z.; Gimzewski, James K.
2013-09-01
Atomic switch networks (ASNs) have been shown to generate network level dynamics that resemble those observed in biological neural networks. To facilitate understanding and control of these behaviors, we developed a numerical model based on the synapse-like properties of individual atomic switches and the random nature of the network wiring. We validated the model against various experimental results highlighting the possibility to functionalize the network plasticity and the differences between an atomic switch in isolation and its behaviors in a network. The effects of changing connectivity density on the nonlinear dynamics were examined as characterized by higher harmonic generation in response to AC inputs. To demonstrate their utility for computation, we subjected the simulated network to training within the framework of reservoir computing and showed initial evidence of the ASN acting as a reservoir which may be optimized for specific tasks by adjusting the input gain. The work presented represents steps in a unified approach to experimentation and theory of complex systems to make ASNs a uniquely scalable platform for neuromorphic computing.
Deep learning for computational chemistry.
Goh, Garrett B; Hodas, Nathan O; Vishnu, Abhinav
2017-06-15
The rise and fall of artificial neural networks is well documented in the scientific literature of both computer science and computational chemistry. Yet almost two decades later, we are now seeing a resurgence of interest in deep learning, a machine learning algorithm based on multilayer neural networks. Within the last few years, we have seen the transformative impact of deep learning in many domains, particularly in speech recognition and computer vision, to the extent that the majority of expert practitioners in those field are now regularly eschewing prior established models in favor of deep learning models. In this review, we provide an introductory overview into the theory of deep neural networks and their unique properties that distinguish them from traditional machine learning algorithms used in cheminformatics. By providing an overview of the variety of emerging applications of deep neural networks, we highlight its ubiquity and broad applicability to a wide range of challenges in the field, including quantitative structure activity relationship, virtual screening, protein structure prediction, quantum chemistry, materials design, and property prediction. In reviewing the performance of deep neural networks, we observed a consistent outperformance against non-neural networks state-of-the-art models across disparate research topics, and deep neural network-based models often exceeded the "glass ceiling" expectations of their respective tasks. Coupled with the maturity of GPU-accelerated computing for training deep neural networks and the exponential growth of chemical data on which to train these networks on, we anticipate that deep learning algorithms will be a valuable tool for computational chemistry. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.
ERIC Educational Resources Information Center
Sng, Dennis Cheng-Hong
The University of Illinois at Urbana-Champaign (UIUC) has a large campus computer network serving a community of about 20,000 users. With such a large network, it is inevitable that there are a wide variety of technologies co-existing in a multi-vendor environment. Effective network monitoring tools can help monitor traffic and link usage, as well…
Calibration of the clock-phase biases of GNSS networks: the closure-ambiguity approach
NASA Astrophysics Data System (ADS)
Lannes, A.; Prieur, J.-L.
2013-08-01
In global navigation satellite systems (GNSS), the problem of retrieving clock-phase biases from network data has a basic rank defect. We analyse the different ways of removing this rank defect, and define a particular strategy for obtaining these phase biases in a standard form. The minimum-constrained problem to be solved in the least-squares (LS) sense depends on some integer vector which can be fixed in an arbitrary manner. We propose to solve the problem via an undifferenced approach based on the notion of closure ambiguity. We present a theoretical justification of this closure-ambiguity approach (CAA), and the main elements for a practical implementation. The links with other methods are also established. We analyse all those methods in a unified interpretative framework, and derive functional relations between the corresponding solutions and our CAA solution. This could be interesting for many GNSS applications like real-time kinematic PPP for instance. To compare the methods providing LS estimates of clock-phase biases, we define a particular solution playing the role of reference solution. For this solution, when a phase bias is estimated for the first time, its fractional part is confined to the one-cycle width interval centred on zero; the integer-ambiguity set is modified accordingly. Our theoretical study is illustrated with some simple and generic examples; it could have applications in data processing of most GNSS networks, and particularly global networks using GPS, Glonass, Galileo, or BeiDou/Compass satellites.
Link failure detection in a parallel computer
Archer, Charles J.; Blocksome, Michael A.; Megerian, Mark G.; Smith, Brian E.
2010-11-09
Methods, apparatus, and products are disclosed for link failure detection in a parallel computer including compute nodes connected in a rectangular mesh network, each pair of adjacent compute nodes in the rectangular mesh network connected together using a pair of links, that includes: assigning each compute node to either a first group or a second group such that adjacent compute nodes in the rectangular mesh network are assigned to different groups; sending, by each of the compute nodes assigned to the first group, a first test message to each adjacent compute node assigned to the second group; determining, by each of the compute nodes assigned to the second group, whether the first test message was received from each adjacent compute node assigned to the first group; and notifying a user, by each of the compute nodes assigned to the second group, whether the first test message was received.
Antenna analysis using neural networks
NASA Technical Reports Server (NTRS)
Smith, William T.
