Belief propagation decoding of quantum channels by passing quantum messages
NASA Astrophysics Data System (ADS)
Renes, Joseph M.
2017-07-01
The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical-quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels.
ERIC Educational Resources Information Center
Schwan, Stephan; Straub, Daniela; Hesse, Friedrich W.
2002-01-01
Describes a study of computer conferencing where learners interacted over the course of four log-in sessions to acquire the knowledge sufficient to pass a learning test. Studied the number of messages irrelevant to the topic, explicit threading of messages, reading times of relevant messages, and learning outcomes. (LRW)
Implementing TCP/IP and a socket interface as a server in a message-passing operating system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hipp, E.; Wiltzius, D.
1990-03-01
The UNICOS 4.3BSD network code and socket transport interface are the basis of an explicit network server for NLTSS, a message passing operating system on the Cray YMP. A BSD socket user library provides access to the network server using an RPC mechanism. The advantages of this server methodology are its modularity and extensibility to migrate to future protocol suites (e.g. OSI) and transport interfaces. In addition, the network server is implemented in an explicit multi-tasking environment to take advantage of the Cray YMP multi-processor platform. 19 refs., 5 figs.
High Performance Programming Using Explicit Shared Memory Model on Cray T3D1
NASA Technical Reports Server (NTRS)
Simon, Horst D.; Saini, Subhash; Grassi, Charles
1994-01-01
The Cray T3D system is the first-phase system in Cray Research, Inc.'s (CRI) three-phase massively parallel processing (MPP) program. This system features a heterogeneous architecture that closely couples DEC's Alpha microprocessors and CRI's parallel-vector technology, i.e., the Cray Y-MP and Cray C90. An overview of the Cray T3D hardware and available programming models is presented. Under Cray Research adaptive Fortran (CRAFT) model four programming methods (data parallel, work sharing, message-passing using PVM, and explicit shared memory model) are available to the users. However, at this time data parallel and work sharing programming models are not available to the user community. The differences between standard PVM and CRI's PVM are highlighted with performance measurements such as latencies and communication bandwidths. We have found that the performance of neither standard PVM nor CRI s PVM exploits the hardware capabilities of the T3D. The reasons for the bad performance of PVM as a native message-passing library are presented. This is illustrated by the performance of NAS Parallel Benchmarks (NPB) programmed in explicit shared memory model on Cray T3D. In general, the performance of standard PVM is about 4 to 5 times less than obtained by using explicit shared memory model. This degradation in performance is also seen on CM-5 where the performance of applications using native message-passing library CMMD on CM-5 is also about 4 to 5 times less than using data parallel methods. The issues involved (such as barriers, synchronization, invalidating data cache, aligning data cache etc.) while programming in explicit shared memory model are discussed. Comparative performance of NPB using explicit shared memory programming model on the Cray T3D and other highly parallel systems such as the TMC CM-5, Intel Paragon, Cray C90, IBM-SP1, etc. is presented.
Combining Distributed and Shared Memory Models: Approach and Evolution of the Global Arrays Toolkit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nieplocha, Jarek; Harrison, Robert J.; Kumar, Mukul
2002-07-29
Both shared memory and distributed memory models have advantages and shortcomings. Shared memory model is much easier to use but it ignores data locality/placement. Given the hierarchical nature of the memory subsystems in the modern computers this characteristic might have a negative impact on performance and scalability. Various techniques, such as code restructuring to increase data reuse and introducing blocking in data accesses, can address the problem and yield performance competitive with message passing[Singh], however at the cost of compromising the ease of use feature. Distributed memory models such as message passing or one-sided communication offer performance and scalability butmore » they compromise the ease-of-use. In this context, the message-passing model is sometimes referred to as?assembly programming for the scientific computing?. The Global Arrays toolkit[GA1, GA2] attempts to offer the best features of both models. It implements a shared-memory programming model in which data locality is managed explicitly by the programmer. This management is achieved by explicit calls to functions that transfer data between a global address space (a distributed array) and local storage. In this respect, the GA model has similarities to the distributed shared-memory models that provide an explicit acquire/release protocol. However, the GA model acknowledges that remote data is slower to access than local data and allows data locality to be explicitly specified and hence managed. The GA model exposes to the programmer the hierarchical memory of modern high-performance computer systems, and by recognizing the communication overhead for remote data transfer, it promotes data reuse and locality of reference. This paper describes the characteristics of the Global Arrays programming model, capabilities of the toolkit, and discusses its evolution.« less
Application of a distributed network in computational fluid dynamic simulations
NASA Technical Reports Server (NTRS)
Deshpande, Manish; Feng, Jinzhang; Merkle, Charles L.; Deshpande, Ashish
1994-01-01
A general-purpose 3-D, incompressible Navier-Stokes algorithm is implemented on a network of concurrently operating workstations using parallel virtual machine (PVM) and compared with its performance on a CRAY Y-MP and on an Intel iPSC/860. The problem is relatively computationally intensive, and has a communication structure based primarily on nearest-neighbor communication, making it ideally suited to message passing. Such problems are frequently encountered in computational fluid dynamics (CDF), and their solution is increasingly in demand. The communication structure is explicitly coded in the implementation to fully exploit the regularity in message passing in order to produce a near-optimal solution. Results are presented for various grid sizes using up to eight processors.
Saguaro: A Distributed Operating System Based on Pools of Servers.
1988-03-25
asynchronous message passing, multicast, and semaphores are supported. We have found this flexibility to be very useful for distributed programming. The...variety of communication primitives provided by SR has facilitated the research of Stella Atkins, who was a visiting professor at Arizona during Spring...data bits in a raw communication channel to help keep the source and destination synchronized , Psync explicitly embeds timing information drawn from the
Mean-field message-passing equations in the Hopfield model and its generalizations
NASA Astrophysics Data System (ADS)
Mézard, Marc
2017-02-01
Motivated by recent progress in using restricted Boltzmann machines as preprocessing algorithms for deep neural network, we revisit the mean-field equations [belief-propagation and Thouless-Anderson Palmer (TAP) equations] in the best understood of such machines, namely the Hopfield model of neural networks, and we explicit how they can be used as iterative message-passing algorithms, providing a fast method to compute the local polarizations of neurons. In the "retrieval phase", where neurons polarize in the direction of one memorized pattern, we point out a major difference between the belief propagation and TAP equations: The set of belief propagation equations depends on the pattern which is retrieved, while one can use a unique set of TAP equations. This makes the latter method much better suited for applications in the learning process of restricted Boltzmann machines. In the case where the patterns memorized in the Hopfield model are not independent, but are correlated through a combinatorial structure, we show that the TAP equations have to be modified. This modification can be seen either as an alteration of the reaction term in TAP equations or, more interestingly, as the consequence of message passing on a graphical model with several hidden layers, where the number of hidden layers depends on the depth of the correlations in the memorized patterns. This layered structure is actually necessary when one deals with more general restricted Boltzmann machines.
Temporal Proof Methodologies for Real-Time Systems,
1990-09-01
real time systems that communicate either through shared variables or by message passing and real time issues such as time-outs, process priorities (interrupts) and process scheduling. The authors exhibit two styles for the specification of real - time systems . While the first approach uses bounded versions of temporal operators the second approach allows explicit references to time through a special clock variable. Corresponding to two styles of specification the authors present and compare two fundamentally different proof
Intel NX to PVM 3.2 message passing conversion library
NASA Technical Reports Server (NTRS)
Arthur, Trey; Nelson, Michael L.
1993-01-01
NASA Langley Research Center has developed a library that allows Intel NX message passing codes to be executed under the more popular and widely supported Parallel Virtual Machine (PVM) message passing library. PVM was developed at Oak Ridge National Labs and has become the defacto standard for message passing. This library will allow the many programs that were developed on the Intel iPSC/860 or Intel Paragon in a Single Program Multiple Data (SPMD) design to be ported to the numerous architectures that PVM (version 3.2) supports. Also, the library adds global operations capability to PVM. A familiarity with Intel NX and PVM message passing is assumed.
Compiling global name-space programs for distributed execution
NASA Technical Reports Server (NTRS)
Koelbel, Charles; Mehrotra, Piyush
1990-01-01
Distributed memory machines do not provide hardware support for a global address space. Thus programmers are forced to partition the data across the memories of the architecture and use explicit message passing to communicate data between processors. The compiler support required to allow programmers to express their algorithms using a global name-space is examined. A general method is presented for analysis of a high level source program and along with its translation to a set of independently executing tasks communicating via messages. If the compiler has enough information, this translation can be carried out at compile-time. Otherwise run-time code is generated to implement the required data movement. The analysis required in both situations is described and the performance of the generated code on the Intel iPSC/2 is presented.
NASA Astrophysics Data System (ADS)
Ha, Jeongmok; Jeong, Hong
2016-07-01
This study investigates the directed acyclic subgraph (DAS) algorithm, which is used to solve discrete labeling problems much more rapidly than other Markov-random-field-based inference methods but at a competitive accuracy. However, the mechanism by which the DAS algorithm simultaneously achieves competitive accuracy and fast execution speed, has not been elucidated by a theoretical derivation. We analyze the DAS algorithm by comparing it with a message passing algorithm. Graphical models, inference methods, and energy-minimization frameworks are compared between DAS and message passing algorithms. Moreover, the performances of DAS and other message passing methods [sum-product belief propagation (BP), max-product BP, and tree-reweighted message passing] are experimentally compared.
Implementation of a 3D mixing layer code on parallel computers
NASA Technical Reports Server (NTRS)
Roe, K.; Thakur, R.; Dang, T.; Bogucz, E.
1995-01-01
This paper summarizes our progress and experience in the development of a Computational-Fluid-Dynamics code on parallel computers to simulate three-dimensional spatially-developing mixing layers. In this initial study, the three-dimensional time-dependent Euler equations are solved using a finite-volume explicit time-marching algorithm. The code was first programmed in Fortran 77 for sequential computers. The code was then converted for use on parallel computers using the conventional message-passing technique, while we have not been able to compile the code with the present version of HPF compilers.
Efficient Data Generation and Publication as a Test Tool
NASA Technical Reports Server (NTRS)
Einstein, Craig Jakob
2017-01-01
A tool to facilitate the generation and publication of test data was created to test the individual components of a command and control system designed to launch spacecraft. Specifically, this tool was built to ensure messages are properly passed between system components. The tool can also be used to test whether the appropriate groups have access (read/write privileges) to the correct messages. The messages passed between system components take the form of unique identifiers with associated values. These identifiers are alphanumeric strings that identify the type of message and the additional parameters that are contained within the message. The values that are passed with the message depend on the identifier. The data generation tool allows for the efficient creation and publication of these messages. A configuration file can be used to set the parameters of the tool and also specify which messages to pass.
Performance and Application of Parallel OVERFLOW Codes on Distributed and Shared Memory Platforms
NASA Technical Reports Server (NTRS)
Djomehri, M. Jahed; Rizk, Yehia M.
1999-01-01
The presentation discusses recent studies on the performance of the two parallel versions of the aerodynamics CFD code, OVERFLOW_MPI and _MLP. Developed at NASA Ames, the serial version, OVERFLOW, is a multidimensional Navier-Stokes flow solver based on overset (Chimera) grid technology. The code has recently been parallelized in two ways. One is based on the explicit message-passing interface (MPI) across processors and uses the _MPI communication package. This approach is primarily suited for distributed memory systems and workstation clusters. The second, termed the multi-level parallel (MLP) method, is simple and uses shared memory for all communications. The _MLP code is suitable on distributed-shared memory systems. For both methods, the message passing takes place across the processors or processes at the advancement of each time step. This procedure is, in effect, the Chimera boundary conditions update, which is done in an explicit "Jacobi" style. In contrast, the update in the serial code is done in more of the "Gauss-Sidel" fashion. The programming efforts for the _MPI code is more complicated than for the _MLP code; the former requires modification of the outer and some inner shells of the serial code, whereas the latter focuses only on the outer shell of the code. The _MPI version offers a great deal of flexibility in distributing grid zones across a specified number of processors in order to achieve load balancing. The approach is capable of partitioning zones across multiple processors or sending each zone and/or cluster of several zones into a single processor. The message passing across the processors consists of Chimera boundary and/or an overlap of "halo" boundary points for each partitioned zone. The MLP version is a new coarse-grain parallel concept at the zonal and intra-zonal levels. A grouping strategy is used to distribute zones into several groups forming sub-processes which will run in parallel. The total volume of grid points in each group are approximately balanced. A proper number of threads are initially allocated to each group, and in subsequent iterations during the run-time, the number of threads are adjusted to achieve load balancing across the processes. Each process exploits the multitasking directives already established in Overflow.
MPF: A portable message passing facility for shared memory multiprocessors
NASA Technical Reports Server (NTRS)
Malony, Allen D.; Reed, Daniel A.; Mcguire, Patrick J.
1987-01-01
The design, implementation, and performance evaluation of a message passing facility (MPF) for shared memory multiprocessors are presented. The MPF is based on a message passing model conceptually similar to conversations. Participants (parallel processors) can enter or leave a conversation at any time. The message passing primitives for this model are implemented as a portable library of C function calls. The MPF is currently operational on a Sequent Balance 21000, and several parallel applications were developed and tested. Several simple benchmark programs are presented to establish interprocess communication performance for common patterns of interprocess communication. Finally, performance figures are presented for two parallel applications, linear systems solution, and iterative solution of partial differential equations.
Efficiently passing messages in distributed spiking neural network simulation.
Thibeault, Corey M; Minkovich, Kirill; O'Brien, Michael J; Harris, Frederick C; Srinivasa, Narayan
2013-01-01
Efficiently passing spiking messages in a neural model is an important aspect of high-performance simulation. As the scale of networks has increased so has the size of the computing systems required to simulate them. In addition, the information exchange of these resources has become more of an impediment to performance. In this paper we explore spike message passing using different mechanisms provided by the Message Passing Interface (MPI). A specific implementation, MVAPICH, designed for high-performance clusters with Infiniband hardware is employed. The focus is on providing information about these mechanisms for users of commodity high-performance spiking simulators. In addition, a novel hybrid method for spike exchange was implemented and benchmarked.
The Effect of Three Message Organization Variables Upon Listener Comprehension.
ERIC Educational Resources Information Center
Johnson, Arlee W.
Public speaking texts urge speakers to organize their message in order to increase their audience's comprehension of it. Tests were run to determine if listeners understand better when three message organization variables are employed in a speech: explicit statement of the central idea, explicit statement of the main points, and transitions before…
Edworthy, Judy; Hellier, Elizabeth; Newbold, Lex; Titchener, Kirsteen
2015-05-01
Three experiments explore several factors which influence information transmission when warning messages are passed from person to person. In Experiment 1, messages were passed down chains of participants using five different modes of communication. Written communication channels resulted in more accurate message transmission than verbal. In addition, some elements of the message endured further down the chain than others. Experiment 2 largely replicated these effects and also demonstrated that simple repetition of a message eliminated differences between written and spoken communication. In a final field experiment, chains of participants passed information however they wanted to, with the proviso that half of the chains could not use telephones. Here, the lack of ability to use a telephone did not affect accuracy, but did slow down the speed of transmission from the recipient of the message to the last person in the chain. Implications of the findings for crisis and emergency risk communication are discussed. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Statistics of Epidemics in Networks by Passing Messages
NASA Astrophysics Data System (ADS)
Shrestha, Munik Kumar
Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result financial contagion gets worse with too much diversification. We also predict that financial system exhibits "robust yet fragile" behavior, with regions of the parameter space where contagion is rare but catastrophic whenever it occurs. In further results, we develop a message-passing approach to recurrent state epidemics like susceptible-infectious-susceptible and susceptible-infectious-recovered-susceptible where nodes can return to previously inhabited states and multiple waves of infection can pass through the population. Given that message-passing has been applied exclusively to models with one-way state changes like susceptible-infectious and susceptible-infectious-recovered, we develop message-passing for recurrent epidemics based on a new class of differential equations and demonstrate that our approach is simple and efficiently approximates results obtained from Monte Carlo simulation, and that the accuracy of message-passing is often superior to the pair approximation (which also takes second-order correlations into account).
Verification of Faulty Message Passing Systems with Continuous State Space in PVS
NASA Technical Reports Server (NTRS)
Pilotto, Concetta; White, Jerome
2010-01-01
We present a library of Prototype Verification System (PVS) meta-theories that verifies a class of distributed systems in which agent commu nication is through message-passing. The theoretic work, outlined in, consists of iterative schemes for solving systems of linear equations , such as message-passing extensions of the Gauss and Gauss-Seidel me thods. We briefly review that work and discuss the challenges in formally verifying it.
The serial message-passing schedule for LDPC decoding algorithms
NASA Astrophysics Data System (ADS)
Liu, Mingshan; Liu, Shanshan; Zhou, Yuan; Jiang, Xue
2015-12-01
The conventional message-passing schedule for LDPC decoding algorithms is the so-called flooding schedule. It has the disadvantage that the updated messages cannot be used until next iteration, thus reducing the convergence speed . In this case, the Layered Decoding algorithm (LBP) based on serial message-passing schedule is proposed. In this paper the decoding principle of LBP algorithm is briefly introduced, and then proposed its two improved algorithms, the grouped serial decoding algorithm (Grouped LBP) and the semi-serial decoding algorithm .They can improve LBP algorithm's decoding speed while maintaining a good decoding performance.
Assessing clarity of message communication for mandated USEPA drinking water quality reports.
Phetxumphou, Katherine; Roy, Siddhartha; Davy, Brenda M; Estabrooks, Paul A; You, Wen; Dietrich, Andrea M
2016-04-01
The United States Environmental Protection Agency mandates that community water systems (CWSs), or drinking water utilities, provide annual consumer confidence reports (CCRs) reporting on water quality, compliance with regulations, source water, and consumer education. While certain report formats are prescribed, there are no criteria ensuring that consumers understand messages in these reports. To assess clarity of message, trained raters evaluated a national sample of 30 CCRs using the Centers for Disease Control Clear Communication Index (Index) indices: (1) Main Message/Call to Action; (2) Language; (3) Information Design; (4) State of the Science; (5) Behavioral Recommendations; (6) Numbers; and (7) Risk. Communication materials are considered qualifying if they achieve a 90% Index score. Overall mean score across CCRs was 50 ± 14% and none scored 90% or higher. CCRs did not differ significantly by water system size. State of the Science (3 ± 15%) and Behavioral Recommendations (77 ± 36%) indices were the lowest and highest, respectively. Only 63% of CCRs explicitly stated if the water was safe to drink according to federal and state standards and regulations. None of the CCRs had passing Index scores, signaling that CWSs are not effectively communicating with their consumers; thus, the Index can serve as an evaluation tool for CCR effectiveness and a guide to improve water quality communications.
Users manual for the Chameleon parallel programming tools
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gropp, W.; Smith, B.
1993-06-01
Message passing is a common method for writing programs for distributed-memory parallel computers. Unfortunately, the lack of a standard for message passing has hampered the construction of portable and efficient parallel programs. In an attempt to remedy this problem, a number of groups have developed their own message-passing systems, each with its own strengths and weaknesses. Chameleon is a second-generation system of this type. Rather than replacing these existing systems, Chameleon is meant to supplement them by providing a uniform way to access many of these systems. Chameleon`s goals are to (a) be very lightweight (low over-head), (b) be highlymore » portable, and (c) help standardize program startup and the use of emerging message-passing operations such as collective operations on subsets of processors. Chameleon also provides a way to port programs written using PICL or Intel NX message passing to other systems, including collections of workstations. Chameleon is tracking the Message-Passing Interface (MPI) draft standard and will provide both an MPI implementation and an MPI transport layer. Chameleon provides support for heterogeneous computing by using p4 and PVM. Chameleon`s support for homogeneous computing includes the portable libraries p4, PICL, and PVM and vendor-specific implementation for Intel NX, IBM EUI (SP-1), and Thinking Machines CMMD (CM-5). Support for Ncube and PVM 3.x is also under development.« less
NASA Technical Reports Server (NTRS)
Phillips, Jennifer K.
1995-01-01
Two of the current and most popular implementations of the Message-Passing Standard, Message Passing Interface (MPI), were contrasted: MPICH by Argonne National Laboratory, and LAM by the Ohio Supercomputer Center at Ohio State University. A parallel skyline matrix solver was adapted to be run in a heterogeneous environment using MPI. The Message-Passing Interface Forum was held in May 1994 which lead to a specification of library functions that implement the message-passing model of parallel communication. LAM, which creates it's own environment, is more robust in a highly heterogeneous network. MPICH uses the environment native to the machine architecture. While neither of these free-ware implementations provides the performance of native message-passing or vendor's implementations, MPICH begins to approach that performance on the SP-2. The machines used in this study were: IBM RS6000, 3 Sun4, SGI, and the IBM SP-2. Each machine is unique and a few machines required specific modifications during the installation. When installed correctly, both implementations worked well with only minor problems.
Implementing Multidisciplinary and Multi-Zonal Applications Using MPI
NASA Technical Reports Server (NTRS)
Fineberg, Samuel A.
1995-01-01
Multidisciplinary and multi-zonal applications are an important class of applications in the area of Computational Aerosciences. In these codes, two or more distinct parallel programs or copies of a single program are utilized to model a single problem. To support such applications, it is common to use a programming model where a program is divided into several single program multiple data stream (SPMD) applications, each of which solves the equations for a single physical discipline or grid zone. These SPMD applications are then bound together to form a single multidisciplinary or multi-zonal program in which the constituent parts communicate via point-to-point message passing routines. Unfortunately, simple message passing models, like Intel's NX library, only allow point-to-point and global communication within a single system-defined partition. This makes implementation of these applications quite difficult, if not impossible. In this report it is shown that the new Message Passing Interface (MPI) standard is a viable portable library for implementing the message passing portion of multidisciplinary applications. Further, with the extension of a portable loader, fully portable multidisciplinary application programs can be developed. Finally, the performance of MPI is compared to that of some native message passing libraries. This comparison shows that MPI can be implemented to deliver performance commensurate with native message libraries.
Efficient Implementation of Multigrid Solvers on Message-Passing Parrallel Systems
NASA Technical Reports Server (NTRS)
Lou, John
1994-01-01
We discuss our implementation strategies for finite difference multigrid partial differential equation (PDE) solvers on message-passing systems. Our target parallel architecture is Intel parallel computers: the Delta and Paragon system.
Supporting shared data structures on distributed memory architectures
NASA Technical Reports Server (NTRS)
Koelbel, Charles; Mehrotra, Piyush; Vanrosendale, John
1990-01-01
Programming nonshared memory systems is more difficult than programming shared memory systems, since there is no support for shared data structures. Current programming languages for distributed memory architectures force the user to decompose all data structures into separate pieces, with each piece owned by one of the processors in the machine, and with all communication explicitly specified by low-level message-passing primitives. A new programming environment is presented for distributed memory architectures, providing a global name space and allowing direct access to remote parts of data values. The analysis and program transformations required to implement this environment are described, and the efficiency of the resulting code on the NCUBE/7 and IPSC/2 hypercubes are described.
Message passing with parallel queue traversal
Underwood, Keith D [Albuquerque, NM; Brightwell, Ronald B [Albuquerque, NM; Hemmert, K Scott [Albuquerque, NM
2012-05-01
In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.
Neighbourhood-consensus message passing and its potentials in image processing applications
NASA Astrophysics Data System (ADS)
Ružic, Tijana; Pižurica, Aleksandra; Philips, Wilfried
2011-03-01
In this paper, a novel algorithm for inference in Markov Random Fields (MRFs) is presented. Its goal is to find approximate maximum a posteriori estimates in a simple manner by combining neighbourhood influence of iterated conditional modes (ICM) and message passing of loopy belief propagation (LBP). We call the proposed method neighbourhood-consensus message passing because a single joint message is sent from the specified neighbourhood to the central node. The message, as a function of beliefs, represents the agreement of all nodes within the neighbourhood regarding the labels of the central node. This way we are able to overcome the disadvantages of reference algorithms, ICM and LBP. On one hand, more information is propagated in comparison with ICM, while on the other hand, the huge amount of pairwise interactions is avoided in comparison with LBP by working with neighbourhoods. The idea is related to the previously developed iterated conditional expectations algorithm. Here we revisit it and redefine it in a message passing framework in a more general form. The results on three different benchmarks demonstrate that the proposed technique can perform well both for binary and multi-label MRFs without any limitations on the model definition. Furthermore, it manifests improved performance over related techniques either in terms of quality and/or speed.
Foundations for a healthy future.
Riley, R; Green, J; Willis, S; Soden, E; Rushby, C; Postle, D; Wakeling, S
1998-01-01
Health promotion activities with children and young people are important as they take messages about health seriously and can be influential in spreading messages about healthy living to their friends and families. Child health professionals have an important role to play in passing on messages of positive health to children and young people. Peer education is a useful way of passing on messages about health to young people. This article shares examples of three health promotion projects with children in a community trust, looking at asthma, sex education and testicular examination.
Gender Stereotype Susceptibility
Pavlova, Marina A.; Weber, Susanna; Simoes, Elisabeth; Sokolov, Alexander N.
2014-01-01
Gender affects performance on a variety of cognitive tasks, and this impact may stem from socio-cultural factors such as gender stereotyping. Here we systematically manipulated gender stereotype messages on a social cognition task on which no initial gender gap has been documented. The outcome reveals: (i) Stereotyping affects both females and males, with a more pronounced impact on females. Yet an explicit negative message for males elicits a striking paradoxical deterioration in performance of females. (ii) Irrespective of gender and directness of message, valence of stereotype message affects performance: negative messages have stronger influence than positive ones. (iii) Directness of stereotype message differentially impacts performance of females and males: females tend to be stronger affected by implicit than explicit negative messages, whereas in males this relationship is opposite. The data are discussed in the light of neural networks underlying gender stereotyping. The findings provide novel insights into the sources of gender related fluctuations in cognition and behavior. PMID:25517903
Gender stereotype susceptibility.
Pavlova, Marina A; Weber, Susanna; Simoes, Elisabeth; Sokolov, Alexander N
2014-01-01
Gender affects performance on a variety of cognitive tasks, and this impact may stem from socio-cultural factors such as gender stereotyping. Here we systematically manipulated gender stereotype messages on a social cognition task on which no initial gender gap has been documented. The outcome reveals: (i) Stereotyping affects both females and males, with a more pronounced impact on females. Yet an explicit negative message for males elicits a striking paradoxical deterioration in performance of females. (ii) Irrespective of gender and directness of message, valence of stereotype message affects performance: negative messages have stronger influence than positive ones. (iii) Directness of stereotype message differentially impacts performance of females and males: females tend to be stronger affected by implicit than explicit negative messages, whereas in males this relationship is opposite. The data are discussed in the light of neural networks underlying gender stereotyping. The findings provide novel insights into the sources of gender related fluctuations in cognition and behavior.
Dispatching packets on a global combining network of a parallel computer
Almasi, Gheorghe [Ardsley, NY; Archer, Charles J [Rochester, MN
2011-07-19
Methods, apparatus, and products are disclosed for dispatching packets on a global combining network of a parallel computer comprising a plurality of nodes connected for data communications using the network capable of performing collective operations and point to point operations that include: receiving, by an origin system messaging module on an origin node from an origin application messaging module on the origin node, a storage identifier and an operation identifier, the storage identifier specifying storage containing an application message for transmission to a target node, and the operation identifier specifying a message passing operation; packetizing, by the origin system messaging module, the application message into network packets for transmission to the target node, each network packet specifying the operation identifier and an operation type for the message passing operation specified by the operation identifier; and transmitting, by the origin system messaging module, the network packets to the target node.
MPIRUN: A Portable Loader for Multidisciplinary and Multi-Zonal Applications
NASA Technical Reports Server (NTRS)
Fineberg, Samuel A.; Woodrow, Thomas S. (Technical Monitor)
1994-01-01
Multidisciplinary and multi-zonal applications are an important class of applications in the area of Computational Aerosciences. In these codes, two or more distinct parallel programs or copies of a single program are utilized to model a single problem. To support such applications, it is common to use a programming model where a program is divided into several single program multiple data stream (SPMD) applications, each of which solves the equations for a single physical discipline or grid zone. These SPMD applications are then bound together to form a single multidisciplinary or multi-zonal program in which the constituent parts communicate via point-to-point message passing routines. One method for implementing the message passing portion of these codes is with the new Message Passing Interface (MPI) standard. Unfortunately, this standard only specifies the message passing portion of an application, but does not specify any portable mechanisms for loading an application. MPIRUN was developed to provide a portable means for loading MPI programs, and was specifically targeted at multidisciplinary and multi-zonal applications. Programs using MPIRUN for loading and MPI for message passing are then portable between all machines supported by MPIRUN. MPIRUN is currently implemented for the Intel iPSC/860, TMC CM5, IBM SP-1 and SP-2, Intel Paragon, and workstation clusters. Further, MPIRUN is designed to be simple enough to port easily to any system supporting MPI.
Preserved feedforward but impaired top-down processes in the vegetative state.
Boly, Melanie; Garrido, Marta Isabel; Gosseries, Olivia; Bruno, Marie-Aurélie; Boveroux, Pierre; Schnakers, Caroline; Massimini, Marcello; Litvak, Vladimir; Laureys, Steven; Friston, Karl
2011-05-13
Frontoparietal cortex is involved in the explicit processing (awareness) of stimuli. Frontoparietal activation has also been found in studies of subliminal stimulus processing. We hypothesized that an impairment of top-down processes, involved in recurrent neuronal message-passing and the generation of long-latency electrophysiological responses, might provide a more reliable correlate of consciousness in severely brain-damaged patients, than frontoparietal responses. We measured effective connectivity during a mismatch negativity paradigm and found that the only significant difference between patients in a vegetative state and controls was an impairment of backward connectivity from frontal to temporal cortices. This result emphasizes the importance of top-down projections in recurrent processing that involve high-order associative cortices for conscious perception.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Painter, J.; McCormick, P.; Krogh, M.
This paper presents the ACL (Advanced Computing Lab) Message Passing Library. It is a high throughput, low latency communications library, based on Thinking Machines Corp.`s CMMD, upon which message passing applications can be built. The library has been implemented on the Cray T3D, Thinking Machines CM-5, SGI workstations, and on top of PVM.
NASA Technical Reports Server (NTRS)
Saini, Subash; Bailey, David; Chancellor, Marisa K. (Technical Monitor)
1997-01-01
High Performance Fortran (HPF), the high-level language for parallel Fortran programming, is based on Fortran 90. HALF was defined by an informal standards committee known as the High Performance Fortran Forum (HPFF) in 1993, and modeled on TMC's CM Fortran language. Several HPF features have since been incorporated into the draft ANSI/ISO Fortran 95, the next formal revision of the Fortran standard. HPF allows users to write a single parallel program that can execute on a serial machine, a shared-memory parallel machine, or a distributed-memory parallel machine. HPF eliminates the complex, error-prone task of explicitly specifying how, where, and when to pass messages between processors on distributed-memory machines, or when to synchronize processors on shared-memory machines. HPF is designed in a way that allows the programmer to code an application at a high level, and then selectively optimize portions of the code by dropping into message-passing or calling tuned library routines as 'extrinsics'. Compilers supporting High Performance Fortran features first appeared in late 1994 and early 1995 from Applied Parallel Research (APR) Digital Equipment Corporation, and The Portland Group (PGI). IBM introduced an HPF compiler for the IBM RS/6000 SP/2 in April of 1996. Over the past two years, these implementations have shown steady improvement in terms of both features and performance. The performance of various hardware/ programming model (HPF and MPI (message passing interface)) combinations will be compared, based on latest NAS (NASA Advanced Supercomputing) Parallel Benchmark (NPB) results, thus providing a cross-machine and cross-model comparison. Specifically, HPF based NPB results will be compared with MPI based NPB results to provide perspective on performance currently obtainable using HPF versus MPI or versus hand-tuned implementations such as those supplied by the hardware vendors. In addition we would also present NPB (Version 1.0) performance results for the following systems: DEC Alpha Server 8400 5/440, Fujitsu VPP Series (VX, VPP300, and VPP700), HP/Convex Exemplar SPP2000, IBM RS/6000 SP P2SC node (120 MHz) NEC SX-4/32, SGI/CRAY T3E, SGI Origin2000.
Towards collaborative filtering recommender systems for tailored health communications.
Marlin, Benjamin M; Adams, Roy J; Sadasivam, Rajani; Houston, Thomas K
2013-01-01
The goal of computer tailored health communications (CTHC) is to promote healthy behaviors by sending messages tailored to individual patients. Current CTHC systems collect baseline patient "profiles" and then use expert-written, rule-based systems to target messages to subsets of patients. Our main interest in this work is the study of collaborative filtering-based CTHC systems that can learn to tailor future message selections to individual patients based explicit feedback about past message selections. This paper reports the results of a study designed to collect explicit feedback (ratings) regarding four aspects of messages from 100 subjects in the smoking cessation support domain. Our results show that most users have positive opinions of most messages and that the ratings for all four aspects of the messages are highly correlated with each other. Finally, we conduct a range of rating prediction experiments comparing several different model variations. Our results show that predicting future ratings based on each user's past ratings contributes the most to predictive accuracy.
Towards Collaborative Filtering Recommender Systems for Tailored Health Communications
Marlin, Benjamin M.; Adams, Roy J.; Sadasivam, Rajani; Houston, Thomas K.
2013-01-01
The goal of computer tailored health communications (CTHC) is to promote healthy behaviors by sending messages tailored to individual patients. Current CTHC systems collect baseline patient “profiles” and then use expert-written, rule-based systems to target messages to subsets of patients. Our main interest in this work is the study of collaborative filtering-based CTHC systems that can learn to tailor future message selections to individual patients based explicit feedback about past message selections. This paper reports the results of a study designed to collect explicit feedback (ratings) regarding four aspects of messages from 100 subjects in the smoking cessation support domain. Our results show that most users have positive opinions of most messages and that the ratings for all four aspects of the messages are highly correlated with each other. Finally, we conduct a range of rating prediction experiments comparing several different model variations. Our results show that predicting future ratings based on each user’s past ratings contributes the most to predictive accuracy. PMID:24551430
DMA engine for repeating communication patterns
Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard; Vranas, Pavlos
2010-09-21
A parallel computer system is constructed as a network of interconnected compute nodes to operate a global message-passing application for performing communications across the network. Each of the compute nodes includes one or more individual processors with memories which run local instances of the global message-passing application operating at each compute node to carry out local processing operations independent of processing operations carried out at other compute nodes. Each compute node also includes a DMA engine constructed to interact with the application via Injection FIFO Metadata describing multiple Injection FIFOs where each Injection FIFO may containing an arbitrary number of message descriptors in order to process messages with a fixed processing overhead irrespective of the number of message descriptors included in the Injection FIFO.
High Performance Fortran for Aerospace Applications
NASA Technical Reports Server (NTRS)
Mehrotra, Piyush; Zima, Hans; Bushnell, Dennis M. (Technical Monitor)
2000-01-01
This paper focuses on the use of High Performance Fortran (HPF) for important classes of algorithms employed in aerospace applications. HPF is a set of Fortran extensions designed to provide users with a high-level interface for programming data parallel scientific applications, while delegating to the compiler/runtime system the task of generating explicitly parallel message-passing programs. We begin by providing a short overview of the HPF language. This is followed by a detailed discussion of the efficient use of HPF for applications involving multiple structured grids such as multiblock and adaptive mesh refinement (AMR) codes as well as unstructured grid codes. We focus on the data structures and computational structures used in these codes and on the high-level strategies that can be expressed in HPF to optimally exploit the parallelism in these algorithms.
Patrick, Kent; Heywood, Wendy; Pitts, Marian K; Mitchell, Anne
2015-11-01
Background There has been increasing attention on assessing rates of sexting in adolescents and of the potential negative effects of the behaviour. Our aim was to assess rates and correlates of sexting in Australian students in years10, 11 and 12. The current study was part of The Fifth National Survey of Australian Secondary Students and Sexual Health and reports on responses of 2114 students (811 male, 1303 female). Sexting was assessed using six items: sending a sexually explicit written text message; receiving a sexually explicit text message; sending a sexually explicit nude or nearly nude photo or video of themselves; sending a sexually explicit nude or nearly nude photo or video of someone else; receiving a sexually explicit nude or nearly nude photo or video of someone else; and using a social media site for sexual reasons. Approximately half of the students had received (54%, 1139/2097) or sent (43%, 904/2107) a sexually explicit written text message. Sexually explicit images had been received by 42% (880/2098) of students, one in four students had sent a sexually explicit image of themselves (26%, 545/2102) and one in 10 had sent a sexually explicit image of someone else (9%, 180/2095). Finally, 22% (454/2103) of students had used social media for sexual reasons. Sexting was associated with several correlates. Sexting was relatively common in this sample of year 10, 11 and 12 Australian students, particularly among older students, those who are sexually active, and those who use recreational substances.
Mattavelli, Simone; Avishai, Aya; Perugini, Marco; Richetin, Juliette; Sheeran, Paschal
2017-08-01
Although correlational studies have demonstrated that implicit and explicit attitudes are both important in predicting eating behavior, few studies targeting food choice have attempted to change both types of attitudes. We tested the impact of (a) an evaluative learning intervention that uses the self to change attitudes (i.e., a Self-Referencing task) and (b) a persuasive communication in modifying implicit and explicit attitudes towards green vegetables and promoting readiness to change. The study targeted individuals who explicitly reported they did not like or only moderately liked green vegetables. Participants (N = 273) were randomly allocated to a 2 (self-referencing: present vs. absent) × 2 (persuasive message: present vs. absent) factorial design. The outcomes were implicit and explicit attitudes as well as readiness to increase consumption of green vegetables. Implicit attitudes increased after repeatedly pairing green vegetable stimuli with the self in the self-referencing task but did not change in response to the persuasive communication. The persuasive message increased explicit attitudes and readiness to change, but did not alter implicit attitudes. A three-way interaction with pre-existing explicit attitudes was also observed. In the absence of a persuasive message, the self-referencing task increased on readiness to change among participants with more negative pre-existing explicit attitudes. This study is the first to demonstrate that a self-referencing task is effective in changing both implicit attitudes and readiness to change eating behavior. Findings indicate that distinct intervention strategies are needed to change implicit and explicit attitudes towards green vegetables.
Message Passing vs. Shared Address Space on a Cluster of SMPs
NASA Technical Reports Server (NTRS)
Shan, Hongzhang; Singh, Jaswinder Pal; Oliker, Leonid; Biswas, Rupak
2000-01-01
The convergence of scalable computer architectures using clusters of PCs (or PC-SMPs) with commodity networking has become an attractive platform for high end scientific computing. Currently, message-passing and shared address space (SAS) are the two leading programming paradigms for these systems. Message-passing has been standardized with MPI, and is the most common and mature programming approach. However message-passing code development can be extremely difficult, especially for irregular structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality, and high protocol overhead. In this paper, we compare the performance of and programming effort, required for six applications under both programming models on a 32 CPU PC-SMP cluster. Our application suite consists of codes that typically do not exhibit high efficiency under shared memory programming. due to their high communication to computation ratios and complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of our applications: however, on certain classes of problems SAS performance is competitive with MPI. We also present new algorithms for improving the PC cluster performance of MPI collective operations.
Xu, Lei; Jeavons, Peter
2015-11-01
Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.
Implicit and explicit false belief development in preschool children.
Grosse Wiesmann, Charlotte; Friederici, Angela D; Singer, Tania; Steinbeis, Nikolaus
2017-09-01
The ability to represent the mental states of other agents is referred to as Theory of Mind (ToM). A developmental breakthrough in ToM consists of understanding that others can have false beliefs about the world. Recently, infants younger than 2 years of age have been shown to pass novel implicit false belief tasks. However, the processes underlying these tasks and their relation to later-developing explicit false belief understanding, as well as to other cognitive abilities, are not yet understood. Here, we study a battery of implicit and explicit false belief tasks in 3- and 4-year-old children, relating their performance to linguistic abilities and executive functions. The present data show a significant developmental change from failing explicit false belief tasks at 3 years of age to passing them at the age of 4, while both age groups pass implicit false belief tasks. This differential developmental trajectory is reflected by the finding that explicit and implicit false belief tasks do not correlate. Further, we demonstrate that explicit false belief tasks correlate with syntactic and executive functions, whereas implicit false belief tasks do not. The study thus indicates that the processes underlying implicit false belief tasks are different from later-developing explicit false belief understanding. Moreover, our results speak for a critical role of syntactic and executive functions for passing standard explicit false belief tasks in contrast to implicit tasks. © 2016 John Wiley & Sons Ltd.
A message passing kernel for the hypercluster parallel processing test bed
NASA Technical Reports Server (NTRS)
Blech, Richard A.; Quealy, Angela; Cole, Gary L.
1989-01-01
A Message-Passing Kernel (MPK) for the Hypercluster parallel-processing test bed is described. The Hypercluster is being developed at the NASA Lewis Research Center to support investigations of parallel algorithms and architectures for computational fluid and structural mechanics applications. The Hypercluster resembles the hypercube architecture except that each node consists of multiple processors communicating through shared memory. The MPK efficiently routes information through the Hypercluster, using a message-passing protocol when necessary and faster shared-memory communication whenever possible. The MPK also interfaces all of the processors with the Hypercluster operating system (HYCLOPS), which runs on a Front-End Processor (FEP). This approach distributes many of the I/O tasks to the Hypercluster processors and eliminates the need for a separate I/O support program on the FEP.
"Assembling" the Ideal Learner: The School Assembly as Regulatory Ritual
ERIC Educational Resources Information Center
Silbert, Patti; Jacklin, Heather
2015-01-01
"School assemblies" are rituals that celebrate and mark the school community. They carry messages of allegiance and belonging that are disseminated both verbally and nonverbally. Although verbal messages are explicitly stated, nonverbal messages are conveyed through subjection to habits, rules, and orders (Foucault 1977) and are…
Sutton, Jeannette; Gibson, C. Ben; Spiro, Emma S.; League, Cedar; Fitzhugh, Sean M.; Butts, Carter T.
2015-01-01
Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not) perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials’ Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events. PMID:26295584
Iantaffi, Alex; Wilkerson, J Michael; Grey, Jeremy A; Rosser, B R Simon
2015-01-01
Sexually explicit media (SEM) have been used in HIV-prevention advertisements to engage men who have sex with men (MSM) and to communicate content. These advertisements exist within larger discourses, including a dominant heteronormative culture and a growing homonormative culture. Cognizant of these hegemonic cultures, this analysis examined the acceptable level of sexual explicitness in prevention advertisements. Seventy-nine MSM participated in 13 online focus groups, which were part of a larger study of SEM. Three macro themes-audience, location, and community representation-emerged from the analysis, as did the influence of homonormativity on the acceptability of SEM in HIV-prevention messages.
Iantaffi, Alex; Wilkerson, J. Michael; Grey, Jeremy A.; Rosser, B. R. Simon
2014-01-01
Sexually explicit media (SEM) have been used in HIV-prevention advertisements to engage men who have sex with men (MSM), and to communicate content. These advertisements exist within larger discourses, including a dominant heternormative culture, and a growing homonormative culture. Cognizant of these hegemonic cultures, this analysis examined the acceptable level of sexual explicitness in prevention advertisements. 79 MSM participated in 13 online focus groups, which were part of a larger study of SEM. Three macro-themes—audience, location and community representation—emerged from the analysis, as did the influence of homonormativity on the acceptability of SEM in HIV-prevention messages. PMID:26075485
The Edge-Disjoint Path Problem on Random Graphs by Message-Passing.
Altarelli, Fabrizio; Braunstein, Alfredo; Dall'Asta, Luca; De Bacco, Caterina; Franz, Silvio
2015-01-01
We present a message-passing algorithm to solve a series of edge-disjoint path problems on graphs based on the zero-temperature cavity equations. Edge-disjoint paths problems are important in the general context of routing, that can be defined by incorporating under a unique framework both traffic optimization and total path length minimization. The computation of the cavity equations can be performed efficiently by exploiting a mapping of a generalized edge-disjoint path problem on a star graph onto a weighted maximum matching problem. We perform extensive numerical simulations on random graphs of various types to test the performance both in terms of path length minimization and maximization of the number of accommodated paths. In addition, we test the performance on benchmark instances on various graphs by comparison with state-of-the-art algorithms and results found in the literature. Our message-passing algorithm always outperforms the others in terms of the number of accommodated paths when considering non trivial instances (otherwise it gives the same trivial results). Remarkably, the largest improvement in performance with respect to the other methods employed is found in the case of benchmarks with meshes, where the validity hypothesis behind message-passing is expected to worsen. In these cases, even though the exact message-passing equations do not converge, by introducing a reinforcement parameter to force convergence towards a sub optimal solution, we were able to always outperform the other algorithms with a peak of 27% performance improvement in terms of accommodated paths. On random graphs, we numerically observe two separated regimes: one in which all paths can be accommodated and one in which this is not possible. We also investigate the behavior of both the number of paths to be accommodated and their minimum total length.
The Edge-Disjoint Path Problem on Random Graphs by Message-Passing
2015-01-01
We present a message-passing algorithm to solve a series of edge-disjoint path problems on graphs based on the zero-temperature cavity equations. Edge-disjoint paths problems are important in the general context of routing, that can be defined by incorporating under a unique framework both traffic optimization and total path length minimization. The computation of the cavity equations can be performed efficiently by exploiting a mapping of a generalized edge-disjoint path problem on a star graph onto a weighted maximum matching problem. We perform extensive numerical simulations on random graphs of various types to test the performance both in terms of path length minimization and maximization of the number of accommodated paths. In addition, we test the performance on benchmark instances on various graphs by comparison with state-of-the-art algorithms and results found in the literature. Our message-passing algorithm always outperforms the others in terms of the number of accommodated paths when considering non trivial instances (otherwise it gives the same trivial results). Remarkably, the largest improvement in performance with respect to the other methods employed is found in the case of benchmarks with meshes, where the validity hypothesis behind message-passing is expected to worsen. In these cases, even though the exact message-passing equations do not converge, by introducing a reinforcement parameter to force convergence towards a sub optimal solution, we were able to always outperform the other algorithms with a peak of 27% performance improvement in terms of accommodated paths. On random graphs, we numerically observe two separated regimes: one in which all paths can be accommodated and one in which this is not possible. We also investigate the behavior of both the number of paths to be accommodated and their minimum total length. PMID:26710102
Berry, Tanya R; Jones, Kelvin E; Courneya, Kerry S; McGannon, Kerry R; Norris, Colleen M; Rodgers, Wendy M; Spence, John C
2018-01-18
The purpose of this research was to examine the relationships of self-reported physical activity to involvement with messages that discuss the prevention of heart disease and breast cancer through physical activity, the explicit believability of the messages, and agreement (or disagreement) with specific statements about the messages or disease beliefs in general. A within subjects' design was used. Participants (N = 96) read either a breast cancer or heart disease message first, then completed a corresponding task that measured agreement or disagreement and confidence in the agreement or disagreement that 1) physical activity 'reduces risk/does not reduce risk' of breast cancer or heart disease, 2) that breast cancer or heart disease is a 'real/not real risk for me', 3) that women who get breast cancer or heart disease are 'like/not like me', and 4) that women who get breast cancer or heart disease are 'to blame/not to blame'. This task was followed by a questionnaire measuring message involvement and explicit believability. They then read the other disease messages and completed the corresponding agreement and confidence task and questionnaire measures. Lastly, participants completed a questionnaire measuring physical activity related attitudes and intentions, and demographics. There was no difference in message involvement or explicit believability of breast cancer compared to heart disease messages. Active participants had a higher confidence in their agreement that physical activity is preventive of heart disease compared to breast cancer. Multinomial regression models showed that, in addition to physical activity related attitudes and intentions, agreement that physical activity was preventive of heart disease and that women with heart disease are 'like me' were predictors of being more active compared to inactive. In the breast cancer model only attitudes and intentions predicted physical activity group. Active women likely internalized messages about heart disease prevention through physical activity, making the prevention messages more readily available within memory, and active women may therefore process such information differently. The study of how health-related beliefs are created and are related to perceptions of prevention messages is a rich area of study that may contribute to more effective health promotion.
ERIC Educational Resources Information Center
Lucas, Kristen
2011-01-01
This study explicitly links processes of anticipatory socialization to social mobility and reproduction. An examination of the socializing messages exchanged between blue-collar parents (n = 41) and their children (n = 25) demonstrate that family-based messages about work and career seldom occur in straightforward, unambiguous ways. Instead,…
Message passing with a limited number of DMA byte counters
Blocksome, Michael [Rochester, MN; Chen, Dong [Croton on Hudson, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Kumar, Sameer [White Plains, NY; Parker, Jeffrey J [Rochester, MN
2011-10-04
A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node. Using one DMA FIFO at the source compute node, the RTS descriptors are maintained for rendezvous messages destined for the destination compute node to ensure proper message data ordering thereat. Using a reception counter at a DMA engine, the destination compute node tracks reception of the RTS and associated message data and sends a clear to send (CTS) message to the source node in a rendezvous protocol form of a remote get to accept the RTS message and message data and processing the remote get (CTS) by the source compute node DMA engine to provide the message data to be sent.
Public-channel cryptography based on mutual chaos pass filters.
Klein, Einat; Gross, Noam; Kopelowitz, Evi; Rosenbluh, Michael; Khaykovich, Lev; Kinzel, Wolfgang; Kanter, Ido
2006-10-01
We study the mutual coupling of chaotic lasers and observe both experimentally and in numeric simulations that there exists a regime of parameters for which two mutually coupled chaotic lasers establish isochronal synchronization, while a third laser coupled unidirectionally to one of the pair does not synchronize. We then propose a cryptographic scheme, based on the advantage of mutual coupling over unidirectional coupling, where all the parameters of the system are public knowledge. We numerically demonstrate that in such a scheme the two communicating lasers can add a message signal (compressed binary message) to the transmitted coupling signal and recover the message in both directions with high fidelity by using a mutual chaos pass filter procedure. An attacker, however, fails to recover an errorless message even if he amplifies the coupling signal.
An implementation and performance measurement of the progressive retry technique
NASA Technical Reports Server (NTRS)
Suri, Gaurav; Huang, Yennun; Wang, Yi-Min; Fuchs, W. Kent; Kintala, Chandra
1995-01-01
This paper describes a recovery technique called progressive retry for bypassing software faults in message-passing applications. The technique is implemented as reusable modules to provide application-level software fault tolerance. The paper describes the implementation of the technique and presents results from the application of progressive retry to two telecommunications systems. the results presented show that the technique is helpful in reducing the total recovery time for message-passing applications.
LCAMP: Location Constrained Approximate Message Passing for Compressed Sensing MRI
Sung, Kyunghyun; Daniel, Bruce L; Hargreaves, Brian A
2016-01-01
Iterative thresholding methods have been extensively studied as faster alternatives to convex optimization methods for solving large-sized problems in compressed sensing. A novel iterative thresholding method called LCAMP (Location Constrained Approximate Message Passing) is presented for reducing computational complexity and improving reconstruction accuracy when a nonzero location (or sparse support) constraint can be obtained from view shared images. LCAMP modifies the existing approximate message passing algorithm by replacing the thresholding stage with a location constraint, which avoids adjusting regularization parameters or thresholding levels. This work is first compared with other conventional reconstruction methods using random 1D signals and then applied to dynamic contrast-enhanced breast MRI to demonstrate the excellent reconstruction accuracy (less than 2% absolute difference) and low computation time (5 - 10 seconds using Matlab) with highly undersampled 3D data (244 × 128 × 48; overall reduction factor = 10). PMID:23042658
Efficient Tracing for On-the-Fly Space-Time Displays in a Debugger for Message Passing Programs
NASA Technical Reports Server (NTRS)
Hood, Robert; Matthews, Gregory
2001-01-01
In this work we describe the implementation of a practical mechanism for collecting and displaying trace information in a debugger for message passing programs. We introduce a trace format that is highly compressible while still providing information adequate for debugging purposes. We make the mechanism convenient for users to access by incorporating the trace collection in a set of wrappers for the MPI (message passing interface) communication library. We implement several debugger operations that use the trace display: consistent stoplines, undo, and rollback. They all are implemented using controlled replay, which executes at full speed in target processes until the appropriate position in the computation is reached. They provide convenient mechanisms for getting to places in the execution where the full power of a state-based debugger can be brought to bear on isolating communication errors.
Design of a network for concurrent message passing systems
NASA Astrophysics Data System (ADS)
Song, Paul Y.
1988-08-01
We describe the design of the network design frame (NDF), a self-timed routing chip for a message-passing concurrent computer. The NDF uses a partitioned data path, low-voltage output drivers, and a distributed token-passing arbiter to provide a bandwidth of 450 Mbits/sec into the network. Wormhole routing and bidirectional virtual channels are used to provide low latency communications, less than 2us latency to deliver a 216 bit message across the diameter of a 1K node mess-connected machine. To support concurrent software systems, the NDF provides two logical networks, one for user messages and one for system messages. The two networks share the same set of physical wires. To facilitate the development of network nodes, the NDF is a design frame. The NDF circuitry is integrated into the pad frame of a chip leaving the center of the chip uncommitted. We define an analytic framework in which to study the effects of network size, network buffering capacity, bidirectional channels, and traffic on this class of networks. The response of the network to various combinations of these parameters are obtained through extensive simulation of the network model. Through simulation, we are able to observe the macro behavior of the network as opposed to the micro behavior of the NDF routing controller.
Autoplan: A self-processing network model for an extended blocks world planning environment
NASA Technical Reports Server (NTRS)
Dautrechy, C. Lynne; Reggia, James A.; Mcfadden, Frank
1990-01-01
Self-processing network models (neural/connectionist models, marker passing/message passing networks, etc.) are currently undergoing intense investigation for a variety of information processing applications. These models are potentially very powerful in that they support a large amount of explicit parallel processing, and they cleanly integrate high level and low level information processing. However they are currently limited by a lack of understanding of how to apply them effectively in many application areas. The formulation of self-processing network methods for dynamic, reactive planning is studied. The long-term goal is to formulate robust, computationally effective information processing methods for the distributed control of semiautonomous exploration systems, e.g., the Mars Rover. The current research effort is focusing on hierarchical plan generation, execution and revision through local operations in an extended blocks world environment. This scenario involves many challenging features that would be encountered in a real planning and control environment: multiple simultaneous goals, parallel as well as sequential action execution, action sequencing determined not only by goals and their interactions but also by limited resources (e.g., three tasks, two acting agents), need to interpret unanticipated events and react appropriately through replanning, etc.
Desire or Disease? Framing Obesity to Influence Attributions of Responsibility and Policy Support.
McGlynn, Joseph; McGlone, Matthew S
2018-02-01
The way we describe health threats affects perceptions of severity and preferred solutions to reduce risk. Most people agree obesity is a problem, but differ in how they attribute responsibility for development and decline of the disease. We explored effects of message framing on attributions of responsibility and support for public obesity policies using a 3 × 2 factorial design. Participants read one of six versions of a health message describing the negative effects of obesity. Message frames influenced respondent attributions and their support for policies to reduce obesity. Those who read a message that assigned agency to the disease (e.g., Obesity causes health problems) endorsed genetics as the cause to a greater degree than those who read a semantically equivalent message that instead assigned agency to people (e.g., Obese people develop health problems). In contrast, assigning agency to people rather than to the disease prompted higher attributions of individual responsibility and support for public policies. Explicit message frames that directly connected responsibility for obesity to either individual or societal factors had no effect on respondent perceptions. Findings suggest explicit arguments may be less effective in shifting perceptions of health threats than arguments embedded in agentic message frames. The results demonstrate specific message features that influence how people attribute responsibility for the onset and solution of obesity.
The graphical brain: Belief propagation and active inference
Friston, Karl J.; Parr, Thomas; de Vries, Bert
2018-01-01
This paper considers functional integration in the brain from a computational perspective. We ask what sort of neuronal message passing is mandated by active inference—and what implications this has for context-sensitive connectivity at microscopic and macroscopic levels. In particular, we formulate neuronal processing as belief propagation under deep generative models. Crucially, these models can entertain both discrete and continuous states, leading to distinct schemes for belief updating that play out on the same (neuronal) architecture. Technically, we use Forney (normal) factor graphs to elucidate the requisite message passing in terms of its form and scheduling. To accommodate mixed generative models (of discrete and continuous states), one also has to consider link nodes or factors that enable discrete and continuous representations to talk to each other. When mapping the implicit computational architecture onto neuronal connectivity, several interesting features emerge. For example, Bayesian model averaging and comparison, which link discrete and continuous states, may be implemented in thalamocortical loops. These and other considerations speak to a computational connectome that is inherently state dependent and self-organizing in ways that yield to a principled (variational) account. We conclude with simulations of reading that illustrate the implicit neuronal message passing, with a special focus on how discrete (semantic) representations inform, and are informed by, continuous (visual) sampling of the sensorium. Author Summary This paper considers functional integration in the brain from a computational perspective. We ask what sort of neuronal message passing is mandated by active inference—and what implications this has for context-sensitive connectivity at microscopic and macroscopic levels. In particular, we formulate neuronal processing as belief propagation under deep generative models that can entertain both discrete and continuous states. This leads to distinct schemes for belief updating that play out on the same (neuronal) architecture. Technically, we use Forney (normal) factor graphs to characterize the requisite message passing, and link this formal characterization to canonical microcircuits and extrinsic connectivity in the brain. PMID:29417960
CSlib, a library to couple codes via Client/Server messaging
DOE Office of Scientific and Technical Information (OSTI.GOV)
Plimpton, Steve
The CSlib is a small, portable library which enables two (or more) independent simulation codes to be coupled, by exchanging messages with each other. Both codes link to the library when they are built, and can them communicate with each other as they run. The messages contain data or instructions that the two codes send back-and-forth to each other. The messaging can take place via files, sockets, or MPI. The latter is a standard distributed-memory message-passing library.
User-Defined Data Distributions in High-Level Programming Languages
NASA Technical Reports Server (NTRS)
Diaconescu, Roxana E.; Zima, Hans P.
2006-01-01
One of the characteristic features of today s high performance computing systems is a physically distributed memory. Efficient management of locality is essential for meeting key performance requirements for these architectures. The standard technique for dealing with this issue has involved the extension of traditional sequential programming languages with explicit message passing, in the context of a processor-centric view of parallel computation. This has resulted in complex and error-prone assembly-style codes in which algorithms and communication are inextricably interwoven. This paper presents a high-level approach to the design and implementation of data distributions. Our work is motivated by the need to improve the current parallel programming methodology by introducing a paradigm supporting the development of efficient and reusable parallel code. This approach is currently being implemented in the context of a new programming language called Chapel, which is designed in the HPCS project Cascade.
Three-Dimensional High-Lift Analysis Using a Parallel Unstructured Multigrid Solver
NASA Technical Reports Server (NTRS)
Mavriplis, Dimitri J.
1998-01-01
A directional implicit unstructured agglomeration multigrid solver is ported to shared and distributed memory massively parallel machines using the explicit domain-decomposition and message-passing approach. Because the algorithm operates on local implicit lines in the unstructured mesh, special care is required in partitioning the problem for parallel computing. A weighted partitioning strategy is described which avoids breaking the implicit lines across processor boundaries, while incurring minimal additional communication overhead. Good scalability is demonstrated on a 128 processor SGI Origin 2000 machine and on a 512 processor CRAY T3E machine for reasonably fine grids. The feasibility of performing large-scale unstructured grid calculations with the parallel multigrid algorithm is demonstrated by computing the flow over a partial-span flap wing high-lift geometry on a highly resolved grid of 13.5 million points in approximately 4 hours of wall clock time on the CRAY T3E.
The Effectiveness of Gateway Communications in Anti-Marijuana Campaigns
YZER, MARCO C.; CAPPELLA, JOSEPH N.; FISHBEIN, MARTIN; HORNIK, ROBERT; AHERN, R. KIRKLAND
2014-01-01
Successful anti-marijuana messages can be hypothesized to have two types of effects, namely persuasion effects, that is, a change in people’s beliefs about using marijuana, and priming effects, that is, a strengthened correlation between beliefs and associated variables such as attitude and intention. This study examined different sets of anti-drug advertisements for persuasion and priming effects. The ads targeted the belief that marijuana is a gateway to stronger drugs, a belief that is often endorsed by campaign planning officials and health educators. A sample of 418 middle and high school students was randomly assigned to a control video or one of three series of ads, two of which included the gateway message in either an explicit or implicit way. Results did not support the use of the gateway belief in anti-marijuana interventions. Whereas no clear persuasion or priming effects were found for any of the ad sequences, there is some possibility that an explicit gateway argument may actually boomerang. In comparison to the control condition, adolescents in the explicit gateway condition tended to agree less with the gateway message and displayed weaker correlations between anti-marijuana beliefs and their attitude toward marijuana use. The results suggest that the gateway message should not be used in anti-drug interventions. PMID:12746037
Design and Implementation of an Operations Module for the ARGOS paperless Ship System
1989-06-01
A. OPERATIONS STACK SCRIPTS SCRIPTS FOR STACK: operations * BACKGROUND #1: Operations * on openStack hide message box show menuBar pass openStack end... openStack ** CARD #1, BUTTON #1: Up ***** on mouseUp visual effect zoom out go to card id 10931 of stack argos end mouseUp ** CARD #1, BUTTON #2...STACK SCRIPTS SCRIPTS FOR STACK: Reports ** BACKGROUND #1: Operations * on openStack hie message box show menuBar pass openStack end openStack ** CARD #1
Experiences Using OpenMP Based on Compiler Directed Software DSM on a PC Cluster
NASA Technical Reports Server (NTRS)
Hess, Matthias; Jost, Gabriele; Mueller, Matthias; Ruehle, Roland; Biegel, Bryan (Technical Monitor)
2002-01-01
In this work we report on our experiences running OpenMP (message passing) programs on a commodity cluster of PCs (personal computers) running a software distributed shared memory (DSM) system. We describe our test environment and report on the performance of a subset of the NAS (NASA Advanced Supercomputing) Parallel Benchmarks that have been automatically parallelized for OpenMP. We compare the performance of the OpenMP implementations with that of their message passing counterparts and discuss performance differences.
Charon Message-Passing Toolkit for Scientific Computations
NASA Technical Reports Server (NTRS)
VanderWijngaart, Rob F.; Yan, Jerry (Technical Monitor)
2000-01-01
Charon is a library, callable from C and Fortran, that aids the conversion of structured-grid legacy codes-such as those used in the numerical computation of fluid flows-into parallel, high- performance codes. Key are functions that define distributed arrays, that map between distributed and non-distributed arrays, and that allow easy specification of common communications on structured grids. The library is based on the widely accepted MPI message passing standard. We present an overview of the functionality of Charon, and some representative results.
Couriers in the Inca Empire: Getting Your Message Across. [Lesson Plan].
ERIC Educational Resources Information Center
2002
This lesson shows how the Inca communicated across the vast stretches of their mountain realm, the largest empire of the pre-industrial world. The lesson explains how couriers carried messages along mountain-ridge roads, up and down stone steps, and over chasm-spanning footbridges. It states that couriers could pass a message from Quito (Ecuador)…
Changing drivers' intentions and behaviours using fear-based driver fatigue advertisements.
Tay, Richard; Watson, Barry
2002-01-01
This paper examines the effects of fear arousal and perceived efficacy on the acceptance and rejection of road safety advertising messages that are typical in Australia and New Zealand. Our results suggest that the level of fear arousal could be lowered without a significant effect on the message acceptance rates but could result in a lower rate of message rejection. Our results also suggest that the inclusion of explicit coping strategies in the road safety advertisements has a significant positive effect on message acceptance.
Inference in the brain: Statistics flowing in redundant population codes
Pitkow, Xaq; Angelaki, Dora E
2017-01-01
It is widely believed that the brain performs approximate probabilistic inference to estimate causal variables in the world from ambiguous sensory data. To understand these computations, we need to analyze how information is represented and transformed by the actions of nonlinear recurrent neural networks. We propose that these probabilistic computations function by a message-passing algorithm operating at the level of redundant neural populations. To explain this framework, we review its underlying concepts, including graphical models, sufficient statistics, and message-passing, and then describe how these concepts could be implemented by recurrently connected probabilistic population codes. The relevant information flow in these networks will be most interpretable at the population level, particularly for redundant neural codes. We therefore outline a general approach to identify the essential features of a neural message-passing algorithm. Finally, we argue that to reveal the most important aspects of these neural computations, we must study large-scale activity patterns during moderately complex, naturalistic behaviors. PMID:28595050
Critical field-exponents for secure message-passing in modular networks
NASA Astrophysics Data System (ADS)
Shekhtman, Louis M.; Danziger, Michael M.; Bonamassa, Ivan; Buldyrev, Sergey V.; Caldarelli, Guido; Zlatić, Vinko; Havlin, Shlomo
2018-05-01
We study secure message-passing in the presence of multiple adversaries in modular networks. We assume a dominant fraction of nodes in each module have the same vulnerability, i.e., the same entity spying on them. We find both analytically and via simulations that the links between the modules (interlinks) have effects analogous to a magnetic field in a spin-system in that for any amount of interlinks the system no longer undergoes a phase transition. We then define the exponents δ, which relates the order parameter (the size of the giant secure component) at the critical point to the field strength (average number of interlinks per node), and γ, which describes the susceptibility near criticality. These are found to be δ = 2 and γ = 1 (with the scaling of the order parameter near the critical point given by β = 1). When two or more vulnerabilities are equally present in a module we find δ = 1 and γ = 0 (with β ≥ 2). Apart from defining a previously unidentified universality class, these exponents show that increasing connections between modules is more beneficial for security than increasing connections within modules. We also measure the correlation critical exponent ν, and the upper critical dimension d c , finding that ν {d}c=3 as for ordinary percolation, suggesting that for secure message-passing d c = 6. These results provide an interesting analogy between secure message-passing in modular networks and the physics of magnetic spin-systems.
Compiled MPI: Cost-Effective Exascale Applications Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bronevetsky, G; Quinlan, D; Lumsdaine, A
2012-04-10
The complexity of petascale and exascale machines makes it increasingly difficult to develop applications that can take advantage of them. Future systems are expected to feature billion-way parallelism, complex heterogeneous compute nodes and poor availability of memory (Peter Kogge, 2008). This new challenge for application development is motivating a significant amount of research and development on new programming models and runtime systems designed to simplify large-scale application development. Unfortunately, DoE has significant multi-decadal investment in a large family of mission-critical scientific applications. Scaling these applications to exascale machines will require a significant investment that will dwarf the costs of hardwaremore » procurement. A key reason for the difficulty in transitioning today's applications to exascale hardware is their reliance on explicit programming techniques, such as the Message Passing Interface (MPI) programming model to enable parallelism. MPI provides a portable and high performance message-passing system that enables scalable performance on a wide variety of platforms. However, it also forces developers to lock the details of parallelization together with application logic, making it very difficult to adapt the application to significant changes in the underlying system. Further, MPI's explicit interface makes it difficult to separate the application's synchronization and communication structure, reducing the amount of support that can be provided by compiler and run-time tools. This is in contrast to the recent research on more implicit parallel programming models such as Chapel, OpenMP and OpenCL, which promise to provide significantly more flexibility at the cost of reimplementing significant portions of the application. We are developing CoMPI, a novel compiler-driven approach to enable existing MPI applications to scale to exascale systems with minimal modifications that can be made incrementally over the application's lifetime. It includes: (1) New set of source code annotations, inserted either manually or automatically, that will clarify the application's use of MPI to the compiler infrastructure, enabling greater accuracy where needed; (2) A compiler transformation framework that leverages these annotations to transform the original MPI source code to improve its performance and scalability; (3) Novel MPI runtime implementation techniques that will provide a rich set of functionality extensions to be used by applications that have been transformed by our compiler; and (4) A novel compiler analysis that leverages simple user annotations to automatically extract the application's communication structure and synthesize most complex code annotations.« less
PRAIS: Distributed, real-time knowledge-based systems made easy
NASA Technical Reports Server (NTRS)
Goldstein, David G.
1990-01-01
This paper discusses an architecture for real-time, distributed (parallel) knowledge-based systems called the Parallel Real-time Artificial Intelligence System (PRAIS). PRAIS strives for transparently parallelizing production (rule-based) systems, even when under real-time constraints. PRAIS accomplishes these goals by incorporating a dynamic task scheduler, operating system extensions for fact handling, and message-passing among multiple copies of CLIPS executing on a virtual blackboard. This distributed knowledge-based system tool uses the portability of CLIPS and common message-passing protocols to operate over a heterogeneous network of processors.
Gene-network inference by message passing
NASA Astrophysics Data System (ADS)
Braunstein, A.; Pagnani, A.; Weigt, M.; Zecchina, R.
2008-01-01
The inference of gene-regulatory processes from gene-expression data belongs to the major challenges of computational systems biology. Here we address the problem from a statistical-physics perspective and develop a message-passing algorithm which is able to infer sparse, directed and combinatorial regulatory mechanisms. Using the replica technique, the algorithmic performance can be characterized analytically for artificially generated data. The algorithm is applied to genome-wide expression data of baker's yeast under various environmental conditions. We find clear cases of combinatorial control, and enrichment in common functional annotations of regulated genes and their regulators.
Optimal mapping of neural-network learning on message-passing multicomputers
NASA Technical Reports Server (NTRS)
Chu, Lon-Chan; Wah, Benjamin W.
1992-01-01
A minimization of learning-algorithm completion time is sought in the present optimal-mapping study of the learning process in multilayer feed-forward artificial neural networks (ANNs) for message-passing multicomputers. A novel approximation algorithm for mappings of this kind is derived from observations of the dominance of a parallel ANN algorithm over its communication time. Attention is given to both static and dynamic mapping schemes for systems with static and dynamic background workloads, as well as to experimental results obtained for simulated mappings on multicomputers with dynamic background workloads.
Trace-Driven Debugging of Message Passing Programs
NASA Technical Reports Server (NTRS)
Frumkin, Michael; Hood, Robert; Lopez, Louis; Bailey, David (Technical Monitor)
1998-01-01
In this paper we report on features added to a parallel debugger to simplify the debugging of parallel message passing programs. These features include replay, setting consistent breakpoints based on interprocess event causality, a parallel undo operation, and communication supervision. These features all use trace information collected during the execution of the program being debugged. We used a number of different instrumentation techniques to collect traces. We also implemented trace displays using two different trace visualization systems. The implementation was tested on an SGI Power Challenge cluster and a network of SGI workstations.
Visualization Co-Processing of a CFD Simulation
NASA Technical Reports Server (NTRS)
Vaziri, Arsi
1999-01-01
OVERFLOW, a widely used CFD simulation code, is combined with a visualization system, pV3, to experiment with an environment for simulation/visualization co-processing on a SGI Origin 2000 computer(O2K) system. The shared memory version of the solver is used with the O2K 'pfa' preprocessor invoked to automatically discover parallelism in the source code. No other explicit parallelism is enabled. In order to study the scaling and performance of the visualization co-processing system, sample runs are made with different processor groups in the range of 1 to 254 processors. The data exchange between the visualization system and the simulation system is rapid enough for user interactivity when the problem size is small. This shared memory version of OVERFLOW, with minimal parallelization, does not scale well to an increasing number of available processors. The visualization task takes about 18 to 30% of the total processing time and does not appear to be a major contributor to the poor scaling. Improper load balancing and inter-processor communication overhead are contributors to this poor performance. Work is in progress which is aimed at obtaining improved parallel performance of the solver and removing the limitations of serial data transfer to pV3 by examining various parallelization/communication strategies, including the use of the explicit message passing.
Gauge-free cluster variational method by maximal messages and moment matching.
Domínguez, Eduardo; Lage-Castellanos, Alejandro; Mulet, Roberto; Ricci-Tersenghi, Federico
2017-04-01
We present an implementation of the cluster variational method (CVM) as a message passing algorithm. The kind of message passing algorithm used for CVM, usually named generalized belief propagation (GBP), is a generalization of the belief propagation algorithm in the same way that CVM is a generalization of the Bethe approximation for estimating the partition function. However, the connection between fixed points of GBP and the extremal points of the CVM free energy is usually not a one-to-one correspondence because of the existence of a gauge transformation involving the GBP messages. Our contribution is twofold. First, we propose a way of defining messages (fields) in a generic CVM approximation, such that messages arrive on a given region from all its ancestors, and not only from its direct parents, as in the standard parent-to-child GBP. We call this approach maximal messages. Second, we focus on the case of binary variables, reinterpreting the messages as fields enforcing the consistency between the moments of the local (marginal) probability distributions. We provide a precise rule to enforce all consistencies, avoiding any redundancy, that would otherwise lead to a gauge transformation on the messages. This moment matching method is gauge free, i.e., it guarantees that the resulting GBP is not gauge invariant. We apply our maximal messages and moment matching GBP to obtain an analytical expression for the critical temperature of the Ising model in general dimensions at the level of plaquette CVM. The values obtained outperform Bethe estimates, and are comparable with loop corrected belief propagation equations. The method allows for a straightforward generalization to disordered systems.
Gauge-free cluster variational method by maximal messages and moment matching
NASA Astrophysics Data System (ADS)
Domínguez, Eduardo; Lage-Castellanos, Alejandro; Mulet, Roberto; Ricci-Tersenghi, Federico
2017-04-01
We present an implementation of the cluster variational method (CVM) as a message passing algorithm. The kind of message passing algorithm used for CVM, usually named generalized belief propagation (GBP), is a generalization of the belief propagation algorithm in the same way that CVM is a generalization of the Bethe approximation for estimating the partition function. However, the connection between fixed points of GBP and the extremal points of the CVM free energy is usually not a one-to-one correspondence because of the existence of a gauge transformation involving the GBP messages. Our contribution is twofold. First, we propose a way of defining messages (fields) in a generic CVM approximation, such that messages arrive on a given region from all its ancestors, and not only from its direct parents, as in the standard parent-to-child GBP. We call this approach maximal messages. Second, we focus on the case of binary variables, reinterpreting the messages as fields enforcing the consistency between the moments of the local (marginal) probability distributions. We provide a precise rule to enforce all consistencies, avoiding any redundancy, that would otherwise lead to a gauge transformation on the messages. This moment matching method is gauge free, i.e., it guarantees that the resulting GBP is not gauge invariant. We apply our maximal messages and moment matching GBP to obtain an analytical expression for the critical temperature of the Ising model in general dimensions at the level of plaquette CVM. The values obtained outperform Bethe estimates, and are comparable with loop corrected belief propagation equations. The method allows for a straightforward generalization to disordered systems.
Multiple node remote messaging
Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos
2010-08-31
A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).
Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
NASA Astrophysics Data System (ADS)
Rachmawati, D.; Budiman, M. A.; Aulya, L.
2018-02-01
Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.
Ordering Traces Logically to Identify Lateness in Message Passing Programs
Isaacs, Katherine E.; Gamblin, Todd; Bhatele, Abhinav; ...
2015-03-30
Event traces are valuable for understanding the behavior of parallel programs. However, automatically analyzing a large parallel trace is difficult, especially without a specific objective. We aid this endeavor by extracting a trace's logical structure, an ordering of trace events derived from happened-before relationships, while taking into account developer intent. Using this structure, we can calculate an operation's delay relative to its peers on other processes. The logical structure also serves as a platform for comparing and clustering processes as well as highlighting communication patterns in a trace visualization. We present an algorithm for determining this idealized logical structure frommore » traces of message passing programs, and we develop metrics to quantify delays and differences among processes. We implement our techniques in Ravel, a parallel trace visualization tool that displays both logical and physical timelines. Rather than showing the duration of each operation, we display where delays begin and end, and how they propagate. As a result, we apply our approach to the traces of several message passing applications, demonstrating the accuracy of our extracted structure and its utility in analyzing these codes.« less
Dust Dynamics in Protoplanetary Disks: Parallel Computing with PVM
NASA Astrophysics Data System (ADS)
de La Fuente Marcos, Carlos; Barge, Pierre; de La Fuente Marcos, Raúl
2002-03-01
We describe a parallel version of our high-order-accuracy particle-mesh code for the simulation of collisionless protoplanetary disks. We use this code to carry out a massively parallel, two-dimensional, time-dependent, numerical simulation, which includes dust particles, to study the potential role of large-scale, gaseous vortices in protoplanetary disks. This noncollisional problem is easy to parallelize on message-passing multicomputer architectures. We performed the simulations on a cache-coherent nonuniform memory access Origin 2000 machine, using both the parallel virtual machine (PVM) and message-passing interface (MPI) message-passing libraries. Our performance analysis suggests that, for our problem, PVM is about 25% faster than MPI. Using PVM and MPI made it possible to reduce CPU time and increase code performance. This allows for simulations with a large number of particles (N ~ 105-106) in reasonable CPU times. The performances of our implementation of the pa! rallel code on an Origin 2000 supercomputer are presented and discussed. They exhibit very good speedup behavior and low load unbalancing. Our results confirm that giant gaseous vortices can play a dominant role in giant planet formation.
TravelAid : in-vehicle signing and variable speed limit evaluation
DOT National Transportation Integrated Search
2001-12-01
This report discusses the effectiveness of using variable message signs (VMSs) and in-vehicle traffic advisory systems (IVUs) on a mountainous pass (Snoqualmie Pass on Interstate 90 in Washington State) for changing driver behavior. As part of this p...
Wilkerson, J. Michael; Iantaffi, Alex; Smolenski, Derek J.; Horvath, Keith J.; Simon Rosser, B. R.
2014-01-01
To inform HIV/STI prevention messaging, we used cross-sectional data from 1,231 MSM to examine the acceptability of strategies for delivering prevention messages in sexually explicit media (SEM). The majority of participants (83%) found it acceptable to include prevention messages in SEM. A latent profile analysis identified three classifications of men with similar views on the acceptability of strategies. Compared to men endorsing some strategies (54%), men endorsing all strategies (29%) were younger (PORadj=0.56 [0.39, 0.79]) and preferred viewing SEM in which the actors used condoms for anal sex (PORadj=1.53 [1.05, 2.23]). Men endorsing no strategies (17%) were of similar age to men endorsing some, but were more likely to prefer viewing SEM in which the actors did not use condoms (PORadj=2.44 [1.43, 4.16]) and to report engaging in insertive unprotected anal sex within the last 3 months (PORadj=2.03 [1.11, 3.70]). Opportunities exist to use SEM for HIV/STI prevention. PMID:23837809
A real-time MPEG software decoder using a portable message-passing library
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kwong, Man Kam; Tang, P.T. Peter; Lin, Biquan
1995-12-31
We present a real-time MPEG software decoder that uses message-passing libraries such as MPL, p4 and MPI. The parallel MPEG decoder currently runs on the IBM SP system but can be easil ported to other parallel machines. This paper discusses our parallel MPEG decoding algorithm as well as the parallel programming environment under which it uses. Several technical issues are discussed, including balancing of decoding speed, memory limitation, 1/0 capacities, and optimization of MPEG decoding components. This project shows that a real-time portable software MPEG decoder is feasible in a general-purpose parallel machine.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gropp, W.D.; Keyes, D.E.
1988-03-01
The authors discuss the parallel implementation of preconditioned conjugate gradient (PCG)-based domain decomposition techniques for self-adjoint elliptic partial differential equations in two dimensions on several architectures. The complexity of these methods is described on a variety of message-passing parallel computers as a function of the size of the problem, number of processors and relative communication speeds of the processors. They show that communication startups are very important, and that even the small amount of global communication in these methods can significantly reduce the performance of many message-passing architectures.
n-body simulations using message passing parallel computers.
NASA Astrophysics Data System (ADS)
Grama, A. Y.; Kumar, V.; Sameh, A.
The authors present new parallel formulations of the Barnes-Hut method for n-body simulations on message passing computers. These parallel formulations partition the domain efficiently incurring minimal communication overhead. This is in contrast to existing schemes that are based on sorting a large number of keys or on the use of global data structures. The new formulations are augmented by alternate communication strategies which serve to minimize communication overhead. The impact of these communication strategies is experimentally studied. The authors report on experimental results obtained from an astrophysical simulation on an nCUBE2 parallel computer.
Sexting Among Married Couples: Who Is Doing It, and Are They More Satisfied?
McDaniel, Brandon T; Drouin, Michelle
2015-11-01
This study examined the prevalence and correlates of sexting (i.e., sending sexual messages via mobile phones) within a sample of married/cohabiting couples (180 wives and 175 husbands). Married adults do sext each other, but it is much less common than within young adult relationships, and consists mainly of sexy or intimate talk (29% reported engaging in sexy talk with partners) rather than sexually explicit photos or videos (12% reported sending nude or nearly-nude photos). Sending sexy talk messages was positively related to relationship satisfaction only among those with high levels of avoidance, and sending sexually explicit pictures was related to satisfaction for men, and for women with high levels of attachment anxiety. Additionally, sending sexually explicit pictures was related to greater ambivalence among both men and women. These findings support and extend previous research with young adults.
Sexting Among Married Couples: Who Is Doing It, and Are They More Satisfied?
Drouin, Michelle
2015-01-01
Abstract This study examined the prevalence and correlates of sexting (i.e., sending sexual messages via mobile phones) within a sample of married/cohabiting couples (180 wives and 175 husbands). Married adults do sext each other, but it is much less common than within young adult relationships, and consists mainly of sexy or intimate talk (29% reported engaging in sexy talk with partners) rather than sexually explicit photos or videos (12% reported sending nude or nearly-nude photos). Sending sexy talk messages was positively related to relationship satisfaction only among those with high levels of avoidance, and sending sexually explicit pictures was related to satisfaction for men, and for women with high levels of attachment anxiety. Additionally, sending sexually explicit pictures was related to greater ambivalence among both men and women. These findings support and extend previous research with young adults. PMID:26484980
Parallel, Distributed Scripting with Python
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, P J
2002-05-24
Parallel computers used to be, for the most part, one-of-a-kind systems which were extremely difficult to program portably. With SMP architectures, the advent of the POSIX thread API and OpenMP gave developers ways to portably exploit on-the-box shared memory parallelism. Since these architectures didn't scale cost-effectively, distributed memory clusters were developed. The associated MPI message passing libraries gave these systems a portable paradigm too. Having programmers effectively use this paradigm is a somewhat different question. Distributed data has to be explicitly transported via the messaging system in order for it to be useful. In high level languages, the MPI librarymore » gives access to data distribution routines in C, C++, and FORTRAN. But we need more than that. Many reasonable and common tasks are best done in (or as extensions to) scripting languages. Consider sysadm tools such as password crackers, file purgers, etc ... These are simple to write in a scripting language such as Python (an open source, portable, and freely available interpreter). But these tasks beg to be done in parallel. Consider the a password checker that checks an encrypted password against a 25,000 word dictionary. This can take around 10 seconds in Python (6 seconds in C). It is trivial to parallelize if you can distribute the information and co-ordinate the work.« less
Teens Share Sexually Explicit Messages: Simple Rebellion or Dangerous Behavior?
ERIC Educational Resources Information Center
Curriculum Review, 2009
2009-01-01
An increasingly popular form of communication among teenagers is "sexting," sending nude photos via text messaging, reported The Orange County Register (3/20/09). This "flirtation" technique has sparked quite a bit of debate: is this simply a form of rebellion or is it dangerous behavior that could have adverse penalties? Although many teens say…
NASA Astrophysics Data System (ADS)
Bellerby, Tim
2015-04-01
PM (Parallel Models) is a new parallel programming language specifically designed for writing environmental and geophysical models. The language is intended to enable implementers to concentrate on the science behind the model rather than the details of running on parallel hardware. At the same time PM leaves the programmer in control - all parallelisation is explicit and the parallel structure of any given program may be deduced directly from the code. This paper describes a PM implementation based on the Message Passing Interface (MPI) and Open Multi-Processing (OpenMP) standards, looking at issues involved with translating the PM parallelisation model to MPI/OpenMP protocols and considering performance in terms of the competing factors of finer-grained parallelisation and increased communication overhead. In order to maximise portability, the implementation stays within the MPI 1.3 standard as much as possible, with MPI-2 MPI-IO file handling the only significant exception. Moreover, it does not assume a thread-safe implementation of MPI. PM adopts a two-tier abstract representation of parallel hardware. A PM processor is a conceptual unit capable of efficiently executing a set of language tasks, with a complete parallel system consisting of an abstract N-dimensional array of such processors. PM processors may map to single cores executing tasks using cooperative multi-tasking, to multiple cores or even to separate processing nodes, efficiently sharing tasks using algorithms such as work stealing. While tasks may move between hardware elements within a PM processor, they may not move between processors without specific programmer intervention. Tasks are assigned to processors using a nested parallelism approach, building on ideas from Reyes et al. (2009). The main program owns all available processors. When the program enters a parallel statement then either processors are divided out among the newly generated tasks (number of new tasks < number of processors) or tasks are divided out among the available processors (number of tasks > number of processors). Nested parallel statements may further subdivide the processor set owned by a given task. Tasks or processors are distributed evenly by default, but uneven distributions are possible under programmer control. It is also possible to explicitly enable child tasks to migrate within the processor set owned by their parent task, reducing load unbalancing at the potential cost of increased inter-processor message traffic. PM incorporates some programming structures from the earlier MIST language presented at a previous EGU General Assembly, while adopting a significantly different underlying parallelisation model and type system. PM code is available at www.pm-lang.org under an unrestrictive MIT license. Reference Ruymán Reyes, Antonio J. Dorta, Francisco Almeida, Francisco de Sande, 2009. Automatic Hybrid MPI+OpenMP Code Generation with llc, Recent Advances in Parallel Virtual Machine and Message Passing Interface, Lecture Notes in Computer Science Volume 5759, 185-195
Parallel Computing of Upwelling in a Rotating Stratified Flow
NASA Astrophysics Data System (ADS)
Cui, A.; Street, R. L.
1997-11-01
A code for the three-dimensional, unsteady, incompressible, and turbulent flow has been implemented on the IBM SP2, using message passing. The effects of rotation and variable density are included. A finite volume method is used to discretize the Navier-Stokes equations in general curvilinear coordinates on a non-staggered grid. All the spatial derivatives are approximated using second-order central differences with the exception of the convection terms, which are handled with special upwind-difference schemes. The semi-implicit, second-order accurate, time-advancement scheme employs the Adams-Bashforth method for the explicit terms and Crank-Nicolson for the implicit terms. A multigrid method, with the four-color ZEBRA as smoother, is used to solve the Poisson equation for pressure, while the momentum equations are solved with an approximate factorization technique. The code was successfully validated for a variety test cases. Simulations of a laboratory model of coastal upwelling in a rotating annulus are in progress and will be presented.
Spectral Element Method for the Simulation of Unsteady Compressible Flows
NASA Technical Reports Server (NTRS)
Diosady, Laslo Tibor; Murman, Scott M.
2013-01-01
This work uses a discontinuous-Galerkin spectral-element method (DGSEM) to solve the compressible Navier-Stokes equations [1{3]. The inviscid ux is computed using the approximate Riemann solver of Roe [4]. The viscous fluxes are computed using the second form of Bassi and Rebay (BR2) [5] in a manner consistent with the spectral-element approximation. The method of lines with the classical 4th-order explicit Runge-Kutta scheme is used for time integration. Results for polynomial orders up to p = 15 (16th order) are presented. The code is parallelized using the Message Passing Interface (MPI). The computations presented in this work are performed using the Sandy Bridge nodes of the NASA Pleiades supercomputer at NASA Ames Research Center. Each Sandy Bridge node consists of 2 eight-core Intel Xeon E5-2670 processors with a clock speed of 2.6Ghz and 2GB per core memory. On a Sandy Bridge node the Tau Benchmark [6] runs in a time of 7.6s.
Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis
NASA Technical Reports Server (NTRS)
Wang, Yi-Min
1993-01-01
Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.
ERIC Educational Resources Information Center
Flowers, Arthur; Crandell, Edwin W.
Three auditory perceptual processes (resistance to distortion, selective listening in the form of auditory dedifferentiation, and binaural synthesis) were evaluated by five assessment techniques: (1) low pass filtered speech, (2) accelerated speech, (3) competing messages, (4) accelerated plus competing messages, and (5) binaural synthesis.…
Quantum cluster variational method and message passing algorithms revisited
NASA Astrophysics Data System (ADS)
Domínguez, E.; Mulet, Roberto
2018-02-01
We present a general framework to study quantum disordered systems in the context of the Kikuchi's cluster variational method (CVM). The method relies in the solution of message passing-like equations for single instances or in the iterative solution of complex population dynamic algorithms for an average case scenario. We first show how a standard application of the Kikuchi's CVM can be easily translated to message passing equations for specific instances of the disordered system. We then present an "ad hoc" extension of these equations to a population dynamic algorithm representing an average case scenario. At the Bethe level, these equations are equivalent to the dynamic population equations that can be derived from a proper cavity ansatz. However, at the plaquette approximation, the interpretation is more subtle and we discuss it taking also into account previous results in classical disordered models. Moreover, we develop a formalism to properly deal with the average case scenario using a replica-symmetric ansatz within this CVM for quantum disordered systems. Finally, we present and discuss numerical solutions of the different approximations for the quantum transverse Ising model and the quantum random field Ising model in two-dimensional lattices.
Albery, Ian P; Frings, Daniel
2017-01-01
Introduction Since the advent of e-cigarettes, e-cigarette advertising has escalated and companies are able to use marketing strategies that are not permissible for tobacco products. Research into the effect of e-cigarette advertising on attitudes towards tobacco and e-cigarettes is in its infancy. To date, no research has compared indirect (implicit) measures of attitude towards e-cigarettes with direct (explicit) measures. Furthermore, little consideration has been given to how viewing online advertisements may have an effect on attitudes towards e-cigarettes or how positive attitudes to e-cigarettes may undermine antismoking public health messages. The objectives of this study are to investigate (1) the relationship between explicit and implicit attitudes towards tobacco and e-cigarettes, (2) the effect of e-cigarette advertising on these attitudes and (3) the effect of these attitudes on the efficacy of antismoking health messages. Methods and analysis In experiment 1 an analysis of covariance will be conducted to determine whether viewing an e-cigarette advertisement, compared with a neutral image, has an effect on implicit or explicit attitudes towards tobacco and e-cigarettes, and if these attitudes differ between smokers, vapers and non-smokers aged 18 - 25 years. In experiment 2, moderation analysis will be conducted to assess whether attitudes towards e-cigarettes moderate the psychological efficacy of antismoking health messages in participants aged 18–65 years. In each experiment, attitudes will be measured preintervention and postintervention and 1 week later (n=150) in participants who are smokers (n=50), vapers (n=50) or non-smokers (n=50). Ethics and dissemination Approval for this study has been given by the London South Bank University’s (LSBU) Research Ethics Committee. The findings of these studies will be submitted for publication and disseminated via conferences. The results will be integrated into course provision for practitioners training at LSBU. PMID:28645957
Metamodelling Messages Conveyed in Five Statistical Mechanical Textbooks from 1936 to 2001
ERIC Educational Resources Information Center
Niss, Martin
2009-01-01
Modelling is a significant aspect of doing physics and it is important how this activity is taught. This paper focuses on the explicit or implicit messages about modelling conveyed to the student in the treatments of phase transitions in statistical mechanics textbooks at beginning graduate level. Five textbooks from the 1930s to the present are…
Asbestos: Securing Untrusted Software with Interposition
2005-09-01
consistent intelligible interfaces to different types of resource. Message-based operating systems, such as Accent, Amoeba, Chorus, L4 , Spring...control on self-authenticating capabilities, precluding policies that restrict delegation. L4 uses a strict hierarchy of interpositions, useful for...the OS de- sign space amenable to secure application construction. Similar effects might be possible with message-passing microkernels , or unwieldy
Sexting and sexual behavior in at-risk adolescents.
Houck, Christopher D; Barker, David; Rizzo, Christie; Hancock, Evan; Norton, Alicia; Brown, Larry K
2014-02-01
This study aimed to examine the prevalence of sexting behaviors (sexually explicit messages and/or pictures) among an at-risk sample of early adolescents as well as the associations between sexting behaviors and sexual behaviors, risk-related cognitions, and emotional regulation skills. It also aimed to determine whether differences in risk were associated with text-based versus photo-based sexts. Seventh-grade adolescents participating in a sexual risk prevention trial for at-risk early adolescents completed a computer-based survey at baseline regarding sexting behavior (having sent sexually explicit messages and/or pictures), sexual activities, intentions to have sex, perceived approval of sexual activity, and emotional regulation skills. Twenty-two percent of the sample reported having sexted in the past 6 months; sexual messages were endorsed by 17% (n = 71), sexual messages and photos by 5% (n = 21). Pictures were endorsed significantly more often by females (χ(2)[2] = 7.33, P = .03) and Latinos (χ(2)[2] = 7.27, P = .03). Sexting of any kind was associated with higher rates of engaging in a variety of sexual behaviors, and sending photos was associated with higher rates of sexual activity than sending text messages only. This was true for a range of behaviors from touching genitals over clothes (odds ratio [OR] = 1.98, P = .03) to oral sex (OR = 2.66, P < .01) to vaginal sex (OR = 2.23, P < .01). Sexting behavior (both photo and text messages) was not uncommon among middle school youth and co-occurred with sexual behavior. These data suggest that phone behaviors, even flirtatious messages, may be an indicator of risk. Clinicians, parents, and health programs should discuss sexting with early adolescents.
Sexting and Sexual Behavior in At-Risk Adolescents
Barker, David; Rizzo, Christie; Hancock, Evan; Norton, Alicia; Brown, Larry K.
2014-01-01
OBJECTIVES: This study aimed to examine the prevalence of sexting behaviors (sexually explicit messages and/or pictures) among an at-risk sample of early adolescents as well as the associations between sexting behaviors and sexual behaviors, risk-related cognitions, and emotional regulation skills. It also aimed to determine whether differences in risk were associated with text-based versus photo-based sexts. METHODS: Seventh-grade adolescents participating in a sexual risk prevention trial for at-risk early adolescents completed a computer-based survey at baseline regarding sexting behavior (having sent sexually explicit messages and/or pictures), sexual activities, intentions to have sex, perceived approval of sexual activity, and emotional regulation skills. RESULTS: Twenty-two percent of the sample reported having sexted in the past 6 months; sexual messages were endorsed by 17% (n = 71), sexual messages and photos by 5% (n = 21). Pictures were endorsed significantly more often by females (χ2[2] = 7.33, P = .03) and Latinos (χ2[2] = 7.27, P = .03). Sexting of any kind was associated with higher rates of engaging in a variety of sexual behaviors, and sending photos was associated with higher rates of sexual activity than sending text messages only. This was true for a range of behaviors from touching genitals over clothes (odds ratio [OR] = 1.98, P = .03) to oral sex (OR = 2.66, P < .01) to vaginal sex (OR = 2.23, P < .01). CONCLUSIONS: Sexting behavior (both photo and text messages) was not uncommon among middle school youth and co-occurred with sexual behavior. These data suggest that phone behaviors, even flirtatious messages, may be an indicator of risk. Clinicians, parents, and health programs should discuss sexting with early adolescents. PMID:24394678
Performance Evaluation of Remote Memory Access (RMA) Programming on Shared Memory Parallel Computers
NASA Technical Reports Server (NTRS)
Jin, Hao-Qiang; Jost, Gabriele; Biegel, Bryan A. (Technical Monitor)
2002-01-01
The purpose of this study is to evaluate the feasibility of remote memory access (RMA) programming on shared memory parallel computers. We discuss different RMA based implementations of selected CFD application benchmark kernels and compare them to corresponding message passing based codes. For the message-passing implementation we use MPI point-to-point and global communication routines. For the RMA based approach we consider two different libraries supporting this programming model. One is a shared memory parallelization library (SMPlib) developed at NASA Ames, the other is the MPI-2 extensions to the MPI Standard. We give timing comparisons for the different implementation strategies and discuss the performance.
Comparing the OpenMP, MPI, and Hybrid Programming Paradigm on an SMP Cluster
NASA Technical Reports Server (NTRS)
Jost, Gabriele; Jin, Hao-Qiang; anMey, Dieter; Hatay, Ferhat F.
2003-01-01
Clusters of SMP (Symmetric Multi-Processors) nodes provide support for a wide range of parallel programming paradigms. The shared address space within each node is suitable for OpenMP parallelization. Message passing can be employed within and across the nodes of a cluster. Multiple levels of parallelism can be achieved by combining message passing and OpenMP parallelization. Which programming paradigm is the best will depend on the nature of the given problem, the hardware components of the cluster, the network, and the available software. In this study we compare the performance of different implementations of the same CFD benchmark application, using the same numerical algorithm but employing different programming paradigms.
ADAPTIVE TETRAHEDRAL GRID REFINEMENT AND COARSENING IN MESSAGE-PASSING ENVIRONMENTS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hallberg, J.; Stagg, A.
2000-10-01
A grid refinement and coarsening scheme has been developed for tetrahedral and triangular grid-based calculations in message-passing environments. The element adaption scheme is based on an edge bisection of elements marked for refinement by an appropriate error indicator. Hash-table/linked-list data structures are used to store nodal and element formation. The grid along inter-processor boundaries is refined and coarsened consistently with the update of these data structures via MPI calls. The parallel adaption scheme has been applied to the solution of a transient, three-dimensional, nonlinear, groundwater flow problem. Timings indicate efficiency of the grid refinement process relative to the flow solvermore » calculations.« less
Montagne, Michael
2011-01-01
Messages posted on the MSN Health message board in response to a news story reporting that antidepressant medications are placebos were examined. Over 37 days, 1,624 messages were posted by 1,238 unique authors. The sampling unit consisted of 960 authors who were users. Users' messages were gathered in real time and content analyzed. Few users explicitly responded to the question posed in the article: 2.5% of the users stated their antidepressant was a miracle drug, 2.0% stated it was a poison, and only 0.2% stated it was a placebo. Users reported positive experiences with antidepressants more than twice as often as they reported negative experiences. Copyright © 2011 Informa Healthcare USA, Inc.
Rodham, Karen; McCabe, Candy; Blake, David
2009-07-01
In this article, we report on the findings of a qualitative inquiry into how an online message board for people who have Complex Regional Pain Syndrome (CRPS) was used by its members. All messages (and responses) posted on the CRPS message board over a 4-month period were collected retrospectively. The data were analysed using the method of Interpretative Phenomenological Analysis. Members used the message board to seek (and provide) support to those with CRPS, and also to express their emotions, feelings and experiences linked to their condition. The message board provided an important source of support for a patient group that can otherwise become isolated as a result of their mobility problems. Furthermore, the analysis revealed the unrealistic hopes that patients can hold concerning the anticipated outcomes of their treatment. This is an important issue for healthcare professionals to explicitly address when interacting with the patient group.
NASA Astrophysics Data System (ADS)
Huang, Haiping
2017-05-01
Revealing hidden features in unlabeled data is called unsupervised feature learning, which plays an important role in pretraining a deep neural network. Here we provide a statistical mechanics analysis of the unsupervised learning in a restricted Boltzmann machine with binary synapses. A message passing equation to infer the hidden feature is derived, and furthermore, variants of this equation are analyzed. A statistical analysis by replica theory describes the thermodynamic properties of the model. Our analysis confirms an entropy crisis preceding the non-convergence of the message passing equation, suggesting a discontinuous phase transition as a key characteristic of the restricted Boltzmann machine. Continuous phase transition is also confirmed depending on the embedded feature strength in the data. The mean-field result under the replica symmetric assumption agrees with that obtained by running message passing algorithms on single instances of finite sizes. Interestingly, in an approximate Hopfield model, the entropy crisis is absent, and a continuous phase transition is observed instead. We also develop an iterative equation to infer the hyper-parameter (temperature) hidden in the data, which in physics corresponds to iteratively imposing Nishimori condition. Our study provides insights towards understanding the thermodynamic properties of the restricted Boltzmann machine learning, and moreover important theoretical basis to build simplified deep networks.
Principles for problem aggregation and assignment in medium scale multiprocessors
NASA Technical Reports Server (NTRS)
Nicol, David M.; Saltz, Joel H.
1987-01-01
One of the most important issues in parallel processing is the mapping of workload to processors. This paper considers a large class of problems having a high degree of potential fine grained parallelism, and execution requirements that are either not predictable, or are too costly to predict. The main issues in mapping such a problem onto medium scale multiprocessors are those of aggregation and assignment. We study a method of parameterized aggregation that makes few assumptions about the workload. The mapping of aggregate units of work onto processors is uniform, and exploits locality of workload intensity to balance the unknown workload. In general, a finer aggregate granularity leads to a better balance at the price of increased communication/synchronization costs; the aggregation parameters can be adjusted to find a reasonable granularity. The effectiveness of this scheme is demonstrated on three model problems: an adaptive one-dimensional fluid dynamics problem with message passing, a sparse triangular linear system solver on both a shared memory and a message-passing machine, and a two-dimensional time-driven battlefield simulation employing message passing. Using the model problems, the tradeoffs are studied between balanced workload and the communication/synchronization costs. Finally, an analytical model is used to explain why the method balances workload and minimizes the variance in system behavior.
Single Sided Messaging v. 0.6.6
DOE Office of Scientific and Technical Information (OSTI.GOV)
Curry, Matthew Leon; Farmer, Matthew Shane; Hassani, Amin
Single-Sided Messaging (SSM) is a portable, multitransport networking library that enables applications to leverage potential one-sided capabilities of underlying network transports. It also provides desirable semantics that services for highperformance, massively parallel computers can leverage, such as an explicit cancel operation for pending transmissions, as well as enhanced matching semantics favoring large numbers of buffers attached to a single match entry. This release supports TCP/IP, shared memory, and Infiniband.
Vetter, Jeffrey S.
2005-02-01
The method and system described herein presents a technique for performance analysis that helps users understand the communication behavior of their message passing applications. The method and system described herein may automatically classifies individual communication operations and reveal the cause of communication inefficiencies in the application. This classification allows the developer to quickly focus on the culprits of truly inefficient behavior, rather than manually foraging through massive amounts of performance data. Specifically, the method and system described herein trace the message operations of Message Passing Interface (MPI) applications and then classify each individual communication event using a supervised learning technique: decision tree classification. The decision tree may be trained using microbenchmarks that demonstrate both efficient and inefficient communication. Since the method and system described herein adapt to the target system's configuration through these microbenchmarks, they simultaneously automate the performance analysis process and improve classification accuracy. The method and system described herein may improve the accuracy of performance analysis and dramatically reduce the amount of data that users must encounter.
Vosbergen, Sandra; Peek, Niels; Mulder-Wiggers, Johanna MR; Kemps, Hareld MC; Kraaijenhagen, Roderik A; Jaspers, Monique WM; Lacroix, Joyca PW
2014-01-01
Objective To evaluate patients’ preferences for message features and assess their relationships with health literacy, monitor–blunter coping style, and other patient-dependent characteristics. Methods Patients with coronary heart disease completed an internet-based survey, which assessed health literacy and monitor–blunter coping style, as well as various other patient characteristics such as sociodemographics, disease history, and explicit information preferences. To assess preferences for message features, nine text sets differing in one of nine message features were composed, and participants were asked to state their preferences. Results The survey was completed by 213 patients. For three of the nine text sets, a relationship was found between patient preference and health literacy or monitor–blunter coping style. Patients with low health literacy preferred the text based on patient experience. Patients with a monitoring coping style preferred information on short-term effects of their treatment and mentioning of explicit risks. Various other patient characteristics such as marital status, social support, disease history, and age also showed a strong association. Conclusion Individual differences exist in patients’ preferences for message features, and these preferences relate to patient characteristics such as health literacy and monitor–blunter coping style. PMID:24851044
2013-08-20
Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: Looking southwest over northern Africa. Libya, Algeria, Niger.
Approximate message passing with restricted Boltzmann machine priors
NASA Astrophysics Data System (ADS)
Tramel, Eric W.; Drémeau, Angélique; Krzakala, Florent
2016-07-01
Approximate message passing (AMP) has been shown to be an excellent statistical approach to signal inference and compressed sensing problems. The AMP framework provides modularity in the choice of signal prior; here we propose a hierarchical form of the Gauss-Bernoulli prior which utilizes a restricted Boltzmann machine (RBM) trained on the signal support to push reconstruction performance beyond that of simple i.i.d. priors for signals whose support can be well represented by a trained binary RBM. We present and analyze two methods of RBM factorization and demonstrate how these affect signal reconstruction performance within our proposed algorithm. Finally, using the MNIST handwritten digit dataset, we show experimentally that using an RBM allows AMP to approach oracle-support performance.
New NAS Parallel Benchmarks Results
NASA Technical Reports Server (NTRS)
Yarrow, Maurice; Saphir, William; VanderWijngaart, Rob; Woo, Alex; Kutler, Paul (Technical Monitor)
1997-01-01
NPB2 (NAS (NASA Advanced Supercomputing) Parallel Benchmarks 2) is an implementation, based on Fortran and the MPI (message passing interface) message passing standard, of the original NAS Parallel Benchmark specifications. NPB2 programs are run with little or no tuning, in contrast to NPB vendor implementations, which are highly optimized for specific architectures. NPB2 results complement, rather than replace, NPB results. Because they have not been optimized by vendors, NPB2 implementations approximate the performance a typical user can expect for a portable parallel program on distributed memory parallel computers. Together these results provide an insightful comparison of the real-world performance of high-performance computers. New NPB2 features: New implementation (CG), new workstation class problem sizes, new serial sample versions, more performance statistics.
Booth, Paula; Albery, Ian P; Frings, Daniel
2017-06-23
Since the advent of e-cigarettes, e-cigarette advertising has escalated and companies are able to use marketing strategies that are not permissible for tobacco products. Research into the effect of e-cigarette advertising on attitudes towards tobacco and e-cigarettes is in its infancy. To date, no research has compared indirect (implicit) measures of attitude towards e-cigarettes with direct (explicit) measures. Furthermore, little consideration has been given to how viewing online advertisements may have an effect on attitudes towards e-cigarettes or how positive attitudes to e-cigarettes may undermine antismoking public health messages. The objectives of this study are to investigate (1) the relationship between explicit and implicit attitudes towards tobacco and e-cigarettes, (2) the effect of e-cigarette advertising on these attitudes and (3) the effect of these attitudes on the efficacy of antismoking health messages. In experiment 1 an analysis of covariance will be conducted to determine whether viewing an e-cigarette advertisement, compared with a neutral image, has an effect on implicit or explicit attitudes towards tobacco and e-cigarettes, and if these attitudes differ between smokers, vapers and non-smokers aged 18 - 25 years. In experiment 2, moderation analysis will be conducted to assess whether attitudes towards e-cigarettes moderate the psychological efficacy of antismoking health messages in participants aged 18-65 years. In each experiment, attitudes will be measured preintervention and postintervention and 1 week later (n=150) in participants who are smokers (n=50), vapers (n=50) or non-smokers (n=50). Approval for this study has been given by the London South Bank University's (LSBU) Research Ethics Committee. The findings of these studies will be submitted for publication and disseminated via conferences. The results will be integrated into course provision for practitioners training at LSBU. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Passing messages between biological networks to refine predicted interactions.
Glass, Kimberly; Huttenhower, Curtis; Quackenbush, John; Yuan, Guo-Cheng
2013-01-01
Regulatory network reconstruction is a fundamental problem in computational biology. There are significant limitations to such reconstruction using individual datasets, and increasingly people attempt to construct networks using multiple, independent datasets obtained from complementary sources, but methods for this integration are lacking. We developed PANDA (Passing Attributes between Networks for Data Assimilation), a message-passing model using multiple sources of information to predict regulatory relationships, and used it to integrate protein-protein interaction, gene expression, and sequence motif data to reconstruct genome-wide, condition-specific regulatory networks in yeast as a model. The resulting networks were not only more accurate than those produced using individual data sets and other existing methods, but they also captured information regarding specific biological mechanisms and pathways that were missed using other methodologies. PANDA is scalable to higher eukaryotes, applicable to specific tissue or cell type data and conceptually generalizable to include a variety of regulatory, interaction, expression, and other genome-scale data. An implementation of the PANDA algorithm is available at www.sourceforge.net/projects/panda-net.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Procassini, R.J.
1997-12-31
The fine-scale, multi-space resolution that is envisioned for accurate simulations of complex weapons systems in three spatial dimensions implies flop-rate and memory-storage requirements that will only be obtained in the near future through the use of parallel computational techniques. Since the Monte Carlo transport models in these simulations usually stress both of these computational resources, they are prime candidates for parallelization. The MONACO Monte Carlo transport package, which is currently under development at LLNL, will utilize two types of parallelism within the context of a multi-physics design code: decomposition of the spatial domain across processors (spatial parallelism) and distribution ofmore » particles in a given spatial subdomain across additional processors (particle parallelism). This implementation of the package will utilize explicit data communication between domains (message passing). Such a parallel implementation of a Monte Carlo transport model will result in non-deterministic communication patterns. The communication of particles between subdomains during a Monte Carlo time step may require a significant level of effort to achieve a high parallel efficiency.« less
Roofline model toolkit: A practical tool for architectural and program analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lo, Yu Jung; Williams, Samuel; Van Straalen, Brian
We present preliminary results of the Roofline Toolkit for multicore, many core, and accelerated architectures. This paper focuses on the processor architecture characterization engine, a collection of portable instrumented micro benchmarks implemented with Message Passing Interface (MPI), and OpenMP used to express thread-level parallelism. These benchmarks are specialized to quantify the behavior of different architectural features. Compared to previous work on performance characterization, these microbenchmarks focus on capturing the performance of each level of the memory hierarchy, along with thread-level parallelism, instruction-level parallelism and explicit SIMD parallelism, measured in the context of the compilers and run-time environments. We also measuremore » sustained PCIe throughput with four GPU memory managed mechanisms. By combining results from the architecture characterization with the Roofline model based solely on architectural specifications, this work offers insights for performance prediction of current and future architectures and their software systems. To that end, we instrument three applications and plot their resultant performance on the corresponding Roofline model when run on a Blue Gene/Q architecture.« less
Dewaraja, Yuni K; Ljungberg, Michael; Majumdar, Amitava; Bose, Abhijit; Koral, Kenneth F
2002-02-01
This paper reports the implementation of the SIMIND Monte Carlo code on an IBM SP2 distributed memory parallel computer. Basic aspects of running Monte Carlo particle transport calculations on parallel architectures are described. Our parallelization is based on equally partitioning photons among the processors and uses the Message Passing Interface (MPI) library for interprocessor communication and the Scalable Parallel Random Number Generator (SPRNG) to generate uncorrelated random number streams. These parallelization techniques are also applicable to other distributed memory architectures. A linear increase in computing speed with the number of processors is demonstrated for up to 32 processors. This speed-up is especially significant in Single Photon Emission Computed Tomography (SPECT) simulations involving higher energy photon emitters, where explicit modeling of the phantom and collimator is required. For (131)I, the accuracy of the parallel code is demonstrated by comparing simulated and experimental SPECT images from a heart/thorax phantom. Clinically realistic SPECT simulations using the voxel-man phantom are carried out to assess scatter and attenuation correction.