1992-01-01
Conventional computing schemes have long been used to analyze problems in electromagnetics (EM). The vast majority of EM applications require computationally intensive algorithms involving numerical integration and solutions to large systems of equations. The feasibility of using neural network computing algorithms for antenna analysis is investigated. The ultimate goal is to use a trained neural network algorithm to reduce the computational demands of existing reflector surface error compensation techniques. Neural networks are computational algorithms based on neurobiological systems. Neural nets consist of massively parallel interconnected nonlinear computational elements. They are often employed in pattern recognition and image processing problems. Recently, neural network analysis has been applied in the electromagnetics area for the design of frequency selective surfaces and beam forming networks. The backpropagation training algorithm was employed to simulate classical antenna array synthesis techniques. The Woodward-Lawson (W-L) and Dolph-Chebyshev (D-C) array pattern synthesis techniques were used to train the neural network. The inputs to the network were samples of the desired synthesis pattern. The outputs are the array element excitations required to synthesize the desired pattern. Once trained, the network is used to simulate the W-L or D-C techniques. Various sector patterns and cosecant-type patterns (27 total) generated using W-L synthesis were used to train the network. Desired pattern samples were then fed to the neural network. The outputs of the network were the simulated W-L excitations. A 20 element linear array was used. There were 41 input pattern samples with 40 output excitations (20 real parts, 20 imaginary). A comparison between the simulated and actual W-L techniques is shown for a triangular-shaped pattern. Dolph-Chebyshev is a different class of synthesis technique in that D-C is used for side lobe control as opposed to pattern shaping. The interesting thing about D-C synthesis is that the side lobes have the same amplitude. Five-element arrays were used. Again, 41 pattern samples were used for the input. Nine actual D-C patterns ranging from -10 dB to -30 dB side lobe levels were used to train the network. A comparison between simulated and actual D-C techniques for a pattern with -22 dB side lobe level is shown. The goal for this research was to evaluate the performance of neural network computing with antennas. Future applications will employ the backpropagation training algorithm to drastically reduce the computational complexity involved in performing EM compensation for surface errors in large space reflector antennas.
Antenna analysis using neural networks
NASA Astrophysics Data System (ADS)
Smith, William T.
1992-09-01
Conventional computing schemes have long been used to analyze problems in electromagnetics (EM). The vast majority of EM applications require computationally intensive algorithms involving numerical integration and solutions to large systems of equations. The feasibility of using neural network computing algorithms for antenna analysis is investigated. The ultimate goal is to use a trained neural network algorithm to reduce the computational demands of existing reflector surface error compensation techniques. Neural networks are computational algorithms based on neurobiological systems. Neural nets consist of massively parallel interconnected nonlinear computational elements. They are often employed in pattern recognition and image processing problems. Recently, neural network analysis has been applied in the electromagnetics area for the design of frequency selective surfaces and beam forming networks. The backpropagation training algorithm was employed to simulate classical antenna array synthesis techniques. The Woodward-Lawson (W-L) and Dolph-Chebyshev (D-C) array pattern synthesis techniques were used to train the neural network. The inputs to the network were samples of the desired synthesis pattern. The outputs are the array element excitations required to synthesize the desired pattern. Once trained, the network is used to simulate the W-L or D-C techniques. Various sector patterns and cosecant-type patterns (27 total) generated using W-L synthesis were used to train the network. Desired pattern samples were then fed to the neural network. The outputs of the network were the simulated W-L excitations. A 20 element linear array was used. There were 41 input pattern samples with 40 output excitations (20 real parts, 20 imaginary).
Computers, Networks, and Desegregation at San Jose High Academy.
ERIC Educational Resources Information Center
Solomon, Gwen
1987-01-01
Describes magnet high school which was created in California to meet desegregation requirements and emphasizes computer technology. Highlights include local computer networks that connect science and music labs, the library/media center, business computer lab, writing lab, language arts skills lab, and social studies classrooms; software; teacher…
Specification of Computer Systems by Objectives.
ERIC Educational Resources Information Center
Eltoft, Douglas
1989-01-01
Discusses the evolution of mainframe and personal computers, and presents a case study of a network developed at the University of Iowa called the Iowa Computer-Aided Engineering Network (ICAEN) that combines Macintosh personal computers with Apollo workstations. Functional objectives are stressed as the best measure of system performance. (LRW)
Sign: large-scale gene network estimation environment for high performance computing.