Earth observation taken by the Expedition 46 crew
2016-01-23
ISS046e021993 (01/23/2016) --- Earth observation of the coast of Oman taken during a night pass by the Expedition 46 crew aboard the International Space Station. NASA astronaut Tim Kopra tweeted this image out with this message: "Passing over the Gulf of #Oman at night -- city lights of #Muscat #Dubai #AbuDhabi and #Doha in the distance".
Rochat, Philippe; Tone, Erin B.; Baron, Andrew S.
2017-01-01
Implicit intergroup bias emerges early in development, are typically pro-ingroup, and remain stable across the lifespan. Such findings have been interpreted in terms of an automatic ingroup bias similar to what is observed with minimal groups paradigms. These studies are typically conducted with groups of high cultural standing (e.g., Caucasians in North America and Europe). Research conducted among culturally lower status groups (e.g., African-Americans, Latino-Americans) reveals a notable absence of an implicit ingroup bias. Understanding the environmental factors that contribute to the absence of an implicit ingroup bias among people from culturally lower status groups is critical for advancing theories of implicit intergroup cognition. The present study aimed to elucidate the factors that shape racial group bias among African-American children and young adults by examining their relationship with age, school composition (predominantly Black schools or racially mixed schools), parental racial attitudes and socialization messages among African-American children (N = 86) and young adults (N = 130). Age, school-type and parents’ racial socialization messages were all found to be related to the strength of pro-Black (ingroup) bias. We also found that relationships between implicit and explicit bias and frequency of parents' racial socialization messages depended on the type of school participants attended. Our results highlight the importance of considering environmental factors in shaping the magnitude and direction of implicit and explicit race bias among African-Americans rather than treating them as a monolithic group. PMID:28957353
Cohen, Elizabeth L
2010-12-01
The decision to become an organ donor involves considering both self-relevant risks and the needs of others. This study applied prospect theory to examine how news exemplar message frames that focus on the possible survival or death of a potential organ transplant recipient affect participants' willingness to become organ donors. Perceived personal risk and ambivalence were examined as moderating variables. Results indicate that risk, rather than ambivalence, played an instrumental role in participants' decisions to donate. Although no main effects or interactions related to message frame emerged in initial analyses, a supplemental analysis revealed an interaction such that there was a modest persuasive advantage for the loss-framed message among low-risk participants. Findings suggest that vivid exemplar message frames, compared to other types of more explicit organ donor appeals, may be associated with unique decisions about organ donation.
2013-08-03
Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: Perhaps a dandelion losing its seeds in the wind? Love clouds!
Paralysis is the loss of muscle function in part of your body. It happens when something goes ... way messages pass between your brain and muscles. Paralysis can be complete or partial. It can occur ...
Advanced Numerical Techniques of Performance Evaluation. Volume 2
1990-06-01
multiprocessor environment. This factor is determined by the overhead of the primitives available in the system ( semaphore , monitor , or message... semaphore , monitor , or message passing primitives ) and U the programming ability of the user who implements the simulation. " t,: the sequential...Warp Operating System . i Pro" lftevcnth ACM Symposum on Operating Systems Princlplcs, pages 77 9:3, Auslin, TX, Nov wicr 1987. ACM. [121 D.R. Jefferson
Benchmarking hypercube hardware and software
NASA Technical Reports Server (NTRS)
Grunwald, Dirk C.; Reed, Daniel A.
1986-01-01
It was long a truism in computer systems design that balanced systems achieve the best performance. Message passing parallel processors are no different. To quantify the balance of a hypercube design, an experimental methodology was developed and the associated suite of benchmarks was applied to several existing hypercubes. The benchmark suite includes tests of both processor speed in the absence of internode communication and message transmission speed as a function of communication patterns.
Data transfer using complete bipartite graph
NASA Astrophysics Data System (ADS)
Chandrasekaran, V. M.; Praba, B.; Manimaran, A.; Kailash, G.
2017-11-01
Information exchange extent is an estimation of the amount of information sent between two focuses on a framework in a given time period. It is an extremely significant perception in present world. There are many ways of message passing in the present situations. Some of them are through encryption, decryption, by using complete bipartite graph. In this paper, we recommend a method for communication using messages through encryption of a complete bipartite graph.
Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks
Lim, Chiwoo; Kim, Sang-Hyo
2018-01-01
In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA), is proposed for peer discovery of distributed device-to-device (D2D) communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR). The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA)-based discovery. PMID:29673167
Statistical physics of hard combinatorial optimization: Vertex cover problem
NASA Astrophysics Data System (ADS)
Zhao, Jin-Hua; Zhou, Hai-Jun
2014-07-01
Typical-case computation complexity is a research topic at the boundary of computer science, applied mathematics, and statistical physics. In the last twenty years, the replica-symmetry-breaking mean field theory of spin glasses and the associated message-passing algorithms have greatly deepened our understanding of typical-case computation complexity. In this paper, we use the vertex cover problem, a basic nondeterministic-polynomial (NP)-complete combinatorial optimization problem of wide application, as an example to introduce the statistical physical methods and algorithms. We do not go into the technical details but emphasize mainly the intuitive physical meanings of the message-passing equations. A nonfamiliar reader shall be able to understand to a large extent the physics behind the mean field approaches and to adjust the mean field methods in solving other optimization problems.
Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks.
Lim, Chiwoo; Jang, Min; Kim, Sang-Hyo
2018-04-17
In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA), is proposed for peer discovery of distributed device-to-device (D2D) communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR). The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA)-based discovery.
Moghadasi, Mohammad; Kozakov, Dima; Mamonov, Artem B.; Vakili, Pirooz; Vajda, Sandor; Paschalidis, Ioannis Ch.
2013-01-01
We introduce a message-passing algorithm to solve the Side Chain Positioning (SCP) problem. SCP is a crucial component of protein docking refinement, which is a key step of an important class of problems in computational structural biology called protein docking. We model SCP as a combinatorial optimization problem and formulate it as a Maximum Weighted Independent Set (MWIS) problem. We then employ a modified and convergent belief-propagation algorithm to solve a relaxation of MWIS and develop randomized estimation heuristics that use the relaxed solution to obtain an effective MWIS feasible solution. Using a benchmark set of protein complexes we demonstrate that our approach leads to more accurate docking predictions compared to a baseline algorithm that does not solve the SCP. PMID:23515575
Multi-partitioning for ADI-schemes on message passing architectures
NASA Technical Reports Server (NTRS)
Vanderwijngaart, Rob F.
1994-01-01
A kind of discrete-operator splitting called Alternating Direction Implicit (ADI) has been found to be useful in simulating fluid flow problems. In particular, it is being used to study the effects of hot exhaust jets from high performance aircraft on landing surfaces. Decomposition techniques that minimize load imbalance and message-passing frequency are described. Three strategies that are investigated for implementing the NAS Scalar Penta-diagonal Parallel Benchmark (SP) are transposition, pipelined Gaussian elimination, and multipartitioning. The multipartitioning strategy, which was used on Ethernet, was found to be the most efficient, although it was considered only a moderate success because of Ethernet's limited communication properties. The efficiency derived largely from the coarse granularity of the strategy, which reduced latencies and allowed overlap of communication and computation.
Parallel and fault-tolerant algorithms for hypercube multiprocessors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aykanat, C.
1988-01-01
Several techniques for increasing the performance of parallel algorithms on distributed-memory message-passing multi-processor systems are investigated. These techniques are effectively implemented for the parallelization of the Scaled Conjugate Gradient (SCG) algorithm on a hypercube connected message-passing multi-processor. Significant performance improvement is achieved by using these techniques. The SCG algorithm is used for the solution phase of an FE modeling system. Almost linear speed-up is achieved, and it is shown that hypercube topology is scalable for an FE class of problem. The SCG algorithm is also shown to be suitable for vectorization, and near supercomputer performance is achieved on a vectormore » hypercube multiprocessor by exploiting both parallelization and vectorization. Fault-tolerance issues for the parallel SCG algorithm and for the hypercube topology are also addressed.« less
Ultrascalable petaflop parallel supercomputer
Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Chiu, George [Cross River, NY; Cipolla, Thomas M [Katonah, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Hall, Shawn [Pleasantville, NY; Haring, Rudolf A [Cortlandt Manor, NY; Heidelberger, Philip [Cortlandt Manor, NY; Kopcsay, Gerard V [Yorktown Heights, NY; Ohmacht, Martin [Yorktown Heights, NY; Salapura, Valentina [Chappaqua, NY; Sugavanam, Krishnan [Mahopac, NY; Takken, Todd [Brewster, NY
2010-07-20
A massively parallel supercomputer of petaOPS-scale includes node architectures based upon System-On-a-Chip technology, where each processing node comprises a single Application Specific Integrated Circuit (ASIC) having up to four processing elements. The ASIC nodes are interconnected by multiple independent networks that optimally maximize the throughput of packet communications between nodes with minimal latency. The multiple networks may include three high-speed networks for parallel algorithm message passing including a Torus, collective network, and a Global Asynchronous network that provides global barrier and notification functions. These multiple independent networks may be collaboratively or independently utilized according to the needs or phases of an algorithm for optimizing algorithm processing performance. The use of a DMA engine is provided to facilitate message passing among the nodes without the expenditure of processing resources at the node.
Incremental Parallelization of Non-Data-Parallel Programs Using the Charon Message-Passing Library
NASA Technical Reports Server (NTRS)
VanderWijngaart, Rob F.
2000-01-01
Message passing is among the most popular techniques for parallelizing scientific programs on distributed-memory architectures. The reasons for its success are wide availability (MPI), efficiency, and full tuning control provided to the programmer. A major drawback, however, is that incremental parallelization, as offered by compiler directives, is not generally possible, because all data structures have to be changed throughout the program simultaneously. Charon remedies this situation through mappings between distributed and non-distributed data. It allows breaking up the parallelization into small steps, guaranteeing correctness at every stage. Several tools are available to help convert legacy codes into high-performance message-passing programs. They usually target data-parallel applications, whose loops carrying most of the work can be distributed among all processors without much dependency analysis. Others do a full dependency analysis and then convert the code virtually automatically. Even more toolkits are available that aid construction from scratch of message passing programs. None, however, allows piecemeal translation of codes with complex data dependencies (i.e. non-data-parallel programs) into message passing codes. The Charon library (available in both C and Fortran) provides incremental parallelization capabilities by linking legacy code arrays with distributed arrays. During the conversion process, non-distributed and distributed arrays exist side by side, and simple mapping functions allow the programmer to switch between the two in any location in the program. Charon also provides wrapper functions that leave the structure of the legacy code intact, but that allow execution on truly distributed data. Finally, the library provides a rich set of communication functions that support virtually all patterns of remote data demands in realistic structured grid scientific programs, including transposition, nearest-neighbor communication, pipelining, gather/scatter, and redistribution. At the end of the conversion process most intermediate Charon function calls will have been removed, the non-distributed arrays will have been deleted, and virtually the only remaining Charon functions calls are the high-level, highly optimized communications. Distribution of the data is under complete control of the programmer, although a wide range of useful distributions is easily available through predefined functions. A crucial aspect of the library is that it does not allocate space for distributed arrays, but accepts programmer-specified memory. This has two major consequences. First, codes parallelized using Charon do not suffer from encapsulation; user data is always directly accessible. This provides high efficiency, and also retains the possibility of using message passing directly for highly irregular communications. Second, non-distributed arrays can be interpreted as (trivial) distributions in the Charon sense, which allows them to be mapped to truly distributed arrays, and vice versa. This is the mechanism that enables incremental parallelization. In this paper we provide a brief introduction of the library and then focus on the actual steps in the parallelization process, using some representative examples from, among others, the NAS Parallel Benchmarks. We show how a complicated two-dimensional pipeline-the prototypical non-data-parallel algorithm- can be constructed with ease. To demonstrate the flexibility of the library, we give examples of the stepwise, efficient parallel implementation of nonlocal boundary conditions common in aircraft simulations, as well as the construction of the sequence of grids required for multigrid.
NASA Astrophysics Data System (ADS)
Stuart, J. A.
2011-12-01
This paper explores the challenges in implementing a message passing interface usable on systems with data-parallel processors, and more specifically GPUs. As a case study, we design and implement the ``DCGN'' API on NVIDIA GPUs that is similar to MPI and allows full access to the underlying architecture. We introduce the notion of data-parallel thread-groups as a way to map resources to MPI ranks. We use a method that also allows the data-parallel processors to run autonomously from user-written CPU code. In order to facilitate communication, we use a sleep-based polling system to store and retrieve messages. Unlike previous systems, our method provides both performance and flexibility. By running a test suite of applications with different communication requirements, we find that a tolerable amount of overhead is incurred, somewhere between one and five percent depending on the application, and indicate the locations where this overhead accumulates. We conclude that with innovations in chipsets and drivers, this overhead will be mitigated and provide similar performance to typical CPU-based MPI implementations while providing fully-dynamic communication.
2003-01-01
media factors affecting: • Shared Understanding – explicit and operational knowledge • Decision-Making – what information format best helps decision...Passing the Bubble: Cognitive Efficiency of Augmented Video for Collaborative Transfer of Situational Understanding Collaboration and Knowledge ...operational knowledge ? • Informed Decision-Making – what information format is best to pass the bubble to a decision-maker 1/14/2003 ONR David Kirsh
de Bruijn, Gert-Jan; Budding, Jeen
2016-08-01
Message framing is a persuasive strategy that has seen mixed evidence for promoting fruit intake intentions, potentially because framed messages for fruit intake have not (a) explicitly compared short-term consequences versus long-term consequences, (b) considered individual-level differences in time perspective, and (c) used alternative measures of fruit intake intentions. In the present online study, the effects of persuasive messages created from temporal context (short term vs. long term) and message frame (gain framed vs. loss framed) were investigated on fruit intake intentions and resolve among a sample of Dutch adults who were categorized as either present oriented or future oriented. For intention and resolve, results showed a significant Type of Frame × Type of Temporal Context interaction, such that gain-framed messages were more persuasive when combined with long-term consequences and loss-framed messages were more persuasive when combined with short-term consequences. The effect sizes for these differences were similar for resolve and intention, but only differences for intentions were significant. No other effects were found. These results demonstrate that message framing theory may usefully consider the inclusion of temporal context of outcomes and alternative motivation measures to maximize their persuasive effects.
Malaviya, Prashant; Brendl, C Miguel
2014-01-01
Research on regulatory focus has established a regulatory matching effect: The persuasiveness of a message is enhanced when regulatory orientations of message and perceiver match (i.e., both are promotion or both are prevention). We report evidence that varying the hedonic outcome reverses this effect. We manipulated hedonic outcome by explicitly stating pleasurable versus painful outcomes as part of the message frame as well as by priming perceivers to focus on either pleasurable or painful outcomes. When both message and perceiver were focused on pleasurable outcomes, we replicated the regulatory matching effect. However, the matching effect reversed when the hedonic outcome of the message was opposed to that of the perceiver (i.e., one was pleasurable and the other painful). Under these conditions, messages that mismatched the perceivers' regulatory orientation were more persuasive (i.e., promotion message for a prevention oriented perceiver or vice versa). We also examined the persuasion effects when both message and perceiver were focused on painful outcomes and found that the regulatory matching effect re-emerged. The reversal of the regulatory matching effect by hedonic outcome strongly suggests that hedonic motives (approach of pleasure vs. avoidance of pain) and regulatory focus motives are distinct constructs. This is important because contrary to theoretical statements these constructs have often been confounded.
Passing Messages between Biological Networks to Refine Predicted Interactions
Glass, Kimberly; Huttenhower, Curtis; Quackenbush, John; Yuan, Guo-Cheng
2013-01-01
Regulatory network reconstruction is a fundamental problem in computational biology. There are significant limitations to such reconstruction using individual datasets, and increasingly people attempt to construct networks using multiple, independent datasets obtained from complementary sources, but methods for this integration are lacking. We developed PANDA (Passing Attributes between Networks for Data Assimilation), a message-passing model using multiple sources of information to predict regulatory relationships, and used it to integrate protein-protein interaction, gene expression, and sequence motif data to reconstruct genome-wide, condition-specific regulatory networks in yeast as a model. The resulting networks were not only more accurate than those produced using individual data sets and other existing methods, but they also captured information regarding specific biological mechanisms and pathways that were missed using other methodologies. PANDA is scalable to higher eukaryotes, applicable to specific tissue or cell type data and conceptually generalizable to include a variety of regulatory, interaction, expression, and other genome-scale data. An implementation of the PANDA algorithm is available at www.sourceforge.net/projects/panda-net. PMID:23741402
Applications of Probabilistic Combiners on Linear Feedback Shift Register Sequences
2016-12-01
on the resulting output strings show a drastic increase in complexity, while simultaneously passing the stringent randomness tests required by the...a three-variable function. Our tests on the resulting output strings show a drastic increase in complex- ity, while simultaneously passing the...10001101 01000010 11101001 Decryption of a message that has been encrypted using bitwise XOR is quite simple. Since each bit is its own additive inverse
2013-07-26
Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: Never tire of finding shapes in the clouds! These look very botanical to me. Simply perfect.
Sen. Alexander, Lamar [R-TN
2011-07-28
Senate - 12/19/2012 Message on House action received in Senate and at desk: House amendments to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Electronic Cigarettes on Twitter – Spreading the Appeal of Flavors
Chu, Kar-Hai; Unger, Jennifer B.; Cruz, Tess Boley; Soto, Daniel W.
2016-01-01
Objectives Social media platforms are used by tobacco companies to promote products. This study examines message content on Twitter from e-cigarette brands and determines if messages about flavors are more likely than non-flavor messages to be passed along to other viewers. Methods We examined Twitter data from 2 e-cigarette brands and identified messages that contained terms related to e-cigarette flavors. Results Flavor-related posts were retweeted at a significantly higher rate by e-cigarette brands (p = .04) and other Twitter users (p < .01) than non-flavor posts. Conclusions E-cigarette brands and other Twitter users pay attention to flavor-related posts and retweet them often. These findings suggest flavors continue to be an attractive characteristic and their marketing should be monitored closely. PMID:27853734
Alvioli, M.; Baum, R.L.
2016-01-01
We describe a parallel implementation of TRIGRS, the Transient Rainfall Infiltration and Grid-Based Regional Slope-Stability Model for the timing and distribution of rainfall-induced shallow landslides. We have parallelized the four time-demanding execution modes of TRIGRS, namely both the saturated and unsaturated model with finite and infinite soil depth options, within the Message Passing Interface framework. In addition to new features of the code, we outline details of the parallel implementation and show the performance gain with respect to the serial code. Results are obtained both on commercial hardware and on a high-performance multi-node machine, showing the different limits of applicability of the new code. We also discuss the implications for the application of the model on large-scale areas and as a tool for real-time landslide hazard monitoring.
NASA Astrophysics Data System (ADS)
Min, Byungjoon
2018-01-01
Identifying the most influential spreaders is one of outstanding problems in physics of complex systems. So far, many approaches have attempted to rank the influence of nodes but there is still the lack of accuracy to single out influential spreaders. Here, we directly tackle the problem of finding important spreaders by solving analytically the expected size of epidemic outbreaks when spreading originates from a single seed. We derive and validate a theory for calculating the size of epidemic outbreaks with a single seed using a message-passing approach. In addition, we find that the probability to occur epidemic outbreaks is highly dependent on the location of the seed but the size of epidemic outbreaks once it occurs is insensitive to the seed. We also show that our approach can be successfully adapted into weighted networks.
The design of multi-core DSP parallel model based on message passing and multi-level pipeline
NASA Astrophysics Data System (ADS)
Niu, Jingyu; Hu, Jian; He, Wenjing; Meng, Fanrong; Li, Chuanrong
2017-10-01
Currently, the design of embedded signal processing system is often based on a specific application, but this idea is not conducive to the rapid development of signal processing technology. In this paper, a parallel processing model architecture based on multi-core DSP platform is designed, and it is mainly suitable for the complex algorithms which are composed of different modules. This model combines the ideas of multi-level pipeline parallelism and message passing, and summarizes the advantages of the mainstream model of multi-core DSP (the Master-Slave model and the Data Flow model), so that it has better performance. This paper uses three-dimensional image generation algorithm to validate the efficiency of the proposed model by comparing with the effectiveness of the Master-Slave and the Data Flow model.
Generalized hypercube structures and hyperswitch communication network
NASA Technical Reports Server (NTRS)
Young, Steven D.
1992-01-01
This paper discusses an ongoing study that uses a recent development in communication control technology to implement hybrid hypercube structures. These architectures are similar to binary hypercubes, but they also provide added connectivity between the processors. This added connectivity increases communication reliability while decreasing the latency of interprocessor message passing. Because these factors directly determine the speed that can be obtained by multiprocessor systems, these architectures are attractive for applications such as remote exploration and experimentation, where high performance and ultrareliability are required. This paper describes and enumerates these architectures and discusses how they can be implemented with a modified version of the hyperswitch communication network (HCN). The HCN is analyzed because it has three attractive features that enable these architectures to be effective: speed, fault tolerance, and the ability to pass multiple messages simultaneously through the same hyperswitch controller.
Lu, Hang; McComas, Katherine A; Besley, John C
2017-01-01
Genetic modification (GM) of crops and climate change are arguably two of today's most challenging science communication issues. Increasingly, these two issues are connected in messages proposing GM as a viable option for ensuring global food security threatened by climate change. This study examines the effects of messages promoting the benefits of GM in the context of climate change. Further, it examines whether explicit reference to "climate change," or "global warming" in a GM message results in different effects than each other, or an implicit climate reference. An online sample of U.S. participants (N = 1050) were randomly assigned to one of four conditions: "climate change" cue, "global warming" cue, implicit cue, or control (no message). Generally speaking, framing GM crops as a way to help ensure global food security proved to be an effective messaging strategy in increasing positive attitudes toward GM. In addition, the implicit cue condition led to liberals having more positive attitudes and behavioral intentions toward GM than the "climate change" cue condition, an effect mediated by message evaluations. Copyright © 2016 Elsevier Ltd. All rights reserved.
2013-08-03
Earth observation taken during day pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message: From southernmost point of orbit over the South Pacific- all clouds seemed to be leading to the South Pole.
2013-07-21
Earth observation taken during night pass by an Expedition 36 crew member on board the International Space Station (ISS). Per Twitter message this is labeled as : Tehran, Iran. Lights along the coast of the Caspian Sea visible through clouds. July 21.
Whistleblower Protection Enhancement Act of 2010
Sen. Akaka, Daniel K. [D-HI
2009-02-03
Senate - 12/22/2010 Message on House action received in Senate and at desk: House amendments to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
2014-05-31
Earth Observation taken during a day pass by the Expedition 40 crew aboard the International Space Station (ISS). Folder lists this as: CEO - Arena de Sao Paolo. View used for Twitter message: Cloudy skies over São Paulo Brazil
1979-12-01
Links between processes can be aLlocated strictLy to controL functions. In fact, the degree of separation of control and data is an important research is...delays or Loss of control messages. Cognoscienti agree that message-passing IPC schemes are equivalent in "power" to schemes which employ shared...THEORETICAL WORK Page 55 SECTION 6 THEORETICAL WORK 6.1 WORKING GRUP JIM REP.OR STRUCTURE of Discussion: Distributed system without central (or any) control
27 CFR 10.23 - Gifts or payments to wholesalers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... payments to wholesalers. Although industry members are not prohibited from offering or giving money or..., implied or explicit, that the money or thing of value will be passed on to the officers, employees, or representatives, or (b) It is obvious by the very nature of the item given (such as a free trip) that a pass...
27 CFR 10.23 - Gifts or payments to wholesalers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... payments to wholesalers. Although industry members are not prohibited from offering or giving money or..., implied or explicit, that the money or thing of value will be passed on to the officers, employees, or representatives, or (b) It is obvious by the very nature of the item given (such as a free trip) that a pass...
27 CFR 10.23 - Gifts or payments to wholesalers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... payments to wholesalers. Although industry members are not prohibited from offering or giving money or..., implied or explicit, that the money or thing of value will be passed on to the officers, employees, or representatives, or (b) It is obvious by the very nature of the item given (such as a free trip) that a pass...
27 CFR 10.23 - Gifts or payments to wholesalers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... payments to wholesalers. Although industry members are not prohibited from offering or giving money or..., implied or explicit, that the money or thing of value will be passed on to the officers, employees, or representatives, or (b) It is obvious by the very nature of the item given (such as a free trip) that a pass...
27 CFR 10.23 - Gifts or payments to wholesalers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... payments to wholesalers. Although industry members are not prohibited from offering or giving money or..., implied or explicit, that the money or thing of value will be passed on to the officers, employees, or representatives, or (b) It is obvious by the very nature of the item given (such as a free trip) that a pass...
Terrorism Risk Insurance Program Reauthorization Act of 2014
Sen. Schumer, Charles E. [D-NY
2014-04-10
Senate - 12/11/2014 Message on House action received in Senate and at desk: House amendment to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Electronic Message Preservation Act
Rep. Hodes, Paul W. [D-NH-2
2009-03-09
Senate - 03/18/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Federal Financial Assistance Management Improvement Act of 2009
Sen. Voinovich, George V. [R-OH
2009-01-22
Senate - 12/15/2009 Message on House action received in Senate and at desk: House amendment to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Bachhuber, Marcus A; McGinty, Emma E; Kennedy-Hendricks, Alene; Niederdeppe, Jeff; Barry, Colleen L
2015-01-01
Barriers to public support for naloxone distribution include lack of knowledge, concerns about potential unintended consequences, and lack of sympathy for people at risk of overdose. A randomized survey experiment was conducted with a nationally-representative web-based survey research panel (GfK KnowledgePanel). Participants were randomly assigned to read different messages alone or in combination: 1) factual information about naloxone; 2) pre-emptive refutation of potential concerns about naloxone distribution; and 3) a sympathetic narrative about a mother whose daughter died of an opioid overdose. Participants were then asked if they support or oppose policies related to naloxone distribution. For each policy item, logistic regression models were used to test the effect of each message exposure compared with the no-exposure control group. The final sample consisted of 1,598 participants (completion rate: 72.6%). Factual information and the sympathetic narrative alone each led to higher support for training first responders to use naloxone, providing naloxone to friends and family members of people using opioids, and passing laws to protect people who administer naloxone. Participants receiving the combination of the sympathetic narrative and factual information, compared to factual information alone, were more likely to support all policies: providing naloxone to friends and family members (OR: 2.0 [95% CI: 1.4 to 2.9]), training first responders to use naloxone (OR: 2.0 [95% CI: 1.2 to 3.4]), passing laws to protect people if they administer naloxone (OR: 1.5 [95% CI: 1.04 to 2.2]), and passing laws to protect people if they call for medical help for an overdose (OR: 1.7 [95% CI: 1.2 to 2.5]). All messages increased public support, but combining factual information and the sympathetic narrative was most effective. Public support for naloxone distribution can be improved through education and sympathetic portrayals of the population who stands to benefit from these policies.
Run-time scheduling and execution of loops on message passing machines
NASA Technical Reports Server (NTRS)
Crowley, Kay; Saltz, Joel; Mirchandaney, Ravi; Berryman, Harry
1989-01-01
Sparse system solvers and general purpose codes for solving partial differential equations are examples of the many types of problems whose irregularity can result in poor performance on distributed memory machines. Often, the data structures used in these problems are very flexible. Crucial details concerning loop dependences are encoded in these structures rather than being explicitly represented in the program. Good methods for parallelizing and partitioning these types of problems require assignment of computations in rather arbitrary ways. Naive implementations of programs on distributed memory machines requiring general loop partitions can be extremely inefficient. Instead, the scheduling mechanism needs to capture the data reference patterns of the loops in order to partition the problem. First, the indices assigned to each processor must be locally numbered. Next, it is necessary to precompute what information is needed by each processor at various points in the computation. The precomputed information is then used to generate an execution template designed to carry out the computation, communication, and partitioning of data, in an optimized manner. The design is presented for a general preprocessor and schedule executer, the structures of which do not vary, even though the details of the computation and of the type of information are problem dependent.
Run-time scheduling and execution of loops on message passing machines
NASA Technical Reports Server (NTRS)
Saltz, Joel; Crowley, Kathleen; Mirchandaney, Ravi; Berryman, Harry
1990-01-01
Sparse system solvers and general purpose codes for solving partial differential equations are examples of the many types of problems whose irregularity can result in poor performance on distributed memory machines. Often, the data structures used in these problems are very flexible. Crucial details concerning loop dependences are encoded in these structures rather than being explicitly represented in the program. Good methods for parallelizing and partitioning these types of problems require assignment of computations in rather arbitrary ways. Naive implementations of programs on distributed memory machines requiring general loop partitions can be extremely inefficient. Instead, the scheduling mechanism needs to capture the data reference patterns of the loops in order to partition the problem. First, the indices assigned to each processor must be locally numbered. Next, it is necessary to precompute what information is needed by each processor at various points in the computation. The precomputed information is then used to generate an execution template designed to carry out the computation, communication, and partitioning of data, in an optimized manner. The design is presented for a general preprocessor and schedule executer, the structures of which do not vary, even though the details of the computation and of the type of information are problem dependent.
Parallelization of KENO-Va Monte Carlo code
NASA Astrophysics Data System (ADS)
Ramón, Javier; Peña, Jorge
1995-07-01
KENO-Va is a code integrated within the SCALE system developed by Oak Ridge that solves the transport equation through the Monte Carlo Method. It is being used at the Consejo de Seguridad Nuclear (CSN) to perform criticality calculations for fuel storage pools and shipping casks. Two parallel versions of the code: one for shared memory machines and other for distributed memory systems using the message-passing interface PVM have been generated. In both versions the neutrons of each generation are tracked in parallel. In order to preserve the reproducibility of the results in both versions, advanced seeds for random numbers were used. The CONVEX C3440 with four processors and shared memory at CSN was used to implement the shared memory version. A FDDI network of 6 HP9000/735 was employed to implement the message-passing version using proprietary PVM. The speedup obtained was 3.6 in both cases.
Statistical analysis of loopy belief propagation in random fields
NASA Astrophysics Data System (ADS)
Yasuda, Muneki; Kataoka, Shun; Tanaka, Kazuyuki
2015-10-01
Loopy belief propagation (LBP), which is equivalent to the Bethe approximation in statistical mechanics, is a message-passing-type inference method that is widely used to analyze systems based on Markov random fields (MRFs). In this paper, we propose a message-passing-type method to analytically evaluate the quenched average of LBP in random fields by using the replica cluster variation method. The proposed analytical method is applicable to general pairwise MRFs with random fields whose distributions differ from each other and can give the quenched averages of the Bethe free energies over random fields, which are consistent with numerical results. The order of its computational cost is equivalent to that of standard LBP. In the latter part of this paper, we describe the application of the proposed method to Bayesian image restoration, in which we observed that our theoretical results are in good agreement with the numerical results for natural images.
Li, J; Guo, L-X; Zeng, H; Han, X-B
2009-06-01
A message-passing-interface (MPI)-based parallel finite-difference time-domain (FDTD) algorithm for the electromagnetic scattering from a 1-D randomly rough sea surface is presented. The uniaxial perfectly matched layer (UPML) medium is adopted for truncation of FDTD lattices, in which the finite-difference equations can be used for the total computation domain by properly choosing the uniaxial parameters. This makes the parallel FDTD algorithm easier to implement. The parallel performance with different processors is illustrated for one sea surface realization, and the computation time of the parallel FDTD algorithm is dramatically reduced compared to a single-process implementation. Finally, some numerical results are shown, including the backscattering characteristics of sea surface for different polarization and the bistatic scattering from a sea surface with large incident angle and large wind speed.
NASA Technical Reports Server (NTRS)
Goldstein, David
1991-01-01
Extensions to an architecture for real-time, distributed (parallel) knowledge-based systems called the Parallel Real-time Artificial Intelligence System (PRAIS) are discussed. PRAIS strives for transparently parallelizing production (rule-based) systems, even under real-time constraints. PRAIS accomplished these goals (presented at the first annual C Language Integrated Production System (CLIPS) conference) by incorporating a dynamic task scheduler, operating system extensions for fact handling, and message-passing among multiple copies of CLIPS executing on a virtual blackboard. This distributed knowledge-based system tool uses the portability of CLIPS and common message-passing protocols to operate over a heterogeneous network of processors. Results using the original PRAIS architecture over a network of Sun 3's, Sun 4's and VAX's are presented. Mechanisms using the producer-consumer model to extend the architecture for fault-tolerance and distributed truth maintenance initiation are also discussed.
Degree Distribution of Position-Dependent Ball-Passing Networks in Football Games
NASA Astrophysics Data System (ADS)
Narizuka, Takuma; Yamamoto, Ken; Yamazaki, Yoshihiro
2015-08-01
We propose a simple stochastic model describing the position-dependent ball-passing network in football (soccer) games. In this network, a player in a certain area in a divided field is a node, and a pass between two nodes corresponds to an edge. Our stochastic process model is characterized by the consecutive choice of a node depending on its intrinsic fitness. We derive an explicit expression for the degree distribution and find that the derived distribution reproduces that for actual data reasonably well.
Zeng, Feng; Zhao, Nan; Li, Wenjia
2017-01-01
In mobile opportunistic networks, the social relationship among nodes has an important impact on data transmission efficiency. Motivated by the strong share ability of “circles of friends” in communication networks such as Facebook, Twitter, Wechat and so on, we take a real-life example to show that social relationships among nodes consist of explicit and implicit parts. The explicit part comes from direct contact among nodes, and the implicit part can be measured through the “circles of friends”. We present the definitions of explicit and implicit social relationships between two nodes, adaptive weights of explicit and implicit parts are given according to the contact feature of nodes, and the distributed mechanism is designed to construct the “circles of friends” of nodes, which is used for the calculation of the implicit part of social relationship between nodes. Based on effective measurement of social relationships, we propose a social-based clustering and routing scheme, in which each node selects the nodes with close social relationships to form a local cluster, and the self-control method is used to keep all cluster members always having close relationships with each other. A cluster-based message forwarding mechanism is designed for opportunistic routing, in which each node only forwards the copy of the message to nodes with the destination node as a member of the local cluster. Simulation results show that the proposed social-based clustering and routing outperforms the other classic routing algorithms. PMID:28498309
Zeng, Feng; Zhao, Nan; Li, Wenjia
2017-05-12
In mobile opportunistic networks, the social relationship among nodes has an important impact on data transmission efficiency. Motivated by the strong share ability of "circles of friends" in communication networks such as Facebook, Twitter, Wechat and so on, we take a real-life example to show that social relationships among nodes consist of explicit and implicit parts. The explicit part comes from direct contact among nodes, and the implicit part can be measured through the "circles of friends". We present the definitions of explicit and implicit social relationships between two nodes, adaptive weights of explicit and implicit parts are given according to the contact feature of nodes, and the distributed mechanism is designed to construct the "circles of friends" of nodes, which is used for the calculation of the implicit part of social relationship between nodes. Based on effective measurement of social relationships, we propose a social-based clustering and routing scheme, in which each node selects the nodes with close social relationships to form a local cluster, and the self-control method is used to keep all cluster members always having close relationships with each other. A cluster-based message forwarding mechanism is designed for opportunistic routing, in which each node only forwards the copy of the message to nodes with the destination node as a member of the local cluster. Simulation results show that the proposed social-based clustering and routing outperforms the other classic routing algorithms.
Reactions to framing of cessation messages: insights from dual-smoker couples.
Lipkus, Isaac M; Ranby, Krista W; Lewis, Megan A; Toll, Benjamin
2013-12-01
Couples in which both members smoke (dual-smoker couples) have not been the explicit target of cessation interventions. Quit rates are lower and relapse rates are higher among individuals in dual-smoker couples. A potentially effective strategy to motivate dual-smoker couples to quit is to convey messages that highlight how the positive outcomes of quitting (gain frame) or the negative outcomes of continued smoking (loss frame) affect the couple rather than the individual smoker. We explored whether dual-smoker couples' smoking behaviors (e.g., amount smoked) and desire to quit would differ as a function of message frame (gain vs. loss) or outcome focus (individual vs. couple). Dual-smoker couples (N = 40) completed a baseline survey and were then randomized to review gain- or loss-framed messages that varied whether the outcomes influenced the individual or the couple. Main outcomes were desire to quit after reading messages and smoking behaviors at a 1-month follow-up. Couple-focused messages produced the strongest desire to quit and decreased amount of cigarettes smoked at follow-up. The latter effect was mediated by desire to quit. Loss-framed messages produced inconsistent effects on desire to quit. There were no significant interactions between outcome focus and message framing. Findings suggest that messages emphasizing how smoking affects both partners can motivate cessation among dual-smoker couples. Contrary to findings showing that gain-framed messages motivate cessation targeting individual smokers, results suggest that loss-framed messages may be more persuasive than gain-framed messages when the target of the outcome involves significant others.
Sexting: New Challenges for Schools and Professional School Counselors
ERIC Educational Resources Information Center
McEachern, Adriana G.; McEachern-Ciattoni, Renee T.; Martin, Filomena
2012-01-01
Sexting, the practice of sending sexually explicit messages or photographs of oneself or others on digital electronic devices, presents challenges for schools and professional school counselors. The implications of sexting for schools, school counselors, students, and parents are discussed. School counselor interventions, developing school…
Message passing with queues and channels
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dozsa, Gabor J; Heidelberger, Philip; Kumar, Sameer
In an embodiment, a send thread receives an identifier that identifies a destination node and a pointer to data. The send thread creates a first send request in response to the receipt of the identifier and the data pointer. The send thread selects a selected channel from among a plurality of channels. The selected channel comprises a selected hand-off queue and an identification of a selected message unit. Each of the channels identifies a different message unit. The selected hand-off queue is randomly accessible. If the selected hand-off queue contains an available entry, the send thread adds the first sendmore » request to the selected hand-off queue. If the selected hand-off queue does not contain an available entry, the send thread removes a second send request from the selected hand-off queue and sends the second send request to the selected message unit.« less
James, Ricky; Naughton, Declan P; Petróczi, Andrea
2010-11-10
Substances with performance enhancing properties appear on a continuum, ranging from prohibited performance enhancing drugs (PED) through dietary supplements to functional foods (FF). Anti-doping messages designed to dissuade athletes from using PEDs have been typically based on moralising sport competition and/or employing scare campaigns with focus on the negative consequences. Campaigns offering comparable and acceptable alternatives are nonexistent, nor are athletes helped in finding these for themselves. It is timely that social marketing strategies for anti-doping prevention and intervention incorporate media messages that complement the existing approaches by promoting comparable and acceptable alternatives to doping. To facilitate this process, the aim of this study was to ascertain whether a single exposure knowledge-based information intervention led to increased knowledge and subsequently result in changes in beliefs and automatic associations regarding performance enhancements. In a repeated measure design, 115 male recreational gym users were recruited and provided with a brief information pamphlet on nitrite/nitrate and erythropoietin as a comparison. Measures of knowledge, beliefs and automatic associations were taken before and after the intervention with at least 24 hours between the two assessments. The psychological tests included explicit measures of beliefs and cognitive attitudes toward FF and PED using a self-reported questionnaire and computerised assessments of automatic associations using the modified and shortened version of the Implicit Association Test. The information based intervention significantly increased knowledge (p < 0.001), changed explicit beliefs in specific FF (p < 0.001) and shifted the automatic association of FF with health to performance (p < 0.001). Explicitly expressed beliefs and automatic associations appear to be independent. Evidence was found that even a single exposure to a persuasive positive message can lead to belief change and can create new or alter existing associations - but only in the specific domain. Interventions to change outcome expectations in a positive way could be a rewarding avenue for anti-doping. Effective social marketing campaigns for drug free sport should follow appropriate market segmentation and use targeted messages via promoting the natural form as opposed to the purified form of the main active ingredient.
2010-01-01
Background Substances with performance enhancing properties appear on a continuum, ranging from prohibited performance enhancing drugs (PED) through dietary supplements to functional foods (FF). Anti-doping messages designed to dissuade athletes from using PEDs have been typically based on moralising sport competition and/or employing scare campaigns with focus on the negative consequences. Campaigns offering comparable and acceptable alternatives are nonexistent, nor are athletes helped in finding these for themselves. It is timely that social marketing strategies for anti-doping prevention and intervention incorporate media messages that complement the existing approaches by promoting comparable and acceptable alternatives to doping. To facilitate this process, the aim of this study was to ascertain whether a single exposure knowledge-based information intervention led to increased knowledge and subsequently result in changes in beliefs and automatic associations regarding performance enhancements. Methods In a repeated measure design, 115 male recreational gym users were recruited and provided with a brief information pamphlet on nitrite/nitrate and erythropoietin as a comparison. Measures of knowledge, beliefs and automatic associations were taken before and after the intervention with at least 24 hours between the two assessments. The psychological tests included explicit measures of beliefs and cognitive attitudes toward FF and PED using a self-reported questionnaire and computerised assessments of automatic associations using the modified and shortened version of the Implicit Association Test. Results The information based intervention significantly increased knowledge (p < 0.001), changed explicit beliefs in specific FF (p < 0.001) and shifted the automatic association of FF with health to performance (p < 0.001). Explicitly expressed beliefs and automatic associations appear to be independent. Conclusion Evidence was found that even a single exposure to a persuasive positive message can lead to belief change and can create new or alter existing associations - but only in the specific domain. Interventions to change outcome expectations in a positive way could be a rewarding avenue for anti-doping. Effective social marketing campaigns for drug free sport should follow appropriate market segmentation and use targeted messages via promoting the natural form as opposed to the purified form of the main active ingredient. PMID:21067611
Scalable Optical-Fiber Communication Networks
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Peterson, John C.
1993-01-01
Scalable arbitrary fiber extension network (SAFEnet) is conceptual fiber-optic communication network passing digital signals among variety of computers and input/output devices at rates from 200 Mb/s to more than 100 Gb/s. Intended for use with very-high-speed computers and other data-processing and communication systems in which message-passing delays must be kept short. Inherent flexibility makes it possible to match performance of network to computers by optimizing configuration of interconnections. In addition, interconnections made redundant to provide tolerance to faults.
Domestic Minor Sex Trafficking Deterrence and Victims Support Act of 2010
Sen. Wyden, Ron [D-OR
2009-12-22
Senate - 12/21/2010 Message on House action received in Senate and at desk: House amendment to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Chaos synchronization communication using extremely unsymmetrical bidirectional injections.
Zhang, Wei Li; Pan, Wei; Luo, Bin; Zou, Xi Hua; Wang, Meng Yao; Zhou, Zhi
2008-02-01
Chaos synchronization and message transmission between two semiconductor lasers with extremely unsymmetrical bidirectional injections (EUBIs) are discussed. By using EUBIs, synchronization is realized through injection locking. Numerical results show that if the laser subjected to strong injection serves as the receiver, chaos pass filtering (CPF) of the system is similar to that of unidirectional coupled systems. Moreover, if the other laser serves as the receiver, a stronger CPF can be obtained. Finally, we demonstrate that messages can be extracted successfully from either of the two transmission directions of the system.
Automation Framework for Flight Dynamics Products Generation
NASA Technical Reports Server (NTRS)
Wiegand, Robert E.; Esposito, Timothy C.; Watson, John S.; Jun, Linda; Shoan, Wendy; Matusow, Carla
2010-01-01
XFDS provides an easily adaptable automation platform. To date it has been used to support flight dynamics operations. It coordinates the execution of other applications such as Satellite TookKit, FreeFlyer, MATLAB, and Perl code. It provides a mechanism for passing messages among a collection of XFDS processes, and allows sending and receiving of GMSEC messages. A unified and consistent graphical user interface (GUI) is used for the various tools. Its automation configuration is stored in text files, and can be edited either directly or using the GUI.
Disaster Relief Appropriations Act, 2013
Rep. Rogers, Harold [R-KY-5
2011-02-11
Senate - 12/30/2012 Message on Senate action sent to the House. (All Actions) Notes: This bill was for a time the Senate legislative vehicle for Hurricane Sandy supplemental appropriations. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Reflection Fosters Deep Learning: The 'Reflection Page & Relevant to You' Intervention
ERIC Educational Resources Information Center
Young, Mark R.
2018-01-01
Cognitive science indicates that the millennial generation's behavior of instant messaging and multitasking may provide inadequate cognitive capabilities for thoughtful processing of experiences that lead to deep learning. This study describes a teaching innovation that explicitly stimulates reflection and critical self-assessment, along with…
Mixed-Up Messages: Ambiguities in Newspaper Representations of the Young Child.
ERIC Educational Resources Information Center
Jackson, Ian
1995-01-01
Reports a six-year study of explicit references to young children's small physical stature in an Australian newspaper. Suggests that when newspaper representations of children and childhood are examined for their focus on children's diminutive size, two conflicting themes emerge: endearment versus depreciation. Suggests that these size-value…
The Pragmatics of Color in Antara's Poetry
ERIC Educational Resources Information Center
Btoosh, Mousa A.
2014-01-01
Perhaps rarely is there any piece of Pre-Islamic Arabic literature where color features more strongly and less naturally than in Antara's poetry. Therefore, the intended message of color in Antara's poetry is adequately understood inasmuch as the pragmatic implicatures of color are worked out. Evidence in literature explicitly attributes Antara's…
Democratic Parenting: Paradoxical Messages in Democratic Parent Education Theories
ERIC Educational Resources Information Center
Oryan, Shlomit; Gastil, John
2013-01-01
Some prominent parent education theories in the United States and other Western countries base their educational viewpoint explicitly on democratic values, such as mutual respect, equality and personal freedom. These democratic parenting theories advocate sharing power with children and including them in family decision making. This study presents…
Sexty Southerners: Sexting Content and Behaviors among Selected Southern Undergraduates
ERIC Educational Resources Information Center
Hudson, Heather K.; Marshall, S. Alexandra
2016-01-01
Sexting is defined as sending/posting/sharing sexually explicit messages or nude/semi-nude images via electronic communication. Purpose: The purpose of this study was to assess and determine relationships of sexting behavioral intentions, sexting behaviors, and sexting content among selected Southern undergraduate students. Methods: Survey…
Cooperative Data Sharing: Simple Support for Clusters of SMP Nodes
NASA Technical Reports Server (NTRS)
DiNucci, David C.; Balley, David H. (Technical Monitor)
1997-01-01
Libraries like PVM and MPI send typed messages to allow for heterogeneous cluster computing. Lower-level libraries, such as GAM, provide more efficient access to communication by removing the need to copy messages between the interface and user space in some cases. still lower-level interfaces, such as UNET, get right down to the hardware level to provide maximum performance. However, these are all still interfaces for passing messages from one process to another, and have limited utility in a shared-memory environment, due primarily to the fact that message passing is just another term for copying. This drawback is made more pertinent by today's hybrid architectures (e.g. clusters of SMPs), where it is difficult to know beforehand whether two communicating processes will share memory. As a result, even portable language tools (like HPF compilers) must either map all interprocess communication, into message passing with the accompanying performance degradation in shared memory environments, or they must check each communication at run-time and implement the shared-memory case separately for efficiency. Cooperative Data Sharing (CDS) is a single user-level API which abstracts all communication between processes into the sharing and access coordination of memory regions, in a model which might be described as "distributed shared messages" or "large-grain distributed shared memory". As a result, the user programs to a simple latency-tolerant abstract communication specification which can be mapped efficiently to either a shared-memory or message-passing based run-time system, depending upon the available architecture. Unlike some distributed shared memory interfaces, the user still has complete control over the assignment of data to processors, the forwarding of data to its next likely destination, and the queuing of data until it is needed, so even the relatively high latency present in clusters can be accomodated. CDS does not require special use of an MMU, which can add overhead to some DSM systems, and does not require an SPMD programming model. unlike some message-passing interfaces, CDS allows the user to implement efficient demand-driven applications where processes must "fight" over data, and does not perform copying if processes share memory and do not attempt concurrent writes. CDS also supports heterogeneous computing, dynamic process creation, handlers, and a very simple thread-arbitration mechanism. Additional support for array subsections is currently being considered. The CDS1 API, which forms the kernel of CDS, is built primarily upon only 2 communication primitives, one process initiation primitive, and some data translation (and marshalling) routines, memory allocation routines, and priority control routines. The entire current collection of 28 routines provides enough functionality to implement most (or all) of MPI 1 and 2, which has a much larger interface consisting of hundreds of routines. still, the API is small enough to consider integrating into standard os interfaces for handling inter-process communication in a network-independent way. This approach would also help to solve many of the problems plaguing other higher-level standards such as MPI and PVM which must, in some cases, "play OS" to adequately address progress and process control issues. The CDS2 API, a higher level of interface roughly equivalent in functionality to MPI and to be built entirely upon CDS1, is still being designed. It is intended to add support for the equivalent of communicators, reduction and other collective operations, process topologies, additional support for process creation, and some automatic memory management. CDS2 will not exactly match MPI, because the copy-free semantics of communication from CDS1 will be supported. CDS2 application programs will be free to carefully also use CDS1. CDS1 has been implemented on networks of workstations running unmodified Unix-based operating systems, using UDP/IP and vendor-supplied high- performance locks. Although its inter-node performance is currently unimpressive due to rudimentary implementation technique, it even now outperforms highly-optimized MPI implementation on intra-node communication due to its support for non-copy communication. The similarity of the CDS1 architecture to that of other projects such as UNET and TRAP suggests that the inter-node performance can be increased significantly to surpass MPI or PVM, and it may be possible to migrate some of its functionality to communication controllers.
How shared reality is created in interpersonal communication.
Echterhoff, Gerald; Schmalbach, Bjarne
2017-12-29
Communication is a key arena and means for shared-reality creation. Most studies explicitly devoted to shared reality have focused on the opening part of a conversation, that is, a speaker's initial message to an audience. The aspect of communication examined by this research is the evaluative adaptation (tuning) of the messages to the audience's attitude or judgment. The speaker's shared-reality creation is typically assessed by the extent to which the speaker's evaluative representation of the topic matches the audience-tuned view expressed in the message. We first review research on such audience-tuning effects, with a focus on shared-reality goals and conditions facilitating the generalization of shared reality. We then review studies using other paradigms that illustrate factors of shared-reality creation in communication, including mere message production, grounding, validation responses, and communication about commonly known information (including stereotypes) in intragroup communication. The different lines of research reveal the potency, but also boundary conditions, of communication effects on shared reality. Copyright © 2017. Published by Elsevier Ltd.
Interactive Supercomputing’s Star-P Platform
DOE Office of Scientific and Technical Information (OSTI.GOV)
Edelman, Alan; Husbands, Parry; Leibman, Steve
2006-09-19
The thesis of this extended abstract is simple. High productivity comes from high level infrastructures. To measure this, we introduce a methodology that goes beyond the tradition of timing software in serial and tuned parallel modes. We perform a classroom productivity study involving 29 students who have written a homework exercise in a low level language (MPI message passing) and a high level language (Star-P with MATLAB client). Our conclusions indicate what perhaps should be of little surprise: (1) the high level language is always far easier on the students than the low level language. (2) The early versions ofmore » the high level language perform inadequately compared to the tuned low level language, but later versions substantially catch up. Asymptotically, the analogy must hold that message passing is to high level language parallel programming as assembler is to high level environments such as MATLAB, Mathematica, Maple, or even Python. We follow the Kepner method that correctly realizes that traditional speedup numbers without some discussion of the human cost of reaching these numbers can fail to reflect the true human productivity cost of high performance computing. Traditional data compares low level message passing with serial computation. With the benefit of a high level language system in place, in our case Star-P running with MATLAB client, and with the benefit of a large data pool: 29 students, each running the same code ten times on three evolutions of the same platform, we can methodically demonstrate the productivity gains. To date we are not aware of any high level system as extensive and interoperable as Star-P, nor are we aware of an experiment of this kind performed with this volume of data.« less
Performance Measurement, Visualization and Modeling of Parallel and Distributed Programs
NASA Technical Reports Server (NTRS)
Yan, Jerry C.; Sarukkai, Sekhar R.; Mehra, Pankaj; Lum, Henry, Jr. (Technical Monitor)
1994-01-01
This paper presents a methodology for debugging the performance of message-passing programs on both tightly coupled and loosely coupled distributed-memory machines. The AIMS (Automated Instrumentation and Monitoring System) toolkit, a suite of software tools for measurement and analysis of performance, is introduced and its application illustrated using several benchmark programs drawn from the field of computational fluid dynamics. AIMS includes (i) Xinstrument, a powerful source-code instrumentor, which supports both Fortran77 and C as well as a number of different message-passing libraries including Intel's NX Thinking Machines' CMMD, and PVM; (ii) Monitor, a library of timestamping and trace -collection routines that run on supercomputers (such as Intel's iPSC/860, Delta, and Paragon and Thinking Machines' CM5) as well as on networks of workstations (including Convex Cluster and SparcStations connected by a LAN); (iii) Visualization Kernel, a trace-animation facility that supports source-code clickback, simultaneous visualization of computation and communication patterns, as well as analysis of data movements; (iv) Statistics Kernel, an advanced profiling facility, that associates a variety of performance data with various syntactic components of a parallel program; (v) Index Kernel, a diagnostic tool that helps pinpoint performance bottlenecks through the use of abstract indices; (vi) Modeling Kernel, a facility for automated modeling of message-passing programs that supports both simulation -based and analytical approaches to performance prediction and scalability analysis; (vii) Intrusion Compensator, a utility for recovering true performance from observed performance by removing the overheads of monitoring and their effects on the communication pattern of the program; and (viii) Compatibility Tools, that convert AIMS-generated traces into formats used by other performance-visualization tools, such as ParaGraph, Pablo, and certain AVS/Explorer modules.
Applications Performance Under MPL and MPI on NAS IBM SP2
NASA Technical Reports Server (NTRS)
Saini, Subhash; Simon, Horst D.; Lasinski, T. A. (Technical Monitor)
1994-01-01
On July 5, 1994, an IBM Scalable POWER parallel System (IBM SP2) with 64 nodes, was installed at the Numerical Aerodynamic Simulation (NAS) Facility Each node of NAS IBM SP2 is a "wide node" consisting of a RISC 6000/590 workstation module with a clock of 66.5 MHz which can perform four floating point operations per clock with a peak performance of 266 Mflop/s. By the end of 1994, 64 nodes of IBM SP2 will be upgraded to 160 nodes with a peak performance of 42.5 Gflop/s. An overview of the IBM SP2 hardware is presented. The basic understanding of architectural details of RS 6000/590 will help application scientists the porting, optimizing, and tuning of codes from other machines such as the CRAY C90 and the Paragon to the NAS SP2. Optimization techniques such as quad-word loading, effective utilization of two floating point units, and data cache optimization of RS 6000/590 is illustrated, with examples giving performance gains at each optimization step. The conversion of codes using Intel's message passing library NX to codes using native Message Passing Library (MPL) and the Message Passing Interface (NMI) library available on the IBM SP2 is illustrated. In particular, we will present the performance of Fast Fourier Transform (FFT) kernel from NAS Parallel Benchmarks (NPB) under MPL and MPI. We have also optimized some of Fortran BLAS 2 and BLAS 3 routines, e.g., the optimized Fortran DAXPY runs at 175 Mflop/s and optimized Fortran DGEMM runs at 230 Mflop/s per node. The performance of the NPB (Class B) on the IBM SP2 is compared with the CRAY C90, Intel Paragon, TMC CM-5E, and the CRAY T3D.