Tamada, Yoshinori; Shimamura, Teppei; Yamaguchi, Rui; Imoto, Seiya; Nagasaki, Masao; Miyano, Satoru
2011-01-01
Our research group is currently developing software for estimating large-scale gene networks from gene expression data. The software, called SiGN, is specifically designed for the Japanese flagship supercomputer "K computer" which is planned to achieve 10 petaflops in 2012, and other high performance computing environments including Human Genome Center (HGC) supercomputer system. SiGN is a collection of gene network estimation software with three different sub-programs: SiGN-BN, SiGN-SSM and SiGN-L1. In these three programs, five different models are available: static and dynamic nonparametric Bayesian networks, state space models, graphical Gaussian models, and vector autoregressive models. All these models require a huge amount of computational resources for estimating large-scale gene networks and therefore are designed to be able to exploit the speed of 10 petaflops. The software will be available freely for "K computer" and HGC supercomputer system users. The estimated networks can be viewed and analyzed by Cell Illustrator Online and SBiP (Systems Biology integrative Pipeline). The software project web site is available at http://sign.hgc.jp/ .
Primer on computers and information technology. Part two: an introduction to computer networking.
Channin, D S; Chang, P J
1997-01-01
Computers networks are a way of connecting computers together such that they can exchange information. For this exchange to be successful, system behavior must be planned and specified very clearly at a number of different levels. Although there are many choices to be made at each level, often there are simple decisions that can be made to rapidly reduce the number of options. Planning is most important at the highest (application) and lowest (wiring) levels, whereas the middle levels must be specified to ensure compatibility. Because of the widespread use of the Internet, solutions based on Internet technologies are often cost-effective and should be considered when designing a network. As in all technical fields, consultation with experts (ie, computer networking specialists) may be worthwhile.
Human Inspired Self-developmental Model of Neural Network (HIM): Introducing Content/Form Computing
NASA Astrophysics Data System (ADS)
Krajíček, Jiří
This paper presents cross-disciplinary research between medical/psychological evidence on human abilities and informatics needs to update current models in computer science to support alternative methods for computation and communication. In [10] we have already proposed hypothesis introducing concept of human information model (HIM) as cooperative system. Here we continue on HIM design in detail. In our design, first we introduce Content/Form computing system which is new principle of present methods in evolutionary computing (genetic algorithms, genetic programming). Then we apply this system on HIM (type of artificial neural network) model as basic network self-developmental paradigm. Main inspiration of our natural/human design comes from well known concept of artificial neural networks, medical/psychological evidence and Sheldrake theory of "Nature as Alive" [22].
PRiFi Networking for Tracking-Resistant Mobile Computing
2017-11-01
PRiFi NETWORKING FOR TRACKING-RESISTANT MOBILE COMPUTING YALE UNIVERSITY NOVEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE...From - To) FEB 2016 – MAY 2017 4. TITLE AND SUBTITLE PRiFi NETWORKING FOR TRACKING-RESISTANT MOBILE COMPUTING 5a. CONTRACT NUMBER FA8750-16-2-0034...3 Figure 2: What We Have: A Cloud of Secret Mass Surveillance Processes .................................. 6 Figure 3: What
ERIC Educational Resources Information Center
Sullivan, Todd
Using an IBM System/360 Model 50 computer, the New York Statewide Film Library Network schedules film use, reports on materials handling and statistics, and provides for interlibrary loan of films. Communications between the film libraries and the computer are maintained by Teletype model 33 ASR Teletypewriter terminals operating on TWX…
The ASCI Network for SC 2000: Gigabyte Per Second Networking
DOE Office of Scientific and Technical Information (OSTI.GOV)
PRATT, THOMAS J.; NAEGLE, JOHN H.; MARTINEZ JR., LUIS G.
2001-11-01
This document highlights the Discom's Distance computing and communication team activities at the 2000 Supercomputing conference in Dallas Texas. This conference is sponsored by the IEEE and ACM. Sandia's participation in the conference has now spanned a decade, for the last five years Sandia National Laboratories, Los Alamos National Lab and Lawrence Livermore National Lab have come together at the conference under the DOE's ASCI, Accelerated Strategic Computing Initiatives, Program rubric to demonstrate ASCI's emerging capabilities in computational science and our combined expertise in high performance computer science and communication networking developments within the program. At SC 2000, DISCOM demonstratedmore » an infrastructure. DISCOM2 uses this forum to demonstrate and focus communication and pre-standard implementation of 10 Gigabit Ethernet, the first gigabyte per second data IP network transfer application, and VPN technology that enabled a remote Distributed Resource Management tools demonstration. Additionally a national OC48 POS network was constructed to support applications running between the show floor and home facilities. This network created the opportunity to test PSE's Parallel File Transfer Protocol (PFTP) across a network that had similar speed and distances as the then proposed DISCOM WAN. The SCINET SC2000 showcased wireless networking and the networking team had the opportunity to explore this emerging technology while on the booth. This paper documents those accomplishments, discusses the details of their convention exhibit floor. We also supported the production networking needs of the implementation, and describes how these demonstrations supports DISCOM overall strategies in high performance computing networking.« less
Statistical Model Applied to NetFlow for Network Intrusion Detection
NASA Astrophysics Data System (ADS)
Proto, André; Alexandre, Leandro A.; Batista, Maira L.; Oliveira, Isabela L.; Cansian, Adriano M.
The computers and network services became presence guaranteed in several places. These characteristics resulted in the growth of illicit events and therefore the computers and networks security has become an essential point in any computing environment. Many methodologies were created to identify these events; however, with increasing of users and services on the Internet, many difficulties are found in trying to monitor a large network environment. This paper proposes a methodology for events detection in large-scale networks. The proposal approaches the anomaly detection using the NetFlow protocol, statistical methods and monitoring the environment in a best time for the application.
LINCS: Livermore's network architecture. [Octopus computing network
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fletcher, J.G.
1982-01-01
Octopus, a local computing network that has been evolving at the Lawrence Livermore National Laboratory for over fifteen years, is currently undergoing a major revision. The primary purpose of the revision is to consolidate and redefine the variety of conventions and formats, which have grown up over the years, into a single standard family of protocols, the Livermore Interactive Network Communication Standard (LINCS). This standard treats the entire network as a single distributed operating system such that access to a computing resource is obtained in a single way, whether that resource is local (on the same computer as the accessingmore » process) or remote (on another computer). LINCS encompasses not only communication but also such issues as the relationship of customer to server processes and the structure, naming, and protection of resources. The discussion includes: an overview of the Livermore user community and computing hardware, the functions and structure of each of the seven layers of LINCS protocol, the reasons why we have designed our own protocols and why we are dissatisfied by the directions that current protocol standards are taking.« less
NASA Astrophysics Data System (ADS)
Prychynenko, Diana; Sitte, Matthias; Litzius, Kai; Krüger, Benjamin; Bourianoff, George; Kläui, Mathias; Sinova, Jairo; Everschor-Sitte, Karin
2018-01-01
Inspired by the human brain, there is a strong effort to find alternative models of information processing capable of imitating the high energy efficiency of neuromorphic information processing. One possible realization of cognitive computing involves reservoir computing networks. These networks are built out of nonlinear resistive elements which are recursively connected. We propose that a Skyrmion network embedded in magnetic films may provide a suitable physical implementation for reservoir computing applications. The significant key ingredient of such a network is a two-terminal device with nonlinear voltage characteristics originating from magnetoresistive effects, such as the anisotropic magnetoresistance or the recently discovered noncollinear magnetoresistance. The most basic element for a reservoir computing network built from "Skyrmion fabrics" is a single Skyrmion embedded in a ferromagnetic ribbon. In order to pave the way towards reservoir computing systems based on Skyrmion fabrics, we simulate and analyze (i) the current flow through a single magnetic Skyrmion due to the anisotropic magnetoresistive effect and (ii) the combined physics of local pinning and the anisotropic magnetoresistive effect.
Computer Network Resources for Physical Geography Instruction.
ERIC Educational Resources Information Center
Bishop, Michael P.; And Others
1993-01-01
Asserts that the use of computer networks provides an important and effective resource for geography instruction. Describes the use of the Internet network in physical geography instruction. Provides an example of the use of Internet resources in a climatology/meteorology course. (CFR)
Including Internet insurance as part of a hospital computer network security plan.
Riccardi, Ken
2002-01-01
Cyber attacks on a hospital's computer network is a new crime to be reckoned with. Should your hospital consider internet insurance? The author explains this new phenomenon and presents a risk assessment for determining network vulnerabilities.
The University of Michigan's Computer-Aided Engineering Network.
ERIC Educational Resources Information Center
Atkins, D. E.; Olsen, Leslie A.
1986-01-01
Presents an overview of the Computer-Aided Engineering Network (CAEN) of the University of Michigan. Describes its arrangement of workstations, communication networks, and servers. Outlines the factors considered in hardware and software decision making. Reviews the program's impact on students. (ML)
The pathway to RCTs: how many roads are there? Examining the homogeneity of RCT justification.
Chow, Jeffrey Tin Yu; Lam, Kevin; Naeem, Abdul; Akanda, Zarique Z; Si, Francie Fengqin; Hodge, William
2017-02-02
Randomized controlled trials (RCTs) form the foundational background of modern medical practice. They are considered the highest quality of evidence, and their results help inform decisions concerning drug development and use, preventive therapies, and screening programs. However, the inputs that justify an RCT to be conducted have not been studied. We reviewed the MEDLINE and EMBASE databases across six specialties (Ophthalmology, Otorhinolaryngology (ENT), General Surgery, Psychiatry, Obstetrics-Gynecology (OB-GYN), and Internal Medicine) and randomly chose 25 RCTs from each specialty except for Otorhinolaryngology (20 studies) and Internal Medicine (28 studies). For each RCT, we recorded information relating to the justification for conducting RCTs such as average study size cited, number of studies cited, and types of studies cited. The justification varied widely both within and between specialties. For Ophthalmology and OB-GYN, the average study sizes cited were around 1100 patients, whereas they were around 500 patients for Psychiatry and General Surgery. Between specialties, the average number of studies cited ranged from around 4.5 for ENT to around 10 for Ophthalmology, but the standard deviations were large, indicating that there was even more discrepancy within each specialty. When standardizing by the sample size of the RCT, some of the discrepancies between and within specialties can be explained, but not all. On average, Ophthalmology papers cited review articles the most (2.96 studies per RCT) compared to less than 1.5 studies per RCT for all other specialties. The justifications for RCTs vary widely both within and between specialties, and the justification for conducting RCTs is not standardized.