Parallelization of a hydrological model using the message passing interface
Wu, Yiping; Li, Tiejian; Sun, Liqun; Chen, Ji
2013-01-01
With the increasing knowledge about the natural processes, hydrological models such as the Soil and Water Assessment Tool (SWAT) are becoming larger and more complex with increasing computation time. Additionally, other procedures such as model calibration, which may require thousands of model iterations, can increase running time and thus further reduce rapid modeling and analysis. Using the widely-applied SWAT as an example, this study demonstrates how to parallelize a serial hydrological model in a Windows® environment using a parallel programing technology—Message Passing Interface (MPI). With a case study, we derived the optimal values for the two parameters (the number of processes and the corresponding percentage of work to be distributed to the master process) of the parallel SWAT (P-SWAT) on an ordinary personal computer and a work station. Our study indicates that model execution time can be reduced by 42%–70% (or a speedup of 1.74–3.36) using multiple processes (two to five) with a proper task-distribution scheme (between the master and slave processes). Although the computation time cost becomes lower with an increasing number of processes (from two to five), this enhancement becomes less due to the accompanied increase in demand for message passing procedures between the master and all slave processes. Our case study demonstrates that the P-SWAT with a five-process run may reach the maximum speedup, and the performance can be quite stable (fairly independent of a project size). Overall, the P-SWAT can help reduce the computation time substantially for an individual model run, manual and automatic calibration procedures, and optimization of best management practices. In particular, the parallelization method we used and the scheme for deriving the optimal parameters in this study can be valuable and easily applied to other hydrological or environmental models.
Harrold, Joanne; Halford, Jason; Boyland, Emma
2018-01-01
Monitoring the creative content within food marketing to children is strongly advocated by public health authorities, but few studies address the prevalence of health-related messaging in television adverts. Food and beverage adverts (n = 18,888 in 2008, n = 6664 in 2010) from UK television channels popular with children were coded and analyzed. Physical-activity depiction displayed an 18.8 percentage point increase from 2008 (4.4%) to 2010 (23.2%). Of the food adverts containing physical-activity depiction in 2010, 81.1% were for non-core foods. The appearance of health claims in food adverts in 2010 increased 4.1 percentage points from 2008 levels (20.7% to 24.8%) where the majority of food adverts featuring health and nutrition claims were for non-core foods (58.3%). Health-related (e.g., health/nutrition, weight loss/diet) appeals were used in 17.1% of food adverts during peak child-viewing times, rising to 33.0% of adverts shown on dedicated children’s channels in 2010. Implicit (physical activity) and explicit (health claims) health messages are increasingly prevalent in UK television food advertising viewed by children, and are frequently used to promote unhealthy foods. Policy makers in the UK should consider amendments to the existing statutory approach in order to address this issue. PMID:29558457
Whalen, Rosa; Harrold, Joanne; Child, Simon; Halford, Jason; Boyland, Emma
2018-03-20
Monitoring the creative content within food marketing to children is strongly advocated by public health authorities, but few studies address the prevalence of health-related messaging in television adverts. Food and beverage adverts ( n = 18,888 in 2008, n = 6664 in 2010) from UK television channels popular with children were coded and analyzed. Physical-activity depiction displayed an 18.8 percentage point increase from 2008 (4.4%) to 2010 (23.2%). Of the food adverts containing physical-activity depiction in 2010, 81.1% were for non-core foods. The appearance of health claims in food adverts in 2010 increased 4.1 percentage points from 2008 levels (20.7% to 24.8%) where the majority of food adverts featuring health and nutrition claims were for non-core foods (58.3%). Health-related (e.g., health/nutrition, weight loss/diet) appeals were used in 17.1% of food adverts during peak child-viewing times, rising to 33.0% of adverts shown on dedicated children's channels in 2010. Implicit (physical activity) and explicit (health claims) health messages are increasingly prevalent in UK television food advertising viewed by children, and are frequently used to promote unhealthy foods. Policy makers in the UK should consider amendments to the existing statutory approach in order to address this issue.
Niesta Kayser, Daniela; Graupmann, Verena; Fryer, James W.; Frey, Dieter
2016-01-01
Two experiments examined how individuals respond to a restriction presented within an approach versus an avoidance frame. In Study 1, working on a problem-solving task, participants were initially free to choose their strategy, but for a second task were told to change their strategy. The message to change was embedded in either an approach or avoidance frame. When confronted with an avoidance compared to an approach frame, the participants’ reactance toward the request was greater and, in turn, led to impaired performance. The role of reactance as a response to threat to freedom was explicitly examined in Study 2, in which participants evaluated a potential change in policy affecting their program of study herein explicitly varying whether a restriction was present or absent and whether the message was embedded in an approach versus avoidance frame. When communicated with an avoidance frame and as a restriction, participants showed the highest resistance in terms of reactance, message agreement and evaluation of the communicator. The difference in agreement with the change was mediated by reactance only when a restriction was present. Overall, avoidance goal frames were associated with more resistance to change on different levels of experience (reactance, performance, and person perception). Reactance mediated the effect of goal frame on other outcomes only when a restriction was present. PMID:27242572
Enabling Energy Saving Innovations Act
Rep. Aderholt, Robert B. [R-AL-4
2012-04-26
Senate - 09/24/2012 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.6582, which became Public Law 112-210 on 12/18/2012. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
A Model for Speedup of Parallel Programs
1997-01-01
Sanjeev. K Setia . The interaction between mem- ory allocation and adaptive partitioning in message- passing multicomputers. In IPPS Workshop on Job...Scheduling Strategies for Parallel Processing, pages 89{99, 1995. [15] Sanjeev K. Setia and Satish K. Tripathi. A compar- ative analysis of static
Interstate Recognition of Notarizations Act of 2010
Rep. Aderholt, Robert B. [R-AL-4
2009-10-14
House - 11/17/2010 On motion to refer the bill and the accompanying veto message to the Committee on the Judiciary. Agreed to without objection. (All Actions) Tracker: This bill has the status Failed to pass over vetoHere are the steps for Status of Legislation:
Communication Studies of DMP and SMP Machines
NASA Technical Reports Server (NTRS)
Sohn, Andrew; Biswas, Rupak; Chancellor, Marisa K. (Technical Monitor)
1997-01-01
Understanding the interplay between machines and problems is key to obtaining high performance on parallel machines. This paper investigates the interplay between programming paradigms and communication capabilities of parallel machines. In particular, we explicate the communication capabilities of the IBM SP-2 distributed-memory multiprocessor and the SGI PowerCHALLENGEarray symmetric multiprocessor. Two benchmark problems of bitonic sorting and Fast Fourier Transform are selected for experiments. Communication-efficient algorithms are developed to exploit the overlapping capabilities of the machines. Programs are written in Message-Passing Interface for portability and identical codes are used for both machines. Various data sizes and message sizes are used to test the machines' communication capabilities. Experimental results indicate that the communication performance of the multiprocessors are consistent with the size of messages. The SP-2 is sensitive to message size but yields a much higher communication overlapping because of the communication co-processor. The PowerCHALLENGEarray is not highly sensitive to message size and yields a low communication overlapping. Bitonic sorting yields lower performance compared to FFT due to a smaller computation-to-communication ratio.
NASA Astrophysics Data System (ADS)
Sakata, Ayaka; Xu, Yingying
2018-03-01
We analyse a linear regression problem with nonconvex regularization called smoothly clipped absolute deviation (SCAD) under an overcomplete Gaussian basis for Gaussian random data. We propose an approximate message passing (AMP) algorithm considering nonconvex regularization, namely SCAD-AMP, and analytically show that the stability condition corresponds to the de Almeida-Thouless condition in spin glass literature. Through asymptotic analysis, we show the correspondence between the density evolution of SCAD-AMP and the replica symmetric (RS) solution. Numerical experiments confirm that for a sufficiently large system size, SCAD-AMP achieves the optimal performance predicted by the replica method. Through replica analysis, a phase transition between replica symmetric and replica symmetry breaking (RSB) region is found in the parameter space of SCAD. The appearance of the RS region for a nonconvex penalty is a significant advantage that indicates the region of smooth landscape of the optimization problem. Furthermore, we analytically show that the statistical representation performance of the SCAD penalty is better than that of \
Message passing for integrating and assessing renewable generation in a redundant power grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zdeborova, Lenka; Backhaus, Scott; Chertkov, Michael
2009-01-01
A simplified model of a redundant power grid is used to study integration of fluctuating renewable generation. The grid consists of large number of generator and consumer nodes. The net power consumption is determined by the difference between the gross consumption and the level of renewable generation. The gross consumption is drawn from a narrow distribution representing the predictability of aggregated loads, and we consider two different distributions representing wind and solar resources. Each generator is connected to D consumers, and redundancy is built in by connecting R {le} D of these consumers to other generators. The lines are switchablemore » so that at any instance each consumer is connected to a single generator. We explore the capacity of the renewable generation by determining the level of 'firm' generation capacity that can be displaced for different levels of redundancy R. We also develop message-passing control algorithm for finding switch sellings where no generator is overloaded.« less
Mapping a battlefield simulation onto message-passing parallel architectures
NASA Technical Reports Server (NTRS)
Nicol, David M.
1987-01-01
Perhaps the most critical problem in distributed simulation is that of mapping: without an effective mapping of workload to processors the speedup potential of parallel processing cannot be realized. Mapping a simulation onto a message-passing architecture is especially difficult when the computational workload dynamically changes as a function of time and space; this is exactly the situation faced by battlefield simulations. This paper studies an approach where the simulated battlefield domain is first partitioned into many regions of equal size; typically there are more regions than processors. The regions are then assigned to processors; a processor is responsible for performing all simulation activity associated with the regions. The assignment algorithm is quite simple and attempts to balance load by exploiting locality of workload intensity. The performance of this technique is studied on a simple battlefield simulation implemented on the Flex/32 multiprocessor. Measurements show that the proposed method achieves reasonable processor efficiencies. Furthermore, the method shows promise for use in dynamic remapping of the simulation.
Steganalysis of recorded speech
NASA Astrophysics Data System (ADS)
Johnson, Micah K.; Lyu, Siwei; Farid, Hany
2005-03-01
Digital audio provides a suitable cover for high-throughput steganography. At 16 bits per sample and sampled at a rate of 44,100 Hz, digital audio has the bit-rate to support large messages. In addition, audio is often transient and unpredictable, facilitating the hiding of messages. Using an approach similar to our universal image steganalysis, we show that hidden messages alter the underlying statistics of audio signals. Our statistical model begins by building a linear basis that captures certain statistical properties of audio signals. A low-dimensional statistical feature vector is extracted from this basis representation and used by a non-linear support vector machine for classification. We show the efficacy of this approach on LSB embedding and Hide4PGP. While no explicit assumptions about the content of the audio are made, our technique has been developed and tested on high-quality recorded speech.
Kingman and Heritage Islands Act of 2009
Rep. Norton, Eleanor Holmes [D-DC-At Large
2009-04-23
Senate - 09/28/2010 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.6278, which became Public Law 111-328 on 12/22/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Distance Learning and Public School Finance.
ERIC Educational Resources Information Center
Monahan, Brian; Wimber, Charles
This discussion of the application of computers and telecommunications technology to distance learning begins by describing a workstation equipped to produce "lessonware" in such formats as audiocassettes, videocassettes, diskettes, and voice messages. Such workstations would be located in classrooms equipped with two-way reverse passes to a cable…
Reducing Flight Delays Act of 2013
Sen. Collins, Susan M. [R-ME
2013-04-25
Senate - 04/30/2013 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.1765, which became Public Law 113-9 on 5/1/2013. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Temporary Bankruptcy Judgeships Extension Act of 2011
Rep. Smith, Lamar [R-TX-21
2011-03-10
Senate - 04/23/2012 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.4967, which became Public Law 112-121 on 5/25/2012. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Winning Is(n't) Everything: The Paradox of Excellence and the Challenge of Organizational Epideictic
ERIC Educational Resources Information Center
Stahley, Melissa Bigam; Boyd, Josh
2006-01-01
Encompassing both the controlled messages of values advocacy and less explicit rhetorical actions such as philanthropy, community programs, and volunteerism, organizational epideictic affirms common values. This essay argues that such common values are problematized by the presence of paradox even in seemingly innocuous epideictic subjects.…
Too Many Monkeys Jumping in Their Heads: Animal Lessons within Young Children's Media
ERIC Educational Resources Information Center
Timmerman, Nora; Ostertag, Julia
2011-01-01
Young children's media regularly features animals as its central characters. Potentially reflecting children's well-documented affinity for/with animals, this media--books, toys, songs, clothing, electronic media, and so on--carries with it many explicit and implicit messages about animals and human-animal relationships. This article focuses on…
NASA Astrophysics Data System (ADS)
Wedgwood, Kyle C. A.; Satin, Leslie S.
2018-03-01
In 1967, the social psychologist Stanley Milgram asked how many intermediates would be required for a letter from participants in various U.S. states to be received by a contact in Boston, given that participants were given only basic information about the contact, and were instructed only to pass along the message to someone that might know the intended recipient [27]. The surprising answer was that, in spite of the social and geographical distances covered, on average, only 6 people were required for the message to reach its intended target.
A distributed infrastructure for publishing VO services: an implementation
NASA Astrophysics Data System (ADS)
Cepparo, Francesco; Scagnetto, Ivan; Molinaro, Marco; Smareglia, Riccardo
2016-07-01
This contribution describes both the design and the implementation details of a new solution for publishing VO services, enlightening its maintainable, distributed, modular and scalable architecture. Indeed, the new publisher is multithreaded and multiprocess. Multiple instances of the modules can run on different machines to ensure high performance and high availability, and this will be true both for the interface modules of the services and the back end data access ones. The system uses message passing to let its components communicate through an AMQP message broker that can itself be distributed to provide better scalability and availability.
Berry, Tanya R; Craig, Cora L; Faulkner, Guy; Latimer, Amy; Rhodes, Ryan; Spence, John C; Tremblay, Mark S
2014-02-01
ParticipACTION's Think Again campaign targeted mothers who think their children are sufficiently active, yet whose children do not achieve recommended amounts of physical activity. This research examined the relationship of mothers' intentions to support children's physical activity with explicit believability and implicit agreement with the Think Again campaign message, attention paid to the advertisement, involvement with the issue, concern regarding children's inactivity, and attitudes. Participants were mothers from Edmonton, Canada (N = 102) who viewed one Think Again advertisement then completed a measure of implicit agreement with the campaign message and questionnaires. The mothers who paid attention to the message and were concerned for their own children were more likely to intend to act on campaign messages. The majority of participants implicitly agreed that children's physical inactivity was a problem, but there was less agreement that physical inactivity was a problem for their own children. Participants automatically tended to agree with campaign messages when the focus was on children in general, but there was greater disagreement when asked about participant's own children. Why most mothers were not in agreement with the reality of how much physical activity their children needs remains to be determined.
Sexuality, contraception, and the media. Committee on Public Education.
2001-01-01
Early sexual intercourse among American adolescents represents a major public health problem. Although early sexual activity may be caused by a variety of factors, the media are believed to play a significant role. In film, television, and music, sexual messages are becoming more explicit in dialogue, lyrics, and behavior. In addition, these messages contain unrealistic, inaccurate, and misleading information that young people accept as fact. Teens rank the media second only to school sex education programs as a leading source of information about sex. Recommendations are presented to help pediatricians address the effects of the media on sexual attitudes, beliefs, and behaviors of their patients.
WinHPC System Programming | High-Performance Computing | NREL
Programming WinHPC System Programming Learn how to build and run an MPI (message passing interface (mpi.h) and library (msmpi.lib) are. To build from the command line, run... Start > Intel Software Development Tools > Intel C++ Compiler Professional... > C++ Build Environment for applications running
Parallel 3D Multi-Stage Simulation of a Turbofan Engine
NASA Technical Reports Server (NTRS)
Turner, Mark G.; Topp, David A.
1998-01-01
A 3D multistage simulation of each component of a modern GE Turbofan engine has been made. An axisymmetric view of this engine is presented in the document. This includes a fan, booster rig, high pressure compressor rig, high pressure turbine rig and a low pressure turbine rig. In the near future, all components will be run in a single calculation for a solution of 49 blade rows. The simulation exploits the use of parallel computations by using two levels of parallelism. Each blade row is run in parallel and each blade row grid is decomposed into several domains and run in parallel. 20 processors are used for the 4 blade row analysis. The average passage approach developed by John Adamczyk at NASA Lewis Research Center has been further developed and parallelized. This is APNASA Version A. It is a Navier-Stokes solver using a 4-stage explicit Runge-Kutta time marching scheme with variable time steps and residual smoothing for convergence acceleration. It has an implicit K-E turbulence model which uses an ADI solver to factor the matrix. Between 50 and 100 explicit time steps are solved before a blade row body force is calculated and exchanged with the other blade rows. This outer iteration has been coined a "flip." Efforts have been made to make the solver linearly scaleable with the number of blade rows. Enough flips are run (between 50 and 200) so the solution in the entire machine is not changing. The K-E equations are generally solved every other explicit time step. One of the key requirements in the development of the parallel code was to make the parallel solution exactly (bit for bit) match the serial solution. This has helped isolate many small parallel bugs and guarantee the parallelization was done correctly. The domain decomposition is done only in the axial direction since the number of points axially is much larger than the other two directions. This code uses MPI for message passing. The parallel speed up of the solver portion (no 1/0 or body force calculation) for a grid which has 227 points axially.
Using the Ecological Model to understand influences on college student vaping.
Cheney, Marshall K; Gowin, Mary; Clawson, Ashley H
2018-02-16
Objective The Ecological Model was used to examine the social and environmental influences of the college environment on e-cigarette use (vaping) among college students. Undergraduate college student e-cigarette users (vapers) across three large college campuses in the southwest US from Jan 2015- Aug 2016. Thirty-three interviews were conducted. Transcribed interviews were coded then analyzed for themes. College student vapers report multiple levels of influence on their vaping beyond personal beliefs and peer influences, including parents, explicit campus and community messaging, community member requests, and respect for others. College student vapers also describe constant associations with smokers in allowable public places to vape. Parents, community members, campus policy, and the physical environment all influence where and when college students vape. Health communication messages to prevent college student vaping should incorporate alternative messages that are important to college students, such as respect for others and social image.
Information processing in the CNS: a supramolecular chemistry?
Tozzi, Arturo
2015-10-01
How does central nervous system process information? Current theories are based on two tenets: (a) information is transmitted by action potentials, the language by which neurons communicate with each other-and (b) homogeneous neuronal assemblies of cortical circuits operate on these neuronal messages where the operations are characterized by the intrinsic connectivity among neuronal populations. In this view, the size and time course of any spike is stereotypic and the information is restricted to the temporal sequence of the spikes; namely, the "neural code". However, an increasing amount of novel data point towards an alternative hypothesis: (a) the role of neural code in information processing is overemphasized. Instead of simply passing messages, action potentials play a role in dynamic coordination at multiple spatial and temporal scales, establishing network interactions across several levels of a hierarchical modular architecture, modulating and regulating the propagation of neuronal messages. (b) Information is processed at all levels of neuronal infrastructure from macromolecules to population dynamics. For example, intra-neuronal (changes in protein conformation, concentration and synthesis) and extra-neuronal factors (extracellular proteolysis, substrate patterning, myelin plasticity, microbes, metabolic status) can have a profound effect on neuronal computations. This means molecular message passing may have cognitive connotations. This essay introduces the concept of "supramolecular chemistry", involving the storage of information at the molecular level and its retrieval, transfer and processing at the supramolecular level, through transitory non-covalent molecular processes that are self-organized, self-assembled and dynamic. Finally, we note that the cortex comprises extremely heterogeneous cells, with distinct regional variations, macromolecular assembly, receptor repertoire and intrinsic microcircuitry. This suggests that every neuron (or group of neurons) embodies different molecular information that hands an operational effect on neuronal computation.
Opening up the Profession: Inclusive Messages for Pre-Service Teachers from a Pedagogy Textbook
ERIC Educational Resources Information Center
Brass, Amber
2016-01-01
Textbooks are a ubiquitous part of classrooms in all levels of education. Whilst textbooks used in tertiary content subjects have been examined in several studies, research focused on textbooks used in mathematics pedagogy subjects is scarce. Using a discourse analytic framework, this paper presents data about the implicit and explicit messages…
A Cross-Cultural Study: Deaf Students in a Public Mainstream School Setting
ERIC Educational Resources Information Center
Slobodzian, Jean T.
2011-01-01
The 1000 primary school students in this study included a minority population of nine deaf children. The underlying foundation of this mainstream environment allowed for accommodations, but only to the extent that the non-deaf majority was not overtly impacted. Explicit messages of equality and implicit notions of normal were often in conflict.…
There Is No "Race" in the Schoolyard: Color-Blind Ideology in an (Almost) All-White School.
ERIC Educational Resources Information Center
Lewis, Amanda E.
2001-01-01
Using ethnographic techniques and formal interviews with 12 students, examined the racial messages and lessons students got from parents and teachers in one suburban elementary school community. Explicit color-blind "race talk" masked a reality of racialized practices and color-conscious understandings. Discusses this apparent paradox in the…
Increasing the Operational Value of Event Messages
NASA Technical Reports Server (NTRS)
Li, Zhenping; Savkli, Cetin; Smith, Dan
2003-01-01
Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.
Scalable Replay with Partial-Order Dependencies for Message-Logging Fault Tolerance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lifflander, Jonathan; Meneses, Esteban; Menon, Harshita
2014-09-22
Deterministic replay of a parallel application is commonly used for discovering bugs or to recover from a hard fault with message-logging fault tolerance. For message passing programs, a major source of overhead during forward execution is recording the order in which messages are sent and received. During replay, this ordering must be used to deterministically reproduce the execution. Previous work in replay algorithms often makes minimal assumptions about the programming model and application in order to maintain generality. However, in many cases, only a partial order must be recorded due to determinism intrinsic in the code, ordering constraints imposed bymore » the execution model, and events that are commutative (their relative execution order during replay does not need to be reproduced exactly). In this paper, we present a novel algebraic framework for reasoning about the minimum dependencies required to represent the partial order for different concurrent orderings and interleavings. By exploiting this theory, we improve on an existing scalable message-logging fault tolerance scheme. The improved scheme scales to 131,072 cores on an IBM BlueGene/P with up to 2x lower overhead than one that records a total order.« less
NASA Astrophysics Data System (ADS)
Chandramouli, Rajarathnam; Li, Grace; Memon, Nasir D.
2002-04-01
Steganalysis techniques attempt to differentiate between stego-objects and cover-objects. In recent work we developed an explicit analytic upper bound for the steganographic capacity of LSB based steganographic techniques for a given false probability of detection. In this paper we look at adaptive steganographic techniques. Adaptive steganographic techniques take explicit steps to escape detection. We explore different techniques that can be used to adapt message embedding to the image content or to a known steganalysis technique. We investigate the advantages of adaptive steganography within an analytical framework. We also give experimental results with a state-of-the-art steganalysis technique demonstrating that adaptive embedding results in a significant number of bits embedded without detection.
NASA Astrophysics Data System (ADS)
Vitanov, Nikolay V.
2018-05-01
In the experimental determination of the population transfer efficiency between discrete states of a coherently driven quantum system it is often inconvenient to measure the population of the target state. Instead, after the interaction that transfers the population from the initial state to the target state, a second interaction is applied which brings the system back to the initial state, the population of which is easy to measure and normalize. If the transition probability is p in the forward process, then classical intuition suggests that the probability to return to the initial state after the backward process should be p2. However, this classical expectation is generally misleading because it neglects interference effects. This paper presents a rigorous theoretical analysis based on the SU(2) and SU(3) symmetries of the propagators describing the evolution of quantum systems with two and three states, resulting in explicit analytic formulas that link the two-step probabilities to the single-step ones. Explicit examples are given with the popular techniques of rapid adiabatic passage and stimulated Raman adiabatic passage. The present results suggest that quantum-mechanical probabilities degrade faster in repeated processes than classical probabilities. Therefore, the actual single-pass efficiencies in various experiments, calculated from double-pass probabilities, might have been greater than the reported values.
Ferguson, Eamonn; Lawrence, Claire
2013-05-01
There is increasing use of counter-normative health messages (i.e., evidence-based health information about cause-effect relationships that run counter to shared normative beliefs, e.g., stress can lead to personal growth). The current studies examine the effect of normative and counter-normative messages about stress on levels of symptom reporting. Predictions are derived from reactance, social comparison, and self-enhancement theories. Two studies focus on the development of the messages, and two experimental studies examine the effect of manipulating normative and counter-normative messages on symptom reports. The final study controls for mere-measurement effects and explores the role of stress process variables (appraisals and coping). Exposure to a normative message (stress causes ill health) results in reduced symptom reporting compared to a counter-normative message (stress provides challenge, growth, and development) and control groups. The results suggest that people may use symptom reporting strategically to indicate coping. Based on the argument that beliefs about stress and health are stored as mental models, the theoretical associations derived from stress theory are only observed when a normative message is presented. Counter-normative stress messages may carry no tangible benefits compared to normative messages. Some stress research may suffer from inherent methodological bias when normative information is provided in information and consent sheets. Statement of contribution What is already known on this subject? At present, nothing is known about counter-normative health messages, despite the fact that they are becoming widely used as a public intervention. What does this study add? A clear operational definition of counter-normative messages. A test of three competing theories for counter-normative messages that focus of the stress-symptom link. Demonstrating for the first time, that in the domain of stress and health, counter-normative messages are at best ineffective. Demonstrating for the first time that only when the stress-coping-symptom links are made explicit do the theoretical associations observed in the literature emerge. This may be a potential methodological artefact in stress research that needs to be controlled. © 2013 The British Psychological Society.
Lang, Jun
2012-01-30
In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.
E-mail, decisional styles, and rest breaks.
Baker, James R; Phillips, James G
2007-10-01
E-mail is a common but problematic work application. A scale was created to measure tendencies to use e-mail to take breaks (e-breaking); and self-esteem and decisional style (vigilance, procrastination, buck-passing, hypervigilance) were used to predict the self-reported and actual e-mail behaviors of 133 participants (students and marketing employees). Individuals who were low in defensive avoidance (buck-passing) engaged in more e-mailing per week, both in time spent on e-mail and message volume. E-breakers were more likely to engage in behavioral procrastination and spent more time on personal e-mail.
PyPanda: a Python package for gene regulatory network reconstruction
van IJzendoorn, David G.P.; Glass, Kimberly; Quackenbush, John; Kuijjer, Marieke L.
2016-01-01
Summary: PANDA (Passing Attributes between Networks for Data Assimilation) is a gene regulatory network inference method that uses message-passing to integrate multiple sources of ‘omics data. PANDA was originally coded in C ++. In this application note we describe PyPanda, the Python version of PANDA. PyPanda runs considerably faster than the C ++ version and includes additional features for network analysis. Availability and implementation: The open source PyPanda Python package is freely available at http://github.com/davidvi/pypanda. Contact: mkuijjer@jimmy.harvard.edu or d.g.p.van_ijzendoorn@lumc.nl PMID:27402905
PyPanda: a Python package for gene regulatory network reconstruction.
van IJzendoorn, David G P; Glass, Kimberly; Quackenbush, John; Kuijjer, Marieke L
2016-11-01
PANDA (Passing Attributes between Networks for Data Assimilation) is a gene regulatory network inference method that uses message-passing to integrate multiple sources of 'omics data. PANDA was originally coded in C ++. In this application note we describe PyPanda, the Python version of PANDA. PyPanda runs considerably faster than the C ++ version and includes additional features for network analysis. The open source PyPanda Python package is freely available at http://github.com/davidvi/pypanda CONTACT: mkuijjer@jimmy.harvard.edu or d.g.p.van_ijzendoorn@lumc.nl. © The Author 2016. Published by Oxford University Press.
Sen. Cornyn, John [R-TX
2012-05-24
Senate - 01/02/2013 Message on House action received in Senate and at desk: House amendments to Senate bill. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Support for Debugging Automatically Parallelized Programs
NASA Technical Reports Server (NTRS)
Hood, Robert; Jost, Gabriele
2001-01-01
This viewgraph presentation provides information on support sources available for the automatic parallelization of computer program. CAPTools, a support tool developed at the University of Greenwich, transforms, with user guidance, existing sequential Fortran code into parallel message passing code. Comparison routines are then run for debugging purposes, in essence, ensuring that the code transformation was accurate.
Earth observation taken by the Expedition 43 crew.
2015-03-13
Earth observation taken during a day pass by the Expedition 43 crew aboard the International Space Station (ISS). Sent as part of Twitter message: #HappyStPatrickDay with best wishes from the #E43 crew! From space you can see the âEmerald Isleâ is very green!
New Frontier Congressional Gold Medal Act
Sen. Nelson, Bill [D-FL
2009-05-01
Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.2245, which became Public Law 111-44 on 8/7/2009. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Sen. Dorgan, Byron L. [D-ND
2009-05-12
Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.1299, which became Public Law 111-145 on 3/4/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
ERIC Educational Resources Information Center
Honawar, Vaishali
2006-01-01
A decade has passed since a few union leaders formed the network known as Teacher Union Reform Network (TURN) to search for innovative ways to enhance education. Selling their message has not always been easy. Created in 1995, TURN was the brain child of Adam Urbanski, the president of the Rochester (N.Y.) Teachers Association for the past 25…
Monitoring Data-Structure Evolution in Distributed Message-Passing Programs
NASA Technical Reports Server (NTRS)
Sarukkai, Sekhar R.; Beers, Andrew; Woodrow, Thomas S. (Technical Monitor)
1996-01-01
Monitoring the evolution of data structures in parallel and distributed programs, is critical for debugging its semantics and performance. However, the current state-of-art in tracking and presenting data-structure information on parallel and distributed environments is cumbersome and does not scale. In this paper we present a methodology that automatically tracks memory bindings (not the actual contents) of static and dynamic data-structures of message-passing C programs, using PVM. With the help of a number of examples we show that in addition to determining the impact of memory allocation overheads on program performance, graphical views can help in debugging the semantics of program execution. Scalable animations of virtual address bindings of source-level data-structures are used for debugging the semantics of parallel programs across all processors. In conjunction with light-weight core-files, this technique can be used to complement traditional debuggers on single processors. Detailed information (such as data-structure contents), on specific nodes, can be determined using traditional debuggers after the data structure evolution leading to the semantic error is observed graphically.
NASA Technical Reports Server (NTRS)
Katz, Daniel
2004-01-01
PVM Wrapper is a software library that makes it possible for code that utilizes the Parallel Virtual Machine (PVM) software library to run using the message-passing interface (MPI) software library, without needing to rewrite the entire code. PVM and MPI are the two most common software libraries used for applications that involve passing of messages among parallel computers. Since about 1996, MPI has been the de facto standard. Codes written when PVM was popular often feature patterns of {"initsend," "pack," "send"} and {"receive," "unpack"} calls. In many cases, these calls are not contiguous and one set of calls may even exist over multiple subroutines. These characteristics make it difficult to obtain equivalent functionality via a single MPI "send" call. Because PVM Wrapper is written to run with MPI- 1.2, some PVM functions are not permitted and must be replaced - a task that requires some programming expertise. The "pvm_spawn" and "pvm_parent" function calls are not replaced, but a programmer can use "mpirun" and knowledge of the ranks of parent and child tasks with supplied macroinstructions to enable execution of codes that use "pvm_spawn" and "pvm_parent."
Parallelized direct execution simulation of message-passing parallel programs
NASA Technical Reports Server (NTRS)
Dickens, Phillip M.; Heidelberger, Philip; Nicol, David M.
1994-01-01
As massively parallel computers proliferate, there is growing interest in findings ways by which performance of massively parallel codes can be efficiently predicted. This problem arises in diverse contexts such as parallelizing computers, parallel performance monitoring, and parallel algorithm development. In this paper we describe one solution where one directly executes the application code, but uses a discrete-event simulator to model details of the presumed parallel machine such as operating system and communication network behavior. Because this approach is computationally expensive, we are interested in its own parallelization specifically the parallelization of the discrete-event simulator. We describe methods suitable for parallelized direct execution simulation of message-passing parallel programs, and report on the performance of such a system, Large Application Parallel Simulation Environment (LAPSE), we have built on the Intel Paragon. On all codes measured to date, LAPSE predicts performance well typically within 10 percent relative error. Depending on the nature of the application code, we have observed low slowdowns (relative to natively executing code) and high relative speedups using up to 64 processors.
Message Passing and Shared Address Space Parallelism on an SMP Cluster
NASA Technical Reports Server (NTRS)
Shan, Hongzhang; Singh, Jaswinder P.; Oliker, Leonid; Biswas, Rupak; Biegel, Bryan (Technical Monitor)
2002-01-01
Currently, message passing (MP) and shared address space (SAS) are the two leading parallel programming paradigms. MP has been standardized with MPI, and is the more common and mature approach; however, code development can be extremely difficult, especially for irregularly structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality and high protocol overhead. In this paper, we compare the performance of and the programming effort required for six applications under both programming models on a 32-processor PC-SMP cluster, a platform that is becoming increasingly attractive for high-end scientific computing. Our application suite consists of codes that typically do not exhibit scalable performance under shared-memory programming due to their high communication-to-computation ratios and/or complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of our applications, while being competitive for the others. A hybrid MPI+SAS strategy shows only a small performance advantage over pure MPI in some cases. Finally, improved implementations of two MPI collective operations on PC-SMP clusters are presented.
Low-pass filtering of noisy Schlumberger sounding curves. Part I: Theory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Patella, D.
1986-02-01
A contribution is given to the solution of the problem of filtering noise-degraded Schlumberger sounding curves. It is shown that the transformation to the pole-pole system is actually a smoothing operation that filters high-frequency noise. In the case of residual noise contamination in the transformed pole-pole curve, it is demonstrated that a subsequent application of a conventional rectangular low-pass filter, with cut-off frequency not less than the right-hand frequency limit of the main message pass-band, may satisfactorily solve the problem by leaving a pole-pole curve available for interpretation. An attempt is also made to understand the essential peculiarities of themore » pole-pole system as far as penetration depth, resolving power and selectivity power are concerned.« less
Message passing with queues and channels
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dozsa, Gabor J; Heidelberger, Philip; Kumar, Sameer
In an embodiment, a reception thread receives a source node identifier, a type, and a data pointer from an application and, in response, creates a receive request. If the source node identifier specifies a source node, the reception thread adds the receive request to a fast-post queue. If a message received from a network does not match a receive request on a posted queue, a polling thread adds a receive request that represents the message to an unexpected queue. If the fast-post queue contains the receive request, the polling thread removes the receive request from the fast-post queue. If themore » receive request that was removed from the fast-post queue does not match the receive request on the unexpected queue, the polling thread adds the receive request that was removed from the fast-post queue to the posted queue. The reception thread and the polling thread execute asynchronously from each other.« less
Secure Web-Site Access with Tickets and Message-Dependent Digests
Donato, David I.
2008-01-01
Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.
Versteeg, Roelof J; Few, Douglas A; Kinoshita, Robert A; Johnson, Doug; Linda, Ondrej
2015-02-24
Methods, computer readable media, and apparatuses provide robotic explosive hazard detection. A robot intelligence kernel (RIK) includes a dynamic autonomy structure with two or more autonomy levels between operator intervention and robot initiative A mine sensor and processing module (ESPM) operating separately from the RIK perceives environmental variables indicative of a mine using subsurface perceptors. The ESPM processes mine information to determine a likelihood of a presence of a mine. A robot can autonomously modify behavior responsive to an indication of a detected mine. The behavior is modified between detection of mines, detailed scanning and characterization of the mine, developing mine indication parameters, and resuming detection. Real time messages are passed between the RIK and the ESPM. A combination of ESPM bound messages and RIK bound messages cause the robot platform to switch between modes including a calibration mode, the mine detection mode, and the mine characterization mode.
Versteeg, Roelof J.; Few, Douglas A.; Kinoshita, Robert A.; Johnson, Douglas; Linda, Ondrej
2015-12-15
Methods, computer readable media, and apparatuses provide robotic explosive hazard detection. A robot intelligence kernel (RIK) includes a dynamic autonomy structure with two or more autonomy levels between operator intervention and robot initiative A mine sensor and processing module (ESPM) operating separately from the RIK perceives environmental variables indicative of a mine using subsurface perceptors. The ESPM processes mine information to determine a likelihood of a presence of a mine. A robot can autonomously modify behavior responsive to an indication of a detected mine. The behavior is modified between detection of mines, detailed scanning and characterization of the mine, developing mine indication parameters, and resuming detection. Real time messages are passed between the RIK and the ESPM. A combination of ESPM bound messages and RIK bound messages cause the robot platform to switch between modes including a calibration mode, the mine detection mode, and the mine characterization mode.
Machine-checked proofs of the design and implementation of a fault-tolerant circuit
NASA Technical Reports Server (NTRS)
Bevier, William R.; Young, William D.
1990-01-01
A formally verified implementation of the 'oral messages' algorithm of Pease, Shostak, and Lamport is described. An abstract implementation of the algorithm is verified to achieve interactive consistency in the presence of faults. This abstract characterization is then mapped down to a hardware level implementation which inherits the fault-tolerant characteristics of the abstract version. All steps in the proof were checked with the Boyer-Moore theorem prover. A significant results is the demonstration of a fault-tolerant device that is formally specified and whose implementation is proved correct with respect to this specification. A significant simplifying assumption is that the redundant processors behave synchronously. A mechanically checked proof that the oral messages algorithm is 'optimal' in the sense that no algorithm which achieves agreement via similar message passing can tolerate a larger proportion of faulty processor is also described.
Using personas to tailor educational messages to the preferences of coronary heart disease patients.
Vosbergen, S; Mulder-Wiggers, J M R; Lacroix, J P; Kemps, H M C; Kraaijenhagen, R A; Jaspers, M W M; Peek, N
2015-02-01
Although tailoring health education messages to individual characteristics of patients has shown promising results, most patient education materials still take a one-size-fits-all approach. The aim of this study was to develop a method for tailoring health education messages to patients' preferences for various message features, using the concept of personas. This is a preliminary study focused on education for coronary heart disease (CHD) patients. This study used a three-step approach. First, we created personas by (i) performing k-means cluster analysis on data from an online survey that assessed the preferences of 213 CHD patients for various message features and, (ii) creating a vivid description of the preferences per patient cluster in an iterative process with the research team. Second, we developed adaptation rules to tailor existing educational messages to the resulting personas. Third, we conducted a pilot validation by adapting nine existing educational messages to each of the personas. These messages and the resulting personas were then presented to a separate group of 38 CHD patients who visited the cardiology outpatient clinic. They were first asked to choose their most preferred, second most preferred, and least preferred persona. Subsequently, they were asked to rate three of the adapted messages; one for every of the persona choices. We created five personas that pertained to five patient clusters. Personas varied mainly on preferences for medical or lay language, current or future temporal perspective, and including or excluding explicit health risks. Fifty-five different adaptation rules were developed, primarily describing adaptations to the message's perspective, level of detail, sentence structure, and terminology. Most participants in the validation study could identify with one of the five personas, although some of them found it hard to choose. On average, 68.5% of all participants rated the messages that matched their most preferred persona more positively than, or in the same way as, the messages that matched their least preferred persona. The persona-based method developed in this study can be used to create a manageable set of patient-centered tailored messages, while additionally using the developed personas to assess patients' preferences. Copyright © 2014 Elsevier Inc. All rights reserved.
Parallel community climate model: Description and user`s guide
DOE Office of Scientific and Technical Information (OSTI.GOV)
Drake, J.B.; Flanery, R.E.; Semeraro, B.D.
This report gives an overview of a parallel version of the NCAR Community Climate Model, CCM2, implemented for MIMD massively parallel computers using a message-passing programming paradigm. The parallel implementation was developed on an Intel iPSC/860 with 128 processors and on the Intel Delta with 512 processors, and the initial target platform for the production version of the code is the Intel Paragon with 2048 processors. Because the implementation uses a standard, portable message-passing libraries, the code has been easily ported to other multiprocessors supporting a message-passing programming paradigm. The parallelization strategy used is to decompose the problem domain intomore » geographical patches and assign each processor the computation associated with a distinct subset of the patches. With this decomposition, the physics calculations involve only grid points and data local to a processor and are performed in parallel. Using parallel algorithms developed for the semi-Lagrangian transport, the fast Fourier transform and the Legendre transform, both physics and dynamics are computed in parallel with minimal data movement and modest change to the original CCM2 source code. Sequential or parallel history tapes are written and input files (in history tape format) are read sequentially by the parallel code to promote compatibility with production use of the model on other computer systems. A validation exercise has been performed with the parallel code and is detailed along with some performance numbers on the Intel Paragon and the IBM SP2. A discussion of reproducibility of results is included. A user`s guide for the PCCM2 version 2.1 on the various parallel machines completes the report. Procedures for compilation, setup and execution are given. A discussion of code internals is included for those who may wish to modify and use the program in their own research.« less
Rep. Crowley, Joseph [D-NY-7
2011-05-26
Senate - 09/15/2011 Message on Senate action sent to the House. (All Actions) Notes: For further action, see H.R.2017, which became Public Law 112-33 on 9/30/2011. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Final report: Compiled MPI. Cost-Effective Exascale Application Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gropp, William Douglas
2015-12-21
This is the final report on Compiled MPI: Cost-Effective Exascale Application Development, and summarizes the results under this project. The project investigated runtime enviroments that improve the performance of MPI (Message-Passing Interface) programs; work at Illinois in the last period of this project looked at optimizing data access optimizations expressed with MPI datatypes.
Emergency Border Security Supplemental Appropriations Act, 2010
Rep. Price, David E. [D-NC-4
2010-07-27
Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.6080, which became Public Law 111-230 on 8/13/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
A Down-to-Earth Educational Operating System for Up-in-the-Cloud Many-Core Architectures
ERIC Educational Resources Information Center
Ziwisky, Michael; Persohn, Kyle; Brylow, Dennis
2013-01-01
We present "Xipx," the first port of a major educational operating system to a processor in the emerging class of many-core architectures. Through extensions to the proven Embedded Xinu operating system, Xipx gives students hands-on experience with system programming in a distributed message-passing environment. We expose the software primitives…
LDPC Codes--Structural Analysis and Decoding Techniques
ERIC Educational Resources Information Center
Zhang, Xiaojie
2012-01-01
Low-density parity-check (LDPC) codes have been the focus of much research over the past decade thanks to their near Shannon limit performance and to their efficient message-passing (MP) decoding algorithms. However, the error floor phenomenon observed in MP decoding, which manifests itself as an abrupt change in the slope of the error-rate curve,…
Comprehensive Iran Sanctions, Accountability, and Divestment Act of 2009
Sen. Dodd, Christopher J. [D-CT
2009-11-19
Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.2194, which became Public Law 111-195 on 7/1/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Federal Aviation Administration Extension Act of 2010
Sen. Rockefeller, John D., IV [D-WV
2010-03-25
Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.5147, which became Public Law 111-161 on 4/30/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Minority Journalists Push Media to Maintain Diversity Commitment
ERIC Educational Resources Information Center
Anderson, Michelle D.
2008-01-01
In a media advisory released earlier this month, the National Association of Black Journalists (NABJ) had an urgent message for the newspaper industry: Diversity should not be treated like a passing fad and it should continue to be a top priority. The advocacy organization, where a majority of its 4,000 members are Black print journalists, warned…
A qualitative analysis of messages to promote smoking cessation among pregnant women
Hoek, Janet; Gifford, Heather; Maubach, Ninya; Newcombe, Rhiannon
2014-01-01
Objectives Although aware that smoking while pregnant presents serious risks to their unborn children, some women continue to smoke and rationalise their dissonance rather than quit. We explored metaphors women used to frame smoking and quitting, then developed cessation messages that drew on these metaphors and examined the perceived effectiveness of these. Participants We used a two-phase qualitative study. Phase one involved 13 in-depth interviews with women who were smoking (or who had smoked) while pregnant. Phase two comprised 22 in-depth interviews with a new sample drawn from the same population. Analyses Data were analysed using thematic analysis, which promoted theme identification independently of the research protocol. Results Participants often described smoking as a choice, a frame that explicitly asserted control over their behaviour. This stance allowed them to counter-argue messages to quit, and distanced them from the risks they created and faced. Messages tested in phase 2 used strong affective appeals as well as themes that stimulated cognitive reflection. Without exception, the messages depicting unwell or distressed children elicited strong emotional responses, were more powerful cessation stimuli, and elicited fewer counter-arguments. Conclusions Cessation messages that evoke strong affective responses capitalise on the dissonance many women feel when smoking while pregnant and stimulate stronger consideration of quitting. Given the importance of promoting cessation among pregnant women, future campaigns could make greater use of emotional appeals and place less emphasis on informational approaches, which often prompt vigorous counter-arguments. PMID:25431224
From Our Practices to Yours: Key Messages for the Journey to Integrated Behavioral Health.
Gold, Stephanie B; Green, Larry A; Peek, C J
The historic, cultural separation of primary care and behavioral health has caused the spread of integrated care to lag behind other practice transformation efforts. The Advancing Care Together study was a 3-year evaluation of how practices implemented integrated care in their local contexts; at its culmination, practice leaders ("innovators") identified lessons learned to pass on to others. Individual feedback from innovators, key messages created by workgroups of innovators and the study team, and a synthesis of key messages from a facilitated discussion were analyzed for themes via immersion/crystallization. Five key themes were captured: (1) frame integrated care as a necessary paradigm shift to patient-centered, whole-person health care; (2) initialize: define relationships and protocols up-front, understanding they will evolve; (3) build inclusive, empowered teams to provide the foundation for integration; (4) develop a change management strategy of continuous evaluation and course-correction; and (5) use targeted data collection pertinent to integrated care to drive improvement and impart accountability. Innovators integrating primary care and behavioral health discerned key messages from their practical experience that they felt were worth sharing with others. Their messages present insight into the challenges unique to integrating care beyond other practice transformation efforts. © Copyright 2017 by the American Board of Family Medicine.
Concurrent hypercube system with improved message passing
NASA Technical Reports Server (NTRS)
Peterson, John C. (Inventor); Tuazon, Jesus O. (Inventor); Lieberman, Don (Inventor); Pniel, Moshe (Inventor)
1989-01-01
A network of microprocessors, or nodes, are interconnected in an n-dimensional cube having bidirectional communication links along the edges of the n-dimensional cube. Each node's processor network includes an I/O subprocessor dedicated to controlling communication of message packets along a bidirectional communication link with each end thereof terminating at an I/O controlled transceiver. Transmit data lines are directly connected from a local FIFO through each node's communication link transceiver. Status and control signals from the neighboring nodes are delivered over supervisory lines to inform the local node that the neighbor node's FIFO is empty and the bidirectional link between the two nodes is idle for data communication. A clocking line between neighbors, clocks a message into an empty FIFO at a neighbor's node and vica versa. Either neighbor may acquire control over the bidirectional communication link at any time, and thus each node has circuitry for checking whether or not the communication link is busy or idle, and whether or not the receive FIFO is empty. Likewise, each node can empty its own FIFO and in turn deliver a status signal to a neighboring node indicating that the local FIFO is empty. The system includes features of automatic message rerouting, block message transfer and automatic parity checking and generation.
Cacades: A reliable dissemination protocol for data collection sensor network
Peng, Y.; Song, W.; Huang, R.; Xu, M.; Shirazi, B.; LaHusen, R.; Pei, G.
2009-01-01
In this paper, we propose a fast and reliable data dissemination protocol Cascades to disseminate data from the sink(base station) to all or a subset of nodes in a data collection sensor network. Cascades makes use of the parentmonitor-children analogy to ensure reliable dissemination. Each node monitors whether or not its children have received the broadcast messages through snooping children's rebroadcasts or waiting for explicit ACKs. If a node detects a gap in its message sequences, it can fetch the missing messages from its neighbours reactively. Cascades also considers many practical issues for field deployment, such as dynamic topology, link/node failure, etc.. It therefore guarantees that a disseminated message from the sink will reach all intended receivers and the dissemination is terminated in a short time period. Notice that, all existing dissemination protocols either do not guarantee reliability or do not terminate [1, 2], which does not meet the requirement of real-time command control. We conducted experiment evaluations in both TOSSIM simulator and a sensor network testbed to compare Cascades with those existing dissemination protocols in TinyOS sensor networks, which show that Cascades achieves a higher degree of reliability, lower communication cost, and less delivery delay. ??2009 IEEE.
A human language corpus for interstellar message construction
NASA Astrophysics Data System (ADS)
Elliott, John
2011-02-01
The aim of HuLCC (the human language chorus corpus), is to provide a resource of sufficient size to facilitate inter-language analysis by incorporating languages from all the major language families: for the first time all aspects of typology will be incorporated within a single corpus, adhering to a consistent grammatical classification and granularity, which historically adopt a plethora of disparate schemes. An added feature will be the inclusion of a common text element, which will be translated across all languages, to provide a precise comparable thread for detailed linguistic analysis for translation strategies and a mechanism by which these mappings can be explicitly achieved. Methods developed to solve unambiguous mappings across these languages can then be adopted for any subsequent message authored by the SETI community. Initially, it is planned to provide at least 20,000 words for each chosen language, as this amount of text exceeds the point where randomly generated text can be disambiguated from natural language and is of sufficient size useful for message transmission [1] (Elliot, 2002). This paper details the design of this resource, which ultimately will be made available to SETI upon its completion, and discusses issues 'core' to any message construction.
Performance issues for domain-oriented time-driven distributed simulations
NASA Technical Reports Server (NTRS)
Nicol, David M.
1987-01-01
It has long been recognized that simulations form an interesting and important class of computations that may benefit from distributed or parallel processing. Since the point of parallel processing is improved performance, the recent proliferation of multiprocessors requires that we consider the performance issues that naturally arise when attempting to implement a distributed simulation. Three such issues are: (1) the problem of mapping the simulation onto the architecture, (2) the possibilities for performing redundant computation in order to reduce communication, and (3) the avoidance of deadlock due to distributed contention for message-buffer space. These issues are discussed in the context of a battlefield simulation implemented on a medium-scale multiprocessor message-passing architecture.
Parallel integer sorting with medium and fine-scale parallelism
NASA Technical Reports Server (NTRS)
Dagum, Leonardo
1993-01-01
Two new parallel integer sorting algorithms, queue-sort and barrel-sort, are presented and analyzed in detail. These algorithms do not have optimal parallel complexity, yet they show very good performance in practice. Queue-sort designed for fine-scale parallel architectures which allow the queueing of multiple messages to the same destination. Barrel-sort is designed for medium-scale parallel architectures with a high message passing overhead. The performance results from the implementation of queue-sort on a Connection Machine CM-2 and barrel-sort on a 128 processor iPSC/860 are given. The two implementations are found to be comparable in performance but not as good as a fully vectorized bucket sort on the Cray YMP.
Reducing Interprocessor Dependence in Recoverable Distributed Shared Memory
NASA Technical Reports Server (NTRS)
Janssens, Bob; Fuchs, W. Kent
1994-01-01
Checkpointing techniques in parallel systems use dependency tracking and/or message logging to ensure that a system rolls back to a consistent state. Traditional dependency tracking in distributed shared memory (DSM) systems is expensive because of high communication frequency. In this paper we show that, if designed correctly, a DSM system only needs to consider dependencies due to the transfer of blocks of data, resulting in reduced dependency tracking overhead and reduced potential for rollback propagation. We develop an ownership timestamp scheme to tolerate the loss of block state information and develop a passive server model of execution where interactions between processors are considered atomic. With our scheme, dependencies are significantly reduced compared to the traditional message-passing model.
Oddone, María Julieta
2013-04-01
This article presents the content (discourse) analysis of messages transmitted by primary school readers in the period between 1880 to 2012. This study allowed us to explore the image of old age and aging that society has and passes on to new generations as well as the role assigned to this generational group. The historical periods that provide the context for the data were defined according to the continuity of or the turning points in the social values transmitted in the reading materials. The role assigned to elderly people and the image of old age that the Argentine society passed on and continues to pass on to younger generations demonstrate that each period described has its own model of aging.
Methods for extracting social network data from chatroom logs
NASA Astrophysics Data System (ADS)
Osesina, O. Isaac; McIntire, John P.; Havig, Paul R.; Geiselman, Eric E.; Bartley, Cecilia; Tudoreanu, M. Eduard
2012-06-01
Identifying social network (SN) links within computer-mediated communication platforms without explicit relations among users poses challenges to researchers. Our research aims to extract SN links in internet chat with multiple users engaging in synchronous overlapping conversations all displayed in a single stream. We approached this problem using three methods which build on previous research. Response-time analysis builds on temporal proximity of chat messages; word context usage builds on keywords analysis and direct addressing which infers links by identifying the intended message recipient from the screen name (nickname) referenced in the message [1]. Our analysis of word usage within the chat stream also provides contexts for the extracted SN links. To test the capability of our methods, we used publicly available data from Internet Relay Chat (IRC), a real-time computer-mediated communication (CMC) tool used by millions of people around the world. The extraction performances of individual methods and their hybrids were assessed relative to a ground truth (determined a priori via manual scoring).
Developing an Assessment of Sexual Identity Management for Lesbian and Gay Workers.
ERIC Educational Resources Information Center
Anderson, Mary Z.; Croteau, James M.; DiStefano, Teresa M.; Chung, Y. Barry
2001-01-01
Psychometric properties of the Workplace Sexual Identity Management Measure were tested with 172 professionals. Results suggest it successfully assesses a continuum of lesbian and gay identity management strategies (passing, covering, implicitly out, explicitly out). (Contains 27 references.) (SK)
Garcia, Justin R; Gesselman, Amanda N; Siliman, Shadia A; Perry, Brea L; Coe, Kathryn; Fisher, Helen E
2016-07-29
Background: The transmission of sexual images and messages via mobile phone or other electronic media (sexting) has been associated with a variety of mostly negative social and behavioural consequences. Research on sexting has focussed on youth, with limited data across demographics and with little known about the sharing of private sexual images and messages with third parties. Methods: The present study examines sexting attitudes and behaviours, including sending, receiving, and sharing of sexual messages and images, across gender, age, and sexual orientation. A total of 5805 single adults were included in the study (2830 women; 2975 men), ranging in age from 21 to 75+ years. Results: Overall, 21% of participants reported sending and 28% reported receiving sexually explicit text messages; both sending and receiving 'sexts' was most common among younger respondents. Although 73.2% of participants reported discomfort with unauthorised sharing of sexts beyond the intended recipient, of those who had received sext images, 22.9% reported sharing them with others (on average with 3.17 friends). Participants also reported concern about the potential consequences of sexting on their social lives, careers, and psychosocial wellbeing. Conclusion: Views on the impact of sexting on reputation suggest a contemporary struggle to reconcile digital eroticism with real-world consequences. These findings suggest a need for future research into negotiations of sexting motivations, risks, and rewards.