Goszczyńska, Eliza; Knol-Michałowska, Kamila; Petrykowska, Alicja
2016-07-01
To research the subjective lay justifications expressed by smoking pregnant women to explain why they use cigarettes during pregnancy and to determine a typology for these justifications. Smoking pregnant mothers' awareness of the detrimental effects of smoking on foetal health frequently is a source of stress and cognitive dissonance (stemming from the contrast between viewing themselves as responsible mothers and smokers). One possible way to reduce these unpleasant feelings is acceptance or creation of beliefs allowing them to explain rationally why they continue this behaviour during pregnancy. Qualitative design. Thematic analysis of the content of posts from the three largest Polish parenting on-line forums written between the time they were founded and 12 November 2012. The data were collected between September - October 2012. During the analysis of the selected 73 posts, each of which included subjective explanations of smoking during pregnancy, 151 fragments, each containing one lay justification, were identified and analysed. Thirty-five subthemes of lay justifications assigned to two main themes were developed. The first main theme includes convictions that undermine the need to break the nicotine addiction and the positive aspects resulting from quitting. The second main theme comprises beliefs that question the possibility to abstain from smoking and exaggerate the barriers in the process of quitting. The creation of a typology of lay justifications might help nurses and midwives perform more effective anti-tobacco interventions geared specifically towards the thought patterns typical of pregnant women. © 2016 John Wiley & Sons Ltd.
Network Community Detection based on the Physarum-inspired Computational Framework.
Gao, Chao; Liang, Mingxin; Li, Xianghua; Zhang, Zili; Wang, Zhen; Zhou, Zhili
2016-12-13
Community detection is a crucial and essential problem in the structure analytics of complex networks, which can help us understand and predict the characteristics and functions of complex networks. Many methods, ranging from the optimization-based algorithms to the heuristic-based algorithms, have been proposed for solving such a problem. Due to the inherent complexity of identifying network structure, how to design an effective algorithm with a higher accuracy and a lower computational cost still remains an open problem. Inspired by the computational capability and positive feedback mechanism in the wake of foraging process of Physarum, which is a large amoeba-like cell consisting of a dendritic network of tube-like pseudopodia, a general Physarum-based computational framework for community detection is proposed in this paper. Based on the proposed framework, the inter-community edges can be identified from the intra-community edges in a network and the positive feedback of solving process in an algorithm can be further enhanced, which are used to improve the efficiency of original optimization-based and heuristic-based community detection algorithms, respectively. Some typical algorithms (e.g., genetic algorithm, ant colony optimization algorithm, and Markov clustering algorithm) and real-world datasets have been used to estimate the efficiency of our proposed computational framework. Experiments show that the algorithms optimized by Physarum-inspired computational framework perform better than the original ones, in terms of accuracy and computational cost. Moreover, a computational complexity analysis verifies the scalability of our framework.
Open source system OpenVPN in a function of Virtual Private Network
NASA Astrophysics Data System (ADS)
Skendzic, A.; Kovacic, B.
2017-05-01
Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.
DSGRN: Examining the Dynamics of Families of Logical Models.
Cummins, Bree; Gedeon, Tomas; Harker, Shaun; Mischaikow, Konstantin
2018-01-01
We present a computational tool DSGRN for exploring the dynamics of a network by computing summaries of the dynamics of switching models compatible with the network across all parameters. The network can arise directly from a biological problem, or indirectly as the interaction graph of a Boolean model. This tool computes a finite decomposition of parameter space such that for each region, the state transition graph that describes the coarse dynamical behavior of a network is the same. Each of these parameter regions corresponds to a different logical description of the network dynamics. The comparison of dynamics across parameters with experimental data allows the rejection of parameter regimes or entire networks as viable models for representing the underlying regulatory mechanisms. This in turn allows a search through the space of perturbations of a given network for networks that robustly fit the data. These are the first steps toward discovering a network that optimally matches the observed dynamics by searching through the space of networks.
The Erector Set Computer: Building a Virtual Workstation over a Large Multi-Vendor Network.
ERIC Educational Resources Information Center
Farago, John M.
1989-01-01
Describes a computer network developed at the City University of New York Law School that uses device sharing and local area networking to create a simulated law office. Topics discussed include working within a multi-vendor environment, and the communication, information, and database access services available through the network. (CLB)
Neural-Network Computer Transforms Coordinates
NASA Technical Reports Server (NTRS)
Josin, Gary M.
1990-01-01
Numerical simulation demonstrated ability of conceptual neural-network computer to generalize what it has "learned" from few examples. Ability to generalize achieved with even simple neural network (relatively few neurons) and after exposure of network to only few "training" examples. Ability to obtain fairly accurate mappings after only few training examples used to provide solutions to otherwise intractable mapping problems.
ERIC Educational Resources Information Center
Regional Laboratory for Educational Improvement of the Northeast & Islands, Andover, MA.
This packet includes reprints of articles and other information concerning the use of computer networks in small, rural schools. Computer networks can minimize isolation; develop stronger links to the community; access reference information from remote sources; and create professional and academic exchanges for teachers, administrators, and…
1987-10-01
include Security Classification) Instrumentation for scientific computing in neural networks, information science, artificial intelligence, and...instrumentation grant to purchase equipment for support of research in neural networks, information science, artificail intellignece , and applied mathematics...in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics Contract AFOSR 86-0282 Principal Investigator: Stephen
Polymorphic Attacks and Network Topology: Application of Concepts from Natural Systems
ERIC Educational Resources Information Center
Rangan, Prahalad
2010-01-01
The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…
NASA Technical Reports Server (NTRS)
Janetzke, David C.; Murthy, Durbha V.
1991-01-01
Aeroelastic analysis is multi-disciplinary and computationally expensive. Hence, it can greatly benefit from parallel processing. As part of an effort to develop an aeroelastic capability on a distributed memory transputer network, a parallel algorithm for the computation of aerodynamic influence coefficients is implemented on a network of 32 transputers. The aerodynamic influence coefficients are calculated using a 3-D unsteady aerodynamic model and a parallel discretization. Efficiencies up to 85 percent were demonstrated using 32 processors. The effect of subtask ordering, problem size, and network topology are presented. A comparison to results on a shared memory computer indicates that higher speedup is achieved on the distributed memory system.
Distributed computation of graphics primitives on a transputer network
NASA Technical Reports Server (NTRS)
Ellis, Graham K.
1988-01-01
A method is developed for distributing the computation of graphics primitives on a parallel processing network. Off-the-shelf transputer boards are used to perform the graphics transformations and scan-conversion tasks that would normally be assigned to a single transputer based display processor. Each node in the network performs a single graphics primitive computation. Frequently requested tasks can be duplicated on several nodes. The results indicate that the current distribution of commands on the graphics network shows a performance degradation when compared to the graphics display board alone. A change to more computation per node for every communication (perform more complex tasks on each node) may cause the desired increase in throughput.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lyonnais, Marc; Smith, Matt; Mace, Kate P.
SCinet is the purpose-built network that operates during the International Conference for High Performance Computing,Networking, Storage and Analysis (Super Computing or SC). Created each year for the conference, SCinet brings to life a high-capacity network that supports applications and experiments that are a hallmark of the SC conference. The network links the convention center to research and commercial networks around the world. This resource serves as a platform for exhibitors to demonstrate the advanced computing resources of their home institutions and elsewhere by supporting a wide variety of applications. Volunteers from academia, government and industry work together to design andmore » deliver the SCinet infrastructure. Industry vendors and carriers donate millions of dollars in equipment and services needed to build and support the local and wide area networks. Planning begins more than a year in advance of each SC conference and culminates in a high intensity installation in the days leading up to the conference. The SCinet architecture for SC16 illustrates a dramatic increase in participation from the vendor community, particularly those that focus on network equipment. Software-Defined Networking (SDN) and Data Center Networking (DCN) are present in nearly all aspects of the design.« less
Neural computation of arithmetic functions
NASA Technical Reports Server (NTRS)
Siu, Kai-Yeung; Bruck, Jehoshua
1990-01-01
An area of application of neural networks is considered. A neuron is modeled as a linear threshold gate, and the network architecture considered is the layered feedforward network. It is shown how common arithmetic functions such as multiplication and sorting can be efficiently computed in a shallow neural network. Some known results are improved by showing that the product of two n-bit numbers and sorting of n n-bit numbers can be computed by a polynomial-size neural network using only four and five unit delays, respectively. Moreover, the weights of each threshold element in the neural networks require O(log n)-bit (instead of n-bit) accuracy. These results can be extended to more complicated functions such as multiple products, division, rational functions, and approximation of analytic functions.
Shared-resource computing for small research labs.
Ackerman, M J
1982-04-01
A real time laboratory computer network is described. This network is composed of four real-time laboratory minicomputers located in each of four division laboratories and a larger minicomputer in a centrally located computer room. Off the shelf hardware and software were used with no customization. The network is configured for resource sharing using DECnet communications software and the RSX-11-M multi-user real-time operating system. The cost effectiveness of the shared resource network and multiple real-time processing using priority scheduling is discussed. Examples of utilization within a medical research department are given.