Perspective: examining communication as macrocognition in STS.
Keyton, Joann; Beck, Stephenson J
2010-04-01
There are significant points of alignment between a macrocognitive frame of teamwork and a communication perspective. This commentary explores these touch points in regard to use of teams in sociotechnical systems (STS). The macrocognitive framework emphasizes a team's shared mental models whereas a communication frame emphasizes that shared meaning among team members is more frequently implicitly than explicitly recorded in their messages. Both acknowledge that communication (in macrocognition) or messages (in communication) serve as an index of team members' goal-directed behavior. The two approaches differ in the role of communication: as information exchange in macrocognition as compared with verbal and nonverbal symbols composing messages for which senders and receivers co-construct meaning. This commentary uses relevant literature to explicate the communication position. From a communication perspective, individuals are simultaneously sending and receiving messages, communication is continual and processual, and meaning construction is dependent on relationship awareness and development among communication partners as well as the context. The authors posit that meaning cannot be constructed solely from messages, nor can meaning be constructed by one person. Furthermore, sharing information is not the same as communicating. Architects and users of STS should be interested in designing systems that improve team communication-a goal that is interdependent with understanding how communication fails in the use of such systems. Drilling down to the fundamental properties of communication is essential to understanding how and why meaning is created among team members (and subsequent action).
An exploration of the use of social media by surgical colleges.
Ralston, Maximilian R; O'Neill, Stephen; Wigmore, Stephen J; Harrison, Ewen M
2014-12-01
Social media use has become common for organisations in surgery, however the nature and reach of these communications is unknown. This study aimed to characterise and compare the use of "Twitter" by five prominent organisations in surgery. Data were collected from Twitter and the scale, reach, nature and sentiment of messages analysed. Message influence was determined and content analysed by frequency and association using hierarchical clustering and network analysis. Poisson regression was used to compare institutional message and "re-tweet" counts. 7712 messages were analysed from a four-year period up to 13th April 2013. The American College of Surgeons (ACS) had tweeted most and posted the greatest number of messages per day (3.3/day). The number of followers reflects social reach and the Royal College of Surgeons of England (RCSEng) had the greatest number (11,600) followed by the ACS (7320). The number of "retweets" a message receives is a measure of influence with the RCSEng (2.0) demonstrating a significantly greater count than the Royal College of Surgeons of Ireland (RCSI; 0.8, p < 0.001) and the ACS (1.3, p < 0.001). Followers of the RCSEng and ACS appeared most influential. Terms relating to education feature prominently in messages posted by the RCSEng and RCSEd, but less so in those from the RCSI and ACS. Education and training terms were highly correlated with "events". Surgical colleges have significant international reach through social media. UK colleges frequently communicate about education/training opportunities while the ACS focuses on patient-related matters. Only one organisation was found to have an explicit social media policy, which would be considered best practice and can focus on-line activity. Copyright © 2014 Surgical Associates Ltd. Published by Elsevier Ltd. All rights reserved.
Commanding and Controlling Satellite Clusters (IEEE Intelligent Systems, November/December 2000)
2000-01-01
real - time operating system , a message-passing OS well suited for distributed...ground Flight processors ObjectAgent RTOS SCL RTOS RDMS Space command language Real - time operating system Rational database management system TS-21 RDMS...engineer with Princeton Satellite Systems. She is working with others to develop ObjectAgent software to run on the OSE Real Time Operating System .
NASA Astrophysics Data System (ADS)
Tóth, Gábor; Keppens, Rony
2012-07-01
The Versatile Advection Code (VAC) is a freely available general hydrodynamic and magnetohydrodynamic simulation software that works in 1, 2 or 3 dimensions on Cartesian and logically Cartesian grids. VAC runs on any Unix/Linux system with a Fortran 90 (or 77) compiler and Perl interpreter. VAC can run on parallel machines using either the Message Passing Interface (MPI) library or a High Performance Fortran (HPF) compiler.
Sharing Content and Experiences in Smart Environments
NASA Astrophysics Data System (ADS)
Plomp, Johan; Heinilä, Juhani; Ikonen, Veikko; Kaasinen, Eija; Välkkynen, Pasi
Once upon a time… Stories used to be the only way to pass a message. The story teller would take his audience through the events by mere oration. Here and there he would hesitate, whisper, or gesticulate to emphasise his story or induce the right emotions in his audience. No doubt troubadourswere loved, they both brought news of the world as well as entertainment.
Pope, Bernard J; Fitch, Blake G; Pitman, Michael C; Rice, John J; Reumann, Matthias
2011-10-01
Future multiscale and multiphysics models that support research into human disease, translational medical science, and treatment can utilize the power of high-performance computing (HPC) systems. We anticipate that computationally efficient multiscale models will require the use of sophisticated hybrid programming models, mixing distributed message-passing processes [e.g., the message-passing interface (MPI)] with multithreading (e.g., OpenMP, Pthreads). The objective of this study is to compare the performance of such hybrid programming models when applied to the simulation of a realistic physiological multiscale model of the heart. Our results show that the hybrid models perform favorably when compared to an implementation using only the MPI and, furthermore, that OpenMP in combination with the MPI provides a satisfactory compromise between performance and code complexity. Having the ability to use threads within MPI processes enables the sophisticated use of all processor cores for both computation and communication phases. Considering that HPC systems in 2012 will have two orders of magnitude more cores than what was used in this study, we believe that faster than real-time multiscale cardiac simulations can be achieved on these systems.
Simulated Raman Spectral Analysis of Organic Molecules
NASA Astrophysics Data System (ADS)
Lu, Lu
The advent of the laser technology in the 1960s solved the main difficulty of Raman spectroscopy, resulted in simplified Raman spectroscopy instruments and also boosted the sensitivity of the technique. Up till now, Raman spectroscopy is commonly used in chemistry and biology. As vibrational information is specific to the chemical bonds, Raman spectroscopy provides fingerprints to identify the type of molecules in the sample. In this thesis, we simulate the Raman Spectrum of organic and inorganic materials by General Atomic and Molecular Electronic Structure System (GAMESS) and Gaussian, two computational codes that perform several general chemistry calculations. We run these codes on our CPU-based high-performance cluster (HPC). Through the message passing interface (MPI), a standardized and portable message-passing system which can make the codes run in parallel, we are able to decrease the amount of time for computation and increase the sizes and capacities of systems simulated by the codes. From our simulations, we will set up a database that allows search algorithm to quickly identify N-H and O-H bonds in different materials. Our ultimate goal is to analyze and identify the spectra of organic matter compositions from meteorites and compared these spectra with terrestrial biologically-produced amino acids and residues.
Pope, Bernard J; Fitch, Blake G; Pitman, Michael C; Rice, John J; Reumann, Matthias
2011-01-01
Future multiscale and multiphysics models must use the power of high performance computing (HPC) systems to enable research into human disease, translational medical science, and treatment. Previously we showed that computationally efficient multiscale models will require the use of sophisticated hybrid programming models, mixing distributed message passing processes (e.g. the message passing interface (MPI)) with multithreading (e.g. OpenMP, POSIX pthreads). The objective of this work is to compare the performance of such hybrid programming models when applied to the simulation of a lightweight multiscale cardiac model. Our results show that the hybrid models do not perform favourably when compared to an implementation using only MPI which is in contrast to our results using complex physiological models. Thus, with regards to lightweight multiscale cardiac models, the user may not need to increase programming complexity by using a hybrid programming approach. However, considering that model complexity will increase as well as the HPC system size in both node count and number of cores per node, it is still foreseeable that we will achieve faster than real time multiscale cardiac simulations on these systems using hybrid programming models.
NASA Technical Reports Server (NTRS)
Hockney, George; Lee, Seungwon
2008-01-01
A computer program known as PyPele, originally written as a Pythonlanguage extension module of a C++ language program, has been rewritten in pure Python language. The original version of PyPele dispatches and coordinates parallel-processing tasks on cluster computers and provides a conceptual framework for spacecraft-mission- design and -analysis software tools to run in an embarrassingly parallel mode. The original version of PyPele uses SSH (Secure Shell a set of standards and an associated network protocol for establishing a secure channel between a local and a remote computer) to coordinate parallel processing. Instead of SSH, the present Python version of PyPele uses Message Passing Interface (MPI) [an unofficial de-facto standard language-independent application programming interface for message- passing on a parallel computer] while keeping the same user interface. The use of MPI instead of SSH and the preservation of the original PyPele user interface make it possible for parallel application programs written previously for the original version of PyPele to run on MPI-based cluster computers. As a result, engineers using the previously written application programs can take advantage of embarrassing parallelism without need to rewrite those programs.
Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani
2015-01-01
Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.
Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani
2015-01-01
Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773
Streaming data analytics via message passing with application to graph algorithms
Plimpton, Steven J.; Shead, Tim
2014-05-06
The need to process streaming data, which arrives continuously at high-volume in real-time, arises in a variety of contexts including data produced by experiments, collections of environmental or network sensors, and running simulations. Streaming data can also be formulated as queries or transactions which operate on a large dynamic data store, e.g. a distributed database. We describe a lightweight, portable framework named PHISH which enables a set of independent processes to compute on a stream of data in a distributed-memory parallel manner. Datums are routed between processes in patterns defined by the application. PHISH can run on top of eithermore » message-passing via MPI or sockets via ZMQ. The former means streaming computations can be run on any parallel machine which supports MPI; the latter allows them to run on a heterogeneous, geographically dispersed network of machines. We illustrate how PHISH can support streaming MapReduce operations, and describe streaming versions of three algorithms for large, sparse graph analytics: triangle enumeration, subgraph isomorphism matching, and connected component finding. Lastly, we also provide benchmark timings for MPI versus socket performance of several kernel operations useful in streaming algorithms.« less
Teaching Controversial Topics to Skeptical High School Students
NASA Astrophysics Data System (ADS)
Ford, K. S.
2012-12-01
Tennessee passes the "Monkey Bill" (HB 0368, SB 0893), North Carolina's state government passes a law to criminalize reference in state documents to scientific models that predict sea level rise to reach at least one meter by the next century, and public concern still lags far behind the scientific community's concern on climate change. The American public and even science teachers across the country seem to have lost faith in the ability of the scientific community to unify a strong message about several important scientific lessons, including global warming in particular. This lack of a unified message has weakened the ability of science teachers to effectively teach the lesson of global warming. For science teachers in strongly conservative areas of the country, it is much easier to omit difficult topics and avoid angering parents and school board members. Teachers who do feel strongly about scientifically proven, yet publically controversial topics CAN teach these topics in conservative areas by confirming students' belief systems by being honest and open about motivations surrounding both sides of controversial topics, and by using vocabulary that avoids triggering negative perceptions about these controversial topics. For true learning and change of preconceived opinion to take place, it is important for students to come to the understanding in their own minds in an open and safe learning environment instead of having the message "preached" to them, which only serves to make them feel unintelligent and defensive if they disagree. This presentation will include lessons learned from a practicing science teacher who works in a community that overwhelmingly disputes the validity of human impacts on climate change.
Nelson, Kimberly M; Leickly, Emily; Yang, Joyce P; Pereira, Andrew; Simoni, Jane M
2014-01-01
Over the past two decades, men who have sex with men (MSM) have engaged in increasing consumption of MSM-specific sexually explicit online media (i.e., online pornography). Furthermore, the amount of MSM-specific sexually explicit online media portraying unprotected anal intercourse (UAI) has increased, raising concerns about HIV transmission among the actors and the potential encouragement of risky sex among consumers. The influence of sexually explicit online media on sexual risk-taking, at present largely understudied, could lead to new avenues for innovative HIV-prevention strategies targeting at-risk MSM. In this preliminary assessment, in-depth qualitative interviews were conducted with 16 MSM in the Seattle area to elucidate MSM's perceptions about the influence of sexually explicit online media on their own and other MSM's sexual behaviors. Participants reported that sexually explicit online media: (1) plays an educational role, (2) increases comfort with sexuality, and (3) sets expectations about sexual behaviors. While participants overwhelmingly reported not feeling personally influenced by viewing UAI in sexually explicit online media, they believed viewing UAI increased sexual risk-taking among other MSM. Specifically, participants reported that the high prevalence of UAI in sexually explicit online media sends the message, at least to other MSM, that (1) engaging in UAI is common, (2) UAI is acceptable and "ok" to engage in, and (3) future partners will desire or expect UAI. Overall, this preliminary assessment indicates that sexually explicit online media exposure may have both positive (e.g., helping MSM become more comfortable with their sexuality) and negative (e.g., normalizing UAI) impacts on the sexual health of MSM and may be useful in the development of novel HIV-prevention interventions.
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Bad News Has Wings: Dread Risk Mediates Social Amplification in Risk Communication.
Jagiello, Robert D; Hills, Thomas T
2018-05-29
Social diffusion of information amplifies risk through processes of birth, death, and distortion of message content. Dread risk-involving uncontrollable, fatal, involuntary, and catastrophic outcomes (e.g., terrorist attacks and nuclear accidents)-may be particularly susceptible to amplification because of the psychological biases inherent in dread risk avoidance. To test this, initially balanced information about high or low dread topics was given to a set of individuals who then communicated this information through diffusion chains, each person passing a message to the next. A subset of these chains were also reexposed to the original information. We measured prior knowledge, perceived risk before and after transmission, and, at each link, number of positive and negative statements. Results showed that the more a message was transmitted the more negative statements it contained. This was highest for the high dread topic. Increased perceived risk and production of negative messages was closely related to the amount of negative information that was received, with domain knowledge mitigating this effect. Reexposue to the initial information was ineffectual in reducing bias, demonstrating the enhanced danger of socially transmitted information. © 2018 Society for Risk Analysis.
Implicit attitudes towards homosexuality: reliability, validity, and controllability of the IAT.
Banse, R; Seise, J; Zerbes, N
2001-01-01
Two experiments were conducted to investigate the psychometric properties of an Implicit Association Test (IAT; Greenwald, McGhee, & Schwartz, 1998) that was adapted to measure implicit attitudes towards homosexuality. In a first experiment, the validity of the Homosexuality-IAT was tested using a known group approach. Implicit and explicit attitudes were assessed in heterosexual and homosexual men and women (N = 101). The results provided compelling evidence for the convergent and discriminant validity of the Homosexuality-IAT as a measure of implicit attitudes. No evidence was found for two alternative explanations of IAT effects (familiarity with stimulus material and stereotype knowledge). The internal consistency of IAT scores was satisfactory (alpha s > .80), but retest correlations were lower. In a second experiment (N = 79) it was shown that uninformed participants were able to fake positive explicit but not implicit attitudes. Discrepancies between implicit and explicit attitudes towards homosexuality could be partially accounted for by individual differences in the motivation to control prejudiced behavior, thus providing independent evidence for the validity of the implicit attitude measure. Neither explicit nor implicit attitudes could be changed by persuasive messages. The results of both experiments are interpreted as evidence for a single construct account of implicit and explicit attitudes towards homosexuality.
A comparison of cigarette- and hookah-related videos on YouTube.
Carroll, Mary V; Shensa, Ariel; Primack, Brian A
2013-09-01
YouTube is now the second most visited site on the internet. The authors aimed to compare characteristics of and messages conveyed by cigarette- and hookah-related videos on YouTube. Systematic search procedures yielded 66 cigarette-related and 61 hookah-related videos. After three trained qualitative researchers used an iterative approach to develop and refine definitions for the coding of variables, two of them independently coded each video for content including positive and negative associations with smoking and major content type. Median view counts were 606,884 for cigarettes-related videos and 102,307 for hookah-related videos (p<0.001). However, the number of comments per 1000 views was significantly lower for cigarette-related videos than for hookah-related videos (1.6 vs 2.5, p=0.003). There was no significant difference in the number of 'like' designations per 100 reactions (91 vs 87, p=0.39). Cigarette-related videos were less likely than hookah-related videos to portray tobacco use in a positive light (24% vs 92%, p<0.001). In addition, cigarette-related videos were more likely to be of high production quality (42% vs 5%, p<0.001), to mention short-term consequences (50% vs 18%, p<0.001) and long-term consequences (44% vs 2%, p<0.001) of tobacco use, to contain explicit antismoking messages (39% vs 0%, p<0.001) and to provide specific information on how to quit tobacco use (21% vs 0%, p<0.001). Although internet user-generated videos related to cigarette smoking often acknowledge harmful consequences and provide explicit antismoking messages, hookah-related videos do not. It may be valuable for public health programmes to correct common misconceptions regarding hookah use.
A Comparison of Cigarette- and Hookah-Related Videos on YouTube
Carroll, Mary V.; Shensa, Ariel; Primack, Brian A.
2013-01-01
Objective YouTube is now the second most visited site on the Internet. We aimed to compare characteristics of and messages conveyed by cigarette- and hookah-related videos on YouTube. Methods Systematic search procedures yielded 66 cigarette-related and 61 hookah-related videos. After 3 trained qualitative researchers used an iterative approach to develop and refine definitions for the coding of variables, 2 of them independently coded each video for content including positive and negative associations with smoking and major content type. Results Median view counts were 606,884 for cigarettes and 102,307 for hookahs (P<.001). However, the number of comments per 1,000 views was significantly lower for cigarette-related videos than for hookah-related videos (1.6 vs 2.5, P=.003). There was no significant difference in the number of “like” designations per 100 reactions (91 vs. 87, P=.39). Cigarette-related videos were less likely than hookah-related videos to portray tobacco use in a positive light (24% vs. 92%, P<.001). In addition, cigarette-related videos were more likely to be of high production quality (42% vs. 5%, P<.001), to mention short-term consequences (50% vs. 18%, P<.001) and long-term consequences (44% vs. 2%, P<.001) of tobacco use, to contain explicit antismoking messages (39% vs. 0%, P<.001), and to provide specific information on how to quit tobacco use (21% vs. 0%, P<.001). Conclusions Although Internet user–generated videos related to cigarette smoking often acknowledge harmful consequences and provide explicit antismoking messages, hookah-related videos do not. It may be valuable for public health programs to correct common misconceptions regarding hookah use. PMID:22363069
A qualitative analysis of messages to promote smoking cessation among pregnant women.
Hoek, Janet; Gifford, Heather; Maubach, Ninya; Newcombe, Rhiannon
2014-11-27
Although aware that smoking while pregnant presents serious risks to their unborn children, some women continue to smoke and rationalise their dissonance rather than quit. We explored metaphors women used to frame smoking and quitting, then developed cessation messages that drew on these metaphors and examined the perceived effectiveness of these. We used a two-phase qualitative study. Phase one involved 13 in-depth interviews with women who were smoking (or who had smoked) while pregnant. Phase two comprised 22 in-depth interviews with a new sample drawn from the same population. Data were analysed using thematic analysis, which promoted theme identification independently of the research protocol. Participants often described smoking as a choice, a frame that explicitly asserted control over their behaviour. This stance allowed them to counter-argue messages to quit, and distanced them from the risks they created and faced. Messages tested in phase 2 used strong affective appeals as well as themes that stimulated cognitive reflection. Without exception, the messages depicting unwell or distressed children elicited strong emotional responses, were more powerful cessation stimuli, and elicited fewer counter-arguments. Cessation messages that evoke strong affective responses capitalise on the dissonance many women feel when smoking while pregnant and stimulate stronger consideration of quitting. Given the importance of promoting cessation among pregnant women, future campaigns could make greater use of emotional appeals and place less emphasis on informational approaches, which often prompt vigorous counter-arguments. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Minors and Sexting: Legal Implications.
Lorang, Melissa R; McNiel, Dale E; Binder, Renée L
2016-03-01
Sexting is the sending or forwarding of sexually explicit photographs or videos of the sender or someone known to the sender via cell phone. It has become common practice among young people, as cell phones are being given to adolescents at ever younger ages. Youths often send messages without giving appropriate thought to the content of the images. In studies on the subject, rates of minors who have sent sexual images range from 4 to 25 percent, depending on the age of the youths surveyed, the content of the messages and other factors. Because transferring and viewing sexually explicit material when the subject is a minor can be considered child pornography, there can be serious legal consequences. Several states have enacted legislation to help differentiate between child pornography and sexting by minors. The trend reflected in statutes has been that minors involved in sexting without other exacerbating circumstances should be charged with a less serious offense. There is no clear national consensus on how sexting by minors is adjudicated, and therefore we compared several statutes. Case examples are used to illustrate the range of legal outcomes, from felony charges to no charges. Two sexting episodes that were followed by suicide are described. We also address the role of the forensic mental health professional. © 2016 American Academy of Psychiatry and the Law.
Information and the Origin of Qualia
Orpwood, Roger
2017-01-01
This article argues that qualia are a likely outcome of the processing of information in local cortical networks. It uses an information-based approach and makes a distinction between information structures (the physical embodiment of information in the brain, primarily patterns of action potentials), and information messages (the meaning of those structures to the brain, and the basis of qualia). It develops formal relationships between these two kinds of information, showing how information structures can represent messages, and how information messages can be identified from structures. The article applies this perspective to basic processing in cortical networks or ensembles, showing how networks can transform between the two kinds of information. The article argues that an input pattern of firing is identified by a network as an information message, and that the output pattern of firing generated is a representation of that message. If a network is encouraged to develop an attractor state through attention or other re-entrant processes, then the message identified each time physical information is cycled through the network becomes “representation of the previous message”. Using an example of olfactory perception, it is shown how this piggy-backing of messages on top of previous messages could lead to olfactory qualia. The message identified on each pass of information could evolve from inner identity, to inner form, to inner likeness or image. The outcome is an olfactory quale. It is shown that the same outcome could result from information cycled through a hierarchy of networks in a resonant state. The argument for qualia generation is applied to other sensory modalities, showing how, through a process of brain-wide constraint satisfaction, a particular state of consciousness could develop at any given moment. Evidence for some of the key predictions of the theory is presented, using ECoG data and studies of gamma oscillations and attractors, together with an outline of what further evidence is needed to provide support for the theory. PMID:28484376
Software architecture for time-constrained machine vision applications
NASA Astrophysics Data System (ADS)
Usamentiaga, Rubén; Molleda, Julio; García, Daniel F.; Bulnes, Francisco G.
2013-01-01
Real-time image and video processing applications require skilled architects, and recent trends in the hardware platform make the design and implementation of these applications increasingly complex. Many frameworks and libraries have been proposed or commercialized to simplify the design and tuning of real-time image processing applications. However, they tend to lack flexibility, because they are normally oriented toward particular types of applications, or they impose specific data processing models such as the pipeline. Other issues include large memory footprints, difficulty for reuse, and inefficient execution on multicore processors. We present a novel software architecture for time-constrained machine vision applications that addresses these issues. The architecture is divided into three layers. The platform abstraction layer provides a high-level application programming interface for the rest of the architecture. The messaging layer provides a message-passing interface based on a dynamic publish/subscribe pattern. A topic-based filtering in which messages are published to topics is used to route the messages from the publishers to the subscribers interested in a particular type of message. The application layer provides a repository for reusable application modules designed for machine vision applications. These modules, which include acquisition, visualization, communication, user interface, and data processing, take advantage of the power of well-known libraries such as OpenCV, Intel IPP, or CUDA. Finally, the proposed architecture is applied to a real machine vision application: a jam detector for steel pickling lines.
Clandestine Message Passing in Virtual Environments
2008-09-01
accessed April 4, 2008). Weir, Laila. “Boring Game? Outsorce It.” (August 24, 2004). http://www.wired.com/ entertainment / music /news/2004/08/ 64638...Multiplayer Online MOVES - Modeling Virtual Environments and Simulation MTV – Music Television NPS - Naval Postgraduate School PAN – Personal Area...Network PSP - PlayStation Portable RPG – Role-playing Game SL - Second Life SVN - Subversion VE – Virtual Environments vMTV – Virtual Music
ERIC Educational Resources Information Center
FitzGerald Murphy, Maggie
2016-01-01
Despite the fact that over fifty years have passed since its publication, Stuart Hall's article "The Supply of Demand" (1960), is remarkably relevant today. The central message that society must not be blinded by "prosperity" such that it no longer envisions and demands a better world is especially pertinent in light of the…
The Guardian. Volume 9, Number 3, Winter 2007
2007-01-01
message correctly. Muslims will ultimately determine whether the ideology of al Qaeda, its affiliates, franchisees , and fellow travelers represents...opined that the effort would not work or would not pass the cost– benefit comparison. Others wanted to develop comprehensive NATO doctrine to guide...full BAT capability, the access-control benefits of BAT/HIIDE are a significant improvement to overall ISAF force protection, even in stand-alone mode
PETSc Users Manual Revision 3.7
DOE Office of Scientific and Technical Information (OSTI.GOV)
Balay, Satish; Abhyankar, S.; Adams, M.
This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Computation (PETSc) is a suite of data structures and routines that provide the building blocks for the implementation of large-scale application codes on parallel (and serial) computers. PETSc uses the MPI standard for all message-passing communication.
PETSc Users Manual Revision 3.8
DOE Office of Scientific and Technical Information (OSTI.GOV)
Balay, S.; Abhyankar, S.; Adams, M.
This manual describes the use of PETSc for the numerical solution of partial differential equations and related problems on high-performance computers. The Portable, Extensible Toolkit for Scientific Computation (PETSc) is a suite of data structures and routines that provide the building blocks for the implementation of large-scale application codes on parallel (and serial) computers. PETSc uses the MPI standard for all message-passing communication.
Statistical Inference in Graphical Models
2008-06-17
fuse probability theory and graph theory in such a way as to permit efficient rep- resentation and computation with probability distributions. They...message passing. 59 viii 1. INTRODUCTION In approaching real-world problems, we often need to deal with uncertainty. Probability and statis- tics provide a...dynamic programming methods. However, for many sensors of interest, the signal-to-noise ratio does not allow such a treatment. Another source of
Goodall, Catherine; Sabo, Jason; Cline, Rebecca; Egbert, Nichole
2012-01-01
The authors conducted a content analysis, investigating the first 5 months of national print and electronic news coverage of the H1N1 virus. They collected all stories about H1N1 appearing in 6 national news outlets between April and September 2009. Of these stories meeting the analysis criteria, the authors randomly selected 200 for inclusion. Using models of fear appeal message processing, this study investigated the nature and prevalence of threat and efficacy messages in news coverage of the virus. Such models have traditionally been applied to strategic health message contexts (e.g., campaigns) rather than to health news coverage. Results suggest that most stories made reference to the threat of the H1N1 virus, sometimes overemphasizing and sensationalizing virus-related death. With regard to efficacy, approximately half mentioned actions individuals or organizations/communities could take to protect themselves from the virus, but almost none provided evidence that such methods are effective, and some explicitly questioned their effectiveness. In addition, a number of stories referenced uncertainty about the threat of the virus (38%) and/or solutions to the potential threat (18%). The authors discuss the implications from the perspective of fear appeal message processing models.
Cross-cultural evidence that the nonverbal expression of pride is an automatic status signal.
Tracy, Jessica L; Shariff, Azim F; Zhao, Wanying; Henrich, Joseph
2013-02-01
To test whether the pride expression is an implicit, reliably developing signal of high social status in humans, the authors conducted a series of experiments that measured implicit and explicit cognitive associations between pride displays and high-status concepts in two culturally disparate populations--North American undergraduates and Fijian villagers living in a traditional, small-scale society. In both groups, pride displays produced strong implicit associations with high status, despite Fijian social norms discouraging overt displays of pride. Also in both groups, implicit and explicit associations between emotion expressions and status were dissociated; despite the cross-cultural implicit association between pride displays and high status, happy displays were, cross-culturally, the more powerful status indicator at an explicit level, and among Fijians, happy and pride displays were equally strongly implicitly associated with status. Finally, a cultural difference emerged: Fijians viewed happy displays as more deserving of high status than did North Americans, both implicitly and explicitly. Together, these findings suggest that the display and recognition of pride may be part of a suite of adaptations for negotiating status relationships, but that the high-status message of pride is largely communicated through implicit cognitive processes. 2013 APA, all rights reserved
Maudsley, Gillian
2011-01-01
Some important research questions in medical education and health services research need 'mixed methods research' (particularly synthesizing quantitative and qualitative findings). The approach is not new, but should be more explicitly reported. The broad search question here, of a disjointed literature, was thus: What is mixed methods research - how should it relate to medical education research?, focused on explicit acknowledgement of 'mixing'. Literature searching focused on Web of Knowledge supplemented by other databases across disciplines. Five main messages emerged: - Thinking quantitative and qualitative, not quantitative versus qualitative - Appreciating that mixed methods research blends different knowledge claims, enquiry strategies, and methods - Using a 'horses for courses' [whatever works] approach to the question, and clarifying the mix - Appreciating how medical education research competes with the 'evidence-based' movement, health services research, and the 'RCT' - Being more explicit about the role of mixed methods in medical education research, and the required expertise Mixed methods research is valuable, yet the literature relevant to medical education is fragmented and poorly indexed. The required time, effort, expertise, and techniques deserve better recognition. More write-ups should explicitly discuss the 'mixing' (particularly of findings), rather than report separate components.
Weinberger, Edward D
2002-01-01
'Standard' information theory says nothing about the semantic content of information. Nevertheless, applications such as evolutionary theory demand consideration of precisely this aspect of information, a need that has motivated a largely unsuccessful search for a suitable measure of an 'amount of meaning'. This paper represents an attempt to move beyond this impasse, based on the observation that the meaning of a message can only be understood relative to its receiver. Positing that the semantic value of information is its usefulness in making an informed decision, we define pragmatic information as the information gain in the probability distributions of the receiver's actions, both before and after receipt of a message in some pre-defined ensemble. We then prove rigorously that our definition is the only one that satisfies obvious desiderata, such as the additivity of information from logically independent messages. This definition, when applied to the information 'learned' by the time evolution of a process, defies the intuitions of the few previous researchers thinking along these lines by being monotonic in the uncertainty that remains after receipt of the message, but non-monotonic in the Shannon entropy of the input ensemble. It also follows that the pragmatic information of the genetic 'messages' in an evolving population is a global Lyapunov function for Eigen's quasi-species model of biological evolution. A concluding section argues that a theory such as ours must explicitly acknowledge purposeful action, or 'agency', in such diverse fields as evolutionary theory and finance.
Direct-to-consumer print ads for drugs: do they undermine the physician-patient relationship?
Cline, Rebecca J Welch; Young, Henry J
2005-12-01
Critics of direct-to-consumer print advertising for drugs (DTCA) contend it alters physician-patient communication by promoting greater patient participation and control. We assessed the nature of messages in print DTCA to identify potential guidelines they may provide to consumers for communicating with physicians. We analyzed all unique advertisements (ie, excluded ads repeated across issues or magazines) in 18 popular magazines (684 issues) from January 1998 to December 1999 (n=225). We identified every statement that referred to physicians, and within that set, statements that focused on physician-patient communication. Each communication-related statement was coded as a message to consumers about communication in terms of cues suggesting who should initiate communication, who should be in relational control, and appropriate interaction topic(s). More than three-quarters (83.8%) of the advertisements' statements referring to physicians focused on physician-patient communication (M=2.6 per ad; SD=1.8). Most (76.1%) of these messages explicitly or implicitly promoted consumers initiating communication, but cast the physician in relational control (54.5%). The most frequently suggested interaction topics were clinical judgments of the product's appropriateness (41.8%) and information about the product (32.1%). Typical direct-to-consumer print ads contain multiple messages about communicating with physicians. The patterned nature of these messages appears to promote social norms for consumers' communication behavior by repeatedly implying the appropriateness of consumers initiating interaction, physicians maintaining relational control, and avoiding negative consequences of advertised drugs as conversational topics.
Booker, Nancy Achieng'; Miller, Ann Neville; Ngure, Peter
2016-12-01
Extremely popular with Kenyan youth, the entertainment-education drama Shuga was designed with specific goals of promoting condom use, single versus multiple sexual partners, and destigmatization of HIV. Almost as soon as it aired, however, it generated controversy due to its extensive sexual themes and relatively explicit portrayal of sexual issues. To determine how safer sex, antistigma messages, and overall sexual content were integrated into Shuga, we conducted a content analysis. Results indicated that condom use and HIV destigmatization messages were frequently and clearly communicated. Negative consequences for risky sexual behavior were communicated over the course of the entire series. Messages about multiple concurrent partnerships were not evident. In addition, in terms of scenes per hour of programming, Shuga had 10.3 times the amount of sexual content overall, 8.2 times the amount of sexual talk, 17.8 times the amount of sexual behavior, and 9.4 times the amount of sexual intercourse as found in previous analysis of U.S. entertainment programming. Research is needed to determine how these factors may interact to influence adolescent viewers of entertainment education dramas.
Igartua, Juan-José; Vega Casanova, Jair
2016-01-01
The aim of this article is to further knowledge of the explanatory processes of narrative persuasion in the field of health communication, using data obtained in a research study of entertainment-education based on audiovisual fiction. Participating in the study were 208 young persons between the ages of 14 and 20, randomly distributed to three different groups. Each of the groups was exposed to a different episode of the Colombian television series Revelados, desde todas las posiciones. The results showed that greater identification with the main character of the episode transmitting a prevention message was associated with greater cognitive elaboration, which in turn led to more favorable attitudes toward the topics addressed. However, counterarguing was not observed to play a significant mediating role. The findings of this study allow us to conclude that getting people to think and reflect can help persuade them, which suggests that narrative persuasion models and dual models of rhetorical persuasion can be compatible in certain contexts, such as when messages are designed in such a way that characters make explicit arguments that endorse a prosocial message through dialogues.
A flexible software architecture for scalable real-time image and video processing applications
NASA Astrophysics Data System (ADS)
Usamentiaga, Rubén; Molleda, Julio; García, Daniel F.; Bulnes, Francisco G.
2012-06-01
Real-time image and video processing applications require skilled architects, and recent trends in the hardware platform make the design and implementation of these applications increasingly complex. Many frameworks and libraries have been proposed or commercialized to simplify the design and tuning of real-time image processing applications. However, they tend to lack flexibility because they are normally oriented towards particular types of applications, or they impose specific data processing models such as the pipeline. Other issues include large memory footprints, difficulty for reuse and inefficient execution on multicore processors. This paper presents a novel software architecture for real-time image and video processing applications which addresses these issues. The architecture is divided into three layers: the platform abstraction layer, the messaging layer, and the application layer. The platform abstraction layer provides a high level application programming interface for the rest of the architecture. The messaging layer provides a message passing interface based on a dynamic publish/subscribe pattern. A topic-based filtering in which messages are published to topics is used to route the messages from the publishers to the subscribers interested in a particular type of messages. The application layer provides a repository for reusable application modules designed for real-time image and video processing applications. These modules, which include acquisition, visualization, communication, user interface and data processing modules, take advantage of the power of other well-known libraries such as OpenCV, Intel IPP, or CUDA. Finally, we present different prototypes and applications to show the possibilities of the proposed architecture.
1993-08-01
on the Lempel - Ziv [44] algo- rithm. Zip is compressing a single 8,017 byte file. " RTLSim An register transfer language simulator for the Message...package. gordoni@cs.adelaide.edu.au, Wynn Vale, 5127, Australia, 1.0 edition, October 1991. [44] Ziv J. and Lempel A. "A universal algorithm for...fixed hardware algorithm . Some data caches allow the program to explicitly allocate cache lines [68]. This allocation is only useful in writing new data
Evaluation Metrics for the Paragon XP/S-15
NASA Technical Reports Server (NTRS)
Traversat, Bernard; McNab, David; Nitzberg, Bill; Fineberg, Sam; Blaylock, Bruce T. (Technical Monitor)
1993-01-01
On February 17th 1993, the Numerical Aerodynamic Simulation (NAS) facility located at the NASA Ames Research Center installed a 224 node Intel Paragon XP/S-15 system. After its installation, the Paragon was found to be in a very immature state and was unable to support a NAS users' workload, composed of a wide range of development and production activities. As a first step towards addressing this problem, we implemented a set of metrics to objectively monitor the system as operating system and hardware upgrades were installed. The metrics were designed to measure four aspects of the system that we consider essential to support our workload: availability, utilization, functionality, and performance. This report presents the metrics collected from February 1993 to August 1993. Since its installation, the Paragon availability has improved from a low of 15% uptime to a high of 80%, while its utilization has remained low. Functionality and performance have improved from merely running one of the NAS Parallel Benchmarks to running all of them faster (between 1 and 2 times) than on the iPSC/860. In spite of the progress accomplished, fundamental limitations of the Paragon operating system are restricting the Paragon from supporting the NAS workload. The maximum operating system message passing (NORMA IPC) bandwidth was measured at 11 Mbytes/s, well below the peak hardware bandwidth (175 Mbytes/s), limiting overall virtual memory and Unix services (i.e. Disk and HiPPI I/O) performance. The high NX application message passing latency (184 microns), three times than on the iPSC/860, was found to significantly degrade performance of applications relying on small message sizes. The amount of memory available for an application was found to be approximately 10 Mbytes per node, indicating that the OS is taking more space than anticipated (6 Mbytes per node).
How Cancer Survivors Provide Support on Cancer-Related Internet Mailing Lists
Lyons, Elizabeth J; Frydman, Gilles; Forlenza, Michael; Rimer, Barbara K
2007-01-01
Background Internet mailing lists are an important and increasingly common way for cancer survivors to find information and support. Most studies of these mailing lists have investigated lists dedicated to one type of cancer, most often breast cancer. Little is known about whether the lessons learned from experiences with breast cancer lists apply to other cancers. Objectives The aim of the study was to compare the structural characteristics of 10 Internet cancer-related mailing lists and identify the processes by which cancer survivors provide support. Methods We studied a systematic 9% sample of email messages sent over five months to 10 cancer mailing lists hosted by the Association of Cancer Online Resources (ACOR). Content analyses were used to compare the structural characteristics of the lists, including participation rates and members’ identities as survivors or caregivers. We used thematic analyses to examine the types of support that list members provided through their message texts. Results Content analyses showed that characteristics of list members and subscriber participation rates varied across the lists. Thematic analyses revealed very little “off topic” discussion. Feedback from listowners indicated that they actively modeled appropriate communication on their lists and worked to keep discussions civil and focused. In all lists, members offered support much more frequently than they requested it; survivors were somewhat more likely than caregivers to offer rather than to ask for support. The most common topics in survivors’ messages were about treatment information and how to communicate with health care providers. Although expressions of emotional support were less common than informational support, they appeared in all lists. Many messages that contained narratives of illness or treatment did not specifically ask for help but provided emotional support by reassuring listmates that they were not alone in their struggles with cancer. Survivors’ explicit expressions of emotional support tended to be messages that encouraged active coping. Such messages also provided senders with opportunities to assume personally empowering “helper” roles that supported self-esteem. Conclusions Many cancer survivors use the Internet to seek informational and emotional support. Across 10 lists for different cancers, informational support was the main communication style. Our finding of an emphasis on informational support is in contrast to most prior literature, which has focused on emotional support. We found the most common expressions of support were offers of technical information and explicit advice about how to communicate with health care providers. Topics and proportions of informational and emotional support differed across the lists. Our previous surveys of ACOR subscribers showed that they join the lists primarily to seek information; this qualitative study shows that they can and do find what they seek. They also find opportunities to play rewarding roles as support givers. PMID:17513283
Parallel Ray Tracing Using the Message Passing Interface
2007-09-01
software is available for lens design and for general optical systems modeling. It tends to be designed to run on a single processor and can be very...Cameron, Senior Member, IEEE Abstract—Ray-tracing software is available for lens design and for general optical systems modeling. It tends to be designed to...National Aeronautics and Space Administration (NASA), optical ray tracing, parallel computing, parallel pro- cessing, prime numbers, ray tracing
High-performance computing — an overview
NASA Astrophysics Data System (ADS)
Marksteiner, Peter
1996-08-01
An overview of high-performance computing (HPC) is given. Different types of computer architectures used in HPC are discussed: vector supercomputers, high-performance RISC processors, various parallel computers like symmetric multiprocessors, workstation clusters, massively parallel processors. Software tools and programming techniques used in HPC are reviewed: vectorizing compilers, optimization and vector tuning, optimization for RISC processors; parallel programming techniques like shared-memory parallelism, message passing and data parallelism; and numerical libraries.
1985-06-01
just pass the message WAIT NOW AFTER Rlock + timeo t -- if time is out write.screen( TIME IS OUT") MAIN PROGRAM* CHAN linki , link2, link3, link4...PAR D.I.Loop.Interface (link4, linkl,) D.I.Loop.Interface ( linki , link2, 2) D.I.Loop.Interface (link2, link3, 3) JD.I Loop.Interface (link3, link4, 4
Control Transfer in Operating System Kernels
1994-05-13
microkernel system that runs less code in the kernel address space. To realize the performance benefit of allocating stacks in unmapped kseg0 memory, the...review how I modified the Mach 3.0 kernel to use continuations. Because of Mach’s message-passing microkernel structure, interprocess communication was...critical control transfer paths, deeply- nested call chains are undesirable in any case because of the function call overhead. 4.1.3 Microkernel Operating
Sen. Akaka, Daniel K. [D-HI
2010-03-24
Senate - 09/23/2010 Message received in the Senate: Returned to the Senate pursuant to the provisions of H.Res. 1653. (All Actions) Notes: For further action, see H.R.5014, which became Public Law 111-173 on 5/27/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol
2011-06-01
use in a quantum key system can be defined in two ways : The number of messages passed between Alice and Bob The...classical and quantum environment. Post- quantum cryptography , which is generally used to describe classical quantum -resilient protocols, includes...composed of a one- way quantum channel and a two - way classical channel. Owing to the physics of the channel, the quantum channel is subject to
FPGA implementation of low complexity LDPC iterative decoder
NASA Astrophysics Data System (ADS)
Verma, Shivani; Sharma, Sanjay
2016-07-01
Low-density parity-check (LDPC) codes, proposed by Gallager, emerged as a class of codes which can yield very good performance on the additive white Gaussian noise channel as well as on the binary symmetric channel. LDPC codes have gained lots of importance due to their capacity achieving property and excellent performance in the noisy channel. Belief propagation (BP) algorithm and its approximations, most notably min-sum, are popular iterative decoding algorithms used for LDPC and turbo codes. The trade-off between the hardware complexity and the decoding throughput is a critical factor in the implementation of the practical decoder. This article presents introduction to LDPC codes and its various decoding algorithms followed by realisation of LDPC decoder by using simplified message passing algorithm and partially parallel decoder architecture. Simplified message passing algorithm has been proposed for trade-off between low decoding complexity and decoder performance. It greatly reduces the routing and check node complexity of the decoder. Partially parallel decoder architecture possesses high speed and reduced complexity. The improved design of the decoder possesses a maximum symbol throughput of 92.95 Mbps and a maximum of 18 decoding iterations. The article presents implementation of 9216 bits, rate-1/2, (3, 6) LDPC decoder on Xilinx XC3D3400A device from Spartan-3A DSP family.
Tofler, A; Chapman, S
2003-12-01
Epidemiological studies and reports on smoking and health published in the 1950s and 1960s threatened the tobacco industry worldwide, which acted to reassure smokers and counteract mounting evidence that smoking posed a serious risk to smokers' health. To document the use of tobacco retailers (1) as a conduit to pass messages of reassurance onto smokers, and (2) to recruit youth and women into smoking. Review of an extensive collection of Australian tobacco retail trade journals (1950-1978) for articles consistent with the industry's efforts to counter messages about smoking and health, and how to attract non-smokers, particularly youth and women. The main arguments advanced in the journals included the notion that air pollution and other substances cause cancer, that "statistics" did not constitute proof in the tobacco health scare, and that the industry was committed to research into the causes of cancer and into developing a "safer" cigarette. Numerous articles designed to be reiterated to customers were published, arguing against the link between tobacco and ill health. Tobacco retailers, salesmen and retail trade organisations played a significant role in dissembling the tobacco health nexus. Tobacco retail journals may be an important component in tobacco industry misinformation strategies.
A Bayesian Model for Highly Accelerated Phase-Contrast MRI
Rich, Adam; Potter, Lee C.; Jin, Ning; Ash, Joshua; Simonetti, Orlando P.; Ahmad, Rizwan
2015-01-01
Purpose Phase-contrast magnetic resonance imaging (PC-MRI) is a noninvasive tool to assess cardiovascular disease by quantifying blood flow; however, low data acquisition efficiency limits the spatial and temporal resolutions, real-time application, and extensions to 4D flow imaging in clinical settings. We propose a new data processing approach called Reconstructing Velocity Encoded MRI with Approximate message passing aLgorithms (ReVEAL) that accelerates the acquisition by exploiting data structure unique to PC-MRI. Theory and Methods ReVEAL models physical correlations across space, time, and velocity encodings. The proposed Bayesian approach exploits the relationships in both magnitude and phase among velocity encodings. A fast iterative recovery algorithm is introduced based on message passing. For validation, prospectively undersampled data are processed from a pulsatile flow phantom and five healthy volunteers. Results ReVEAL is in good agreement, quantified by peak velocity and stroke volume (SV), with reference data for acceleration rates R ≤ 10. For SV, Pearson r ≥ 0.996 for phantom imaging (n = 24) and r ≥ 0.956 for prospectively accelerated in vivo imaging (n = 10) for R ≤ 10. Conclusion ReVEAL enables accurate quantification of blood flow from highly undersampled data. The technique is extensible to 4D flow imaging, where higher acceleration may be possible due to additional redundancy. PMID:26444911
EMPIRE and pyenda: Two ensemble-based data assimilation systems written in Fortran and Python
NASA Astrophysics Data System (ADS)
Geppert, Gernot; Browne, Phil; van Leeuwen, Peter Jan; Merker, Claire
2017-04-01
We present and compare the features of two ensemble-based data assimilation frameworks, EMPIRE and pyenda. Both frameworks allow to couple models to the assimilation codes using the Message Passing Interface (MPI), leading to extremely efficient and fast coupling between models and the data-assimilation codes. The Fortran-based system EMPIRE (Employing Message Passing Interface for Researching Ensembles) is optimized for parallel, high-performance computing. It currently includes a suite of data assimilation algorithms including variants of the ensemble Kalman and several the particle filters. EMPIRE is targeted at models of all kinds of complexity and has been coupled to several geoscience models, eg. the Lorenz-63 model, a barotropic vorticity model, the general circulation model HadCM3, the ocean model NEMO, and the land-surface model JULES. The Python-based system pyenda (Python Ensemble Data Assimilation) allows Fortran- and Python-based models to be used for data assimilation. Models can be coupled either using MPI or by using a Python interface. Using Python allows quick prototyping and pyenda is aimed at small to medium scale models. pyenda currently includes variants of the ensemble Kalman filter and has been coupled to the Lorenz-63 model, an advection-based precipitation nowcasting scheme, and the dynamic global vegetation model JSBACH.
A practical approach to portability and performance problems on massively parallel supercomputers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beazley, D.M.; Lomdahl, P.S.
1994-12-08
We present an overview of the tactics we have used to achieve a high-level of performance while improving portability for a large-scale molecular dynamics code SPaSM. SPaSM was originally implemented in ANSI C with message passing for the Connection Machine 5 (CM-5). In 1993, SPaSM was selected as one of the winners in the IEEE Gordon Bell Prize competition for sustaining 50 Gflops on the 1024 node CM-5 at Los Alamos National Laboratory. Achieving this performance on the CM-5 required rewriting critical sections of code in CDPEAC assembler language. In addition, the code made extensive use of CM-5 parallel I/Omore » and the CMMD message passing library. Given this highly specialized implementation, we describe how we have ported the code to the Cray T3D and high performance workstations. In addition we will describe how it has been possible to do this using a single version of source code that runs on all three platforms without sacrificing any performance. Sound too good to be true? We hope to demonstrate that one can realize both code performance and portability without relying on the latest and greatest prepackaged tool or parallelizing compiler.« less
Toward Abstracting the Communication Intent in Applications to Improve Portability and Productivity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mintz, Tiffany M; Hernandez, Oscar R; Kartsaklis, Christos
Programming with communication libraries such as the Message Passing Interface (MPI) obscures the high-level intent of the communication in an application and makes static communication analysis difficult to do. Compilers are unaware of communication libraries specifics, leading to the exclusion of communication patterns from any automated analysis and optimizations. To overcome this, communication patterns can be expressed at higher-levels of abstraction and incrementally added to existing MPI applications. In this paper, we propose the use of directives to clearly express the communication intent of an application in a way that is not specific to a given communication library. Our communicationmore » directives allow programmers to express communication among processes in a portable way, giving hints to the compiler on regions of computations that can be overlapped with communication and relaxing communication constraints on the ordering, completion and synchronization of the communication imposed by specific libraries such as MPI. The directives can then be translated by the compiler into message passing calls that efficiently implement the intended pattern and be targeted to multiple communication libraries. Thus far, we have used the directives to express point-to-point communication patterns in C, C++ and Fortran applications, and have translated them to MPI and SHMEM.« less
NASA Astrophysics Data System (ADS)
Ramiller, Chuck; Taylor, Trey; Rafferty, Tom H.; Cornell, Mark E.; Rafal, Marc; Savage, Richard
2010-07-01
The Hobby-Eberly Telescope (HET) will be undergoing a major upgrade as a precursor to the HET Dark Energy Experiment (HETDEX‡). As part of this upgrade, the Prime Focus Instrument Package (PFIP) will be replaced with a new design that supports the HETDEX requirements along with the existing suite of instruments and anticipated future additions. This paper describes the new PFIP control system hardware plus the physical constraints and other considerations driving its design. Because of its location at the top end of the telescope, the new PFIP is essentially a stand-alone remote automation island containing over a dozen subsystems. Within the PFIP, motion controllers and modular IO systems are interconnected using a local Controller Area Network (CAN) bus and the CANOpen messaging protocol. CCD cameras that are equipped only with USB 2.0 interfaces are connected to a local Ethernet network via small microcontroller boards running embedded Linux. Links to ground-level systems pass through a 100 m cable bundle and use Ethernet over fiber optic cable exclusively; communications are either direct or through Ethernet/CAN gateways that pass CANOpen messages transparently. All of the control system hardware components are commercially available, designed for rugged industrial applications, and rated for extended temperature operation down to -10 °C.
The Raid distributed database system
NASA Technical Reports Server (NTRS)
Bhargava, Bharat; Riedl, John
1989-01-01
Raid, a robust and adaptable distributed database system for transaction processing (TP), is described. Raid is a message-passing system, with server processes on each site to manage concurrent processing, consistent replicated copies during site failures, and atomic distributed commitment. A high-level layered communications package provides a clean location-independent interface between servers. The latest design of the package delivers messages via shared memory in a configuration with several servers linked into a single process. Raid provides the infrastructure to investigate various methods for supporting reliable distributed TP. Measurements on TP and server CPU time are presented, along with data from experiments on communications software, consistent replicated copy control during site failures, and concurrent distributed checkpointing. A software tool for evaluating the implementation of TP algorithms in an operating-system kernel is proposed.
Plasma Physics Calculations on a Parallel Macintosh Cluster
NASA Astrophysics Data System (ADS)
Decyk, Viktor; Dauger, Dean; Kokelaar, Pieter
2000-03-01
We have constructed a parallel cluster consisting of 16 Apple Macintosh G3 computers running the MacOS, and achieved very good performance on numerically intensive, parallel plasma particle-in-cell simulations. A subset of the MPI message-passing library was implemented in Fortran77 and C. This library enabled us to port code, without modification, from other parallel processors to the Macintosh cluster. For large problems where message packets are large and relatively few in number, performance of 50-150 MFlops/node is possible, depending on the problem. This is fast enough that 3D calculations can be routinely done. Unlike Unix-based clusters, no special expertise in operating systems is required to build and run the cluster. Full details are available on our web site: http://exodus.physics.ucla.edu/appleseed/.
Plasma Physics Calculations on a Parallel Macintosh Cluster
NASA Astrophysics Data System (ADS)
Decyk, Viktor K.; Dauger, Dean E.; Kokelaar, Pieter R.
We have constructed a parallel cluster consisting of 16 Apple Macintosh G3 computers running the MacOS, and achieved very good performance on numerically intensive, parallel plasma particle-in-cell simulations. A subset of the MPI message-passing library was implemented in Fortran77 and C. This library enabled us to port code, without modification, from other parallel processors to the Macintosh cluster. For large problems where message packets are large and relatively few in number, performance of 50-150 Mflops/node is possible, depending on the problem. This is fast enough that 3D calculations can be routinely done. Unlike Unix-based clusters, no special expertise in operating systems is required to build and run the cluster. Full details are available on our web site: http://exodus.physics.ucla.edu/appleseed/.
NASA Astrophysics Data System (ADS)
Barranco, Joseph
2006-03-01
We have developed a three-dimensional (3D) spectral hydrodynamic code to study vortex dynamics in rotating, shearing, stratified systems (eg, the atmosphere of gas giant planets, protoplanetary disks around newly forming protostars). The time-independent background state is stably stratified in the vertical direction and has a unidirectional linear shear flow aligned with one horizontal axis. Superposed on this background state is an unsteady, subsonic flow that is evolved with the Euler equations subject to the anelastic approximation to filter acoustic phenomena. A Fourier-Fourier basis in a set of quasi-Lagrangian coordinates that advect with the background shear is used for spectral expansions in the two horizontal directions. For the vertical direction, two different sets of basis functions have been implemented: (1) Chebyshev polynomials on a truncated, finite domain, and (2) rational Chebyshev functions on an infinite domain. Use of this latter set is equivalent to transforming the infinite domain to a finite one with a cotangent mapping, and using cosine and sine expansions in the mapped coordinate. The nonlinear advection terms are time integrated explicitly, whereas the Coriolis force, buoyancy terms, and pressure/enthalpy gradient are integrated semi- implicitly. We show that internal gravity waves can be damped by adding new terms to the Euler equations. The code exhibits excellent parallel performance with the Message Passing Interface (MPI). As a demonstration of the code, we simulate vortex dynamics in protoplanetary disks and the Kelvin-Helmholtz instability in the dusty midplanes of protoplanetary disks.
A 3D spectral anelastic hydrodynamic code for shearing, stratified flows
NASA Astrophysics Data System (ADS)
Barranco, Joseph A.; Marcus, Philip S.
2006-11-01
We have developed a three-dimensional (3D) spectral hydrodynamic code to study vortex dynamics in rotating, shearing, stratified systems (e.g., the atmosphere of gas giant planets, protoplanetary disks around newly forming protostars). The time-independent background state is stably stratified in the vertical direction and has a unidirectional linear shear flow aligned with one horizontal axis. Superposed on this background state is an unsteady, subsonic flow that is evolved with the Euler equations subject to the anelastic approximation to filter acoustic phenomena. A Fourier Fourier basis in a set of quasi-Lagrangian coordinates that advect with the background shear is used for spectral expansions in the two horizontal directions. For the vertical direction, two different sets of basis functions have been implemented: (1) Chebyshev polynomials on a truncated, finite domain, and (2) rational Chebyshev functions on an infinite domain. Use of this latter set is equivalent to transforming the infinite domain to a finite one with a cotangent mapping, and using cosine and sine expansions in the mapped coordinate. The nonlinear advection terms are time-integrated explicitly, the pressure/enthalpy terms are integrated semi-implicitly, and the Coriolis force and buoyancy terms are treated semi-analytically. We show that internal gravity waves can be damped by adding new terms to the Euler equations. The code exhibits excellent parallel performance with the message passing interface (MPI). As a demonstration of the code, we simulate the merger of two 3D vortices in the midplane of a protoplanetary disk.
Friedman, Lissy C; Cheyne, Andrew; Givelber, Daniel; Gottlieb, Mark A; Daynard, Richard A
2015-02-01
We examined the tobacco industry's rhetoric to frame personal responsibility arguments. The industry rarely uses the phrase "personal responsibility" explicitly, but rather "freedom of choice." When freedom of choice is used in the context of litigation, the industry means that those who choose to smoke are solely to blame for their injuries. When used in the industry's public relations messages, it grounds its meaning in the concept of liberty and the right to smoke. The courtroom "blame rhetoric" has influenced the industry's larger public relations message to shift responsibility away from the tobacco companies and onto their customers. Understanding the rhetoric and framing that the industry employs is essential to combating this tactic, and we apply this comprehension to other industries that act as disease vectors.
In blind pursuit of racial equality?
Apfelbaum, Evan P; Pauker, Kristin; Sommers, Samuel R; Ambady, Nalini
2010-11-01
Despite receiving little empirical assessment, the color-blind approach to managing diversity has become a leading institutional strategy for promoting racial equality, across domains and scales of practice. We gauged the utility of color blindness as a means to eliminating future racial inequity--its central objective--by assessing its impact on a sample of elementary-school students. Results demonstrated that students exposed to a color-blind mind-set, as opposed to a value-diversity mind-set, were actually less likely both to detect overt instances of racial discrimination and to describe such events in a manner that would prompt intervention by certified teachers. Institutional messages of color blindness may therefore artificially depress formal reporting of racial injustice. Color-blind messages may thus appear to function effectively on the surface even as they allow explicit forms of bias to persist.
Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies
Uhlemann, Elisabeth
2018-01-01
Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications. PMID:29570676
Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies.
Balador, Ali; Uhlemann, Elisabeth; Calafate, Carlos T; Cano, Juan-Carlos
2018-03-23
Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.
The Physical Therapy and Society Summit (PASS) Meeting: observations and opportunities.
Kigin, Colleen M; Rodgers, Mary M; Wolf, Steven L
2010-11-01
The construct of delivering high-quality and cost-effective health care is in flux, and the profession must strategically plan how to meet the needs of society. In 2006, the House of Delegates of the American Physical Therapy Association passed a motion to convene a summit on "how physical therapists can meet current, evolving, and future societal health care needs." The Physical Therapy and Society Summit (PASS) meeting on February 27-28, 2009, in Leesburg, Virginia, sent a clear message that for physical therapists to be effective and thrive in the health care environment of the future, a paradigm shift is required. During the PASS meeting, participants reframed our traditional focus on the physical therapist and the patient/client (consumer) to one in which physical therapists are an integral part of a collaborative, multidisciplinary health care team with the health care consumer as its focus. The PASS Steering Committee recognized that some of the opportunities that surfaced during the PASS meeting may be disruptive or may not be within the profession's present strategic or tactical plans. Thus, adopting a framework that helps to establish the need for change that is provocative and potentially disruptive to our present care delivery, yet prioritizes opportunities, is a critical and essential step. Each of us in the physical therapy profession must take on post-PASS roles and responsibilities to accomplish the systemic change that is so intimately intertwined with our destiny. This article offers a perspective of the dynamic dialogue and suggestions that emerged from the PASS event, providing further opportunities for discussion and action within our profession.
Al Sahawa - The Awakening. Volume 4: Al Anbar Province, Area of Operations Topeka, Ramadi
2016-08-01
is a multimedia instructional package to accom- modate different teaching and learning styles. B. Collection Interviews were conducted in the...the city of Fallujah in November 2004 to rid the city of insurgents. For more information , see Matt M. Matthews, Operation AL FAJR: A Study in Army... communities . Some of the messages explicitly thanked the community “for the information that you are providing on the insurgents.” This technique served
Al Sahawa - The Awakening, Volume 4: Al Anbar Province, Area of Operations Topeka, Ramadi
2016-08-01
is a multimedia instructional package to accom- modate different teaching and learning styles. B. Collection Interviews were conducted in the...the city of Fallujah in November 2004 to rid the city of insurgents. For more information , see Matt M. Matthews, Operation AL FAJR: A Study in Army... communities . Some of the messages explicitly thanked the community “for the information that you are providing on the insurgents.” This technique served
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boche, H., E-mail: boche@tum.de, E-mail: janis.noetzel@tum.de; Nötzel, J., E-mail: boche@tum.de, E-mail: janis.noetzel@tum.de
2014-12-15
This work is motivated by a quite general question: Under which circumstances are the capacities of information transmission systems continuous? The research is explicitly carried out on finite arbitrarily varying quantum channels (AVQCs). We give an explicit example that answers the recent question whether the transmission of messages over AVQCs can benefit from assistance by distribution of randomness between the legitimate sender and receiver in the affirmative. The specific class of channels introduced in that example is then extended to show that the unassisted capacity does have discontinuity points, while it is known that the randomness-assisted capacity is always continuousmore » in the channel. We characterize the discontinuity points and prove that the unassisted capacity is always continuous around its positivity points. After having established shared randomness as an important resource, we quantify the interplay between the distribution of finite amounts of randomness between the legitimate sender and receiver, the (nonzero) probability of a decoding error with respect to the average error criterion and the number of messages that can be sent over a finite number of channel uses. We relate our results to the entanglement transmission capacities of finite AVQCs, where the role of shared randomness is not yet well understood, and give a new sufficient criterion for the entanglement transmission capacity with randomness assistance to vanish.« less
Heffernan, Kayla Joanne; Chang, Shanton; Maclean, Skye Tamara; Callegari, Emma Teresa; Garland, Suzanne Marie; Reavley, Nicola Jane; Varigos, George Andrew; Wark, John Dennis
2016-02-09
The now ubiquitous catchphrase, "There's an app for that," rings true owing to the growing number of mobile phone apps. In excess of 97,000 eHealth apps are available in major app stores. Yet the effectiveness of these apps varies greatly. While a minority of apps are developed grounded in theory and in conjunction with health care experts, the vast majority are not. This is concerning given the Hippocratic notion of "do no harm." There is currently no unified formal theory for developing interactive eHealth apps, and development is especially difficult when complex messaging is required, such as in health promotion and prevention. This paper aims to provide insight into the creation of interactive eHealth apps for complex messaging, by leveraging the Safe-D case study, which involved complex messaging required to guide safe but sufficient UV exposure for vitamin D synthesis in users. We aim to create recommendations for developing interactive eHealth apps for complex messages based on the lessons learned during Safe-D app development. For this case study we developed an Apple and Android app, both named Safe-D, to safely improve vitamin D status in young women through encouraging safe ultraviolet radiation exposure. The app was developed through participatory action research involving medical and human computer interaction researchers, subject matter expert clinicians, external developers, and target users. The recommendations for development were created from analysis of the development process. By working with clinicians and implementing disparate design examples from the literature, we developed the Safe-D app. From this development process, recommendations for developing interactive eHealth apps for complex messaging were created: (1) involve a multidisciplinary team in the development process, (2) manage complex messages to engage users, and (3) design for interactivity (tailor recommendations, remove barriers to use, design for simplicity). This research has provided principles for developing interactive eHealth apps for complex messaging as guidelines by aggregating existing design concepts and expanding these concepts and new learnings from our development process. A set of guidelines to develop interactive eHealth apps generally, and specifically those for complex messaging, was previously missing from the literature; this research has contributed these principles. Safe-D delivers complex messaging simply, to aid education, and explicitly, considering user safety.
Heffernan, Kayla Joanne; Maclean, Skye Tamara; Callegari, Emma Teresa; Garland, Suzanne Marie; Reavley, Nicola Jane; Varigos, George Andrew; Wark, John Dennis
2016-01-01
Background The now ubiquitous catchphrase, “There’s an app for that,” rings true owing to the growing number of mobile phone apps. In excess of 97,000 eHealth apps are available in major app stores. Yet the effectiveness of these apps varies greatly. While a minority of apps are developed grounded in theory and in conjunction with health care experts, the vast majority are not. This is concerning given the Hippocratic notion of “do no harm.” There is currently no unified formal theory for developing interactive eHealth apps, and development is especially difficult when complex messaging is required, such as in health promotion and prevention. Objective This paper aims to provide insight into the creation of interactive eHealth apps for complex messaging, by leveraging the Safe-D case study, which involved complex messaging required to guide safe but sufficient UV exposure for vitamin D synthesis in users. We aim to create recommendations for developing interactive eHealth apps for complex messages based on the lessons learned during Safe-D app development. Methods For this case study we developed an Apple and Android app, both named Safe-D, to safely improve vitamin D status in young women through encouraging safe ultraviolet radiation exposure. The app was developed through participatory action research involving medical and human computer interaction researchers, subject matter expert clinicians, external developers, and target users. The recommendations for development were created from analysis of the development process. Results By working with clinicians and implementing disparate design examples from the literature, we developed the Safe-D app. From this development process, recommendations for developing interactive eHealth apps for complex messaging were created: (1) involve a multidisciplinary team in the development process, (2) manage complex messages to engage users, and (3) design for interactivity (tailor recommendations, remove barriers to use, design for simplicity). Conclusions This research has provided principles for developing interactive eHealth apps for complex messaging as guidelines by aggregating existing design concepts and expanding these concepts and new learnings from our development process. A set of guidelines to develop interactive eHealth apps generally, and specifically those for complex messaging, was previously missing from the literature; this research has contributed these principles. Safe-D delivers complex messaging simply, to aid education, and explicitly, considering user safety. PMID:26860623
Porting Gravitational Wave Signal Extraction to Parallel Virtual Machine (PVM)
NASA Technical Reports Server (NTRS)
Thirumalainambi, Rajkumar; Thompson, David E.; Redmon, Jeffery
2009-01-01
Laser Interferometer Space Antenna (LISA) is a planned NASA-ESA mission to be launched around 2012. The Gravitational Wave detection is fundamentally the determination of frequency, source parameters, and waveform amplitude derived in a specific order from the interferometric time-series of the rotating LISA spacecrafts. The LISA Science Team has developed a Mock LISA Data Challenge intended to promote the testing of complicated nested search algorithms to detect the 100-1 millihertz frequency signals at amplitudes of 10E-21. However, it has become clear that, sequential search of the parameters is very time consuming and ultra-sensitive; hence, a new strategy has been developed. Parallelization of existing sequential search algorithms of Gravitational Wave signal identification consists of decomposing sequential search loops, beginning with outermost loops and working inward. In this process, the main challenge is to detect interdependencies among loops and partitioning the loops so as to preserve concurrency. Existing parallel programs are based upon either shared memory or distributed memory paradigms. In PVM, master and node programs are used to execute parallelization and process spawning. The PVM can handle process management and process addressing schemes using a virtual machine configuration. The task scheduling and the messaging and signaling can be implemented efficiently for the LISA Gravitational Wave search process using a master and 6 nodes. This approach is accomplished using a server that is available at NASA Ames Research Center, and has been dedicated to the LISA Data Challenge Competition. Historically, gravitational wave and source identification parameters have taken around 7 days in this dedicated single thread Linux based server. Using PVM approach, the parameter extraction problem can be reduced to within a day. The low frequency computation and a proxy signal-to-noise ratio are calculated in separate nodes that are controlled by the master using message and vector of data passing. The message passing among nodes follows a pattern of synchronous and asynchronous send-and-receive protocols. The communication model and the message buffers are allocated dynamically to address rapid search of gravitational wave source information in the Mock LISA data sets.
A Parallel Workload Model and its Implications for Processor Allocation
1996-11-01
with SEV or AVG, both of which can tolerate c = 0.4 { 0.6 before their performance deteriorates signi cantly. On the other hand, Setia [10] has...Sanjeev. K Setia . The interaction between memory allocation and adaptive partitioning in message-passing multicomputers. In IPPS Workshop on Job...Scheduling Strategies for Parallel Processing, pages 89{99, 1995. [11] Sanjeev K. Setia and Satish K. Tripathi. An analysis of several processor
Parallel deterministic neutronics with AMR in 3D
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clouse, C.; Ferguson, J.; Hendrickson, C.
1997-12-31
AMTRAN, a three dimensional Sn neutronics code with adaptive mesh refinement (AMR) has been parallelized over spatial domains and energy groups and runs on the Meiko CS-2 with MPI message passing. Block refined AMR is used with linear finite element representations for the fluxes, which allows for a straight forward interpretation of fluxes at block interfaces with zoning differences. The load balancing algorithm assumes 8 spatial domains, which minimizes idle time among processors.
NASA Astrophysics Data System (ADS)
Cardall, Christian Y.; Budiardja, Reuben D.
2017-05-01
GenASiS Basics provides Fortran 2003 classes furnishing extensible object-oriented utilitarian functionality for large-scale physics simulations on distributed memory supercomputers. This functionality includes physical units and constants; display to the screen or standard output device; message passing; I/O to disk; and runtime parameter management and usage statistics. This revision -Version 2 of Basics - makes mostly minor additions to functionality and includes some simplifying name changes.
A Survey of Rollback-Recovery Protocols in Message-Passing Systems
1999-06-01
and M.A. Castillo. "Checkpointing through garbage collection." Technical report. Departamento de Ciencia de la Computation, Escuela de Ingenieria ...between consecutive checkpoints. It can be implemented by using the dirty-bit of the memory protection hardware or by emulating a dirty-bit in software [4...compare the program’s state with the previous checkpoint in software , and writing the difference in a new checkpoint [46]. The required storage and
An HLA-Based Approach to Quantify Achievable Performance for Tactical Edge Applications
2011-05-01
in: Proceedings of the 2002 Fall Simulation Interoperability Workshop, 02F- SIW -068, Nov 2002. [16] P. Knight, et al. ―WBT RTI Independent...Benchmark Tests: Design, Implementation, and Updated Results‖, in: Proceedings of the 2002 Spring Simulation Interoperability Workshop, 02S- SIW -081, March...Interoperability Workshop, 98F- SIW -085, Nov 1998. [18] S. Ferenci and R. Fujimoto. ―RTI Performance on Shared Memory and Message Passing Architectures‖, in
Implicit and Explicit False Belief Development in Preschool Children
ERIC Educational Resources Information Center
Grosse Wiesmann, Charlotte; Friederici, Angela D.; Singer, Tania; Steinbeis, Nikolaus
2017-01-01
The ability to represent the mental states of other agents is referred to as Theory of Mind (ToM). A developmental breakthrough in ToM consists of understanding that others can have false beliefs about the world. Recently, infants younger than 2 years of age have been shown to pass novel implicit false belief tasks. However, the processes…
ERIC Educational Resources Information Center
Tannenbaum, Richard J.; Kannan, Priya
2015-01-01
Angoff-based standard setting is widely used, especially for high-stakes licensure assessments. Nonetheless, some critics have claimed that the judgment task is too cognitively complex for panelists, whereas others have explicitly challenged the consistency in (replicability of) standard-setting outcomes. Evidence of consistency in item judgments…
Leading-Brand Advertisement of Quitting Smoking Benefits for E-Cigarettes.
Ramamurthi, Divya; Gall, Phillip A; Ayoub, Noel; Jackler, Robert K
2016-11-01
To provide regulators and the US Food and Drug Administration with a description of cessation-themed advertising among electronic cigarette (e-cigarette) brands. We performed a content analysis of 6 months (January through June 2015) of advertising by e-cigarette brands on their company-sponsored social media channels and blogs as well as user-generated content (testimonials) appearing within brand-sponsored Web sites. An explicit claim of cessation efficacy unambiguously states that e-cigarettes help in quitting smoking, and implicit claims use euphemisms such as "It works." We selected a cohort of 23 leading e-cigarette brands, either by their rank in advertising spending or their prevalence in Internet searches. Among leading e-cigarette brands, 22 of 23 used cessation-themed advertisements. Overall, 23% of the advertisements contained cessation claims, of which 18% were explicit and 82% were implicit. Among leading e-cigarette advertisers, cessation themes are prevalent with implicit messaging predominating over explicit quit claims. These results can help the Food and Drug Administration clarify whether tobacco products should be regulated as drugs with therapeutic purpose or as recreational products.
The simple rules of social contagion.
Hodas, Nathan O; Lerman, Kristina
2014-03-11
It is commonly believed that information spreads between individuals like a pathogen, with each exposure by an informed friend potentially resulting in a naive individual becoming infected. However, empirical studies of social media suggest that individual response to repeated exposure to information is far more complex. As a proxy for intervention experiments, we compare user responses to multiple exposures on two different social media sites, Twitter and Digg. We show that the position of exposing messages on the user-interface strongly affects social contagion. Accounting for this visibility significantly simplifies the dynamics of social contagion. The likelihood an individual will spread information increases monotonically with exposure, while explicit feedback about how many friends have previously spread it increases the likelihood of a response. We provide a framework for unifying information visibility, divided attention, and explicit social feedback to predict the temporal dynamics of user behavior.
The Simple Rules of Social Contagion
NASA Astrophysics Data System (ADS)
Hodas, Nathan O.; Lerman, Kristina
2014-03-01
It is commonly believed that information spreads between individuals like a pathogen, with each exposure by an informed friend potentially resulting in a naive individual becoming infected. However, empirical studies of social media suggest that individual response to repeated exposure to information is far more complex. As a proxy for intervention experiments, we compare user responses to multiple exposures on two different social media sites, Twitter and Digg. We show that the position of exposing messages on the user-interface strongly affects social contagion. Accounting for this visibility significantly simplifies the dynamics of social contagion. The likelihood an individual will spread information increases monotonically with exposure, while explicit feedback about how many friends have previously spread it increases the likelihood of a response. We provide a framework for unifying information visibility, divided attention, and explicit social feedback to predict the temporal dynamics of user behavior.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gorentla Venkata, Manjunath; Graham, Richard L; Ladd, Joshua S
This paper describes the design and implementation of InfiniBand (IB) CORE-Direct based blocking and nonblocking broadcast operations within the Cheetah collective operation framework. It describes a novel approach that fully ofFLoads collective operations and employs only user-supplied buffers. For a 64 rank communicator, the latency of CORE-Direct based hierarchical algorithm is better than production-grade Message Passing Interface (MPI) implementations, 150% better than the default Open MPI algorithm and 115% better than the shared memory optimized MVAPICH implementation for a one kilobyte (KB) message, and for eight mega-bytes (MB) it is 48% and 64% better, respectively. Flat-topology broadcast achieves 99.9% overlapmore » in a polling based communication-computation test, and 95.1% overlap for a wait based test, compared with 92.4% and 17.0%, respectively, for a similar Central Processing Unit (CPU) based implementation.« less
Cheyne, Andrew; Givelber, Daniel; Gottlieb, Mark A.; Daynard, Richard A.
2015-01-01
We examined the tobacco industry’s rhetoric to frame personal responsibility arguments. The industry rarely uses the phrase “personal responsibility” explicitly, but rather “freedom of choice.” When freedom of choice is used in the context of litigation, the industry means that those who choose to smoke are solely to blame for their injuries. When used in the industry’s public relations messages, it grounds its meaning in the concept of liberty and the right to smoke. The courtroom “blame rhetoric” has influenced the industry’s larger public relations message to shift responsibility away from the tobacco companies and onto their customers. Understanding the rhetoric and framing that the industry employs is essential to combating this tactic, and we apply this comprehension to other industries that act as disease vectors. PMID:25521876
Two-lane traffic-flow model with an exact steady-state solution.
Kanai, Masahiro
2010-12-01
We propose a stochastic cellular-automaton model for two-lane traffic flow based on the misanthrope process in one dimension. The misanthrope process is a stochastic process allowing for an exact steady-state solution; hence, we have an exact flow-density diagram for two-lane traffic. In addition, we introduce two parameters that indicate, respectively, driver's driving-lane preference and passing-lane priority. Due to the additional parameters, the model shows a deviation of the density ratio for driving-lane use and a biased lane efficiency in flow. Then, a mean-field approach explicitly describes the asymmetric flow by the hop rates, the driving-lane preference, and the passing-lane priority. Meanwhile, the simulation results are in good agreement with an observational data, and we thus estimate these parameters. We conclude that the proposed model successfully produces two-lane traffic flow particularly with the driving-lane preference and the passing-lane priority.
Adaptive Numerical Algorithms in Space Weather Modeling
NASA Technical Reports Server (NTRS)
Toth, Gabor; vanderHolst, Bart; Sokolov, Igor V.; DeZeeuw, Darren; Gombosi, Tamas I.; Fang, Fang; Manchester, Ward B.; Meng, Xing; Nakib, Dalal; Powell, Kenneth G.;
2010-01-01
Space weather describes the various processes in the Sun-Earth system that present danger to human health and technology. The goal of space weather forecasting is to provide an opportunity to mitigate these negative effects. Physics-based space weather modeling is characterized by disparate temporal and spatial scales as well as by different physics in different domains. A multi-physics system can be modeled by a software framework comprising of several components. Each component corresponds to a physics domain, and each component is represented by one or more numerical models. The publicly available Space Weather Modeling Framework (SWMF) can execute and couple together several components distributed over a parallel machine in a flexible and efficient manner. The framework also allows resolving disparate spatial and temporal scales with independent spatial and temporal discretizations in the various models. Several of the computationally most expensive domains of the framework are modeled by the Block-Adaptive Tree Solar wind Roe Upwind Scheme (BATS-R-US) code that can solve various forms of the magnetohydrodynamics (MHD) equations, including Hall, semi-relativistic, multi-species and multi-fluid MHD, anisotropic pressure, radiative transport and heat conduction. Modeling disparate scales within BATS-R-US is achieved by a block-adaptive mesh both in Cartesian and generalized coordinates. Most recently we have created a new core for BATS-R-US: the Block-Adaptive Tree Library (BATL) that provides a general toolkit for creating, load balancing and message passing in a 1, 2 or 3 dimensional block-adaptive grid. We describe the algorithms of BATL and demonstrate its efficiency and scaling properties for various problems. BATS-R-US uses several time-integration schemes to address multiple time-scales: explicit time stepping with fixed or local time steps, partially steady-state evolution, point-implicit, semi-implicit, explicit/implicit, and fully implicit numerical schemes. Depending on the application, we find that different time stepping methods are optimal. Several of the time integration schemes exploit the block-based granularity of the grid structure. The framework and the adaptive algorithms enable physics based space weather modeling and even forecasting.
NASA Technical Reports Server (NTRS)
Campbell, W.
1981-01-01
A theoretical evaluation of the stability of an explicit finite difference solution of the transient temperature field in a composite medium is presented. The grid points of the field are assumed uniformly spaced, and media interfaces are either vertical or horizontal and pass through grid points. In addition, perfect contact between different media (infinite interfacial conductance) is assumed. A finite difference form of the conduction equation is not valid at media interfaces; therefore, heat balance forms are derived. These equations were subjected to stability analysis, and a computer graphics code was developed that permitted determination of a maximum time step for a given grid spacing.
Learning classifier systems for single and multiple mobile robots in unstructured environments
NASA Astrophysics Data System (ADS)
Bay, John S.
1995-12-01
The learning classifier system (LCS) is a learning production system that generates behavioral rules via an underlying discovery mechanism. The LCS architecture operates similarly to a blackboard architecture; i.e., by posted-message communications. But in the LCS, the message board is wiped clean at every time interval, thereby requiring no persistent shared resource. In this paper, we adapt the LCS to the problem of mobile robot navigation in completely unstructured environments. We consider the model of the robot itself, including its sensor and actuator structures, to be part of this environment, in addition to the world-model that includes a goal and obstacles at unknown locations. This requires a robot to learn its own I/O characteristics in addition to solving its navigation problem, but results in a learning controller that is equally applicable, unaltered, in robots with a wide variety of kinematic structures and sensing capabilities. We show the effectiveness of this LCS-based controller through both simulation and experimental trials with a small robot. We then propose a new architecture, the Distributed Learning Classifier System (DLCS), which generalizes the message-passing behavior of the LCS from internal messages within a single agent to broadcast massages among multiple agents. This communications mode requires little bandwidth and is easily implemented with inexpensive, off-the-shelf hardware. The DLCS is shown to have potential application as a learning controller for multiple intelligent agents.
The amplification of risk in experimental diffusion chains.
Moussaïd, Mehdi; Brighton, Henry; Gaissmaier, Wolfgang
2015-05-05
Understanding how people form and revise their perception of risk is central to designing efficient risk communication methods, eliciting risk awareness, and avoiding unnecessary anxiety among the public. However, public responses to hazardous events such as climate change, contagious outbreaks, and terrorist threats are complex and difficult-to-anticipate phenomena. Although many psychological factors influencing risk perception have been identified in the past, it remains unclear how perceptions of risk change when propagated from one person to another and what impact the repeated social transmission of perceived risk has at the population scale. Here, we study the social dynamics of risk perception by analyzing how messages detailing the benefits and harms of a controversial antibacterial agent undergo change when passed from one person to the next in 10-subject experimental diffusion chains. Our analyses show that when messages are propagated through the diffusion chains, they tend to become shorter, gradually inaccurate, and increasingly dissimilar between chains. In contrast, the perception of risk is propagated with higher fidelity due to participants manipulating messages to fit their preconceptions, thereby influencing the judgments of subsequent participants. Computer simulations implementing this simple influence mechanism show that small judgment biases tend to become more extreme, even when the injected message contradicts preconceived risk judgments. Our results provide quantitative insights into the social amplification of risk perception, and can help policy makers better anticipate and manage the public response to emerging threats.
The amplification of risk in experimental diffusion chains
Moussaïd, Mehdi; Brighton, Henry; Gaissmaier, Wolfgang
2015-01-01
Understanding how people form and revise their perception of risk is central to designing efficient risk communication methods, eliciting risk awareness, and avoiding unnecessary anxiety among the public. However, public responses to hazardous events such as climate change, contagious outbreaks, and terrorist threats are complex and difficult-to-anticipate phenomena. Although many psychological factors influencing risk perception have been identified in the past, it remains unclear how perceptions of risk change when propagated from one person to another and what impact the repeated social transmission of perceived risk has at the population scale. Here, we study the social dynamics of risk perception by analyzing how messages detailing the benefits and harms of a controversial antibacterial agent undergo change when passed from one person to the next in 10-subject experimental diffusion chains. Our analyses show that when messages are propagated through the diffusion chains, they tend to become shorter, gradually inaccurate, and increasingly dissimilar between chains. In contrast, the perception of risk is propagated with higher fidelity due to participants manipulating messages to fit their preconceptions, thereby influencing the judgments of subsequent participants. Computer simulations implementing this simple influence mechanism show that small judgment biases tend to become more extreme, even when the injected message contradicts preconceived risk judgments. Our results provide quantitative insights into the social amplification of risk perception, and can help policy makers better anticipate and manage the public response to emerging threats. PMID:25902519
Object-oriented knowledge representation for expert systems
NASA Technical Reports Server (NTRS)
Scott, Stephen L.
1991-01-01
Object oriented techniques have generated considerable interest in the Artificial Intelligence (AI) community in recent years. This paper discusses an approach for representing expert system knowledge using classes, objects, and message passing. The implementation is in version 4.3 of NASA's C Language Integrated Production System (CLIPS), an expert system tool that does not provide direct support for object oriented design. The method uses programmer imposed conventions and keywords to structure facts, and rules to provide object oriented capabilities.
Advances in Parallel Computing and Databases for Digital Pathology in Cancer Research
2016-11-13
these technologies and how we have used them in the past. We are interested in learning more about the needs of clinical pathologists as we continue to...such as image processing and correlation. Further, High Performance Computing (HPC) paradigms such as the Message Passing Interface (MPI) have been...Defense for Research and Engineering. such as pMatlab [4], or bcMPI [5] can significantly reduce the need for deep knowledge of parallel computing. In
Experiences using OpenMP based on Computer Directed Software DSM on a PC Cluster
NASA Technical Reports Server (NTRS)
Hess, Matthias; Jost, Gabriele; Mueller, Matthias; Ruehle, Roland
2003-01-01
In this work we report on our experiences running OpenMP programs on a commodity cluster of PCs running a software distributed shared memory (DSM) system. We describe our test environment and report on the performance of a subset of the NAS Parallel Benchmarks that have been automaticaly parallelized for OpenMP. We compare the performance of the OpenMP implementations with that of their message passing counterparts and discuss performance differences.
Discrete Event Simulation Modeling and Analysis of Key Leader Engagements
2012-06-01
to offer. GreenPlayer agents require four parameters, pC, pKLK, pTK, and pRK , which give probabilities for being corrupt, having key leader...HandleMessageRequest component. The same parameter constraints apply to these four parameters. The parameter pRK is the same parameter from the CreatePlayers component...whether the local Green player has resource critical knowledge by using the parameter pRK . It schedules an EndResourceKnowledgeRequest event, passing
Parallel-Processing Test Bed For Simulation Software
NASA Technical Reports Server (NTRS)
Blech, Richard; Cole, Gary; Townsend, Scott
1996-01-01
Second-generation Hypercluster computing system is multiprocessor test bed for research on parallel algorithms for simulation in fluid dynamics, electromagnetics, chemistry, and other fields with large computational requirements but relatively low input/output requirements. Built from standard, off-shelf hardware readily upgraded as improved technology becomes available. System used for experiments with such parallel-processing concepts as message-passing algorithms, debugging software tools, and computational steering. First-generation Hypercluster system described in "Hypercluster Parallel Processor" (LEW-15283).
Time-Dependent Simulations of Incompressible Flow in a Turbopump Using Overset Grid Approach
NASA Technical Reports Server (NTRS)
Kiris, Cetin; Kwak, Dochan
2001-01-01
This viewgraph presentation provides information on mathematical modelling of the SSME (space shuttle main engine). The unsteady SSME-rig1 start-up procedure from the pump at rest has been initiated by using 34.3 million grid points. The computational model for the SSME-rig1 has been completed. Moving boundary capability is obtained by using DCF module in OVERFLOW-D. MPI (Message Passing Interface)/OpenMP hybrid parallel code has been benchmarked.
Tofler, A; Chapman, S
2003-01-01
Background: Epidemiological studies and reports on smoking and health published in the 1950s and 1960s threatened the tobacco industry worldwide, which acted to reassure smokers and counteract mounting evidence that smoking posed a serious risk to smokers' health. Objective: To document the use of tobacco retailers (1) as a conduit to pass messages of reassurance onto smokers, and (2) to recruit youth and women into smoking. Methods: Review of an extensive collection of Australian tobacco retail trade journals (1950–1978) for articles consistent with the industry's efforts to counter messages about smoking and health, and how to attract non-smokers, particularly youth and women. Results: The main arguments advanced in the journals included the notion that air pollution and other substances cause cancer, that "statistics" did not constitute proof in the tobacco health scare, and that the industry was committed to research into the causes of cancer and into developing a "safer" cigarette. Conclusions: Numerous articles designed to be reiterated to customers were published, arguing against the link between tobacco and ill health. Tobacco retailers, salesmen and retail trade organisations played a significant role in dissembling the tobacco health nexus. Tobacco retail journals may be an important component in tobacco industry misinformation strategies. PMID:14645943
Strategies for Energy Efficient Resource Management of Hybrid Programming Models
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li, Dong; Supinski, Bronis de; Schulz, Martin
2013-01-01
Many scientific applications are programmed using hybrid programming models that use both message-passing and shared-memory, due to the increasing prevalence of large-scale systems with multicore, multisocket nodes. Previous work has shown that energy efficiency can be improved using software-controlled execution schemes that consider both the programming model and the power-aware execution capabilities of the system. However, such approaches have focused on identifying optimal resource utilization for one programming model, either shared-memory or message-passing, in isolation. The potential solution space, thus the challenge, increases substantially when optimizing hybrid models since the possible resource configurations increase exponentially. Nonetheless, with the accelerating adoptionmore » of hybrid programming models, we increasingly need improved energy efficiency in hybrid parallel applications on large-scale systems. In this work, we present new software-controlled execution schemes that consider the effects of dynamic concurrency throttling (DCT) and dynamic voltage and frequency scaling (DVFS) in the context of hybrid programming models. Specifically, we present predictive models and novel algorithms based on statistical analysis that anticipate application power and time requirements under different concurrency and frequency configurations. We apply our models and methods to the NPB MZ benchmarks and selected applications from the ASC Sequoia codes. Overall, we achieve substantial energy savings (8.74% on average and up to 13.8%) with some performance gain (up to 7.5%) or negligible performance loss.« less
Weighted community detection and data clustering using message passing
NASA Astrophysics Data System (ADS)
Shi, Cheng; Liu, Yanchen; Zhang, Pan
2018-03-01
Grouping objects into clusters based on the similarities or weights between them is one of the most important problems in science and engineering. In this work, by extending message-passing algorithms and spectral algorithms proposed for an unweighted community detection problem, we develop a non-parametric method based on statistical physics, by mapping the problem to the Potts model at the critical temperature of spin-glass transition and applying belief propagation to solve the marginals corresponding to the Boltzmann distribution. Our algorithm is robust to over-fitting and gives a principled way to determine whether there are significant clusters in the data and how many clusters there are. We apply our method to different clustering tasks. In the community detection problem in weighted and directed networks, we show that our algorithm significantly outperforms existing algorithms. In the clustering problem, where the data were generated by mixture models in the sparse regime, we show that our method works all the way down to the theoretical limit of detectability and gives accuracy very close to that of the optimal Bayesian inference. In the semi-supervised clustering problem, our method only needs several labels to work perfectly in classic datasets. Finally, we further develop Thouless-Anderson-Palmer equations which heavily reduce the computation complexity in dense networks but give almost the same performance as belief propagation.
Cellular automata with object-oriented features for parallel molecular network modeling.
Zhu, Hao; Wu, Yinghui; Huang, Sui; Sun, Yan; Dhar, Pawan
2005-06-01
Cellular automata are an important modeling paradigm for studying the dynamics of large, parallel systems composed of multiple, interacting components. However, to model biological systems, cellular automata need to be extended beyond the large-scale parallelism and intensive communication in order to capture two fundamental properties characteristic of complex biological systems: hierarchy and heterogeneity. This paper proposes extensions to a cellular automata language, Cellang, to meet this purpose. The extended language, with object-oriented features, can be used to describe the structure and activity of parallel molecular networks within cells. Capabilities of this new programming language include object structure to define molecular programs within a cell, floating-point data type and mathematical functions to perform quantitative computation, message passing capability to describe molecular interactions, as well as new operators, statements, and built-in functions. We discuss relevant programming issues of these features, including the object-oriented description of molecular interactions with molecule encapsulation, message passing, and the description of heterogeneity and anisotropy at the cell and molecule levels. By enabling the integration of modeling at the molecular level with system behavior at cell, tissue, organ, or even organism levels, the program will help improve our understanding of how complex and dynamic biological activities are generated and controlled by parallel functioning of molecular networks. Index Terms-Cellular automata, modeling, molecular network, object-oriented.
A Bayesian model for highly accelerated phase-contrast MRI.
Rich, Adam; Potter, Lee C; Jin, Ning; Ash, Joshua; Simonetti, Orlando P; Ahmad, Rizwan
2016-08-01
Phase-contrast magnetic resonance imaging is a noninvasive tool to assess cardiovascular disease by quantifying blood flow; however, low data acquisition efficiency limits the spatial and temporal resolutions, real-time application, and extensions to four-dimensional flow imaging in clinical settings. We propose a new data processing approach called Reconstructing Velocity Encoded MRI with Approximate message passing aLgorithms (ReVEAL) that accelerates the acquisition by exploiting data structure unique to phase-contrast magnetic resonance imaging. The proposed approach models physical correlations across space, time, and velocity encodings. The proposed Bayesian approach exploits the relationships in both magnitude and phase among velocity encodings. A fast iterative recovery algorithm is introduced based on message passing. For validation, prospectively undersampled data are processed from a pulsatile flow phantom and five healthy volunteers. The proposed approach is in good agreement, quantified by peak velocity and stroke volume (SV), with reference data for acceleration rates R≤10. For SV, Pearson r≥0.99 for phantom imaging (n = 24) and r≥0.96 for prospectively accelerated in vivo imaging (n = 10) for R≤10. The proposed approach enables accurate quantification of blood flow from highly undersampled data. The technique is extensible to four-dimensional flow imaging, where higher acceleration may be possible due to additional redundancy. Magn Reson Med 76:689-701, 2016. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.
ERIC Educational Resources Information Center
Academic Collective Bargaining Information Service, Washington, DC.
This document analyzes legislation in 23 states enabling collective bargaining in higher education. Highlights indicate: (1) Twenty of the 23 laws were either passed or amended within the last 3 years. (2) Only five laws made special effort to identify college faculty explicitly as being covered and needing some special concern. (3) Only three…
Gallagher, Kristel M
2016-01-01
The benefits of exercise gained by older adults during physical therapy are often not maintained once the program is over. This lack of sustained benefits is thought to be partially the result of poor adherence to the prescribed home exercise program to be continued once therapy is completed. Most of what is known about older adults' adherence to physical therapy and home exercise comes from research seeking to identify and understand predictors of adherence, rather than trying to enhance adherence explicitly. The purpose of this study was to test a theoretically grounded approach to promoting adherence to home exercise programs in older adults. Sixty older adults (M age = 69.3 (6.87) years) in a program of physical therapy received 1 of 2 print messages and magnets promoting adherence to home exercise. The content of the messages was informed by the goal-specific tenets of socioemotional selectivity theory-one message described the emotional and meaningful benefits of home exercise, such as time with loved ones and independence, and one message described facts and information about physiological benefits, such as balance and strength. Adherence to home exercise was measured 2 weeks after participants were discharged from physical therapy by calculating the percentage of the prescribed exercises participants reported completing at home. An analysis of covariance indicated that there was no statistically significant difference in adherence rates between participants receiving either message. However, a 2×2 analysis of covariance did reveal a significant interaction between the type of message participants received and the time at which they received that message. Post hoc analyses separately examined the rates of adherence in participants who received the intervention message with time remaining in their therapy program and participants who received the intervention message on the day of discharge. In the subset of participants who received their intervention message with time remaining in their therapy program, those who received the emotion and meaning message were somewhat more adherent to their home exercise program than those who received the facts and information message (63.6% vs 50.8%; P = .07). Those who received the emotion and meaning message also performed on average more exercises outside of their home exercise program (2.4 vs 1.3; P = .06). Despite lacking a statistically significant difference between message groups, the results of this study suggest that highlighting the emotional and meaningful benefits of home exercise versus providing facts and information about the physiological benefits may encourage older adults to be adherent to their home exercise programs. This may especially be the case if they receive the information while still in therapy. As this was the first study to empirically test an intervention targeting adherence to post-physical therapy home exercise in older adults, future research is needed to better understand what motivates older adults to be adherent.
Shariff, Azim F; Tracy, Jessica L; Markusoff, Jeffrey L
2012-09-01
How do we decide who merits social status? According to functionalist theories of emotion, the nonverbal expressions of pride and shame play a key role, functioning as automatically perceived status signals. In this view, observers automatically make status inferences about expressers on the basis of these expressions, even when contradictory contextual information about the expressers' status is available. In four studies, the authors tested whether implicit and explicit status perceptions are influenced by pride and shame expressions even when these expressions' status-related messages are contradicted by contextual information. Results indicate that emotion expressions powerfully influence implicit and explicit status inferences, at times neutralizing or even overriding situational knowledge. These findings demonstrate the irrepressible communicative power of emotion displays and indicate that status judgments can be informed as much (and often more) by automatic responses to nonverbal expressions of emotion as by rational, contextually bound knowledge.
Online Identities and Social Networking
NASA Astrophysics Data System (ADS)
Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien
Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.
The Simple Rules of Social Contagion
Hodas, Nathan O.; Lerman, Kristina
2014-01-01
It is commonly believed that information spreads between individuals like a pathogen, with each exposure by an informed friend potentially resulting in a naive individual becoming infected. However, empirical studies of social media suggest that individual response to repeated exposure to information is far more complex. As a proxy for intervention experiments, we compare user responses to multiple exposures on two different social media sites, Twitter and Digg. We show that the position of exposing messages on the user-interface strongly affects social contagion. Accounting for this visibility significantly simplifies the dynamics of social contagion. The likelihood an individual will spread information increases monotonically with exposure, while explicit feedback about how many friends have previously spread it increases the likelihood of a response. We provide a framework for unifying information visibility, divided attention, and explicit social feedback to predict the temporal dynamics of user behavior. PMID:24614301
Asynchronous Message Service Reference Implementation
NASA Technical Reports Server (NTRS)
Burleigh, Scott C.
2011-01-01
This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to operate at high speeds; linked lists protected by mutex semaphores and condition variables are used for efficient, inter-thread communication. Applications may use a variety of transport protocols underlying AMS itself, including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and message queues.
A software bus for thread objects
NASA Technical Reports Server (NTRS)
Callahan, John R.; Li, Dehuai
1995-01-01
The authors have implemented a software bus for lightweight threads in an object-oriented programming environment that allows for rapid reconfiguration and reuse of thread objects in discrete-event simulation experiments. While previous research in object-oriented, parallel programming environments has focused on direct communication between threads, our lightweight software bus, called the MiniBus, provides a means to isolate threads from their contexts of execution by restricting communications between threads to message-passing via their local ports only. The software bus maintains a topology of connections between these ports. It routes, queues, and delivers messages according to this topology. This approach allows for rapid reconfiguration and reuse of thread objects in other systems without making changes to the specifications or source code. A layered approach that provides the needed transparency to developers is presented. Examples of using the MiniBus are given, and the value of bus architectures in building and conducting simulations of discrete-event systems is discussed.
An implementation and evaluation of the MPI 3.0 one-sided communication interface
Dinan, James S.; Balaji, Pavan; Buntinas, Darius T.; ...
2016-01-09
The Q1 Message Passing Interface (MPI) 3.0 standard includes a significant revision to MPI’s remote memory access (RMA) interface, which provides support for one-sided communication. MPI-3 RMA is expected to greatly enhance the usability and performance ofMPI RMA.We present the first complete implementation of MPI-3 RMA and document implementation techniques and performance optimization opportunities enabled by the new interface. Our implementation targets messaging-based networks and is publicly available in the latest release of the MPICH MPI implementation. Here using this implementation, we explore the performance impact of new MPI-3 functionality and semantics. Results indicate that the MPI-3 RMA interface providesmore » significant advantages over the MPI-2 interface by enabling increased communication concurrency through relaxed semantics in the interface and additional routines that provide new window types, synchronization modes, and atomic operations.« less
An implementation and evaluation of the MPI 3.0 one-sided communication interface
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dinan, James S.; Balaji, Pavan; Buntinas, Darius T.
The Q1 Message Passing Interface (MPI) 3.0 standard includes a significant revision to MPI’s remote memory access (RMA) interface, which provides support for one-sided communication. MPI-3 RMA is expected to greatly enhance the usability and performance ofMPI RMA.We present the first complete implementation of MPI-3 RMA and document implementation techniques and performance optimization opportunities enabled by the new interface. Our implementation targets messaging-based networks and is publicly available in the latest release of the MPICH MPI implementation. Here using this implementation, we explore the performance impact of new MPI-3 functionality and semantics. Results indicate that the MPI-3 RMA interface providesmore » significant advantages over the MPI-2 interface by enabling increased communication concurrency through relaxed semantics in the interface and additional routines that provide new window types, synchronization modes, and atomic operations.« less
Non-invasive lightweight integration engine for building EHR from autonomous distributed systems.
Angulo, Carlos; Crespo, Pere; Maldonado, José A; Moner, David; Pérez, Daniel; Abad, Irene; Mandingorra, Jesús; Robles, Montserrat
2007-12-01
In this paper we describe Pangea-LE, a message-oriented lightweight data integration engine that allows homogeneous and concurrent access to clinical information from disperse and heterogeneous data sources. The engine extracts the information and passes it to the requesting client applications in a flexible XML format. The XML response message can be formatted on demand by appropriate Extensible Stylesheet Language (XSL) transformations in order to meet the needs of client applications. We also present a real deployment in a hospital where Pangea-LE collects and generates an XML view of all the available patient clinical information. The information is presented to healthcare professionals in an Electronic Health Record (EHR) viewer Web application with patient search and EHR browsing capabilities. Implantation in a real setting has been a success due to the non-invasive nature of Pangea-LE which respects the existing information systems.
The equipment access software for a distributed UNIX-based accelerator control system
NASA Astrophysics Data System (ADS)
Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé
1994-12-01
This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.
Behavior of Flotsam in the California Current System Utilizing Surface Drift of RAFOS Floats
2012-09-01
drifter is most widely used (Lumpkin and Pazos 2006). The evolution and construction of the SVP drifter is described by Lumpkin and Pazos (2006). SVP...weight them down so that they were almost submerged in order to reduce the effect of the wind force on drifting objects (Lumpkin and Pazos 2007...by Argos (2011) and Lumpkin and Pazos (2007). As the satellite passes over the drifter, it begins receiving messages. To calculate the drifter’s
Proof of Concept for the Rewrite Rule Machine: Interensemble Studies
1994-02-23
34 -,,, S2 •fbo fibo 0 1 Figure 1: Concurrent Rewriting of Fibonacci Expressions exploit a problem’s parallelism at several levels. We call this...property multigrain concurrency; it makes the RRM very well suited for solving not only homogeneous problems, but also complex, locally homogeneous but...interprocessor message passing over a network-is not well suited to data parallelism. A key goal of the RRM is to combine the best of these two approaches in a
Alexander George Karczmar (1917-2017).
Soreq, Hermona; Silman, Israel
2017-12-01
The neurochemistry community at large and the Advisory Board of The International Symposia on Cholinergic Mechanisms mourn the loss of Alexander George Karczmar, the elected Honorary President of these international symposia, who passed away peacefully in his Chicago home at the age of 100 on August 17, 2017. For many of us Alex was the essence of cholinergic signaling, and personified its versatile power to send messages between the brain and the peripheral tissues and organs, and to connect between body and soul. © 2017 International Society for Neurochemistry.
Strategic and Tactical Decision-Making Under Uncertainty
2006-01-03
message passing algorithms. In recent work we applied this method to the problem of joint decoding of a low-density parity-check ( LDPC ) code and a partial...Joint Decoding of LDPC Codes and Partial-Response Channels." IEEE Transactions on Communications. Vol. 54, No. 7, 1149-1153, 2006. P. Pakzad and V...Michael I. Jordan PAGES U U U SAPR 20 19b. TELEPHONE NUMBER (Include area code ) 510/642-3806 Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39.18
NASA Technical Reports Server (NTRS)
VanderWijngaart, Rob; Biegel, Bryan A. (Technical Monitor)
2002-01-01
We describe a new problem size, called Class D, for the NAS Parallel Benchmarks (NPB), whose MPI source code implementation is being released as NPB 2.4. A brief rationale is given for how the new class is derived. We also describe the modifications made to the MPI (Message Passing Interface) implementation to allow the new class to be run on systems with 32-bit integers, and with moderate amounts of memory. Finally, we give the verification values for the new problem size.
IMPETUS - Interactive MultiPhysics Environment for Unified Simulations.
Ha, Vi Q; Lykotrafitis, George
2016-12-08
We introduce IMPETUS - Interactive MultiPhysics Environment for Unified Simulations, an object oriented, easy-to-use, high performance, C++ program for three-dimensional simulations of complex physical systems that can benefit a large variety of research areas, especially in cell mechanics. The program implements cross-communication between locally interacting particles and continuum models residing in the same physical space while a network facilitates long-range particle interactions. Message Passing Interface is used for inter-processor communication for all simulations. Copyright © 2016 Elsevier Ltd. All rights reserved.
Specification of Fenix MPI Fault Tolerance library version 1.0.1
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gamble, Marc; Van Der Wijngaart, Rob; Teranishi, Keita
This document provides a specification of Fenix, a software library compatible with the Message Passing Interface (MPI) to support fault recovery without application shutdown. The library consists of two modules. The first, termed process recovery , restores an application to a consistent state after it has suffered a loss of one or more MPI processes (ranks). The second specifies functions the user can invoke to store application data in Fenix managed redundant storage, and to retrieve it from that storage after process recovery.
Relay Forward-Link File Management Services (MaROS Phase 2)
NASA Technical Reports Server (NTRS)
Allard, Daniel A.; Wallick, Michael N.; Hy, Franklin H.; Gladden, Roy E.
2013-01-01
This software provides the service-level functionality to manage the delivery of files from a lander mission repository to an orbiter mission repository for eventual spacelink relay by the orbiter asset on a specific communications pass. It provides further functions to deliver and track a set of mission-defined messages detailing lander authorization instructions and orbiter data delivery state. All of the information concerning these transactions is persisted in a database providing a high level of accountability of the forward-link relay process.
1988-12-01
Break Control....................51 8755 I/O Control..................54 Z-100 Control Software................. 55 Pass User Memory...the emulator SRAM and the other is 55 for the target SRAM. If either signal is replaced by the NACK signal the host computer displays an error message...Block Diagram 69 AUU M/M 8 in Fiur[:. cemti Daga 70m F’M I-- ’I ANLAD AMam U52 COMM ow U2 i M.2 " -n ax- U 6_- Figure 2b. Schematic Diagram 71 )-M -A -I
1988-05-01
for Advanced Computer Studies and Department of Computer Science University of Maryland College Park, MD 20742 4, ABSTRACT We discuss some aspects of...Computer Studies and Technology & Dept. of Compute. Scienc II. CONTROLLING OFFICE NAME AND ADDRESS Viyriyf~ 12. REPORT DATE Department of the Navy uo...number)-1/ 2.) We study the performance of CG and PCG by examining its performance for u E (0,1), for solving the two model problems with an accuracy
Expertise and decision-making in American football
Woods, Adam J.; Kranjec, Alexander; Lehet, Matt; Chatterjee, Anjan
2015-01-01
In American football, pass interference calls can be difficult to make, especially when the timing of contact between players is ambiguous. American football history contains many examples of controversial pass interference decisions, often with fans, players, and officials interpreting the same event differently. The current study sought to evaluate the influence of experience with concepts important for officiating decisions in American football on the probability (i.e., response criteria) of pass interference calls. We further investigated the extent to which such experience modulates perceptual biases that might influence the interpretation of such events. We hypothesized that observers with less experience with the American football concepts important for pass interference would make progressively more pass interference calls than more experienced observers, even when given an explicit description of the necessary criteria for a pass interference call. In a go/no-go experiment using photographs from American football games, three groups of participants with different levels of experience with American football (Football Naïve, Football Player, and Football Official) made pass interference calls for pictures depicting left-moving and right-moving events. More experience was associated with progressively and significantly fewer pass interference calls [F(2,48) = 10.4, p < 0.001], with Football Naïve participants making the most pass interference calls, and Football Officials the least. In addition, our data replicated a prior finding of spatial biases for interpreting left-moving images more harshly than identical right-moving images, but only in Football Players. These data suggest that experience with the concepts important for making a decision may influence the rate of decision-making, and may also play a role in susceptibility to spatial biases. PMID:26217294
Expertise and decision-making in American football.
Woods, Adam J; Kranjec, Alexander; Lehet, Matt; Chatterjee, Anjan
2015-01-01
In American football, pass interference calls can be difficult to make, especially when the timing of contact between players is ambiguous. American football history contains many examples of controversial pass interference decisions, often with fans, players, and officials interpreting the same event differently. The current study sought to evaluate the influence of experience with concepts important for officiating decisions in American football on the probability (i.e., response criteria) of pass interference calls. We further investigated the extent to which such experience modulates perceptual biases that might influence the interpretation of such events. We hypothesized that observers with less experience with the American football concepts important for pass interference would make progressively more pass interference calls than more experienced observers, even when given an explicit description of the necessary criteria for a pass interference call. In a go/no-go experiment using photographs from American football games, three groups of participants with different levels of experience with American football (Football Naïve, Football Player, and Football Official) made pass interference calls for pictures depicting left-moving and right-moving events. More experience was associated with progressively and significantly fewer pass interference calls [F (2,48) = 10.4, p < 0.001], with Football Naïve participants making the most pass interference calls, and Football Officials the least. In addition, our data replicated a prior finding of spatial biases for interpreting left-moving images more harshly than identical right-moving images, but only in Football Players. These data suggest that experience with the concepts important for making a decision may influence the rate of decision-making, and may also play a role in susceptibility to spatial biases.
ERIC Educational Resources Information Center
Puisto, Jaakko
2009-01-01
The federal policy of termination against Native Americans was on a high roll from 1946 to 1954. The policy received explicit expression in House Concurrent Resolution 108, passed in 1953, which stated that "Indians should be made subject to the same laws and entitled to the same privileges and responsibilities as are applicable to other…
Satellite telemetry: performance of animal-tracking systems
Keating, Kim A.; Brewster, Wayne G.; Key, Carl H.
1991-01-01
t: We used 10 Telonics ST-3 platform transmitter terminals (PTT's) configured for wolves and ungulates to examine the performance of the Argos satellite telemetry system. Under near-optimal conditions, 68 percentile errors for location qualities (NQ) 1, 2, and 3 were 1,188, 903, and 361 m, respectively. Errors (rE) exceeded expected values for NQ = 2 and 3, varied greatly among PTT's, increased as the difference (HE) between the estimated and actual PTT elevations increased, and were correlated nonlinearly with maximum satellite pass height (P,). We present a model of the relationships among rE, HE, and PH. Errors were bimodally distributed along the east-west axis and tended to occur away from the satellite when HE was positive. A southeasterly bias increased with HE, probably due to the particular distribution of satellite passes and effects of HE on rE. Under near-optimal conditions, 21 sensor message was received for up to 64% of available (PH, 50) satellite passes, and a location (NQ 2 1) was calculated for up to 63% of such passes. Sampling frequencies of sensor and location data declined 13 and 70%, respectively, for PTT's in a valley bottom and 65 and 86%, respectively, for PTT's on animals that were in valley bottoms. Sampling frequencies were greater for ungulate than for wolf collars.
Hernández-Jover, M; Schembri, N; Toribio, J-A; Holyoake, P K
2009-10-01
To evaluate the implementation and barriers to adoption, among pig producers, of a newly introduced traceability and food safety system in Australia. Implementation of the PigPass national vendor declaration (NVD) linked to an on-farm quality assurance (QA) program was evaluated in May and December 2007 at saleyards and abattoirs in New South Wales, Victoria and Queensland. Four focus group discussions with saleyard producers were held between April and July 2007. Implementation of the PigPass system in terms of accurate completion of the form and QA accreditation was higher at the export abattoir than at the regional saleyard at the first audit (P < 0.01). Implementation increased at the second audit at the abattoirs, but little change with time was observed at saleyards. Approximately half of the producers at saleyards used photocopied PigPass forms, made at least one error (>64%), and many vendors did not appear to be QA-accredited. During focus groups, producers expressed the view that PigPass implementation improved animal and product traceability. They identified the associated costs and a perceived lack of support by information providers as obstacles for adoption. Improvement in the implementation of PigPass among producers marketing pigs at export abattoirs was observed during the 8-month period of the study. There is a need for a more uniform message to producers from government agencies on the importance of the PigPass NVD and QA and extension and education targeted toward producers supplying pigs to saleyards and domestic abattoirs to ensure compliance with the traceability requirements.
GEOS Atmospheric Model: Challenges at Exascale
NASA Technical Reports Server (NTRS)
Putman, William M.; Suarez, Max J.