User's guide to the Octopus computer network (the SHOC manual)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schneider, C.; Thompson, D.; Whitten, G.
1977-07-18
This guide explains how to enter, run, and debug programs on the Octopus network. It briefly describes the network's operation, and directs the reader to other documents for further information. It stresses those service programs that will be most useful in the long run; ''quick'' methods that have little flexibility are not discussed. The Octopus timesharing network gives the user access to four CDC 7600 computers, two CDC STAR computers, and a broad array of peripheral equipment, from any of 800 or so remote terminals. 16 figures, 7 tables.
User's guide to the Octopus computer network (the SHOC manual)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schneider, C.; Thompson, D.; Whitten, G.
1976-10-07
This guide explains how to enter, run, and debug programs on the Octopus network. It briefly describes the network's operation, and directs the reader to other documents for further information. It stresses those service programs that will be most useful in the long run; ''quick'' methods that have little flexibility are not discussed. The Octopus timesharing network gives the user access to four CDC 7600 computers, two CDC STAR computers, and a broad array of peripheral equipment, from any of 800 or so remote terminals. 8 figures, 4 tables.
User's guide to the Octopus computer network (the SHOC manual)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schneider, C.; Thompson, D.; Whitten, G.
1975-06-02
This guide explains how to enter, run, and debug programs on the Octopus network. It briefly describes the network's operation, and directs the reader to other documents for further information. It stresses those service programs that will be most useful in the long run; ''quick'' methods that have little flexibility are not discussed. The Octopus timesharing network gives the user access to four CDC 7600 computers and a broad array of peripheral equipment, from any of 800 remote terminals. Octopus will soon include the Laboratory's STAR-100 computers. 9 figures, 5 tables. (auth)
A Diagrammatic Language for Biochemical Networks
NASA Astrophysics Data System (ADS)
Maimon, Ron
2002-03-01
I present a diagrammatic language for representing the structure of biochemical networks. The language is designed to represent modular structure in a computational fasion, with composition of reactions replacing functional composition. This notation is used to represent arbitrarily large networks efficiently. The notation finds its most natural use in representing biological interaction networks, but it is a general computing language appropriate to any naturally occuring computation. Unlike lambda-calculus, or text-derived languages, it does not impose a tree-structure on the diagrams, and so is more effective at representing biological fucntion than competing notations.
Authority and Moral Reasons: Parenting Style and Children's Perceptions of Adult Rule Justifications
ERIC Educational Resources Information Center
Leman, Patrick J.
2005-01-01
The style of parenting of 100 children (mean age 11 years, 5 months) was established according to Baumrind's typology. Children were asked to indicate what they thought an adult would say to justify a moral rule in five different scenarios. Results indicated that parenting style did not relate to the number of justifications that children thought…
ERIC Educational Resources Information Center
Tarrant, Iona; Tarrant, James
2004-01-01
This paper proposes a new interpretation of John Stuart Mill's notion of utility, which is used to provide a utilitarian justification for an eclectic, rather than a vocational, education. Vocational education is strongly promoted in recent policy documents, which makes it important to raise the question of justification. Many existing…
Verification or Proof: Justification of Pythagoras' Theorem in Chinese Mathematics Classrooms
ERIC Educational Resources Information Center
Huang, Rongjin
2005-01-01
This paper presents key findings of my research on the approaches to justification by investigating how a sample of teachers in Hong Kong and Shanghai taught the topic Pythagoras theorem. In this study, 8 Hong Kong videos taken from TIMSS 1999 Video Study and 11 Shanghai videos videotaped by the researcher comprised the database. It was found that…
Education without Moral Worth? Kantian Moral Theory and the Obligation to Educate Others
ERIC Educational Resources Information Center
Martin, Christopher
2011-01-01
This article examines the possibility of a Kantian justification of the intrinsic moral worth of education. The author critiques a recent attempt to secure such justification via Kant's notion of the Kingdom of Ends. He gives four reasons why such an account would deny any intrinsic moral worth to education. He concludes with a tentative…
ERIC Educational Resources Information Center
Okshevsky, Walter C.
2016-01-01
In this essay Walter Okshevsky addresses the question of whether a certain form of dialogically derived agreement can function as an epistemic (universal and necessary) criterion of moral judgment and ground of moral authority. Okshevsky examines arguments for and against in the literature of educational philosophy and develops Jürgen Habermas's…
The Body and the Place of Physical Activity in Education: Some Classical Perspectives
ERIC Educational Resources Information Center
Ozolinš, Janis
2013-01-01
The place of physical education has been contested in recent times and it has been argued that its justification as part of school curricula seems to be marginal at best. Such justifications as have been offered, propose that physical education is justified because of its contribution to moral development or because it is capable of being studied…
Software for Brain Network Simulations: A Comparative Study
Tikidji-Hamburyan, Ruben A.; Narayana, Vikram; Bozkus, Zeki; El-Ghazawi, Tarek A.
2017-01-01
Numerical simulations of brain networks are a critical part of our efforts in understanding brain functions under pathological and normal conditions. For several decades, the community has developed many software packages and simulators to accelerate research in computational neuroscience. In this article, we select the three most popular simulators, as determined by the number of models in the ModelDB database, such as NEURON, GENESIS, and BRIAN, and perform an independent evaluation of these simulators. In addition, we study NEST, one of the lead simulators of the Human Brain Project. First, we study them based on one of the most important characteristics, the range of supported models. Our investigation reveals that brain network simulators may be biased toward supporting a specific set of models. However, all simulators tend to expand the supported range of models by providing a universal environment for the computational study of individual neurons and brain networks. Next, our investigations on the characteristics of computational architecture and efficiency indicate that all simulators compile the most computationally intensive procedures into binary code, with the aim of maximizing their computational performance. However, not all simulators provide the simplest method for module development and/or guarantee efficient binary code. Third, a study of their amenability for high-performance computing reveals that NEST can almost transparently map an existing model on a cluster or multicore computer, while NEURON requires code modification if the model developed for a single computer has to be mapped on a computational cluster. Interestingly, parallelization is the weakest characteristic of BRIAN, which provides no support for cluster computations and limited support for multicore computers. Fourth, we identify the level of user support and frequency of usage for all simulators. Finally, we carry out an evaluation using two case studies: a large network with simplified neural and synaptic models and a small network with detailed models. These two case studies allow us to avoid any bias toward a particular software package. The results indicate that BRIAN provides the most concise language for both cases considered. Furthermore, as expected, NEST mostly favors large network models, while NEURON is better suited for detailed models. Overall, the case studies reinforce our general observation that simulators have a bias in the computational performance toward specific types of the brain network models. PMID:28775687
Collaboration, campaigns and champions for appropriate imaging: feedback from the Zagreb workshop.
Remedios, D; Brkljacic, B; Ebdon-Jackson, S; Hierath, M; Sinitsyn, V; Vassileva, J
2018-04-01
Leading radiologists and representatives from national radiation protection regulatory authorities and health ministries from 19 countries of the European region worked together with five experts at the workshop on justification and appropriate use of imaging in Zagreb, Croatia, from 26 to 28 October 2017 jointly organised by the IAEA and the European Society of Radiology. The workshop served as a forum to exchange information on challenges and solutions for improving justification and the appropriate use of diagnostic imaging. Common barriers to improving the use of imaging referral guidelines were discussed and the need for increased collaboration identified. Examples of good practices were presented, including use of Clinical Decision Support (CDS) systems to facilitate rapid and good justification decisions. The workshop identified some of the needs of European countries for achieving more appropriate imaging proposing wider use of collaboration, campaigns and champions. • Drivers for appropriate imaging in Europe are similar to those elsewhere globally. • Implementing imaging referral guidelines is the main barrier to more appropriate imaging. • Clinical Decision Support systems (CDS) facilitates good referral practice and justification decisions. • Collaboration, campaigns and champions may improve awareness, appropriateness and audit.
Using high-performance networks to enable computational aerosciences applications
NASA Technical Reports Server (NTRS)
Johnson, Marjory J.
1992-01-01
One component of the U.S. Federal High Performance Computing and Communications Program (HPCCP) is the establishment of a gigabit network to provide a communications infrastructure for researchers across the nation. This gigabit network will provide new services and capabilities, in addition to increased bandwidth, to enable future applications. An understanding of these applications is necessary to guide the development of the gigabit network and other high-performance networks of the future. In this paper we focus on computational aerosciences applications run remotely using the Numerical Aerodynamic Simulation (NAS) facility located at NASA Ames Research Center. We characterize these applications in terms of network-related parameters and relate user experiences that reveal limitations imposed by the current wide-area networking infrastructure. Then we investigate how the development of a nationwide gigabit network would enable users of the NAS facility to work in new, more productive ways.
Queuing theory models for computer networks
NASA Technical Reports Server (NTRS)
Galant, David C.
1989-01-01
A set of simple queuing theory models which can model the average response of a network of computers to a given traffic load has been implemented using a spreadsheet. The impact of variations in traffic patterns and intensities, channel capacities, and message protocols can be assessed using them because of the lack of fine detail in the network traffic rates, traffic patterns, and the hardware used to implement the networks. A sample use of the models applied to a realistic problem is included in appendix A. Appendix B provides a glossary of terms used in this paper. This Ames Research Center computer communication network is an evolving network of local area networks (LANs) connected via gateways and high-speed backbone communication channels. Intelligent planning of expansion and improvement requires understanding the behavior of the individual LANs as well as the collection of networks as a whole.