2017-01-01
The Goddard Earth Observing System (GEOS) model at NASA's Global Modeling and Assimilation Office (GMAO) is used to simulate the multi-scale variability of the Earth's weather and climate, and is used primarily to assimilate conventional and satellite-based observations for weather forecasting and reanalysis. In addition, assimilations coupled to an ocean model are used for longer-term forecasting (e.g., El Nino) on seasonal to interannual times-scales. The GMAO's research activities, including system development, focus on numerous time and space scales, as detailed on the GMAO website, where they are tabbed under five major themes: Weather Analysis and Prediction; Seasonal-Decadal Analysis and Prediction; Reanalysis; Global Mesoscale Modeling, and Observing System Science. A brief description of the GEOS systems can also be found at the GMAO website. GEOS executes as a collection of earth system components connected through the Earth System Modeling Framework (ESMF). The ESMF layer is supplemented with the MAPL (Modeling, Analysis, and Prediction Layer) software toolkit developed at the GMAO, which facilitates the organization of the computational components into a hierarchical architecture. GEOS systems run in parallel using a horizontal decomposition of the Earth's sphere into processing elements (PEs). Communication between PEs is primarily through a message passing framework, using the message passing interface (MPI), and through explicit use of node-level shared memory access via the SHMEM (Symmetric Hierarchical Memory access) protocol. Production GEOS weather prediction systems currently run at 12.5-kilometer horizontal resolution with 72 vertical levels decomposed into PEs associated with 5,400 MPI processes. Research GEOS systems run at resolutions as fine as 1.5 kilometers globally using as many as 30,000 MPI processes. Looking forward, these systems can be expected to see a 2 times increase in horizontal resolution every two to three years, as well as less frequent increases in vertical resolution. Coupling these resolution changes with increases in complexity, the computational demands on the GEOS production and research systems should easily increase 100-fold over the next five years. Currently, our 12.5 kilometer weather prediction system narrowly meets the time-to-solution demands of a near-real-time production system. Work is now in progress to take advantage of a hybrid MPI-OpenMP parallelism strategy, in an attempt to achieve a modest two-fold speed-up to accommodate an immediate demand due to increased scientific complexity and an increase in vertical resolution. Pursuing demands that require a 10- to 100-fold increases or more, however, would require a detailed exploration of the computational profile of GEOS, as well as targeted solutions using more advanced high-performance computing technologies. Increased computing demands of 100-fold will be required within five years based on anticipated changes in the GEOS production systems, increases of 1000-fold can be anticipated over the next ten years.
Thomas, F Dennis; Blomberg, Richard D; Peck, Raymond C; Cosgrove, Linda A; Salzberg, Philip M
2008-01-01
In 2004, Washington State applied NHTSA's High Visibility Enforcement model used in the Click It or Ticket seat belt campaign in an attempt to reduce unsafe driving behaviors around commercial motor vehicles (CMVs). The program was called Ticketing Aggressive Cars and Trucks (TACT). This paper details the methods used to evaluate the program's effectiveness and the results of the evaluation. Four high-crash interstate highway corridors, each approximately 25 miles in length, were selected. Two of these corridors received TACT media messages and increased enforcement over an 18-month period while two comparison corridors did not receive any increased media or enforcement. A total of 4,737 contacts were made with drivers during the two enforcement waves, and 72% of these contacts led to a citation. Drivers at the intervention sites who said they saw or heard any of the TACT messages increased from 17.7% in the pre period to a high of 67.3% in the post periods. Drivers at the intervention sites also reported increased exposure to the core message of leaving more space when passing trucks (14% pre to 40% post period). The percentage of drivers who said they leave more room when passing trucks than when passing cars rose from 16% in the pre period to 24% in the post period at the intervention sites, while comparison sites showed no change. Over 150 hours of video recorded by law enforcement officers in unmarked vehicles were utilized to examine violation rates and severity of violations before and after the intervention campaigns. Statistical analyses showed that violation rates were reduced significantly at the intervention sites (between 23% and 46%), while remaining constant at the comparison sites. Analyses of the video data also showed that the seriousness of the residual violations at the intervention sites decreased. Overall, the evaluation results provide a consistent picture of the effectiveness of the TACT pilot project. Success was demonstrated at every step - messages were received and understood, knowledge was changed in the intended direction, self reported driving behavior around large trucks improved, and observed driving behaviors confirmed the self reports. After this initial success in Washington State, the TACT model will continue to be implemented and evaluated by FMCSA in an attempt to validate the program. Based on the results of this study and the consistent positive results found for other sTEP projects, it is likely that TACT will show continued success in a variety of settings and will help reduce the number and severity of crashes involving CMVs. Future research should attempt to use many of the methods described here to further validate the methods for not only evaluations of TACT programs, but also for any other highway safety programs that require measurements of the program's effectiveness.
Poolton, J M; Masters, R S W; Maxwell, J P
2007-06-01
Heuristics of evolutionary biology (e.g., survival of the fittest) dictate that phylogenetically older processes are inherently more stable and resilient to disruption than younger processes. On the grounds that non-declarative behaviour emerged long before declarative behaviour, Reber (1992) argues that implicit (non-declarative) learning is supported by neural processes that are evolutionarily older than those supporting explicit learning. Reber suggested that implicit learning thus leads to performance that is more robust than explicit learning. Applying this evolutionary framework to motor performance, we examined whether implicit motor learning, relative to explicit motor learning, conferred motor output that was resilient to physiological fatigue and durable over time. In Part One of the study a fatigued state was induced by a double Wingate Anaerobic test protocol. Fatigue had no affect on performance of participants in the implicit condition; whereas, performance of participants in the explicit condition deteriorated significantly. In Part Two of the study a convenience sample of participants was recalled following a one-year hiatus. In both the implicit and the explicit condition retention of performance was seen and, contrary to the findings in Part One, so was resilience to fatigue. The resilient performance in the explicit condition after one year may have resulted from forgetting (the decay of declarative knowledge) or from consolidation of declarative knowledge as implicit memories. In either case, implicit processes were left to more effectively support motor performance.
Mark 4A antenna control system data handling architecture study
NASA Technical Reports Server (NTRS)
Briggs, H. C.; Eldred, D. B.
1991-01-01
A high-level review was conducted to provide an analysis of the existing architecture used to handle data and implement control algorithms for NASA's Deep Space Network (DSN) antennas and to make system-level recommendations for improving this architecture so that the DSN antennas can support the ever-tightening requirements of the next decade and beyond. It was found that the existing system is seriously overloaded, with processor utilization approaching 100 percent. A number of factors contribute to this overloading, including dated hardware, inefficient software, and a message-passing strategy that depends on serial connections between machines. At the same time, the system has shortcomings and idiosyncrasies that require extensive human intervention. A custom operating system kernel and an obscure programming language exacerbate the problems and should be modernized. A new architecture is presented that addresses these and other issues. Key features of the new architecture include a simplified message passing hierarchy that utilizes a high-speed local area network, redesign of particular processing function algorithms, consolidation of functions, and implementation of the architecture in modern hardware and software using mainstream computer languages and operating systems. The system would also allow incremental hardware improvements as better and faster hardware for such systems becomes available, and costs could potentially be low enough that redundancy would be provided economically. Such a system could support DSN requirements for the foreseeable future, though thorough consideration must be given to hard computational requirements, porting existing software functionality to the new system, and issues of fault tolerance and recovery.
Collignon, Barbara; Schulz, Roland; Smith, Jeremy C; Baudry, Jerome
2011-04-30
A message passing interface (MPI)-based implementation (Autodock4.lga.MPI) of the grid-based docking program Autodock4 has been developed to allow simultaneous and independent docking of multiple compounds on up to thousands of central processing units (CPUs) using the Lamarkian genetic algorithm. The MPI version reads a single binary file containing precalculated grids that represent the protein-ligand interactions, i.e., van der Waals, electrostatic, and desolvation potentials, and needs only two input parameter files for the entire docking run. In comparison, the serial version of Autodock4 reads ASCII grid files and requires one parameter file per compound. The modifications performed result in significantly reduced input/output activity compared with the serial version. Autodock4.lga.MPI scales up to 8192 CPUs with a maximal overhead of 16.3%, of which two thirds is due to input/output operations and one third originates from MPI operations. The optimal docking strategy, which minimizes docking CPU time without lowering the quality of the database enrichments, comprises the docking of ligands preordered from the most to the least flexible and the assignment of the number of energy evaluations as a function of the number of rotatable bounds. In 24 h, on 8192 high-performance computing CPUs, the present MPI version would allow docking to a rigid protein of about 300K small flexible compounds or 11 million rigid compounds.
Compositional schedulability analysis of real-time actor-based systems.
Jaghoori, Mohammad Mahdi; de Boer, Frank; Longuet, Delphine; Chothia, Tom; Sirjani, Marjan
2017-01-01
We present an extension of the actor model with real-time, including deadlines associated with messages, and explicit application-level scheduling policies, e.g.,"earliest deadline first" which can be associated with individual actors. Schedulability analysis in this setting amounts to checking whether, given a scheduling policy for each actor, every task is processed within its designated deadline. To check schedulability, we introduce a compositional automata-theoretic approach, based on maximal use of model checking combined with testing. Behavioral interfaces define what an actor expects from the environment, and the deadlines for messages given these assumptions. We use model checking to verify that actors match their behavioral interfaces. We extend timed automata refinement with the notion of deadlines and use it to define compatibility of actor environments with the behavioral interfaces. Model checking of compatibility is computationally hard, so we propose a special testing process. We show that the analyses are decidable and automate the process using the Uppaal model checker.
Theoretical perspectives accounting for adolescent homosexuality.
Savin-Williams, R C
1988-03-01
Few topics in sexology elicit such a diversity of opinions and emotions as the question of etiology of homosexuality. Views frequently carry with them implicit or explicit messages concerning the psychologic health of this sexual orientation. Theories of sexual development usually portray adolescence as a critical time in the life course because of changes in: 1) anatomy and physiology; 2) psychologic functioning: the reawakening, renewal, and reliving of previously established sexual relations and drives; and/or 3) social conditions: an increased exposure and adherence to societal messages concerning appropriate and inappropriate social and sexual behaviors and relationships. This paper provides a brief overview of several major theories--evolutionary biology, psychoanalysis, and social processes--as they relate to the development of sexual orientation. In addition, an ethologic perspective that synthesizes various etiologic theories, as they relate to homosexuality during adolescence, is briefly reviewed. In these discussions, the issue of whether homosexuality is a normal or abnormal developmental state during adolescence is also addressed.
Context-rich semantic framework for effective data-to-decisions in coalition networks
NASA Astrophysics Data System (ADS)
Grueneberg, Keith; de Mel, Geeth; Braines, Dave; Wang, Xiping; Calo, Seraphin; Pham, Tien
2013-05-01
In a coalition context, data fusion involves combining of soft (e.g., field reports, intelligence reports) and hard (e.g., acoustic, imagery) sensory data such that the resulting output is better than what it would have been if the data are taken individually. However, due to the lack of explicit semantics attached with such data, it is difficult to automatically disseminate and put the right contextual data in the hands of the decision makers. In order to understand the data, explicit meaning needs to be added by means of categorizing and/or classifying the data in relationship to each other from base reference sources. In this paper, we present a semantic framework that provides automated mechanisms to expose real-time raw data effectively by presenting appropriate information needed for a given situation so that an informed decision could be made effectively. The system utilizes controlled natural language capabilities provided by the ITA (International Technology Alliance) Controlled English (CE) toolkit to provide a human-friendly semantic representation of messages so that the messages can be directly processed in human/machine hybrid environments. The Real-time Semantic Enrichment (RTSE) service adds relevant contextual information to raw data streams from domain knowledge bases using declarative rules. The rules define how the added semantics and context information are derived and stored in a semantic knowledge base. The software framework exposes contextual information from a variety of hard and soft data sources in a fast, reliable manner so that an informed decision can be made using semantic queries in intelligent software systems.
A new deadlock resolution protocol and message matching algorithm for the extreme-scale simulator
Engelmann, Christian; Naughton, III, Thomas J.
2016-03-22
Investigating the performance of parallel applications at scale on future high-performance computing (HPC) architectures and the performance impact of different HPC architecture choices is an important component of HPC hardware/software co-design. The Extreme-scale Simulator (xSim) is a simulation toolkit for investigating the performance of parallel applications at scale. xSim scales to millions of simulated Message Passing Interface (MPI) processes. The overhead introduced by a simulation tool is an important performance and productivity aspect. This paper documents two improvements to xSim: (1)~a new deadlock resolution protocol to reduce the parallel discrete event simulation overhead and (2)~a new simulated MPI message matchingmore » algorithm to reduce the oversubscription management overhead. The results clearly show a significant performance improvement. The simulation overhead for running the NAS Parallel Benchmark suite was reduced from 102% to 0% for the embarrassingly parallel (EP) benchmark and from 1,020% to 238% for the conjugate gradient (CG) benchmark. xSim offers a highly accurate simulation mode for better tracking of injected MPI process failures. Furthermore, with highly accurate simulation, the overhead was reduced from 3,332% to 204% for EP and from 37,511% to 13,808% for CG.« less
Application Portable Parallel Library
NASA Technical Reports Server (NTRS)
Cole, Gary L.; Blech, Richard A.; Quealy, Angela; Townsend, Scott
1995-01-01
Application Portable Parallel Library (APPL) computer program is subroutine-based message-passing software library intended to provide consistent interface to variety of multiprocessor computers on market today. Minimizes effort needed to move application program from one computer to another. User develops application program once and then easily moves application program from parallel computer on which created to another parallel computer. ("Parallel computer" also include heterogeneous collection of networked computers). Written in C language with one FORTRAN 77 subroutine for UNIX-based computers and callable from application programs written in C language or FORTRAN 77.
Design and evaluation of Nemesis, a scalable, low-latency, message-passing communication subsystem.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buntinas, D.; Mercier, G.; Gropp, W.
2005-12-02
This paper presents a new low-level communication subsystem called Nemesis. Nemesis has been designed and implemented to be scalable and efficient both in the intranode communication context using shared-memory and in the internode communication case using high-performance networks and is natively multimethod-enabled. Nemesis has been integrated in MPICH2 as a CH3 channel and delivers better performance than other dedicated communication channels in MPICH2. Furthermore, the resulting MPICH2 architecture outperforms other MPI implementations in point-to-point benchmarks.
Rokadiya, S; McCaul, J A; Mitchell, D A; Brennan, P A
2016-07-01
Many doctors now use mobile devices such as smartphones to communicate with one another about their patients, and sometimes this is without the knowledge and approval of their employer. We know of little information about the use of texting and other web-based messaging services by doctors in hospitals, so we reviewed relevant published studies to assess the safety and usefulness of current methods of digital communication. Copyright © 2016 The British Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, William Michael; Plimpton, Steven James; Wang, Peng
2010-03-01
LAMMPS is a classical molecular dynamics code, and an acronym for Large-scale Atomic/Molecular Massively Parallel Simulator. LAMMPS has potentials for soft materials (biomolecules, polymers) and solid-state materials (metals, semiconductors) and coarse-grained or mesoscopic systems. It can be used to model atoms or, more generically, as a parallel particle simulator at the atomic, meso, or continuum scale. LAMMPS runs on single processors or in parallel using message-passing techniques and a spatial-decomposition of the simulation domain. The code is designed to be easy to modify or extend with new functionality.
High-energy physics software parallelization using database techniques
NASA Astrophysics Data System (ADS)
Argante, E.; van der Stok, P. D. V.; Willers, I.
1997-02-01
A programming model for software parallelization, called CoCa, is introduced that copes with problems caused by typical features of high-energy physics software. By basing CoCa on the database transaction paradimg, the complexity induced by the parallelization is for a large part transparent to the programmer, resulting in a higher level of abstraction than the native message passing software. CoCa is implemented on a Meiko CS-2 and on a SUN SPARCcenter 2000 parallel computer. On the CS-2, the performance is comparable with the performance of native PVM and MPI.
Computer-aided programming for message-passing system; Problems and a solution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, M.Y.; Gajski, D.D.
1989-12-01
As the number of processors and the complexity of problems to be solved increase, programming multiprocessing systems becomes more difficult and error-prone. Program development tools are necessary since programmers are not able to develop complex parallel programs efficiently. Parallel models of computation, parallelization problems, and tools for computer-aided programming (CAP) are discussed. As an example, a CAP tool that performs scheduling and inserts communication primitives automatically is described. It also generates the performance estimates and other program quality measures to help programmers in improving their algorithms and programs.
Multiple-Ring Digital Communication Network
NASA Technical Reports Server (NTRS)
Kirkham, Harold
1992-01-01
Optical-fiber digital communication network to support data-acquisition and control functions of electric-power-distribution networks. Optical-fiber links of communication network follow power-distribution routes. Since fiber crosses open power switches, communication network includes multiple interconnected loops with occasional spurs. At each intersection node is needed. Nodes of communication network include power-distribution substations and power-controlling units. In addition to serving data acquisition and control functions, each node acts as repeater, passing on messages to next node(s). Multiple-ring communication network operates on new AbNET protocol and features fiber-optic communication.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Armstrong, Robert C.; Ray, Jaideep; Malony, A.
2003-11-01
We present a case study of performance measurement and modeling of a CCA (Common Component Architecture) component-based application in a high performance computing environment. We explore issues peculiar to component-based HPC applications and propose a performance measurement infrastructure for HPC based loosely on recent work done for Grid environments. A prototypical implementation of the infrastructure is used to collect data for a three components in a scientific application and construct performance models for two of them. Both computational and message-passing performance are addressed.
On the mapping associated with the complex representation of functions and processes.
NASA Technical Reports Server (NTRS)
Harger, R. O.
1972-01-01
The mapping between function spaces that is implied by the representation of a real 'bandpass' function by a complex 'low-pass' function is explicitly accepted. The discussion is extended to the representation of stationary random processes where the mapping is between spaces of random processes. This approach clarifies the nature of the complex representation, especially in the case of random processes and, in addition, derives the properties of the complex representation.-
Bannink, Rienke; Broeren, Suzanne; Joosten-van Zwanenburg, Evelien; van As, Els; van de Looij-Jansen, Petra
2014-01-01
Background Health promotion for adolescents is important in the prevention of mental health problems and health-risk behaviors. We implemented two interventions in a preventive youth health care setting. Adolescents in the E-health4Uth group received Web-based, tailored messages on their health behavior and well-being. Adolescents in the E-health4Uth and counseling group received the same tailored messages, but were subsequently referred to a school nurse for a consultation if they were at risk of mental health problems. Objective This study evaluated the use and appreciation of these Web-based, tailored messages and additional consultation with a school nurse. Differences in use and appreciation according to demographics (ie, gender, level of education, and ethnicity) of the adolescents were also assessed. Methods Two youth health care organizations participated in this study and conducted the interventions in 12 secondary schools. In total, 1702 adolescents participated; 533 in the E-health4Uth group, 554 in the E-health4Uth and counseling group, and 615 in the control group (ie, care as usual). Adolescents completed an evaluation questionnaire assessing the use and appreciation of the tailored messages immediately after receiving these messages and at a 4-month follow-up. After the consultation, adolescents and nurses completed an evaluation questionnaire on the use and appreciation of the consultation. Results The majority of the adolescents (845/1034, 81.72%) indicated they had read the tailored messages. Most items on the use and appreciation of the tailored messages and the program were scored positive (overall satisfaction on a scale from 1, most-negative, to 10, most-positive: mean 6.70, SD 1.60). In general, adolescents in vocational training, girls, and adolescents of non-Dutch ethnicity, indicated they used the tailored messages more often and appreciated the content of the messages better than adolescents receiving preuniversity education, boys, and adolescents of Dutch ethnicity, respectively (all P<.05). In the E-health4Uth and counseling group, 18.6% (103/553) of the adolescents were referred to a nurse. Adolescents in vocational training and girls were more often referred to a nurse than adolescents receiving preuniversity education (P=.007) and boys (P=.03), respectively. Adolescents and nurses positively evaluated the consultation (overall satisfaction of adolescents: mean 8.07, SD 1.21). Adolescents in vocational training attended the consultation more often (P=.047) and considered the consultation a more valuable addition to the tailored messages than adolescents receiving preuniversity education (P=.034). Conclusions The Web-based, tailored messages and additional consultation were used and appreciated positively by adolescents and nurses. The consultation seems a valuable addition to the tailored messages. However, the tailored messages might need further improvement since adolescents did not rate all evaluation items about these messages explicitly positive. As these interventions were already interweaved with the existing practice of the preventive youth health care, they are especially promising for future implementation. Trial Registration Netherlands Trial Register Number (NTR): NTR3596; http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=3596 (Archived by WebCite at http://www.webcitation.org/6LryL42zH). PMID:24394676
Bannink, Rienke; Broeren, Suzanne; Joosten-van Zwanenburg, Evelien; van As, Els; van de Looij-Jansen, Petra; Raat, Hein
2014-01-06
Health promotion for adolescents is important in the prevention of mental health problems and health-risk behaviors. We implemented two interventions in a preventive youth health care setting. Adolescents in the E-health4Uth group received Web-based, tailored messages on their health behavior and well-being. Adolescents in the E-health4Uth and counseling group received the same tailored messages, but were subsequently referred to a school nurse for a consultation if they were at risk of mental health problems. This study evaluated the use and appreciation of these Web-based, tailored messages and additional consultation with a school nurse. Differences in use and appreciation according to demographics (ie, gender, level of education, and ethnicity) of the adolescents were also assessed. Two youth health care organizations participated in this study and conducted the interventions in 12 secondary schools. In total, 1702 adolescents participated; 533 in the E-health4Uth group, 554 in the E-health4Uth and counseling group, and 615 in the control group (ie, care as usual). Adolescents completed an evaluation questionnaire assessing the use and appreciation of the tailored messages immediately after receiving these messages and at a 4-month follow-up. After the consultation, adolescents and nurses completed an evaluation questionnaire on the use and appreciation of the consultation. The majority of the adolescents (845/1034, 81.72%) indicated they had read the tailored messages. Most items on the use and appreciation of the tailored messages and the program were scored positive (overall satisfaction on a scale from 1, most-negative, to 10, most-positive: mean 6.70, SD 1.60). In general, adolescents in vocational training, girls, and adolescents of non-Dutch ethnicity, indicated they used the tailored messages more often and appreciated the content of the messages better than adolescents receiving preuniversity education, boys, and adolescents of Dutch ethnicity, respectively (all P<.05). In the E-health4Uth and counseling group, 18.6% (103/553) of the adolescents were referred to a nurse. Adolescents in vocational training and girls were more often referred to a nurse than adolescents receiving preuniversity education (P=.007) and boys (P=.03), respectively. Adolescents and nurses positively evaluated the consultation (overall satisfaction of adolescents: mean 8.07, SD 1.21). Adolescents in vocational training attended the consultation more often (P=.047) and considered the consultation a more valuable addition to the tailored messages than adolescents receiving preuniversity education (P=.034). The Web-based, tailored messages and additional consultation were used and appreciated positively by adolescents and nurses. The consultation seems a valuable addition to the tailored messages. However, the tailored messages might need further improvement since adolescents did not rate all evaluation items about these messages explicitly positive. As these interventions were already interweaved with the existing practice of the preventive youth health care, they are especially promising for future implementation. Netherlands Trial Register Number (NTR): NTR3596; http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=3596 (Archived by WebCite at http://www.webcitation.org/6LryL42zH).
Kawazoe, Yoshimasa; Imai, Takeshi; Ohe, Kazuhiko
2016-04-05
Health level seven version 2.5 (HL7 v2.5) is a widespread messaging standard for information exchange between clinical information systems. By applying Semantic Web technologies for handling HL7 v2.5 messages, it is possible to integrate large-scale clinical data with life science knowledge resources. Showing feasibility of a querying method over large-scale resource description framework (RDF)-ized HL7 v2.5 messages using publicly available drug databases. We developed a method to convert HL7 v2.5 messages into the RDF. We also converted five kinds of drug databases into RDF and provided explicit links between the corresponding items among them. With those linked drug data, we then developed a method for query expansion to search the clinical data using semantic information on drug classes along with four types of temporal patterns. For evaluation purpose, medication orders and laboratory test results for a 3-year period at the University of Tokyo Hospital were used, and the query execution times were measured. Approximately 650 million RDF triples for medication orders and 790 million RDF triples for laboratory test results were converted. Taking three types of query in use cases for detecting adverse events of drugs as an example, we confirmed these queries were represented in SPARQL Protocol and RDF Query Language (SPARQL) using our methods and comparison with conventional query expressions were performed. The measurement results confirm that the query time is feasible and increases logarithmically or linearly with the amount of data and without diverging. The proposed methods enabled query expressions that separate knowledge resources and clinical data, thereby suggesting the feasibility for improving the usability of clinical data by enhancing the knowledge resources. We also demonstrate that when HL7 v2.5 messages are automatically converted into RDF, searches are still possible through SPARQL without modifying the structure. As such, the proposed method benefits not only our hospitals, but also numerous hospitals that handle HL7 v2.5 messages. Our approach highlights a potential of large-scale data federation techniques to retrieve clinical information, which could be applied as applications of clinical intelligence to improve clinical practices, such as adverse drug event monitoring and cohort selection for a clinical study as well as discovering new knowledge from clinical information.
Poganik, Jesse R; Long, Marcus J C; Aye, Yimon
2018-05-01
Precision cell signaling activities of reactive electrophilic species (RES) are arguably among the most poorly-understood means to transmit biological messages. Latest research implicates native RES to be a chemically-distinct subset of endogenous redox signals that influence cell decision making through non-enzyme-assisted modifications of specific proteins. Yet, fundamental questions remain regarding the role of RES as bona fide second messengers. Here, we lay out three sets of criteria we feel need to be met for RES to be considered as true cellular signals that directly mediate information transfer by modifying "first-responding" sensor proteins. We critically assess the available evidence and define the extent to which each criterion has been fulfilled. Finally, we offer some ideas on the future trajectories of the electrophile signaling field taking inspiration from work that has been done to understand canonical signaling mediators. Also see the video abstract here: https://youtu.be/rG7o0clVP0c. © 2018 WILEY Periodicals, Inc.
Large-eddy simulation/Reynolds-averaged Navier-Stokes hybrid schemes for high speed flows
NASA Astrophysics Data System (ADS)
Xiao, Xudong
Three LES/RANS hybrid schemes have been proposed for the prediction of high speed separated flows. Each method couples the k-zeta (Enstrophy) BANS model with an LES subgrid scale one-equation model by using a blending function that is coordinate system independent. Two of these functions are based on turbulence dissipation length scale and grid size, while the third one has no explicit dependence on the grid. To implement the LES/RANS hybrid schemes, a new rescaling-reintroducing method is used to generate time-dependent turbulent inflow conditions. The hybrid schemes have been tested on a Mach 2.88 flow over 25 degree compression-expansion ramp and a Mach 2.79 flow over 20 degree compression ramp. A special computation procedure has been designed to prevent the separation zone from expanding upstream to the recycle-plane. The code is parallelized using Message Passing Interface (MPI) and is optimized for running on IBM-SP3 parallel machine. The scheme was validated first for a flat plate. It was shown that the blending function has to be monotonic to prevent the RANS region from appearing in the LES region. In the 25 deg ramp case, the hybrid schemes provided better agreement with experiment in the recovery region. Grid refinement studies demonstrated the importance of using a grid independent blend function and further improvement with experiment in the recovery region. In the 20 deg ramp case, with a relatively finer grid, the hybrid scheme characterized by grid independent blending function well predicted the flow field in both the separation region and the recovery region. Therefore, with "appropriately" fine grid, current hybrid schemes are promising for the simulation of shock wave/boundary layer interaction problems.
NASA Astrophysics Data System (ADS)
Zhao, Lifei; Li, Zhen; Caswell, Bruce; Ouyang, Jie; Karniadakis, George Em
2018-06-01
We simulate complex fluids by means of an on-the-fly coupling of the bulk rheology to the underlying microstructure dynamics. In particular, a continuum model of polymeric fluids is constructed without a pre-specified constitutive relation, but instead it is actively learned from mesoscopic simulations where the dynamics of polymer chains is explicitly computed. To couple the bulk rheology of polymeric fluids and the microscale dynamics of polymer chains, the continuum approach (based on the finite volume method) provides the transient flow field as inputs for the (mesoscopic) dissipative particle dynamics (DPD), and in turn DPD returns an effective constitutive relation to close the continuum equations. In this multiscale modeling procedure, we employ an active learning strategy based on Gaussian process regression (GPR) to minimize the number of expensive DPD simulations, where adaptively selected DPD simulations are performed only as necessary. Numerical experiments are carried out for flow past a circular cylinder of a non-Newtonian fluid, modeled at the mesoscopic level by bead-spring chains. The results show that only five DPD simulations are required to achieve an effective closure of the continuum equations at Reynolds number Re = 10. Furthermore, when Re is increased to 100, only one additional DPD simulation is required for constructing an extended GPR-informed model closure. Compared to traditional message-passing multiscale approaches, applying an active learning scheme to multiscale modeling of non-Newtonian fluids can significantly increase the computational efficiency. Although the method demonstrated here obtains only a local viscosity from the polymer dynamics, it can be extended to other multiscale models of complex fluids whose macro-rheology is unknown.
Performance Analysis of Distributed Object-Oriented Applications
NASA Technical Reports Server (NTRS)
Schoeffler, James D.
1998-01-01
The purpose of this research was to evaluate the efficiency of a distributed simulation architecture which creates individual modules which are made self-scheduling through the use of a message-based communication system used for requesting input data from another module which is the source of that data. To make the architecture as general as possible, the message-based communication architecture was implemented using standard remote object architectures (Common Object Request Broker Architecture (CORBA) and/or Distributed Component Object Model (DCOM)). A series of experiments were run in which different systems are distributed in a variety of ways across multiple computers and the performance evaluated. The experiments were duplicated in each case so that the overhead due to message communication and data transmission can be separated from the time required to actually perform the computational update of a module each iteration. The software used to distribute the modules across multiple computers was developed in the first year of the current grant and was modified considerably to add a message-based communication scheme supported by the DCOM distributed object architecture. The resulting performance was analyzed using a model created during the first year of this grant which predicts the overhead due to CORBA and DCOM remote procedure calls and includes the effects of data passed to and from the remote objects. A report covering the distributed simulation software and the results of the performance experiments has been submitted separately. The above report also discusses possible future work to apply the methodology to dynamically distribute the simulation modules so as to minimize overall computation time.
Messages about appearance, food, weight and exercise in "tween" television.
Simpson, Courtney C; Kwitowski, Melissa; Boutte, Rachel; Gow, Rachel W; Mazzeo, Suzanne E
2016-12-01
Tweens (children ages ~8-14years) are a relatively recently defined age group, increasingly targeted by marketers. Individuals in this age group are particularly vulnerable to opinions and behaviors presented in media messages, given their level of cognitive and social development. However, little research has examined messages about appearance, food, weight, and exercise in television specifically targeting tweens, despite the popularity of this media type among this age group. This study used a content analytic approach to explore these messages in the five most popular television shows for tweens on the Disney Channel (as of 2015). Using a multiple-pass approach, relevant content in episodes from the most recently completed seasons of each show was coded. Appearance related incidents occurred in every episode; these most frequently mentioned attractiveness/beauty. Food related incidents were also present in every episode; typically, these situations were appearance and weight neutral. Exercise related incidents occurred in 53.3% of episodes; the majority expressed resistance to exercise. Weight related incidents occurred in 40.0% of the episodes; the majority praised the muscular ideal. Women were more likely to initiate appearance incidents, and men were more likely to initiate exercise incidents. These results suggest that programs specifically marketed to tweens reinforce appearance ideals, including stereotypes about female attractiveness and male athleticism, two constructs linked to eating pathology and body dissatisfaction. Given the developmental vulnerability of the target group, these findings are concerning, and highlight potential foci for prevention programming, including media literacy, for tweens. Copyright © 2016 Elsevier Ltd. All rights reserved.
Pokhrel, Pallav; Herzog, Thaddeus A; Fagan, Pebbles; Unger, Jennifer B; Stacy, Alan W
2018-02-10
This study tested whether exposure to e-cigarette advertising increases e-cigarette use susceptibility among non-smoking young adults by promoting explicit and implicit attitudes towards e-cigarettes as a safer and healthier alternative to combustible cigarettes. Young adult current non-smokers who had never used an e-cigarette (N = 393; Mean age = 22.1, Standard Deviation = 3.9; 66% Women) were randomly assigned to one of the 3 conditions that involved viewing real-world, print e-cigarette ads. Two of the 3 conditions were experimental conditions where ads with different predominant themes [harm-reduction ("Health") vs. social enhancement ("Social") focused] were interspersed among ads of everyday objects. The third condition was the control condition involving ads of everyday objects only. Participants provided data on explicit (i.e., self-reported harm perceptions) and implicit (i.e., Implicit Association Test) attitudes towards e-cigarette use and e-cigarette use intentions. Hypotheses were tested using structural equation modeling. Relative to Control participants, participants in Health and Social conditions were more likely to show higher implicit attitudes towards e-cigarettes as a safer alternative to cigarettes. Only the Social condition, relative to Control, had a significant effect on lower explicit harm perceptions of e-cigarette versus cigarette use. The Social condition had a significant indirect effect on e-cigarette use susceptibility, mediated by explicit harm perceptions. Social enhancement-themed ads may communicate the reduced-harm messages more strongly among young adults so as to affect both explicit and implicit attitudes and, through these, e-cigarette use susceptibility. Regulatory bodies may need to scrutinize reduced-harm claims communicated through social enhancement-themed ads. © The Author(s) 2018. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Effects of Group Gender Composition on Mental Rotation Test Performance in Women.
Moè, Angelica
2018-06-01
Mental rotation is a task in which men outscore women by up to one standard deviation. Many biological, strategic, experiential, and motivational factors concur to explain this gender gap. Among these there are gender stereotypes, which could either harm or favor performance, giving rise, respectively, to stereotype threat or lift effects. This study examined effects due to stereotypes induced by testing women in a minority mixed-gender group composition (subtle message) when provided with instructions about men's or women's superiority (blatant message), in order to assess the hypothesis that the effort of disconfirming a negative stereotype causes increased performance when two messages, either blatant or subtle, are provided. Sixty-six men and 78 women tested either in a mixed-gender or a same-gender group composition were provided with one of the three instructions (men better, women better, nullifying) after performing a mental rotation test (baseline measure) and before taking another one. Results showed that women increased performance mainly when instructed that men score higher in the mixed-gender group composition, and after the nullifying instructions when tested in the same-gender group composition. Men increased performance mainly when they were instructed that women scored higher. Taken together, the results showed that both genders improve performance, when two threats arise both subtly and blatantly, or when no threat is in the air. Effects of implicit and explicit activated stereotypes are discussed.
Statistical mechanics of complex neural systems and high dimensional data
NASA Astrophysics Data System (ADS)
Advani, Madhu; Lahiri, Subhaneil; Ganguli, Surya
2013-03-01
Recent experimental advances in neuroscience have opened new vistas into the immense complexity of neuronal networks. This proliferation of data challenges us on two parallel fronts. First, how can we form adequate theoretical frameworks for understanding how dynamical network processes cooperate across widely disparate spatiotemporal scales to solve important computational problems? Second, how can we extract meaningful models of neuronal systems from high dimensional datasets? To aid in these challenges, we give a pedagogical review of a collection of ideas and theoretical methods arising at the intersection of statistical physics, computer science and neurobiology. We introduce the interrelated replica and cavity methods, which originated in statistical physics as powerful ways to quantitatively analyze large highly heterogeneous systems of many interacting degrees of freedom. We also introduce the closely related notion of message passing in graphical models, which originated in computer science as a distributed algorithm capable of solving large inference and optimization problems involving many coupled variables. We then show how both the statistical physics and computer science perspectives can be applied in a wide diversity of contexts to problems arising in theoretical neuroscience and data analysis. Along the way we discuss spin glasses, learning theory, illusions of structure in noise, random matrices, dimensionality reduction and compressed sensing, all within the unified formalism of the replica method. Moreover, we review recent conceptual connections between message passing in graphical models, and neural computation and learning. Overall, these ideas illustrate how statistical physics and computer science might provide a lens through which we can uncover emergent computational functions buried deep within the dynamical complexities of neuronal networks.
Impact of the infectious period on epidemics
NASA Astrophysics Data System (ADS)
Wilkinson, Robert R.; Sharkey, Kieran J.
2018-05-01
The duration of the infectious period is a crucial determinant of the ability of an infectious disease to spread. We consider an epidemic model that is network based and non-Markovian, containing classic Kermack-McKendrick, pairwise, message passing, and spatial models as special cases. For this model, we prove a monotonic relationship between the variability of the infectious period (with fixed mean) and the probability that the infection will reach any given subset of the population by any given time. For certain families of distributions, this result implies that epidemic severity is decreasing with respect to the variance of the infectious period. The striking importance of this relationship is demonstrated numerically. We then prove, with a fixed basic reproductive ratio (R0), a monotonic relationship between the variability of the posterior transmission probability (which is a function of the infectious period) and the probability that the infection will reach any given subset of the population by any given time. Thus again, even when R0 is fixed, variability of the infectious period tends to dampen the epidemic. Numerical results illustrate this but indicate the relationship is weaker. We then show how our results apply to message passing, pairwise, and Kermack-McKendrick epidemic models, even when they are not exactly consistent with the stochastic dynamics. For Poissonian contact processes, and arbitrarily distributed infectious periods, we demonstrate how systems of delay differential equations and ordinary differential equations can provide upper and lower bounds, respectively, for the probability that any given individual has been infected by any given time.
Berry, Leonard L; Bendapudi, Neeli
2003-02-01
Leonard L. Berry and Neeli Bendapudi When customers lack the expertise to judge a company's offerings, they naturally turn detective, scrutinizing people, facilities, and processes for evidence of quality. The Mayo Clinic understands this and carefully manages that evidence to convey a simple, consistent message: The needs of the patient come first. From the way it hires and trains employees to the way it designs its facilities and approaches its care, the Mayo Clinic provides patients and their families concrete evidence of its strengths and values, an approach that has allowed it to build what is arguably the most powerful brand in health care. Marketing professors Leonard Berry and Neeli Bendapudi conducted a five-month study of evidence management at the Mayo Clinic. They interviewed more than 1,000 patients and employees, observed hundreds of doctor visits, traveled in the Mayo helicopter, and stayed in the organization's many hospitals. Their experiences led them to identify best practices applicable to just about any company, in particular those that sell intangible or technically complex products. Essentially, the authors say, companies need to determine what story they want to tell, then ensure that their employees and facilities consistently show customers evidence of that story. At Mayo, the evidence falls into three categories: people, collaboration, and tangibles. The clinic systematically hires people who espouse its values, and its incentive and reward systems promote collaborative care focused on the patient's needs. The physical environment is explicitly designed for its intended effect on the patient experience. In almost every interaction, an organization's message comes through. "Patients first," the Mayo Clinic's message, is not the only story a medical organization could tell, but the way in which Mayo manages evidence to communicate this message is an example to be followed.
Outley, Corliss Wilson; Taddese, Abdissa
2006-04-01
To examine the number of food advertisements African American children are exposed to during children's television programming aired on predominantly African American and general television stations. A content analysis was conducted to identify and analyze the health-related content (HRC) and physical activity-related content (PARC) of food advertisements shown during children's television programming. Three sets of television advertisements from 3 stations (Black Entertainment Television, The WB [Warner Bros], and Disney Channel) served as the sample during a 1-week period in July 2005 (July 11-15), from 3 pm to 9 pm. In total, 1098 advertisements were recorded, with 256 food and beverage commercials used for this study. Results indicate that 36.3% of all commercials were based on fast food restaurants, 31.3% were for drinks, 16.8% were for candy, 13.7% were for cereals, and 2.0% were for snacks (percentages do not total 100 because of rounding). Compared with The WB and Disney Channel, Black Entertainment Television had significantly (P=.001) more food and beverage advertisements. Few HRC or PARC advertisements were shown. Of 256 food and beverage commercials, only 8.2% contained HRC and 9.4% had PARC. Also, the HRC and PARC scenes contained messages that were implied vs explicitly talking about the health or physical benefits of the product. African American children are overexposed to numerous types of food and beverage advertisements. These advertisements do not provide an adequate level of positive HRC and PARC messages. Consequently, the messages that are portrayed may undermine efforts to teach African American children about the importance of healthy living and physical activity.
Development of a distributed control system for TOTEM experiment using ASIO Boost C++ libraries
NASA Astrophysics Data System (ADS)
Cafagna, F.; Mercadante, A.; Minafra, N.; Quinto, M.; Radicioni, E.
2014-06-01
The main goals of the TOTEM Experiment at the LHC are the measurements of the elastic and total p-p cross sections and the studies of the diffractive dissociation processes. Those scientific objectives are achieved by using three tracking detectors symmetrically arranged around the interaction point called IP5. The control system is based on a C++ software that allows the user, by means of a graphical interface, direct access to hardware and handling of devices configuration. A first release of the software was designed as a monolithic block, with all functionalities being merged together. Such approach showed soon its limits, mainly poor reusability and maintainability of the source code, evident not only in phase of bug-fixing, but also when one wants to extend functionalities or apply some other modifications. This led to the decision of a radical redesign of the software, now based on the dialogue (message-passing) among separate building blocks. Thanks to the acquired extensibility, the software gained new features and now is a complete tool by which it is possible not only to configure different devices interfacing with a large subset of buses like I2C and VME, but also to do data acquisition both for calibration and physics runs. Furthermore, the software lets the user set up a series of operations to be executed sequentially to handle complex operations. To achieve maximum flexibility, the program units may be run either as a single process or as separate processes on different PCs which exchange messages over the network, thus allowing remote control of the system. Portability is ensured by the adoption of the ASIO (Asynchronous Input Output) library of Boost, a cross-platform suite of libraries which is candidate to become part of the C++ 11 standard. We present the state of the art of this project and outline the future perspectives. In particular, we describe the system architecture and the message-passing scheme. We also report on the results obtained in a first complete test of the software both as a single process and on two PCs.
Multiple scattering induced negative refraction of matter waves
Pinsker, Florian
2016-01-01
Starting from fundamental multiple scattering theory it is shown that negative refraction indices are feasible for matter waves passing a well-defined ensemble of scatterers. A simple approach to this topic is presented and explicit examples for systems of scatterers in 1D and 3D are stated that imply negative refraction for a generic incoming quantum wave packet. Essential features of the effective scattering field, densities and frequency spectrum of scatterers are considered. Additionally it is shown that negative refraction indices allow perfect transmission of the wave passing the ensemble of scatterers. Finally the concept of the superlens is discussed, since it is based on negative refraction and can be extended to matter waves utilizing the observations presented in this paper which thus paves the way to ‘untouchable’ quantum systems in analogy to cloaking devices for electromagnetic waves. PMID:26857266
Emotions for sale: cigarette advertising and women's psychosocial needs.
Anderson, S J; Glantz, S A; Ling, P M
2005-04-01
To explore messages of psychosocial needs satisfaction in cigarette advertising targeting women and implications for tobacco control policy. Analysis of internal tobacco industry documents and public advertising collections. Tobacco industry market research attempted to identify the psychosocial needs of different groups of women, and cigarette advertising campaigns for brands that women smoke explicitly aimed to position cigarettes as capable of satisfying these needs. Such positioning can be accomplished with advertising that downplays or excludes smoking imagery. As women's needs change with age and over time, advertisements were developed to reflect the needs encountered at different stages in women's lives. Cigarette brands for younger women stressed female camaraderie, self confidence, freedom, and independence; cigarette brands for older women addressed needs for pleasure, relaxation, social acceptability, and escape from daily stresses. Psychosocial needs satisfaction can be communicated without reference to cigarettes or smoking. This may explain why partial advertising bans are ineffective and comprehensive bans on all forms of tobacco marketing are effective. Counter-advertising should attempt to expose and undermine the needs satisfaction messages of cigarette advertising campaigns directed at women.
Emotions for sale: cigarette advertising and women's psychosocial needs
Anderson, S; Glantz, S; Ling, P
2005-01-01
Objective: To explore messages of psychosocial needs satisfaction in cigarette advertising targeting women and implications for tobacco control policy. Methods: Analysis of internal tobacco industry documents and public advertising collections. Results: Tobacco industry market research attempted to identify the psychosocial needs of different groups of women, and cigarette advertising campaigns for brands that women smoke explicitly aimed to position cigarettes as capable of satisfying these needs. Such positioning can be accomplished with advertising that downplays or excludes smoking imagery. As women's needs change with age and over time, advertisements were developed to reflect the needs encountered at different stages in women's lives. Cigarette brands for younger women stressed female camaraderie, self confidence, freedom, and independence; cigarette brands for older women addressed needs for pleasure, relaxation, social acceptability, and escape from daily stresses. Conclusions: Psychosocial needs satisfaction can be communicated without reference to cigarettes or smoking. This may explain why partial advertising bans are ineffective and comprehensive bans on all forms of tobacco marketing are effective. Counter-advertising should attempt to expose and undermine the needs satisfaction messages of cigarette advertising campaigns directed at women. PMID:15791023
Hafler, Janet P; Ownby, Allison R; Thompson, Britta M; Fasser, Carl E; Grigsby, Kevin; Haidet, Paul; Kahn, Marc J; Hafferty, Frederic W
2011-04-01
Medical student literature has broadly established the importance of differentiating between formal-explicit and hidden-tacit dimensions of the physician education process. The hidden curriculum refers to cultural mores that are transmitted, but not openly acknowledged, through formal and informal educational endeavors. The authors extend the concept of the hidden curriculum from students to faculty, and in so doing, they frame the acquisition by faculty of knowledge, skills, and values as a more global process of identity formation. This process includes a subset of formal, formative activities labeled "faculty development programs" that target specific faculty skills such as teaching effectiveness or leadership; however, it also includes informal, tacit messages that faculty absorb. As faculty members are socialized into faculty life, they often encounter conflicting messages about their role. In this article, the authors examine how faculty development programs have functioned as a source of conflict, and they ask how these programs might be retooled to assist faculty in understanding the tacit institutional culture shaping effective socialization and in managing the inconsistencies that so often dominate faculty life. © by the Association of American Medical Colleges.
Conspicuity, memorability, comprehension, and priming in road hazard warning signs.
Charlton, Samuel G
2006-05-01
This study assessed driver reactions to 16 road hazard warning signs of various formats by projecting life-sized video of road scenes to drivers in a driving simulator. A range of measures, including attentional and search conspicuity, implicit and explicit recognition, dynamic and static comprehension, and sign priming were collected. Of the signs tested, road works and school warning signs were most often detected, remembered, and understood. Slippery surface warnings were associated with some of the lowest detection and comprehension rates. The effectiveness of the different formats depended on the type of hazard sign. In the case of road works warnings, a flashing variable message format was only slightly more conspicuous than the large dimension format, equal in comprehensibility, and perhaps somewhat worse in terms of memorability. For the school warnings, however, the flashing variable message format appeared to convey a greater sense of potential hazard, produced superior search conspicuity and priming, and was equal in terms of memorability and comprehensibility. The range of measures worked well as a whole with the two measures of conspicuity and the measure of static comprehension showing the greatest consistency.
Niederdeppe, Jeff; Roh, Sungjong; Shapiro, Michael A
2015-01-01
This study tests whether policy narratives designed to increase support for obesity-reducing public policies should explicitly acknowledge individual responsibility while emphasizing social, physical, and economic (social) determinants of obesity. We use a web-based, randomized experiment with a nationally representative sample of American adults (n = 718) to test hypotheses derived from theory and research on narrative persuasion. Respondents exposed to narratives that acknowledged individual responsibility while emphasizing obesity's social determinants were less likely to engage in counterargument and felt more empathy for the story's main character than those exposed to a message that did not acknowledge individual responsibility. Counterarguing and affective empathy fully mediated the relationship between message condition and support for policies to reduce rates of obesity. Failure to acknowledge individual responsibility in narratives emphasizing social determinants of obesity may undermine the persuasiveness of policy narratives. Omitting information about individual responsibility, a strongly-held American value, invites the public to engage in counterargument about the narratives and reduces feelings of empathy for a character that experiences the challenges and benefits of social determinants of obesity.
Niederdeppe, Jeff; Roh, Sungjong; Shapiro, Michael A.
2015-01-01
This study tests whether policy narratives designed to increase support for obesity-reducing public policies should explicitly acknowledge individual responsibility while emphasizing social, physical, and economic (social) determinants of obesity. We use a web-based, randomized experiment with a nationally representative sample of American adults (n = 718) to test hypotheses derived from theory and research on narrative persuasion. Respondents exposed to narratives that acknowledged individual responsibility while emphasizing obesity’s social determinants were less likely to engage in counterargument and felt more empathy for the story’s main character than those exposed to a message that did not acknowledge individual responsibility. Counterarguing and affective empathy fully mediated the relationship between message condition and support for policies to reduce rates of obesity. Failure to acknowledge individual responsibility in narratives emphasizing social determinants of obesity may undermine the persuasiveness of policy narratives. Omitting information about individual responsibility, a strongly-held American value, invites the public to engage in counterargument about the narratives and reduces feelings of empathy for a character that experiences the challenges and benefits of social determinants of obesity. PMID:25706743
MPI_XSTAR: MPI-based parallelization of XSTAR program
NASA Astrophysics Data System (ADS)
Danehkar, A.
2017-12-01
MPI_XSTAR parallelizes execution of multiple XSTAR runs using Message Passing Interface (MPI). XSTAR (ascl:9910.008), part of the HEASARC's HEAsoft (ascl:1408.004) package, calculates the physical conditions and emission spectra of ionized gases. MPI_XSTAR invokes XSTINITABLE from HEASoft to generate a job list of XSTAR commands for given physical parameters. The job list is used to make directories in ascending order, where each individual XSTAR is spawned on each processor and outputs are saved. HEASoft's XSTAR2TABLE program is invoked upon the contents of each directory in order to produce table model FITS files for spectroscopy analysis tools.
Distributed memory compiler design for sparse problems
NASA Technical Reports Server (NTRS)
Wu, Janet; Saltz, Joel; Berryman, Harry; Hiranandani, Seema
1991-01-01
A compiler and runtime support mechanism is described and demonstrated. The methods presented are capable of solving a wide range of sparse and unstructured problems in scientific computing. The compiler takes as input a FORTRAN 77 program enhanced with specifications for distributing data, and the compiler outputs a message passing program that runs on a distributed memory computer. The runtime support for this compiler is a library of primitives designed to efficiently support irregular patterns of distributed array accesses and irregular distributed array partitions. A variety of Intel iPSC/860 performance results obtained through the use of this compiler are presented.
Role of Edges in Complex Network Epidemiology
NASA Astrophysics Data System (ADS)
Zhang, Hao; Jiang, Zhi-Hong; Wang, Hui; Xie, Fei; Chen, Chao
2012-09-01
In complex network epidemiology, diseases spread along contacting edges between individuals and different edges may play different roles in epidemic outbreaks. Quantifying the efficiency of edges is an important step towards arresting epidemics. In this paper, we study the efficiency of edges in general susceptible-infected-recovered models, and introduce the transmission capability to measure the efficiency of edges. Results show that deleting edges with the highest transmission capability will greatly decrease epidemics on scale-free networks. Basing on the message passing approach, we get exact mathematical solution on configuration model networks with edge deletion in the large size limit.
A Scalable Architecture of a Structured LDPC Decoder
NASA Technical Reports Server (NTRS)
Lee, Jason Kwok-San; Lee, Benjamin; Thorpe, Jeremy; Andrews, Kenneth; Dolinar, Sam; Hamkins, Jon
2004-01-01
We present a scalable decoding architecture for a certain class of structured LDPC codes. The codes are designed using a small (n,r) protograph that is replicated Z times to produce a decoding graph for a (Z x n, Z x r) code. Using this architecture, we have implemented a decoder for a (4096,2048) LDPC code on a Xilinx Virtex-II 2000 FPGA, and achieved decoding speeds of 31 Mbps with 10 fixed iterations. The implemented message-passing algorithm uses an optimized 3-bit non-uniform quantizer that operates with 0.2dB implementation loss relative to a floating point decoder.
''Towards a High-Performance and Robust Implementation of MPI-IO on Top of GPFS''
DOE Office of Scientific and Technical Information (OSTI.GOV)
Prost, J.P.; Tremann, R.; Blackwore, R.
2000-01-11
MPI-IO/GPFS is a prototype implementation of the I/O chapter of the Message Passing Interface (MPI) 2 standard. It uses the IBM General Parallel File System (GPFS), with prototyped extensions, as the underlying file system. this paper describes the features of this prototype which support its high performance and robustness. The use of hints at the file system level and at the MPI-IO level allows tailoring the use of the file system to the application needs. Error handling in collective operations provides robust error reporting and deadlock prevention in case of returning errors.
Scalability and Portability of Two Parallel Implementations of ADI
NASA Technical Reports Server (NTRS)
Phung, Thanh; VanderWijngaart, Rob F.
1994-01-01
Two domain decompositions for the implementation of the NAS Scalar Penta-diagonal Parallel Benchmark on MIMD systems are investigated, namely transposition and multi-partitioning. Hardware platforms considered are the Intel iPSC/860 and Paragon XP/S-15, and clusters of SGI workstations on ethernet, communicating through PVM. It is found that the multi-partitioning strategy offers the kind of coarse granularity that allows scaling up to hundreds of processors on a massively parallel machine. Moreover, efficiency is retained when the code is ported verbatim (save message passing syntax) to a PVM environment on a modest size cluster of workstations.
Chronology of the birth and death of a health bill.
Jacks, J C; Jacks, L
1995-01-01
A two-year attempt by the Clinton administration to develop and pass a health care reform bill was from the beginning destined for failure. The health care reform plan was developed in secret, leaving the plan open for special interest suspect. It was overly complex and difficult to understand. Congress and the general public initially supported the effort, but wavered under pressure and negative messages generated by special interest groups. After a year of intense debate, health care reform was declared dead, with very little hope of resurrection in the 1994 election year, which saw Republicans make significant gains in Congress.
Distributed-Memory Computing With the Langley Aerothermodynamic Upwind Relaxation Algorithm (LAURA)
NASA Technical Reports Server (NTRS)
Riley, Christopher J.; Cheatwood, F. McNeil
1997-01-01
The Langley Aerothermodynamic Upwind Relaxation Algorithm (LAURA), a Navier-Stokes solver, has been modified for use in a parallel, distributed-memory environment using the Message-Passing Interface (MPI) standard. A standard domain decomposition strategy is used in which the computational domain is divided into subdomains with each subdomain assigned to a processor. Performance is examined on dedicated parallel machines and a network of desktop workstations. The effect of domain decomposition and frequency of boundary updates on performance and convergence is also examined for several realistic configurations and conditions typical of large-scale computational fluid dynamic analysis.
Overview of Sparse Graph for Multiple Access in Future Mobile Networks
NASA Astrophysics Data System (ADS)
Lei, Jing; Li, Baoguo; Li, Erbao; Gong, Zhenghui
2017-10-01
Multiple access via sparse graph, such as low density signature (LDS) and sparse code multiple access (SCMA), is a promising technique for future wireless communications. This survey presents an overview of the developments in this burgeoning field, including transmitter structures, extrinsic information transform (EXIT) chart analysis and comparisons with existing multiple access techniques. Such technique enables multiple access under overloaded conditions to achieve a satisfactory performance. Message passing algorithm is utilized for multi-user detection in the receiver, and structures of the sparse graph are illustrated in detail. Outlooks and challenges of this technique are also presented.
Testing New Programming Paradigms with NAS Parallel Benchmarks
NASA Technical Reports Server (NTRS)
Jin, H.; Frumkin, M.; Schultz, M.; Yan, J.
2000-01-01
Over the past decade, high performance computing has evolved rapidly, not only in hardware architectures but also with increasing complexity of real applications. Technologies have been developing to aim at scaling up to thousands of processors on both distributed and shared memory systems. Development of parallel programs on these computers is always a challenging task. Today, writing parallel programs with message passing (e.g. MPI) is the most popular way of achieving scalability and high performance. However, writing message passing programs is difficult and error prone. Recent years new effort has been made in defining new parallel programming paradigms. The best examples are: HPF (based on data parallelism) and OpenMP (based on shared memory parallelism). Both provide simple and clear extensions to sequential programs, thus greatly simplify the tedious tasks encountered in writing message passing programs. HPF is independent of memory hierarchy, however, due to the immaturity of compiler technology its performance is still questionable. Although use of parallel compiler directives is not new, OpenMP offers a portable solution in the shared-memory domain. Another important development involves the tremendous progress in the internet and its associated technology. Although still in its infancy, Java promisses portability in a heterogeneous environment and offers possibility to "compile once and run anywhere." In light of testing these new technologies, we implemented new parallel versions of the NAS Parallel Benchmarks (NPBs) with HPF and OpenMP directives, and extended the work with Java and Java-threads. The purpose of this study is to examine the effectiveness of alternative programming paradigms. NPBs consist of five kernels and three simulated applications that mimic the computation and data movement of large scale computational fluid dynamics (CFD) applications. We started with the serial version included in NPB2.3. Optimization of memory and cache usage was applied to several benchmarks, noticeably BT and SP, resulting in better sequential performance. In order to overcome the lack of an HPF performance model and guide the development of the HPF codes, we employed an empirical performance model for several primitives found in the benchmarks. We encountered a few limitations of HPF, such as lack of supporting the "REDISTRIBUTION" directive and no easy way to handle irregular computation. The parallelization with OpenMP directives was done at the outer-most loop level to achieve the largest granularity. The performance of six HPF and OpenMP benchmarks is compared with their MPI counterparts for the Class-A problem size in the figure in next page. These results were obtained on an SGI Origin2000 (195MHz) with MIPSpro-f77 compiler 7.2.1 for OpenMP and MPI codes and PGI pghpf-2.4.3 compiler with MPI interface for HPF programs.
Explicit filtering in large eddy simulation using a discontinuous Galerkin method
NASA Astrophysics Data System (ADS)
Brazell, Matthew J.
The discontinuous Galerkin (DG) method is a formulation of the finite element method (FEM). DG provides the ability for a high order of accuracy in complex geometries, and allows for highly efficient parallelization algorithms. These attributes make the DG method attractive for solving the Navier-Stokes equations for large eddy simulation (LES). The main goal of this work is to investigate the feasibility of adopting an explicit filter in the numerical solution of the Navier-Stokes equations with DG. Explicit filtering has been shown to increase the numerical stability of under-resolved simulations and is needed for LES with dynamic sub-grid scale (SGS) models. The explicit filter takes advantage of DG's framework where the solution is approximated using a polyno- mial basis where the higher modes of the solution correspond to a higher order polynomial basis. By removing high order modes, the filtered solution contains low order frequency content much like an explicit low pass filter. The explicit filter implementation is tested on a simple 1-D solver with an initial condi- tion that has some similarity to turbulent flows. The explicit filter does restrict the resolution as well as remove accumulated energy in the higher modes from aliasing. However, the ex- plicit filter is unable to remove numerical errors causing numerical dissipation. A second test case solves the 3-D Navier-Stokes equations of the Taylor-Green vortex flow (TGV). The TGV is useful for SGS model testing because it is initially laminar and transitions into a fully turbulent flow. The SGS models investigated include the constant coefficient Smagorinsky model, dynamic Smagorinsky model, and dynamic Heinz model. The constant coefficient Smagorinsky model is over dissipative, this is generally not desirable however it does add stability. The dynamic Smagorinsky model generally performs better, especially during the laminar-turbulent transition region as expected. The dynamic Heinz model which is based on an improved model, handles the laminar-turbulent transition region well while also showing additional robustness.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Demeure, I.M.
The research presented here is concerned with representation techniques and tools to support the design, prototyping, simulation, and evaluation of message-based parallel, distributed computations. The author describes ParaDiGM-Parallel, Distributed computation Graph Model-a visual representation technique for parallel, message-based distributed computations. ParaDiGM provides several views of a computation depending on the aspect of concern. It is made of two complementary submodels, the DCPG-Distributed Computing Precedence Graph-model, and the PAM-Process Architecture Model-model. DCPGs are precedence graphs used to express the functionality of a computation in terms of tasks, message-passing, and data. PAM graphs are used to represent the partitioning of a computationmore » into schedulable units or processes, and the pattern of communication among those units. There is a natural mapping between the two models. He illustrates the utility of ParaDiGM as a representation technique by applying it to various computations (e.g., an adaptive global optimization algorithm, the client-server model). ParaDiGM representations are concise. They can be used in documenting the design and the implementation of parallel, distributed computations, in describing such computations to colleagues, and in comparing and contrasting various implementations of the same computation. He then describes VISA-VISual Assistant, a software tool to support the design, prototyping, and simulation of message-based parallel, distributed computations. VISA is based on the ParaDiGM model. In particular, it supports the editing of ParaDiGM graphs to describe the computations of interest, and the animation of these graphs to provide visual feedback during simulations. The graphs are supplemented with various attributes, simulation parameters, and interpretations which are procedures that can be executed by VISA.« less
1991-05-01
or may not bypass the editing function. At present, editing rules beyond those required for translation have not been stipulated. 2When explicit... editing rules become defined, the editor at a site LGN may perform two levels of edit checking: warning, which would insert blanks or pass as submitted...position image transactions into a transaction set. This low-level edit checking is performed at the site LGN to reduce transmission costs and to
NASA Technical Reports Server (NTRS)
Billingham, John
1991-01-01
The paper presents a broad range of issues that raise important questions about the search for exterrestrial life forms or intelligence. The history of the concept of plurality of inhabited worlds is reviewed, and disciplinary areas are cited that are considered crucial for SETI. Such issues involve analogs of the discovery of ETI, immediate responses to such detections, and the significance of journalistic and media response. The responses of religion is also considered, and it is suggested that humankind respond to the discovery of ETI with a single voice and message. The issues discussed demonstrate the need for explicit protocols that would be followed after any discovery of the types discussed.
Culture and Context in Mental Health Diagnosing: Scrutinizing the DSM-5 Revision.
Bredström, Anna
2017-12-28
This article examines the revision of the Diagnostic and Statistical Manual of Mental Disorders (DSM-5) and its claim of incorporating a "greater cultural sensitivity." The analysis reveals that the manual conveys mixed messages as it explicitly addresses the critique of being ethnocentric and having a static notion of culture yet continues in a similar fashion when culture is applied in diagnostic criteria. The analysis also relates to current trends in psychiatric nosology that emphasize neurobiology and decontextualize distress and points to how the DSM-5 risks serving as an ethnic dividing line in psychiatry by making sociocultural context relevant only for some patients.
Quantum Teleportation of an Arbitrary N-qubit State via GHZ-like States
NASA Astrophysics Data System (ADS)
Zhang, Bo; Liu, Xing-tong; Wang, Jian; Tang, Chao-jing
2016-03-01
Recently Zhu (Int. J. Theor. Phys. 53, 4095, 2014) had shown that using GHZ-like states as quantum channel, it is possible to teleport an arbitrary unknown two-qubit state. We investigate this channel for the teleportation of an arbitrary N-qubit state. The strict proof through mathematical induction is presented and the rule for the receiver to reconstruct the desired state is explicitly derived in the most general case. We also discuss that if a system of quantum secret sharing of classical message is established, our protocol can be transformed to a N-qubit perfect controlled teleportation scheme from the controller's point of view.
Entropy Inequalities for Stable Densities and Strengthened Central Limit Theorems
NASA Astrophysics Data System (ADS)
Toscani, Giuseppe
2016-10-01
We consider the central limit theorem for stable laws in the case of the standardized sum of independent and identically distributed random variables with regular probability density function. By showing decay of different entropy functionals along the sequence we prove convergence with explicit rate in various norms to a Lévy centered density of parameter λ >1 . This introduces a new information-theoretic approach to the central limit theorem for stable laws, in which the main argument is shown to be the relative fractional Fisher information, recently introduced in Toscani (Ricerche Mat 65(1):71-91, 2016). In particular, it is proven that, with respect to the relative fractional Fisher information, the Lévy density satisfies an analogous of the logarithmic Sobolev inequality, which allows to pass from the monotonicity and decay to zero of the relative fractional Fisher information in the standardized sum to the decay to zero in relative entropy with an explicit decay rate.
An aftereffect of adaptation to mean size
Corbett, Jennifer E.; Wurnitsch, Nicole; Schwartz, Alex; Whitney, David
2013-01-01
The visual system rapidly represents the mean size of sets of objects. Here, we investigated whether mean size is explicitly encoded by the visual system, along a single dimension like texture, numerosity, and other visual dimensions susceptible to adaptation. Observers adapted to two sets of dots with different mean sizes, presented simultaneously in opposite visual fields. After adaptation, two test patches replaced the adapting dot sets, and participants judged which test appeared to have the larger average dot diameter. They generally perceived the test that replaced the smaller mean size adapting set as being larger than the test that replaced the larger adapting set. This differential aftereffect held for single test dots (Experiment 2) and high-pass filtered displays (Experiment 3), and changed systematically as a function of the variance of the adapting dot sets (Experiment 4), providing additional support that mean size is adaptable, and therefore explicitly encoded dimension of visual scenes. PMID:24348083
Rice, Stephen; McCarley, Jason S
2011-12-01
Automated diagnostic aids prone to false alarms often produce poorer human performance in signal detection tasks than equally reliable miss-prone aids. However, it is not yet clear whether this is attributable to differences in the perceptual salience of the automated aids' misses and false alarms or is the result of inherent differences in operators' cognitive responses to different forms of automation error. The present experiments therefore examined the effects of automation false alarms and misses on human performance under conditions in which the different forms of error were matched in their perceptual characteristics. Young adult participants performed a simulated baggage x-ray screening task while assisted by an automated diagnostic aid. Judgments from the aid were rendered as text messages presented at the onset of each trial, and every trial was followed by a second text message providing response feedback. Thus, misses and false alarms from the aid were matched for their perceptual salience. Experiment 1 found that even under these conditions, false alarms from the aid produced poorer human performance and engendered lower automation use than misses from the aid. Experiment 2, however, found that the asymmetry between misses and false alarms was reduced when the aid's false alarms were framed as neutral messages rather than explicit misjudgments. Results suggest that automation false alarms and misses differ in their inherent cognitive salience and imply that changes in diagnosis framing may allow designers to encourage better use of imperfectly reliable automated aids.
Sharpe, Kimberly; Di Pietro, Nina; Illes, Judy
2016-02-01
Stem cell research has generated considerable attention for its potential to remediate many disorders of the central nervous system including neurodevelopmental disorders such as autism spectrum disorder (ASD) and cerebral palsy (CP) that place a high burden on individual children, families and society. Here we characterized messaging about the use of stem cells for ASD and CP in news media articles and concurrent dissemination of discoveries through conventional science discourse. We searched LexisNexis and Canadian Newsstand for news articles from the US, UK, Canada and Australia in the period between 2000 and 2014, and PubMed for peer reviewed articles for the same 10 years. Using in-depth content analysis methods, we found less cautionary messaging about stem cells for ASD and CP in the resulting sample of 73 media articles than in the sample of 87 science papers, and a privileging of benefits over risk. News media also present stem cells as ready for clinical application to treat these neurodevelopmental disorders, even while the science literature calls for further research. Investigative news reports that explicitly quote researchers, however, provide the most accurate information to actual science news. The hope, hype, and promise of stem cell interventions for neurodevelopmental disorders, combined with the extreme vulnerability of these children and their families, creates a perfect storm in which journalists and stem cell scientists must commit to a continued, if not even more robust, partnership to promote balanced and accurate messaging.
Gendered Expectations: Examining How Peers Shape Female Students' Intent to Pursue STEM Fields.
Riegle-Crumb, Catherine; Morton, Karisma
2017-01-01
Building on prior psychological and sociological research on the power of local environments to shape gendered outcomes in STEM fields, this study focuses on the critical stage of adolescence to explore the potential negative impact of exposure to exclusionary messages from peers within girls' science classrooms, as well as the positive potential impact of inclusionary messages. Specifically, utilizing longitudinal data from a diverse sample of adolescent youth, analyses examine how the presence of biased male peers, as well as confident female peers, shape girls' subsequent intentions to pursue different STEM fields, focusing specifically on intentions to pursue the male-dominated fields of computer science and engineering, as well as more gender equitable fields. Results reveal that exposure to a higher percentage of 8th grade male peers in the classroom who endorsed explicit gender/STEM stereotypes significantly and negatively predicted girls' later intentions to pursue a computer science/engineering (CS/E) major. Yet results also reveal that exposure to a higher percentage of confident female peers in the science classroom positively predicted such intentions. These results were specific to CS/E majors, suggesting that peers are an important source of messages regarding whether or not girls should pursue non-traditional STEM fields. This study calls attention to the importance of examining both positive and negative sources of influence within the local contexts where young people live and learn. Limitations and directions for future research are also discussed.
Gendered Expectations: Examining How Peers Shape Female Students' Intent to Pursue STEM Fields
Riegle-Crumb, Catherine; Morton, Karisma
2017-01-01
Building on prior psychological and sociological research on the power of local environments to shape gendered outcomes in STEM fields, this study focuses on the critical stage of adolescence to explore the potential negative impact of exposure to exclusionary messages from peers within girls' science classrooms, as well as the positive potential impact of inclusionary messages. Specifically, utilizing longitudinal data from a diverse sample of adolescent youth, analyses examine how the presence of biased male peers, as well as confident female peers, shape girls' subsequent intentions to pursue different STEM fields, focusing specifically on intentions to pursue the male-dominated fields of computer science and engineering, as well as more gender equitable fields. Results reveal that exposure to a higher percentage of 8th grade male peers in the classroom who endorsed explicit gender/STEM stereotypes significantly and negatively predicted girls' later intentions to pursue a computer science/engineering (CS/E) major. Yet results also reveal that exposure to a higher percentage of confident female peers in the science classroom positively predicted such intentions. These results were specific to CS/E majors, suggesting that peers are an important source of messages regarding whether or not girls should pursue non-traditional STEM fields. This study calls attention to the importance of examining both positive and negative sources of influence within the local contexts where young people live and learn. Limitations and directions for future research are also discussed. PMID:28360868
Implicit LES using adaptive filtering
NASA Astrophysics Data System (ADS)
Sun, Guangrui; Domaradzki, Julian A.
2018-04-01
In implicit large eddy simulations (ILES) numerical dissipation prevents buildup of small scale energy in a manner similar to the explicit subgrid scale (SGS) models. If spectral methods are used the numerical dissipation is negligible but it can be introduced by applying a low-pass filter in the physical space, resulting in an effective ILES. In the present work we provide a comprehensive analysis of the numerical dissipation produced by different filtering operations in a turbulent channel flow simulated using a non-dissipative, pseudo-spectral Navier-Stokes solver. The amount of numerical dissipation imparted by filtering can be easily adjusted by changing how often a filter is applied. We show that when the additional numerical dissipation is close to the subgrid-scale (SGS) dissipation of an explicit LES the overall accuracy of ILES is also comparable, indicating that periodic filtering can replace explicit SGS models. A new method is proposed, which does not require any prior knowledge of a flow, to determine the filtering period adaptively. Once an optimal filtering period is found, the accuracy of ILES is significantly improved at low implementation complexity and computational cost. The method is general, performing well for different Reynolds numbers, grid resolutions, and filter shapes.
NASA Astrophysics Data System (ADS)
Steinke, R. C.; Ogden, F. L.; Lai, W.; Moreno, H. A.; Pureza, L. G.
2014-12-01
Physics-based watershed models are useful tools for hydrologic studies, water resources management and economic analyses in the contexts of climate, land-use, and water-use changes. This poster presents a parallel implementation of a quasi 3-dimensional, physics-based, high-resolution, distributed water resources model suitable for simulating large watersheds in a massively parallel computing environment. Developing this model is one of the objectives of the NSF EPSCoR RII Track II CI-WATER project, which is joint between Wyoming and Utah EPSCoR jurisdictions. The model, which we call ADHydro, is aimed at simulating important processes in the Rocky Mountain west, including: rainfall and infiltration, snowfall and snowmelt in complex terrain, vegetation and evapotranspiration, soil heat flux and freezing, overland flow, channel flow, groundwater flow, water management and irrigation. Model forcing is provided by the Weather Research and Forecasting (WRF) model, and ADHydro is coupled with the NOAH-MP land-surface scheme for calculating fluxes between the land and atmosphere. The ADHydro implementation uses the Charm++ parallel run time system. Charm++ is based on location transparent message passing between migrateable C++ objects. Each object represents an entity in the model such as a mesh element. These objects can be migrated between processors or serialized to disk allowing the Charm++ system to automatically provide capabilities such as load balancing and checkpointing. Objects interact with each other by passing messages that the Charm++ system routes to the correct destination object regardless of its current location. This poster discusses the algorithms, communication patterns, and caching strategies used to implement ADHydro with Charm++. The ADHydro model code will be released to the hydrologic community in late 2014.
NASA Technical Reports Server (NTRS)
Juang, Hann-Ming Henry; Tao, Wei-Kuo; Zeng, Xi-Ping; Shie, Chung-Lin; Simpson, Joanne; Lang, Steve
2004-01-01
The capability for massively parallel programming (MPP) using a message passing interface (MPI) has been implemented into a three-dimensional version of the Goddard Cumulus Ensemble (GCE) model. The design for the MPP with MPI uses the concept of maintaining similar code structure between the whole domain as well as the portions after decomposition. Hence the model follows the same integration for single and multiple tasks (CPUs). Also, it provides for minimal changes to the original code, so it is easily modified and/or managed by the model developers and users who have little knowledge of MPP. The entire model domain could be sliced into one- or two-dimensional decomposition with a halo regime, which is overlaid on partial domains. The halo regime requires that no data be fetched across tasks during the computational stage, but it must be updated before the next computational stage through data exchange via MPI. For reproducible purposes, transposing data among tasks is required for spectral transform (Fast Fourier Transform, FFT), which is used in the anelastic version of the model for solving the pressure equation. The performance of the MPI-implemented codes (i.e., the compressible and anelastic versions) was tested on three different computing platforms. The major results are: 1) both versions have speedups of about 99% up to 256 tasks but not for 512 tasks; 2) the anelastic version has better speedup and efficiency because it requires more computations than that of the compressible version; 3) equal or approximately-equal numbers of slices between the x- and y- directions provide the fastest integration due to fewer data exchanges; and 4) one-dimensional slices in the x-direction result in the slowest integration due to the need for more memory relocation for computation.
3D unstructured-mesh radiation transport codes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Morel, J.
1997-12-31
Three unstructured-mesh radiation transport codes are currently being developed at Los Alamos National Laboratory. The first code is ATTILA, which uses an unstructured tetrahedral mesh in conjunction with standard Sn (discrete-ordinates) angular discretization, standard multigroup energy discretization, and linear-discontinuous spatial differencing. ATTILA solves the standard first-order form of the transport equation using source iteration in conjunction with diffusion-synthetic acceleration of the within-group source iterations. DANTE is designed to run primarily on workstations. The second code is DANTE, which uses a hybrid finite-element mesh consisting of arbitrary combinations of hexahedra, wedges, pyramids, and tetrahedra. DANTE solves several second-order self-adjoint forms of the transport equation including the even-parity equation, the odd-parity equation, and a new equation called the self-adjoint angular flux equation. DANTE also offers three angular discretization options:more » $$S{_}n$$ (discrete-ordinates), $$P{_}n$$ (spherical harmonics), and $$SP{_}n$$ (simplified spherical harmonics). DANTE is designed to run primarily on massively parallel message-passing machines, such as the ASCI-Blue machines at LANL and LLNL. The third code is PERICLES, which uses the same hybrid finite-element mesh as DANTE, but solves the standard first-order form of the transport equation rather than a second-order self-adjoint form. DANTE uses a standard $$S{_}n$$ discretization in angle in conjunction with trilinear-discontinuous spatial differencing, and diffusion-synthetic acceleration of the within-group source iterations. PERICLES was initially designed to run on workstations, but a version for massively parallel message-passing machines will be built. The three codes will be described in detail and computational results will be presented.« less
González-Domínguez, Jorge; Remeseiro, Beatriz; Martín, María J
2017-02-01
The analysis of the interference patterns on the tear film lipid layer is a useful clinical test to diagnose dry eye syndrome. This task can be automated with a high degree of accuracy by means of the use of tear film maps. However, the time required by the existing applications to generate them prevents a wider acceptance of this method by medical experts. Multithreading has been previously successfully employed by the authors to accelerate the tear film map definition on multicore single-node machines. In this work, we propose a hybrid message-passing and multithreading parallel approach that further accelerates the generation of tear film maps by exploiting the computational capabilities of distributed-memory systems such as multicore clusters and supercomputers. The algorithm for drawing tear film maps is parallelized using Message Passing Interface (MPI) for inter-node communications and the multithreading support available in the C++11 standard for intra-node parallelization. The original algorithm is modified to reduce the communications and increase the scalability. The hybrid method has been tested on 32 nodes of an Intel cluster (with two 12-core Haswell 2680v3 processors per node) using 50 representative images. Results show that maximum runtime is reduced from almost two minutes using the previous only-multithreaded approach to less than ten seconds using the hybrid method. The hybrid MPI/multithreaded implementation can be used by medical experts to obtain tear film maps in only a few seconds, which will significantly accelerate and facilitate the diagnosis of the dry eye syndrome. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
A Multi-Level Parallelization Concept for High-Fidelity Multi-Block Solvers
NASA Technical Reports Server (NTRS)
Hatay, Ferhat F.; Jespersen, Dennis C.; Guruswamy, Guru P.; Rizk, Yehia M.; Byun, Chansup; Gee, Ken; VanDalsem, William R. (Technical Monitor)
1997-01-01
The integration of high-fidelity Computational Fluid Dynamics (CFD) analysis tools with the industrial design process benefits greatly from the robust implementations that are transportable across a wide range of computer architectures. In the present work, a hybrid domain-decomposition and parallelization concept was developed and implemented into the widely-used NASA multi-block Computational Fluid Dynamics (CFD) packages implemented in ENSAERO and OVERFLOW. The new parallel solver concept, PENS (Parallel Euler Navier-Stokes Solver), employs both fine and coarse granularity in data partitioning as well as data coalescing to obtain the desired load-balance characteristics on the available computer platforms. This multi-level parallelism implementation itself introduces no changes to the numerical results, hence the original fidelity of the packages are identically preserved. The present implementation uses the Message Passing Interface (MPI) library for interprocessor message passing and memory accessing. By choosing an appropriate combination of the available partitioning and coalescing capabilities only during the execution stage, the PENS solver becomes adaptable to different computer architectures from shared-memory to distributed-memory platforms with varying degrees of parallelism. The PENS implementation on the IBM SP2 distributed memory environment at the NASA Ames Research Center obtains 85 percent scalable parallel performance using fine-grain partitioning of single-block CFD domains using up to 128 wide computational nodes. Multi-block CFD simulations of complete aircraft simulations achieve 75 percent perfect load-balanced executions using data coalescing and the two levels of parallelism. SGI PowerChallenge, SGI Origin 2000, and a cluster of workstations are the other platforms where the robustness of the implementation is tested. The performance behavior on the other computer platforms with a variety of realistic problems will be included as this on-going study progresses.
Zhang, Xiaohua; Wong, Sergio E; Lightstone, Felice C
2013-04-30
A mixed parallel scheme that combines message passing interface (MPI) and multithreading was implemented in the AutoDock Vina molecular docking program. The resulting program, named VinaLC, was tested on the petascale high performance computing (HPC) machines at Lawrence Livermore National Laboratory. To exploit the typical cluster-type supercomputers, thousands of docking calculations were dispatched by the master process to run simultaneously on thousands of slave processes, where each docking calculation takes one slave process on one node, and within the node each docking calculation runs via multithreading on multiple CPU cores and shared memory. Input and output of the program and the data handling within the program were carefully designed to deal with large databases and ultimately achieve HPC on a large number of CPU cores. Parallel performance analysis of the VinaLC program shows that the code scales up to more than 15K CPUs with a very low overhead cost of 3.94%. One million flexible compound docking calculations took only 1.4 h to finish on about 15K CPUs. The docking accuracy of VinaLC has been validated against the DUD data set by the re-docking of X-ray ligands and an enrichment study, 64.4% of the top scoring poses have RMSD values under 2.0 Å. The program has been demonstrated to have good enrichment performance on 70% of the targets in the DUD data set. An analysis of the enrichment factors calculated at various percentages of the screening database indicates VinaLC has very good early recovery of actives. Copyright © 2013 Wiley Periodicals, Inc.
NASA Astrophysics Data System (ADS)
Lesieur, Thibault; Krzakala, Florent; Zdeborová, Lenka
2017-07-01
This article is an extended version of previous work of Lesieur et al (2015 IEEE Int. Symp. on Information Theory Proc. pp 1635-9 and 2015 53rd Annual Allerton Conf. on Communication, Control and Computing (IEEE) pp 680-7) on low-rank matrix estimation in the presence of constraints on the factors into which the matrix is factorized. Low-rank matrix factorization is one of the basic methods used in data analysis for unsupervised learning of relevant features and other types of dimensionality reduction. We present a framework to study the constrained low-rank matrix estimation for a general prior on the factors, and a general output channel through which the matrix is observed. We draw a parallel with the study of vector-spin glass models—presenting a unifying way to study a number of problems considered previously in separate statistical physics works. We present a number of applications for the problem in data analysis. We derive in detail a general form of the low-rank approximate message passing (Low-RAMP) algorithm, that is known in statistical physics as the TAP equations. We thus unify the derivation of the TAP equations for models as different as the Sherrington-Kirkpatrick model, the restricted Boltzmann machine, the Hopfield model or vector (xy, Heisenberg and other) spin glasses. The state evolution of the Low-RAMP algorithm is also derived, and is equivalent to the replica symmetric solution for the large class of vector-spin glass models. In the section devoted to result we study in detail phase diagrams and phase transitions for the Bayes-optimal inference in low-rank matrix estimation. We present a typology of phase transitions and their relation to performance of algorithms such as the Low-RAMP or commonly used spectral methods.
Mentally walking through doorways causes forgetting: The location updating effect and imagination.
Lawrence, Zachary; Peterson, Daniel
2016-01-01
Researchers have documented an intriguing phenomenon whereby simply walking through a doorway causes forgetting (the location updating effect). The Event Horizon Model is the most commonly cited theory to explain these data. Importantly, this model explains the effect without invoking the importance or reliance upon perceptual information (i.e., seeing oneself pass through the doorway). This generates the intriguing hypothesis that the effect may be demonstrated in participants who simply imagine walking through a doorway. Across two experiments, we explicitly test this hypothesis. Participants familiarised themselves with both real (Experiment 1) and virtual (Experiment 2) environments which served as the setting for their mental walk. They were then provided with an image to remember and were instructed to imagine themselves walking through the previously presented space. In both experiments, when the mental walk required participants to pass through a doorway, more forgetting occurred, consistent with the predictions laid out in the Event Horizon Model.
Hierarchical control of procedural and declarative category-learning systems
Turner, Benjamin O.; Crossley, Matthew J.; Ashby, F. Gregory
2017-01-01
Substantial evidence suggests that human category learning is governed by the interaction of multiple qualitatively distinct neural systems. In this view, procedural memory is used to learn stimulus-response associations, and declarative memory is used to apply explicit rules and test hypotheses about category membership. However, much less is known about the interaction between these systems: how is control passed between systems as they interact to influence motor resources? Here, we used fMRI to elucidate the neural correlates of switching between procedural and declarative categorization systems. We identified a key region of the cerebellum (left Crus I) whose activity was bidirectionally modulated depending on switch direction. We also identified regions of the default mode network (DMN) that were selectively connected to left Crus I during switching. We propose that the cerebellum—in coordination with the DMN—serves a critical role in passing control between procedural and declarative memory systems. PMID:28213114
DOE Office of Scientific and Technical Information (OSTI.GOV)
Doucet, Mathieu; Hobson, Tanner C.; Ferraz Leal, Ricardo Miguel
The Django Remote Submission (DRS) is a Django (Django, n.d.) application to manage long running job submission, including starting the job, saving logs, and storing results. It is an independent project available as a standalone pypi package (PyPi, n.d.). It can be easily integrated in any Django project. The source code is freely available as a GitHub repository (django-remote-submission, n.d.). To run the jobs in background, DRS takes advantage of Celery (Celery, n.d.), a powerful asynchronous job queue used for running tasks in the background, and the Redis Server (Redis, n.d.), an in-memory data structure store. Celery uses brokers tomore » pass messages between a Django Project and the Celery workers. Redis is the message broker of DRS. In addition DRS provides real time monitoring of the progress of Jobs and associated logs. Through the Django Channels project (Channels, n.d.), and the usage of Web Sockets, it is possible to asynchronously display the Job Status and the live Job output (standard output and standard error) on a web page.« less
HYDRA : High-speed simulation architecture for precision spacecraft formation simulation
NASA Technical Reports Server (NTRS)
Martin, Bryan J.; Sohl, Garett.
2003-01-01
e Hierarchical Distributed Reconfigurable Architecture- is a scalable simulation architecture that provides flexibility and ease-of-use which take advantage of modern computation and communication hardware. It also provides the ability to implement distributed - or workstation - based simulations and high-fidelity real-time simulation from a common core. Originally designed to serve as a research platform for examining fundamental challenges in formation flying simulation for future space missions, it is also finding use in other missions and applications, all of which can take advantage of the underlying Object-Oriented structure to easily produce distributed simulations. Hydra automates the process of connecting disparate simulation components (Hydra Clients) through a client server architecture that uses high-level descriptions of data associated with each client to find and forge desirable connections (Hydra Services) at run time. Services communicate through the use of Connectors, which abstract messaging to provide single-interface access to any desired communication protocol, such as from shared-memory message passing to TCP/IP to ACE and COBRA. Hydra shares many features with the HLA, although providing more flexibility in connectivity services and behavior overriding.
Research for the design of visual fatigue based on the computer visual communication
NASA Astrophysics Data System (ADS)
Deng, Hu-Bin; Ding, Bao-min
2013-03-01
With the era of rapid development of computer networks. The role of network communication in the social, economic, political, become more and more important and suggested their special role. The computer network communicat ion through the modern media and byway of the visual communication effect the public of the emotional, spiritual, career and other aspects of the life. While its rapid growth also brought some problems, It is that their message across to the public, its design did not pass a relat ively perfect manifestation to express the informat ion. So this not only leads to convey the error message, but also to cause the physical and psychological fatigue for the audiences. It is said that the visual fatigue. In order to reduce the fatigue when people obtain the useful information in using computer. Let the audience in a short time to obtain the most useful informat ion, this article gave a detailed account of its causes, and propose effective solutions and, through the specific examples to explain it, also in the future computer design visual communicat ion applications development prospect.
Doucet, Mathieu; Hobson, Tanner C.; Ferraz Leal, Ricardo Miguel
2017-08-01
The Django Remote Submission (DRS) is a Django (Django, n.d.) application to manage long running job submission, including starting the job, saving logs, and storing results. It is an independent project available as a standalone pypi package (PyPi, n.d.). It can be easily integrated in any Django project. The source code is freely available as a GitHub repository (django-remote-submission, n.d.). To run the jobs in background, DRS takes advantage of Celery (Celery, n.d.), a powerful asynchronous job queue used for running tasks in the background, and the Redis Server (Redis, n.d.), an in-memory data structure store. Celery uses brokers tomore » pass messages between a Django Project and the Celery workers. Redis is the message broker of DRS. In addition DRS provides real time monitoring of the progress of Jobs and associated logs. Through the Django Channels project (Channels, n.d.), and the usage of Web Sockets, it is possible to asynchronously display the Job Status and the live Job output (standard output and standard error) on a web page.« less
Suicide Prevention Media Campaigns: A Systematic Literature Review.
Pirkis, Jane; Rossetto, Alyssia; Nicholas, Angela; Ftanou, Maria; Robinson, Jo; Reavley, Nicola
2017-11-30
Suicide prevention media campaigns are gaining traction as a means of combatting suicide. The current review set out to synthesize information about the effectiveness of these campaigns. We searched four electronic databases for studies that provided evidence on the effectiveness of media campaigns. We focused on studies that described an evaluation of the effectiveness of an entire campaign or a public service announcement explicitly aimed at suicide prevention. We identified 20 studies of varying quality. Studies that looked at whether campaign exposure leads to improved knowledge and awareness of suicide found support for this. Most studies that considered whether campaign materials can achieve improvements in attitudes toward suicide also found this to be the case, although there were some exceptions. Some studies found that media campaigns could boost help-seeking, whereas others suggested that they made no difference or only had an impact when particular sources of help or particular types of help-seeking were considered. Relatively few studies had sufficient statistical power to examine whether media campaigns had an impact on the ultimate behavioral outcome of suicides, but those that did demonstrated significant reductions. Our review indicates that media campaigns should be considered in the suite of interventions that might be used to prevent suicide. Evidence for their effectiveness is still amassing, but there are strong suggestions that they can achieve positive results in terms of certain suicide-related outcomes. Care should be taken to ensure that campaign developers get the messaging of campaigns right, and further work is needed to determine which messages work and which ones do not, and how effective messages should be disseminated. There is an onus on those developing and delivering campaigns to evaluate them carefully and to share the findings with others. There is a need for evaluations that employ rigorous designs assessing the most pertinent outcomes. These evaluations should explore the nature of given campaigns in detail - in particular the messaging contained within them - in order to tease out which messages work well and which do not. They should also take into account the reach of the campaign, in order to determine whether it would be reasonable to expect that they might have their desired effect.
Grossman, Ruth B; Steinhart, Erin; Mitchell, Teresa; McIlvane, William
2015-06-01
Conversation requires integration of information from faces and voices to fully understand the speaker's message. To detect auditory-visual asynchrony of speech, listeners must integrate visual movements of the face, particularly the mouth, with auditory speech information. Individuals with autism spectrum disorder may be less successful at such multisensory integration, despite their demonstrated preference for looking at the mouth region of a speaker. We showed participants (individuals with and without high-functioning autism (HFA) aged 8-19) a split-screen video of two identical individuals speaking side by side. Only one of the speakers was in synchrony with the corresponding audio track and synchrony switched between the two speakers every few seconds. Participants were asked to watch the video without further instructions (implicit condition) or to specifically watch the in-synch speaker (explicit condition). We recorded which part of the screen and face their eyes targeted. Both groups looked at the in-synch video significantly more with explicit instructions. However, participants with HFA looked at the in-synch video less than typically developing (TD) peers and did not increase their gaze time as much as TD participants in the explicit task. Importantly, the HFA group looked significantly less at the mouth than their TD peers, and significantly more at non-face regions of the image. There were no between-group differences for eye-directed gaze. Overall, individuals with HFA spend less time looking at the crucially important mouth region of the face during auditory-visual speech integration, which is maladaptive gaze behavior for this type of task. © 2015 International Society for Autism Research, Wiley Periodicals, Inc.
Optimisation of a parallel ocean general circulation model
NASA Astrophysics Data System (ADS)
Beare, M. I.; Stevens, D. P.
1997-10-01
This paper presents the development of a general-purpose parallel ocean circulation model, for use on a wide range of computer platforms, from traditional scalar machines to workstation clusters and massively parallel processors. Parallelism is provided, as a modular option, via high-level message-passing routines, thus hiding the technical intricacies from the user. An initial implementation highlights that the parallel efficiency of the model is adversely affected by a number of factors, for which optimisations are discussed and implemented. The resulting ocean code is portable and, in particular, allows science to be achieved on local workstations that could otherwise only be undertaken on state-of-the-art supercomputers.
Computation of an Underexpanded 3-D Rectangular Jet by the CE/SE Method
NASA Technical Reports Server (NTRS)
Loh, Ching Y.; Himansu, Ananda; Wang, Xiao Y.; Jorgenson, Philip C. E.
2000-01-01
Recently, an unstructured three-dimensional space-time conservation element and solution element (CE/SE) Euler solver was developed. Now it is also developed for parallel computation using METIS for domain decomposition and MPI (message passing interface). The method is employed here to numerically study the near-field of a typical 3-D rectangular under-expanded jet. For the computed case-a jet with Mach number Mj = 1.6. with a very modest grid of 1.7 million tetrahedrons, the flow features such as the shock-cell structures and the axis switching, are in good qualitative agreement with experimental results.
Hyperswitch Communication Network Computer
NASA Technical Reports Server (NTRS)
Peterson, John C.; Chow, Edward T.; Priel, Moshe; Upchurch, Edwin T.
1993-01-01
Hyperswitch Communications Network (HCN) computer is prototype multiple-processor computer being developed. Incorporates improved version of hyperswitch communication network described in "Hyperswitch Network For Hypercube Computer" (NPO-16905). Designed to support high-level software and expansion of itself. HCN computer is message-passing, multiple-instruction/multiple-data computer offering significant advantages over older single-processor and bus-based multiple-processor computers, with respect to price/performance ratio, reliability, availability, and manufacturing. Design of HCN operating-system software provides flexible computing environment accommodating both parallel and distributed processing. Also achieves balance among following competing factors; performance in processing and communications, ease of use, and tolerance of (and recovery from) faults.
Comparing the Performance of Two Dynamic Load Distribution Methods
NASA Technical Reports Server (NTRS)
Kale, L. V.
1987-01-01
Parallel processing of symbolic computations on a message-passing multi-processor presents one challenge: To effectively utilize the available processors, the load must be distributed uniformly to all the processors. However, the structure of these computations cannot be predicted in advance. go, static scheduling methods are not applicable. In this paper, we compare the performance of two dynamic, distributed load balancing methods with extensive simulation studies. The two schemes are: the Contracting Within a Neighborhood (CWN) scheme proposed by us, and the Gradient Model proposed by Lin and Keller. We conclude that although simpler, the CWN is significantly more effective at distributing the work than the Gradient model.
NASA Technical Reports Server (NTRS)
Saini, Subhash; Frumkin, Michael; Hribar, Michelle; Jin, Hao-Qiang; Waheed, Abdul; Yan, Jerry
1998-01-01
Porting applications to new high performance parallel and distributed computing platforms is a challenging task. Since writing parallel code by hand is extremely time consuming and costly, porting codes would ideally be automated by using some parallelization tools and compilers. In this paper, we compare the performance of the hand written NAB Parallel Benchmarks against three parallel versions generated with the help of tools and compilers: 1) CAPTools: an interactive computer aided parallelization too] that generates message passing code, 2) the Portland Group's HPF compiler and 3) using compiler directives with the native FORTAN77 compiler on the SGI Origin2000.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moryakov, A. V., E-mail: sailor@orc.ru
2016-12-15
An algorithm for solving the linear Cauchy problem for large systems of ordinary differential equations is presented. The algorithm for systems of first-order differential equations is implemented in the EDELWEISS code with the possibility of parallel computations on supercomputers employing the MPI (Message Passing Interface) standard for the data exchange between parallel processes. The solution is represented by a series of orthogonal polynomials on the interval [0, 1]. The algorithm is characterized by simplicity and the possibility to solve nonlinear problems with a correction of the operator in accordance with the solution obtained in the previous iterative process.
Application of decentralized cooperative problem solving in dynamic flexible scheduling
NASA Astrophysics Data System (ADS)
Guan, Zai-Lin; Lei, Ming; Wu, Bo; Wu, Ya; Yang, Shuzi
1995-08-01
The object of this study is to discuss an intelligent solution to the problem of task-allocation in shop floor scheduling. For this purpose, the technique of distributed artificial intelligence (DAI) is applied. Intelligent agents (IAs) are used to realize decentralized cooperation, and negotiation is realized by using message passing based on the contract net model. Multiple agents, such as manager agents, workcell agents, and workstation agents, make game-like decisions based on multiple criteria evaluations. This procedure of decentralized cooperative problem solving makes local scheduling possible. And by integrating such multiple local schedules, dynamic flexible scheduling for the whole shop floor production can be realized.
Aspen: A microsimulation model of the economy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Basu, N.; Pryor, R.J.; Quint, T.
1996-10-01
This report presents, Aspen. Sandia National Laboratories is developing this new agent-based microeconomic simulation model of the U.S. economy. The model is notable because it allows a large number of individual economic agents to be modeled at a high level of detail and with a great degree of freedom. Some features of Aspen are (a) a sophisticated message-passing system that allows individual pairs of agents to communicate, (b) the use of genetic algorithms to simulate the learning of certain agents, and (c) a detailed financial sector that includes a banking system and a bond market. Results from runs of themore » model are also presented.« less
NASA Technical Reports Server (NTRS)
Lawson, Gary; Poteat, Michael; Sosonkina, Masha; Baurle, Robert; Hammond, Dana
2016-01-01
In this work, several mini-apps have been created to enhance a real-world application performance, namely the VULCAN code for complex flow analysis developed at the NASA Langley Research Center. These mini-apps explore hybrid parallel programming paradigms with Message Passing Interface (MPI) for distributed memory access and either Shared MPI (SMPI) or OpenMP for shared memory accesses. Performance testing shows that MPI+SMPI yields the best execution performance, while requiring the largest number of code changes. A maximum speedup of 23X was measured for MPI+SMPI, but only 10X was measured for MPI+OpenMP.
Ellingson, Sally R; Dakshanamurthy, Sivanesan; Brown, Milton; Smith, Jeremy C; Baudry, Jerome
2014-04-25
In this paper we give the current state of high-throughput virtual screening. We describe a case study of using a task-parallel MPI (Message Passing Interface) version of Autodock4 [1], [2] to run a virtual high-throughput screen of one-million compounds on the Jaguar Cray XK6 Supercomputer at Oak Ridge National Laboratory. We include a description of scripts developed to increase the efficiency of the predocking file preparation and postdocking analysis. A detailed tutorial, scripts, and source code for this MPI version of Autodock4 are available online at http://www.bio.utk.edu/baudrylab/autodockmpi.htm.
Heartbeat-based error diagnosis framework for distributed embedded systems
NASA Astrophysics Data System (ADS)
Mishra, Swagat; Khilar, Pabitra Mohan
2012-01-01
Distributed Embedded Systems have significant applications in automobile industry as steer-by-wire, fly-by-wire and brake-by-wire systems. In this paper, we provide a general framework for fault detection in a distributed embedded real time system. We use heartbeat monitoring, check pointing and model based redundancy to design a scalable framework that takes care of task scheduling, temperature control and diagnosis of faulty nodes in a distributed embedded system. This helps in diagnosis and shutting down of faulty actuators before the system becomes unsafe. The framework is designed and tested using a new simulation model consisting of virtual nodes working on a message passing system.
Heartbeat-based error diagnosis framework for distributed embedded systems
NASA Astrophysics Data System (ADS)
Mishra, Swagat; Khilar, Pabitra Mohan
2011-12-01
Distributed Embedded Systems have significant applications in automobile industry as steer-by-wire, fly-by-wire and brake-by-wire systems. In this paper, we provide a general framework for fault detection in a distributed embedded real time system. We use heartbeat monitoring, check pointing and model based redundancy to design a scalable framework that takes care of task scheduling, temperature control and diagnosis of faulty nodes in a distributed embedded system. This helps in diagnosis and shutting down of faulty actuators before the system becomes unsafe. The framework is designed and tested using a new simulation model consisting of virtual nodes working on a message passing system.
How to Build an AppleSeed: A Parallel Macintosh Cluster for Numerically Intensive Computing
NASA Astrophysics Data System (ADS)
Decyk, V. K.; Dauger, D. E.
We have constructed a parallel cluster consisting of a mixture of Apple Macintosh G3 and G4 computers running the Mac OS, and have achieved very good performance on numerically intensive, parallel plasma particle-incell simulations. A subset of the MPI message-passing library was implemented in Fortran77 and C. This library enabled us to port code, without modification, from other parallel processors to the Macintosh cluster. Unlike Unix-based clusters, no special expertise in operating systems is required to build and run the cluster. This enables us to move parallel computing from the realm of experts to the main stream of computing.
NASA Technical Reports Server (NTRS)
Jones, Terry; Mark, Richard; Martin, Jeanne; May, John; Pierce, Elsie; Stanberry, Linda
1996-01-01
This paper describes an implementation of the proposed MPI-IO (Message Passing Interface - Input/Output) standard for parallel I/O. Our system uses third-party transfer to move data over an external network between the processors where it is used and the I/O devices where it resides. Data travels directly from source to destination, without the need for shuffling it among processors or funneling it through a central node. Our distributed server model lets multiple compute nodes share the burden of coordinating data transfers. The system is built on the High Performance Storage System (HPSS), and a prototype version runs on a Meiko CS-2 parallel computer.
Analysis of multigrid methods on massively parallel computers: Architectural implications
NASA Technical Reports Server (NTRS)
Matheson, Lesley R.; Tarjan, Robert E.
1993-01-01
We study the potential performance of multigrid algorithms running on massively parallel computers with the intent of discovering whether presently envisioned machines will provide an efficient platform for such algorithms. We consider the domain parallel version of the standard V cycle algorithm on model problems, discretized using finite difference techniques in two and three dimensions on block structured grids of size 10(exp 6) and 10(exp 9), respectively. Our models of parallel computation were developed to reflect the computing characteristics of the current generation of massively parallel multicomputers. These models are based on an interconnection network of 256 to 16,384 message passing, 'workstation size' processors executing in an SPMD mode. The first model accomplishes interprocessor communications through a multistage permutation network. The communication cost is a logarithmic function which is similar to the costs in a variety of different topologies. The second model allows single stage communication costs only. Both models were designed with information provided by machine developers and utilize implementation derived parameters. With the medium grain parallelism of the current generation and the high fixed cost of an interprocessor communication, our analysis suggests an efficient implementation requires the machine to support the efficient transmission of long messages, (up to 1000 words) or the high initiation cost of a communication must be significantly reduced through an alternative optimization technique. Furthermore, with variable length message capability, our analysis suggests the low diameter multistage networks provide little or no advantage over a simple single stage communications network.
Byron, Paul; Albury, Kath; Evers, Clifton
2013-05-01
In today's media environment, information is not simply passed from producers to consumers, but is mediated by participants of new media cultures, including information on sexual health. In focus groups held in Sydney and regional Australia in 2011, we asked young people aged 16-22 about the potential for sexual health promotion via Facebook and other social media. Our findings point to the complex ways in which young people use social media, and the unlikelihood of traditional take-home sexual health messages having traction in social media spaces. Five key aspects which emerged were: the participatory culture of social network sites; the stigma of sexual health, especially sexually transmitted infections (STIs); young people's careful presentations of self; privacy concerns; and the importance of humour in sexual health messaging. Fears of bullying and gossip (or 'drama') were also likely to prevent the dissemination of sexual health messages in this environment. However, humorous online videos were noted by participants as a significant way to avoid stigma and enable the sharing of sexual health information. The young people in our study were interested in sexual health information, but did not want to access it at the cost of their own sense of comfort and belonging in their social networks. Any sexual health promotion within these sites must be understood as a site-specific intervention. Copyright © 2013 Reproductive Health Matters. Published by Elsevier Ltd. All rights reserved.
Health Vlogger-Viewer Interaction in Chronic Illness Management
Liu, Leslie S.; Huh, Jina; Neogi, Tina; Inkpen, Kori; Pratt, Wanda
2014-01-01
Health video blogs (vlogs) allow individuals with chronic illnesses to share their stories, experiences, and knowledge with the general public. Furthermore, health vlogs help in creating a connection between the vlogger and the viewers. In this work, we present a qualitative study examining the various methods that health vloggers use to establish a connection with their viewers. We found that vloggers used genres to express specific messages to their viewers while using the uniqueness of video to establish a deeper connection with their viewers. Health vloggers also explicitly sought interaction with their viewers. Based on these results, we present design implications to help facilitate and build sustainable communities for vloggers. PMID:24634895
(Re)Integration of mental patients - mixed media messages.
Jukić, Vlado
2008-09-01
It can be said that (re)integration of mental patients is the basic goal of psychiatry as a medical discipline. Throughout the history of psychiatry different approaches to treatment and rehabilitation of mental patients and their social (re)integration have been identified and monitored. There have always existed different impediments to the (re)integration of mental patients, as a manifestation of the times when treatment and rehabilitation took place. In the beginning of psychiatric development, the principal goal, in line with the social development and social awareness of human rights, was to isolate the patient away from his/her social environment and place him/her into a psychiatric hospital, preferably for life. Lately, as fighting for human rights grew into a matter of fashion and prestige rather than an ethical and legal issue, the media have often spoken about the human rights of mental patients and, explicitly or implicitly, advocated their social (re)integration. This cry for human rights of mental patients has virtually rooted out the advocates for permanent social isolation, even in this region. However, the Croatian media often give out the so called mixed messages when it comes to treating mental patients. This article analyzes such contradictory communication and attempts to offer certain solutions.
NASA Astrophysics Data System (ADS)
Riegle-Crumb, Catherine
2017-01-01
Despite being the focus of decades of research as well as interventions, gender inequality in representation in many STEM fields, including physics, engineering, and computer science remains. Recent research indicates that high school is a particularly important time point to investigate regarding the roots of inequality, as this is when many young women decide that they are not interested in pursuing degrees in these STEM fields. This presentation will focus on the role of local contexts, including communities, classrooms, and peers, in contributing to such decisions. Specifically, sociological theories suggest that role models and peers within young people's immediate environment can send both implicit and explicit messages that contradict larger social stereotypes, and promote perceptions and experiences of inclusion. Alternatively, adults and peers can endorse and behave in a manner consistent with stereotypes, leading to overtly exclusionary messages and actions. Utilizing data from a large urban district in the Southwest, as well as a national sample of high school students, this presentation will examine how such factors within local contexts can work in both positive and negative ways to shape girls' interests and expectations in STEM fields.
Forensic implications: adolescent sexting and cyberbullying.
Korenis, Panagiota; Billick, Stephen Bates
2014-03-01
Adolescence is marked by establishing a sense of identity, core values, a sense of one's relationship to the outside world and heightened peer relationships. In addition, there is also risk taking, impulsivity, self exploration and dramatic increase in sexuality. The dramatic increase in the use of cell phones and the Internet has additional social implications of sexting and cyberbullying. Sexting refers to the practice of sending sexually explicit material including language or images to another person's cell phone. Cyberbullying refers to the use of this technology to socially exclude, threaten, insult or shame another person. Studies of cell phone use in the 21st century report well over 50% of adolescents use them and that text messaging is the communication mode of choice. Studies also show a significant percentage of adolescents send and receive sex messaging, both text and images. This paper will review this expanding literature. Various motivations for sexting will also be reviewed. This new technology presents many dangers for adolescents. The legal implications are extensive and psychiatrists may play an important role in evaluation of some of these adolescents in the legal context. This paper will also make suggestions on future remedies and preventative actions.
The readings of smoking fathers: a reception analysis of tobacco cessation images.
Johnson, Joy L; Oliffe, John L; Kelly, Mary T; Bottorff, Joan L; LeBeau, Karen
2009-09-01
The purpose of this qualitative study was to examine how new fathers decode image-based anti-smoking messages and uncover the extent to which ideals of masculinity might influence men to take up and/or disregard smoking cessation messages. The authors analyzed 5 images that had been used to promote smoking cessation and arrived at a consensus about the dominant discourse encoded by each image. During face-to-face interviews, new fathers were invited to discuss the images; these interview data were coded and analyzed using a social constructionist gender analysis. The study findings highlight how most men negotiated or opposed dominant discourses of health that communicated the dangers of smoking by reproducing dominant ideals of masculinity, including explicit disregard for self-health. They accepted dominant social discourses of fathering that reproduced traditional notions of masculinity, such as the protector and provider. The authors conclude that tobacco interventions targeted to new fathers must (a) develop more awareness of the ability of audiences to select discourses that empower their own interpretive positioning with regard to media, and (b) deconstruct and engage with context and age-specific masculine ideals to avoid providing rationales for continued tobacco use.
Diabetes and the Motivated Patient: Understanding Perlocutionary Effect in Health Communication.
Roth, Erin G; Girling, Laura M; Chard, Sarah; Wallace, Brandy Harris; Eckert, J Kevin
2017-04-01
Health care providers (HCP) understand the importance of keeping patients motivated but may be unaware how their words may have unintended negative effects upon their patient's lives. People with diabetes report being told by their HCP that they are "cured" or that they are praised for strides made in weight loss and/or lowered blood glucose, and interpret these messages in unexpected ways. For this paper, we focus upon one case to illustrate the depth and nuance of the patient-provider communication as it emerged within a larger interview-based ethnographic study. Audio-recorded interviews and transcriptions were analyzed discursively. Discourse analysis reveals the ways ideology affects how the patient responds to HCP's utterances and how this affects diabetes self-care. Findings indicate significant perlocutionary effects upon health outcomes, varying both positively and/or negatively. This study points to the importance of carefully considering the power of words and whenever possible knowing the patient's ideological orientation to their world. HCPs should be explicit and deliberate with their communication. Sensitization to the various ways patients hear and react to messages in a clinical setting may lead to improved health outcomes, especially for those with chronic health conditions such as diabetes mellitus.
Hesketh, K; Waters, E; Green, J; Salmon, L; Williams, J
2005-03-01
Preventative health strategies incorporating the views of target participants have improved the likelihood of success. This qualitative study aimed to elicit child and parent views regarding social and environmental barriers to healthy eating, physical activity and child obesity prevention programmes, acceptable foci, and appropriate modes of delivery. To obtain views across a range of social circumstances three demographically diverse primary schools in Victoria, Australia were selected. Children in Grades 2 (aged 7-8 years) and 5 (aged 10-11 years) participated in focus groups of three to six children. Groups were semi-structured using photo-based activities to initiate discussion. Focus groups with established parent groups were also conducted. Comments were recorded, collated, and themes extracted using grounded theory. 119 children and 17 parents participated. Nine themes emerged: information and awareness, contradiction between knowledge and behaviour, lifestyle balance, local environment, barriers to a healthy lifestyle, contradictory messages, myths, roles of the school and family, and timing and content of prevention strategies for childhood obesity. In conclusion, awareness of food 'healthiness' was high however perceptions of the 'healthiness' of some sedentary activities that are otherwise of benefit (e.g. reading) were uncertain. The contradictions in messages children receive were reported to be a barrier to a healthy lifestyle. Parent recommendations regarding the timing and content of childhood obesity prevention strategies were consistent with quantitative research. Contradictions in the explicit and implicit messages children receive around diet and physical activity need to be prevented. Consistent promotion of healthy food and activity choices across settings is core to population prevention programmes for childhood obesity.